Please use this identifier to cite or link to this item:
Scopus Web of Science® Altmetric
Type: Conference paper
Title: Building secure SRAM PUF key generators on resource constrained devices
Author: Gao, Y.
Su, Y.
Yang, W.
Chen, S.
Nepal, S.
Ranasinghe, D.
Citation: Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2019 / pp.912-917
Publisher: IEEE
Issue Date: 2019
Series/Report no.: International Conference on Pervasive Computing and Communications
ISBN: 9781538691519
ISSN: 2474-2503
Conference Name: IEEE International Conference on Pervasive Computing and Communications (PerCom)Workshops (PerCom Workshops) (11 Mar 2019 - 15 Mar 2019 : Kyoto, Japan)
Statement of
Yansong Gao, Yang Su, Wei Yang, Shiping Chen, Surya Nepal, and Damith C. Ranasinghe
Abstract: A securely maintained key is the premise upon which data stored and transmitted by ubiquitously deployed resource limited devices, such as those in the Internet of Things (IoT), are protected. However, many of these devices lack a secure non-volatile memory (NVM) for storing keys because of cost constraints. Silicon physical unclonable functions (PUFs) offering unique device specific secrets to electronic commodities are a low-cost alternative to secure NVM. As a physical hardware security primitive, reliability of a PUF is affected by thermal noise and changes in environmental conditions; consequently, PUF responses cannot be directly employed as cryptographic keys. A fuzzy extractor can turn noisy PUF responses into usable cryptographic keys. However, a fuzzy extractor is not immediately mountable on (highly) resource constrained devices due to its implementation overhead. We present a methodology for constructing a lightweight and secure PUF key generator for resource limited devices. In particular, we focus on PUFs constructed from pervasively embedded SRAM in modern microcontroller units and use a batteryless computational radio frequency identification (CRFID) device as a representative resource constrained IoT device in a case study.
Keywords: SRAM PUF; reverse fuzzy extractor; multiple reference response; PUF key generator; computational RFID
Description: SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of Things
Rights: © 2019 IEEE
RMID: 0030119630
DOI: 10.1109/PERCOMW.2019.8730781
Grant ID:
Appears in Collections:Computer Science publications

Files in This Item:
There are no files associated with this item.

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.