59 research outputs found

    IoT Security Evolution: Challenges and Countermeasures Review

    Get PDF
    Internet of Things (IoT) architecture, technologies, applications and security have been recently addressed by a number of researchers. Basically, IoT adds internet connectivity to a system of intelligent devices, machines, objects and/or people. Devices are allowed to automatically collect and transmit data over the Internet, which exposes them to serious attacks and threats. This paper provides an intensive review of IoT evolution with primary focusing on security issues together with the proposed countermeasures. Thus, it outlines the IoT security challenges as a future roadmap of research for new researchers in this domain

    Sensor-Based PUF:A Lightweight Random Number Generator for Resource Constrained IoT Devices

    Get PDF
    Internet of Things (IoT) prevalence is surging swiftly over the past years, and by 2050, the number of IoT devices are expected to exceed 50 billion. IoT has been deployed in many application domains such as smart health, smart logistics and smart manufacturing. IoT has significantly improved quality of our day-to-day life. However, IoT faces multiple challenges due to its lack of adequate computational and storage capabilities and consequently it is very strenuous to implement sophisticated cryptographic mechanisms for security, trust and privacy. The number of IoT devices are increasing drastically which potentially leads to additional challenges namely transparency, scalability and central point of failure. Furthermore, the growing number of IoT applications induces the need of decentralized and resource constrained mechanisms. Therefore, in this paper, we propose a decentralized Random Number Generator (RNG) based on sensor Physical Unclonable Functions (PUF) in smart logistics scenario. PUF is a secure and lightweight source of randomness and hence suitable for constrained devices. Data is collected from various sensors and processed to extract cryptographically secure seed. NIST tests are performed to appraise the aptness of the proposed mechanism. Moreover, the seed is fed into an Elliptic Curve Cryptographic (ECC) mechanism to generate pseudo-random numbers and keys which can potentially be used for authentication, encryption and decryption purposes.</p

    PROGRAMMABLE WRINKLE PATTERNING ON MICROPARTICLES

    Get PDF
    학위논문 (박사)-- 서울대학교 대학원 : 전기·컴퓨터공학부, 2017. 2. 권성훈.Wrinkles can be defined as sinusoidal topography with ridge and valley structures, and they commonly exist in various organisms like human skins. Many scientists have studied to understand the fundamental principles of the natural wrinkling phenomenon in various material systems. Moreover, engineers have also paid attention to these spontaneously generated wrinkle patterns found in nature, even with complex structures in micro/nano scale, because it is hard to fabricate them with conventional lithography technologies. Therefore, various bottom-up patterning methods based on the mechanical instability have been developed as alternatives to top-down patterning approaches. To utilize wrinkling as patterning purposes, appropriate control mechanisms are required in the fabrication processes due to the random nature of it. Although numerous patterning technologies with controllability have been developed by pre-patterning the substrates or films, engineering the stress states, and others, it was elusive to achieve both the flexible pattern design (e.g., precise control of in individual ridge to any geometry) and the high-throughput production of heterogeneously patterned structures, simultaneously. In this dissertation, a new wrinkle patterning platform based on the microparticle substrate is presented, which is able to realize them and thus to extend utility of the wrinkle patterns. For this purpose, polymeric microparticles coated with silica film were utilized for the unit structure, because the parameters to program the resulting wrinkle patterns (e.g., elastic modulus, film thickness, and geometry of the microparticle) could be dynamically tuned in each microparticle during the fabrication processes. By shrinking the homogeneously or heterogeneously programmed silica-coated microparticles, a few thousands of wrinkled microstructures could be constructed in a single fabrication process. First, the random wrinkle patterns were generated on plane, disk-type microparticles, and they were utilized as unclonable codes analogous to human fingerprint for anti-counterfeiting purposes. Using conventional fingerprint identification algorithms, the authentication system of these artificial fingerprints was demonstrated, and the uniqueness, individuality, and durability of them were verified. This application was the first functionalization of random wrinkle patterns. Next, several control techniques were applied to tune the degree of the pattern randomness or the directionality of ridges in low-level. Further, an elaborate wrinkle control mechanism was developed by pre-patterning the ridge guiding structures consisting of small grooves on the surface of the polymeric microparticles. This slightly modified patterning method allowed the self-organization of microstructures with precise control of the individual ridge orientation over the randomness. Not only the anisotropic, orthogonal, and hexagonal ridge patterns, but also the letter-shaped ridge patterns were realized. Although this dissertation focused on the polymeric microparticles covered by silica, the presented programmable wrinkle patterning concept could be also applied to other materials or substrates systems. It is expected that this patterning technology and the resulting structures could be utilized for various purposes other than the presented applications, including those for useful experimental platforms in studying mechanical instability.Chapter 1 Introduction 1 1.1 Principle of Wrinkling 2 1.2 Wrinkle Patterning Methods 4 1.2.1 Planar Substrates 5 1.2.2 Curved Substrates 12 1.3 Applications 15 1.4 Main Concept: Wrinkle Patterning on Microparticles 17 Chapter 2 Patterning Random Wrinkles 20 2.1 Microparticle Synthesis 21 2.2 Silica-Coating 24 2.3 Wrinkling Process 28 Chapter 3 Application: Artificial Microfingerprints 33 3.1 Anti-Counterfeiting Technologies 34 3.1.1 Taggant Systems 35 3.1.2 Physical Unclonable Function (PUF) 38 3.2 Concept of Artificial Fingerprints 42 3.3 Security Level Control 47 3.4 Individuality Analysis 57 3.5 Demonstration 66 Chapter 4 Patterning Controlled Wrinkles 78 4.1 Rough Control Methods 79 4.2 Sophisticated Control Method: Guided Wrinkling 83 4.3 Analysis of Orthogonal Ridge Patterns 87 4.4 Programming Ridge Directionality 93 Chapter 5 Conclusion 98 Bibliography 101 Abstract in Korean 109Docto

