Innovative Dynamic SRAM PUF Authentication for Trusted Internet of Things

被引:5
|
作者
Urien, Pascal [1 ]
机构
[1] Telecom Paris, 19 Pl Marguerite Perey, F-91120 Palaiseau, France
关键词
PUF; SRAM; Security;
D O I
10.1109/wimob50308.2020.9253432
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper presents innovative dynamic SRAM PUF (Physical Unclonable Function) authentication for microcontroller units (MCU) embedding static RAM. We introduce a low cost PUF extractor, designed to monitor the MCU power-up and to read SRAM content. Some SRAM cells, referred as flipping-bits, have a fix content dependant on the voltage rising time. Experiments, using double ramp power-up waveform, show that these cells switch at low voltage values (below 500mV) according to a distribution, which seems to be linear. Because the digital part of the MCU is not working when flipping-bits switch, we propose a simple SRAM dynamic authentication protocol, based on slope and square power-up waveform, whose goal is to detect cloned MCUs.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] TTAS: Trusted Token Authentication Service of Securing SCADA Network in Energy Management System for Industrial Internet of Things
    Yang, Yu-Sheng
    Lee, Shih-Hsiung
    Chen, Wei-Che
    Yang, Chu-Sing
    Huang, Yuen-Min
    Hou, Ting-Wei
    SENSORS, 2021, 21 (08)
  • [42] A Lightweight Authentication Protocol for Internet of Things
    Lee, Jun-Ya
    Lin, Wei-Cheng
    Huang, Yu-Hung
    2014 INTERNATIONAL SYMPOSIUM ON NEXT-GENERATION ELECTRONICS (ISNE), 2014,
  • [43] Survey of Authentication and Authorization for the Internet of Things
    Trnka, Michal
    Cerny, Tomas
    Stickney, Nathaniel
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [44] Privacy, Discovery, and Authentication for the Internet of Things
    Wu, David J.
    Taly, Ankur
    Shankar, Asim
    Boneh, Dan
    COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 301 - 319
  • [45] Authentication Techniques for the Internet of Things: A Survey
    Saadeh, Maha
    Sleit, Azzam
    Qatawneh, Mohammed
    Almobaideen, Wesam
    2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC), 2016, : 28 - 34
  • [46] Efficient Multicast Authentication in Internet of Things
    Bamasag, Omaimah
    Toumi, Kamal Youcef
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 429 - 435
  • [47] Research of authentication techniques for the Internet of things
    Yan H.
    Wang L.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (07): : 213 - 222
  • [48] A Survey on Authentication Techniques for the Internet of Things
    Atwady, Yahya
    Hammoudeh, Mohammad
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (ICFNDS '17), 2017,
  • [49] Continuous Authentication and Authorization for the Internet of Things
    Shahzad, Muhammad
    Singh, Munindar P.
    IEEE INTERNET COMPUTING, 2017, 21 (02) : 86 - 90
  • [50] A Survey on Authentication Techniques for the Internet of Things
    Albalawi, Afrah
    Almrshed, Amal
    Badhib, Arwa
    Alshehri, Suhair
    2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 271 - 275