Cargando…
A novel IoT sensor authentication using HaLo extraction method and memory chip variability
Since the inception of encrypted messages thousands of years ago, mathematicians and scientists have continued to improve encryption algorithms in order to create more secure means of communication. These improvements came by means of more complex encryption algorithms that have stronger security fe...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer International Publishing
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8527440/ http://dx.doi.org/10.1007/s43926-021-00019-2 |
_version_ | 1784586068261076992 |
---|---|
author | Gordon, Holden Lyp, Thomas Kimbro, Calvin Tehranipoor, Sara |
author_facet | Gordon, Holden Lyp, Thomas Kimbro, Calvin Tehranipoor, Sara |
author_sort | Gordon, Holden |
collection | PubMed |
description | Since the inception of encrypted messages thousands of years ago, mathematicians and scientists have continued to improve encryption algorithms in order to create more secure means of communication. These improvements came by means of more complex encryption algorithms that have stronger security features such as larger keys and trusted third parties. While many new processors can handle these more complex encryption algorithms, IoT devices on the edge often struggle to keep up with resource intensive encryption standards. In order to meet this demand for lightweight, secure encryption on the edge, this paper proposes a novel solution, called the High and Low (HaLo) method, that generates Physical Unclonable Function (PUF) signatures based on process variations within flash memory. These PUF signatures can be used to uniquely identify and authenticate remote sensors, and help ensure that messages being sent from remote sensors are encrypted adequately without requiring computationally expensive methods. The HaLo method consumes 20x less power than conventional authentication schemes commonly used with IoT devices, it has an average latency of only 39ms for 512 bit signature generation, and the average error rate is below 0.06%. Due to its low latency, low error rate, and high power efficiency, the HaLo method can progress the field of IoT encryption standards by accurately and efficiently authenticating remote sensors without sacrificing encryption integrity. |
format | Online Article Text |
id | pubmed-8527440 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | Springer International Publishing |
record_format | MEDLINE/PubMed |
spelling | pubmed-85274402021-10-20 A novel IoT sensor authentication using HaLo extraction method and memory chip variability Gordon, Holden Lyp, Thomas Kimbro, Calvin Tehranipoor, Sara Discov Internet Things Research Since the inception of encrypted messages thousands of years ago, mathematicians and scientists have continued to improve encryption algorithms in order to create more secure means of communication. These improvements came by means of more complex encryption algorithms that have stronger security features such as larger keys and trusted third parties. While many new processors can handle these more complex encryption algorithms, IoT devices on the edge often struggle to keep up with resource intensive encryption standards. In order to meet this demand for lightweight, secure encryption on the edge, this paper proposes a novel solution, called the High and Low (HaLo) method, that generates Physical Unclonable Function (PUF) signatures based on process variations within flash memory. These PUF signatures can be used to uniquely identify and authenticate remote sensors, and help ensure that messages being sent from remote sensors are encrypted adequately without requiring computationally expensive methods. The HaLo method consumes 20x less power than conventional authentication schemes commonly used with IoT devices, it has an average latency of only 39ms for 512 bit signature generation, and the average error rate is below 0.06%. Due to its low latency, low error rate, and high power efficiency, the HaLo method can progress the field of IoT encryption standards by accurately and efficiently authenticating remote sensors without sacrificing encryption integrity. Springer International Publishing 2021-10-20 2021 /pmc/articles/PMC8527440/ http://dx.doi.org/10.1007/s43926-021-00019-2 Text en © The Author(s) 2021 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) . |
spellingShingle | Research Gordon, Holden Lyp, Thomas Kimbro, Calvin Tehranipoor, Sara A novel IoT sensor authentication using HaLo extraction method and memory chip variability |
title | A novel IoT sensor authentication using HaLo extraction method and memory chip variability |
title_full | A novel IoT sensor authentication using HaLo extraction method and memory chip variability |
title_fullStr | A novel IoT sensor authentication using HaLo extraction method and memory chip variability |
title_full_unstemmed | A novel IoT sensor authentication using HaLo extraction method and memory chip variability |
title_short | A novel IoT sensor authentication using HaLo extraction method and memory chip variability |
title_sort | novel iot sensor authentication using halo extraction method and memory chip variability |
topic | Research |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8527440/ http://dx.doi.org/10.1007/s43926-021-00019-2 |
work_keys_str_mv | AT gordonholden anoveliotsensorauthenticationusinghaloextractionmethodandmemorychipvariability AT lypthomas anoveliotsensorauthenticationusinghaloextractionmethodandmemorychipvariability AT kimbrocalvin anoveliotsensorauthenticationusinghaloextractionmethodandmemorychipvariability AT tehranipoorsara anoveliotsensorauthenticationusinghaloextractionmethodandmemorychipvariability AT gordonholden noveliotsensorauthenticationusinghaloextractionmethodandmemorychipvariability AT lypthomas noveliotsensorauthenticationusinghaloextractionmethodandmemorychipvariability AT kimbrocalvin noveliotsensorauthenticationusinghaloextractionmethodandmemorychipvariability AT tehranipoorsara noveliotsensorauthenticationusinghaloextractionmethodandmemorychipvariability |