    A Physical Unclonable Function Based on Inter-Metal Layer Resistance Variations and an Evaluation of its Temperature and Voltage Stability

    Get PDF
    Keying material for encryption is stored as digital bistrings in non-volatile memory (NVM) on FPGAs and ASICs in current technologies. However, secrets stored this way are not secure against a determined adversary, who can use probing attacks to steal the secret. Physical Unclonable functions (PUFs) have emerged as an alternative. PUFs leverage random manufacturing variations as the source of entropy for generating random bitstrings, and incorporate an on-chip infrastructure for measuring and digitizing the corresponding variations in key electrical parameters, such as delay or voltage. PUFs are designed to reproduce a bitstring on demand and therefore eliminate the need for on-chip storage. In this dissertation, I propose a kind of PUF that measures resistance variations in inter-metal layers that define the power grid of the chip and evaluate its temperature and voltage stability. First, I introduce two implementations of a power grid-based PUF (PG-PUF). Then, I analyze the quality of bit strings generated without considering environmental variations from the PG-PUFs that leverage resistance variations in: 1) the power grid metal wires in 60 copies of a 90 nm chip and 2) in the power grid metal wires of 58 copies of a 65 nm chip. Next, I carry out a series of experiments in a set of 63 chips in IBM\u27s 90 nm technology at 9 TV corners, i.e., over all combination of 3 temperatures: -40oC, 25oC and 85oC and 3 voltages: nominal and +/-10% of the nominal supply voltage. The randomness, uniqueness and stability characteristics of bitstrings generated from PG-PUFs are evaluated. The stability of the PG-PUF and an on-chip voltage-to-digital (VDC) are also evaluated at 9 temperature-voltage corners. I introduce several techniques that have not been previously described, including a mechanism to eliminate voltage trends or \u27bias\u27 in the power grid voltage measurements, as well as a voltage threshold, Triple-Module-Redundancy (TMR) and majority voting scheme to identify and exclude unstable bits

    How Physicality Enables Trust: A New Era of Trust-Centered Cyberphysical Systems

    Full text link
    Multi-agent cyberphysical systems enable new capabilities in efficiency, resilience, and security. The unique characteristics of these systems prompt a reevaluation of their security concepts, including their vulnerabilities, and mechanisms to mitigate these vulnerabilities. This survey paper examines how advancement in wireless networking, coupled with the sensing and computing in cyberphysical systems, can foster novel security capabilities. This study delves into three main themes related to securing multi-agent cyberphysical systems. First, we discuss the threats that are particularly relevant to multi-agent cyberphysical systems given the potential lack of trust between agents. Second, we present prospects for sensing, contextual awareness, and authentication, enabling the inference and measurement of ``inter-agent trust" for these systems. Third, we elaborate on the application of quantifiable trust notions to enable ``resilient coordination," where ``resilient" signifies sustained functionality amid attacks on multiagent cyberphysical systems. We refer to the capability of cyberphysical systems to self-organize, and coordinate to achieve a task as autonomy. This survey unveils the cyberphysical character of future interconnected systems as a pivotal catalyst for realizing robust, trust-centered autonomy in tomorrow's world

    Reflective-Physically Unclonable Function based System for Anti-Counterfeiting

    Get PDF
    Physically unclonable functions (PUF) are physical security mechanisms, which utilize inherent randomness in processes used to instantiate physical objects. In this dissertation, an extensive overview of the state of the art in implementations, accompanying definitions and their analysis is provided. The concept of the reflective-PUF is presented as a product security solution. The viability of the concept, its evaluation and the requirements of such a system is explored

    New authentication applications in the protection of caller ID and banknote

    Get PDF
    In the era of computers and the Internet, where almost everything is interconnected, authentication plays a crucial role in safeguarding online and offline data. As authentication systems face continuous testing from advanced attacking techniques and tools, the need for evolving authentication technology becomes imperative. In this thesis, we study attacks on authentication systems and propose countermeasures. Considering various nominated techniques, the thesis is divided into two parts. The first part introduces caller ID verification (CIV) protocol to address caller ID spoofing in telecommunication systems. This kind of attack usually follows fraud, which not only inflicts financial losses on victims but also reduces public trust in the telephone system. We propose CIV to authenticate the caller ID based on a challenge-response process. We show that spoofing can be leveraged, in conjunction with dual tone multi-frequency (DTMF), to efficiently implement the challenge-response process, i.e., using spoofing to fight against spoofing. We conduct extensive experiments showing that our solution can work reliably across the legacy and new telephony systems, including landline, cellular and Internet protocol (IP) network, without the cooperation of telecom providers. In the second part, we present polymer substrate fingerprinting (PSF) as a method to combat counterfeiting of banknotes in the financial area. Our technique is built on the observation that the opacity coating leaves uneven thickness in the polymer substrate, resulting in random translucent patterns when a polymer banknote is back-lit by a light source. With extensive experiments, we show that our method can reliably authenticate banknotes and is robust against rough daily handling of banknotes. Furthermore, we show that the extracted fingerprints are extremely scalable to identify every polymer note circulated globally. Our method ensures that even when counterfeiters have procured the same printing equipment and ink as used by a legitimate government, counterfeiting banknotes remains infeasible
    corecore