Abstract
The technological progress we witnessed in recent years has led to a pervasive usage of smart and embedded devices in many application domains. The monitoring of Power Delivery Networks (PDNs) is an example: the use of interconnected sensors makes it possible to detect faults and to dynamically adapt the network topology to isolate and compensate for them. In this paper we discuss how Fault-Detection, Isolation and Service Recovery (FDISR) for PDNs can be modeled according to the fog-computing paradigm, which distributes part of the computation among edge nodes and the cloud. In particular, we consider an FDISR application on Medium-Voltage PDNs (MV-PDNs) based on a Wireless Sensor Network (WSN) whose nodes make use of the Long Range (LoRa) technology to communicate with each other. Security concerns and the attack model of such application are discussed, then the use of a communication protocol based on the Physically Unclonable Functions (PUFs) mechanism is proposed to achieve both mutual authentication and confidentiality. Finally, an implementation of the proposal is presented and evaluated w.r.t. security concerns and communication overhead.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Barbareschi, M., Bagnasco, P., Amelino, D., Mazzeo, A.: Designing an SRAM PUF-based secret extractor for resource-constrained devices. Int. J. Embedded Syst. 9, 353–364 (2017)
Angrisani, L., Bonavolontà , F., Liccardo, A., Schiano Lo Moriello, R.: On the use of LoRa technology for logic selectivity in MV distribution networks. Energies 11(11), 3079 (2018)
Barbareschi, M., Bagnasco, P., Mazzeo, A.: Authenticating IoT devices with physically unclonable functions models. In: 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp. 563–567. IEEE (2015)
Barbareschi, M., De Benedictis, A., La Montagna, E., Mazzeo, A., Mazzocca, N.: A PUF-based mutual authentication scheme for cloud-edges IoT systems. Futur. Gener. Comput. Syst. 101, 246–261 (2019)
Barbareschi, M., De Benedictis, A., Mazzocca, N.: A PUF-based hardware mutual authentication protocol. J. Parallel Distrib. Comput. 119, 107–120 (2018)
Botton, S., Cavalletto, L., Marmeggi, F.: Schema project-innovative criteria for management and operation of a closed ring mv network. In: 22th International Conference and Exhibition on Electricity Distribution (CIRED 2013). IET (2013)
Bou-Harb, E., Fachkha, C., Pourzandi, M., Debbabi, M., Assi, C.: Communication security for smart grid distribution networks. IEEE Commun. Mag. 51(1), 42–49 (2013)
Böhm, C., Hofer, M., Pribyl, W.: A microcontroller SRAM-PUF. In: 2011 5th International Conference on Network and System Security, pp. 269–273 (2011)
Casola, V., Benedictis, A.D., Drago, A., Mazzocca, N.: Analysis and comparison of security protocols in wireless sensor networks. In: 30th IEEE Symposium on Reliable Distributed Systems Workshops, SRDS Workshops 2011, Madrid, Spain, 4–7 October 2011, pp. 52–56. IEEE Computer Society (2011)
Chien, H.: SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Sec. Comput. 4, 337–340 (2007)
Cortez, M., Dargar, A., Hamdioui, S., Schrijen, G.J.: Modeling SRAM start-up behavior for physical unclonable functions. In: 2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), pp. 1–6. IEEE (2012)
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_31
D’Orazio, L., Calone, R.: Innovative protection system on distribution network. In: 22th International Conference and Exhibition on Electricity Distribution (CIRED 2013). IET (2013)
Fouda, M.M., Fadlullah, Z.M., Kato, N., Lu, R., Shen, X.S.: A lightweight message authentication scheme for smart grid communications. IEEE Trans. Smart Grid 2(4), 675–685 (2011)
Frikken, K.B., Blanton, M., Atallah, M.J.: Robust authentication using physically unclonable functions. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 262–277. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04474-8_22
Hellman, M.E.: An overview of public key cryptography. IEEE Commun. Mag. 40(5), 42–49 (2002)
Hung, K., et al.: On wireless sensors communication for overhead transmission line monitoring in power delivery systems. In: 2010 First IEEE International Conference on Smart Grid Communications, pp. 309–314. IEEE (2010)
Kanuparthi, A., Karri, R., Addepalli, S.: Hardware and embedded security in the context of Internet of Things. In: Proceedings of the 2013 ACM Workshop on Security, Privacy & Dependability for Cyber Vehicles, pp. 61–64 (2013)
Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395–411 (2018)
Kulkarni, G., Shelke, R., Sutar, R., Mohite, S.: RFID security issues & challenges. In: 2014 International Conference on Electronics and Communication Systems (ICECS), pp. 1–4, February 2014
Li, H., Lu, R., Zhou, L., Yang, B., Shen, X.: An efficient Merkle-tree-based authentication scheme for smart grid. IEEE Syst. J. 8(2), 655–663 (2013)
Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5), 1125–1142 (2017)
Mahmood, K., Chaudhry, S.A., Naqvi, H., Kumari, S., Li, X., Sangaiah, A.K.: An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Futur. Gener. Comput. Syst. 81, 557–565 (2018)
Mahmood, K., Chaudhry, S.A., Naqvi, H., Shon, T., Ahmad, H.F.: A lightweight message authentication scheme for smart grid communications in power sector. Comput. Electr. Eng. 52, 114–124 (2016)
Muller, D.E.: Application of Boolean algebra to switching circuit design and to error detection. Trans. IRE Prof. Group Electron. Comput. 3, 6–12 (1954)
Ni, J., Zhang, K., Lin, X., Shen, X.S.: Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun. Surv. Tutor. 20(1), 601–628 (2018)
Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297(5589), 2026–2030 (2002)
Raychowdhury, A., Pramanik, A.: Survey on LoRa technology: solution for Internet of Things. In: Thampi, S.M., et al. (eds.) Intelligent Systems, Technologies and Applications. AISC, vol. 1148, pp. 259–271. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-3914-5_20
Reed, I.S.: A class of multiple-error-correcting codes and the decoding scheme. Technical report, Massachusetts Institute of Technology, Lincoln Laboratory, Lexington (1953)
Roel, M.: Physically unclonable functions: constructions, properties and applications. Katholieke Universiteit Leuven, Belgium (2012)
Roman, R., Lopez, J., Mambo, M.: Mobile edge computing, Fog et al.: a survey and analysis of security threats and challenges. Futur. Gener. Comput. Syst. 78, 680–698 (2018)
Rostami, M., Majzoobi, M., Koushanfar, F., Wallach, D.S., Devadas, S.: Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching. IEEE Trans. Emerg. Top. Comput. 2(1), 37–49 (2014)
Schrijen, G., van der Leest, V.: Comparative analysis of SRAM memories used as PUF primitives. In: 2012 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1319–1324 (2012)
Spalding, R.A., et al.: Fault location, isolation and service restoration (FLISR) functionalities tests in a smart grids laboratory for evaluation of the quality of service. In: 2016 17th International Conference on Harmonics and Quality of Power (ICHQP), pp. 879–884. IEEE (2016)
Stojmenovic, I., Wen, S.: The Fog computing paradigm: scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems, pp. 1–8, September 2014
Stojmenovic, I., Wen, S., Huang, X., Luan, H.: An overview of fog computing and its security issues. Concurr. Comput. Practice Exp. 28(10), 2991–3005 (2016)
Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: 2007 44th ACM/IEEE Design Automation Conference, pp. 9–14. IEEE (2007)
Tewari, A., Gupta, B.B.: Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J. Supercomput. 73(3), 1085–1102 (2017)
Valdes, M.E., Dougherty, J.J.: Advances in protective device interlocking for improved protection and selectivity. IEEE Trans. Ind. Appl. 50(3), 1639–1648 (2013)
Xiao, K., Rahman, M.T., Forte, D., Huang, Y., Su, M., Tehranipoor, M.: Bit selection algorithm suitable for high-volume production of SRAM-PUF. In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 101–106 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Barbareschi, M., Barone, S., Fezza, A., La Montagna, E. (2021). Enforcing Mutual Authentication and Confidentiality in Wireless Sensor Networks Using Physically Unclonable Functions: A Case Study. In: Paiva, A.C.R., Cavalli, A.R., Ventura Martins, P., Pérez-Castillo, R. (eds) Quality of Information and Communications Technology. QUATIC 2021. Communications in Computer and Information Science, vol 1439. Springer, Cham. https://doi.org/10.1007/978-3-030-85347-1_22
Download citation
DOI: https://doi.org/10.1007/978-3-030-85347-1_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-85346-4
Online ISBN: 978-3-030-85347-1
eBook Packages: Computer ScienceComputer Science (R0)