Abstract
A wide spectrum of security challenges were arose by Wireless Sensor Network (WSN) architectures and common security techniques used in traditional networks are impractical. In particular, being the sensor nodes often deployed in unattended areas, physical attacks are possible and have to be taken into account during the architecture design. Whenever an attacker enters in possession of a node, he/she can jeopardize the network by extracting cryptographic keys used for secure communication. Moreover, an attacker can also try to brute force the keys, hence they should be fully random and hard to guess. In this paper, we propose a novel solution based on generating keys from unique physical characteristics of a node integrated circuit without requiring additional hardware compared to common WSN node architectures. To this aim, we exploit the Static Random Access Memory based Physically Unclonable Functions and we show their applicability to the WSN by implementing a working prototype based on the STM32F4 microcontroller.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
The Reed-Muller ECC has a (128,8,63) configuration, which has probability error of 4.321086e-09.
- 2.
The device goes into standby mode to power down the SRAM, before rebooting.
References
Albanese, M., Battista, E., Jajodia, S., Casola, V.: Manipulating the attacker’s view of a system’s attack surface. In: 2014 IEEE Conference on Communications and Network Security (CNS), pp. 472–480. IEEE (2014)
Amato, F., Chianese, A., Moscato, V., Picariello, A., Sperli, G.: Snops: A Smart Environment for Cultural Heritage Applications, pp. 49–56 (2012)
Amato, F., Mazzeo, A., Moscato, V., Picariello, A.: Exploiting cloud technologies and context information for recommending touristic paths. Stud. Comput. Intell. 511, 281–287 (2014)
Anderson, J.H.: A puf design for secure fpga-based embedded systems. In: Proceedings of Asia and South Pacific Design Automation Conference, pp. 1–6. IEEE Press (2010)
Barbareschi, M., Bagnasco, P., Mazzeo, A.: Supply voltage variation impact on anderson puf quality. In: 2015 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS), pp. 1–6. IEEE (2015)
Barbareschi, M., Battista, E., Mazzeo, A., Mazzocca, N.: Testing 90 nm microcontroller sram puf quality. In: 2015 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS), pp. 1–6. IEEE (2015)
Barbareschi, M., Battista, E., Mazzeo, A., Venkatesan, S.: Advancing wsn physical security adopting tpm-based architectures. In: 2014 IEEE 15th International Conference on Information Reuse and Integration (IRI), pp. 394–399. IEEE (2014)
Battista, E., Casola, V., Mazzeo, A., Mazzocca, N.: Siren: a feasible moving target defence framework for securing resource-constrained embedded nodes. Int. J. Crit. Comput.-Based Syst. 4(4), 374–392 (2013)
Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The simon and speck lightweight block ciphers. In: Proceedings of the 52nd Annual Design Automation Conference, p. 175. ACM (2015)
Böhm, C., Hofer, M., Pribyl, W.: A microcontroller sram-puf. In: 2011 5th International Conference on Network and System Security (NSS), pp. 269–273. IEEE (2011)
Cilardo, A., Barbareschi, M., Mazzeo, A.: Secure distribution infrastructure for hardware digital contents. CDT, IET 8(6), 300–310 (2014)
Claes, M., van der Leest, V., Braeken, A.: Comparison of sram and ff puf in 65nm technology. In: Information Security Technology for Applications, pp. 47–64. Springer (2011)
Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. Springer (2007)
Hu, W., Tan, H., Corke, P., Shih, W.C., Jha, S.: Toward trusted wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 7(1), 5 (2010)
Lee, Y.S., Lee, H.J., Alasaarela, E.: Mutual authentication in wireless body sensor networks (wbsn) based on physical unclonable function (puf). In: 2013 9th International Wireless Communications and Mobile Computing, pp. 1314–1318. IEEE (2013)
Liu, W., Zhang, Z., Li, M., Liu, Z.: A trustworthy key generation prototype based on ddr3 puf for wireless sensor networks. Sensors 14(7), 11542–11556 (2014)
Maes, R., Tuyls, P., Verbauwhede, I.: Intrinsic pufs from ip-ops on reconfigurable devices. In: Proceedings of Benelux Information and System Security, Eindhoven (2008)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC press (1996)
Rampon, J., Perillat, R., Torres, L., Benoit, P., Di Natale, G., Barbareschi, M.: Digital right management for ip protection. In: IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2015, pp. 200–203. IEEE (2015)
STMicroelectronics: RM0090 Reference Manual, 10 (2015)
Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th annual Design Automation Conference, pp. 9–14. ACM (2007)
Vatajelu, I., Di Natale, G., Barbareschi, M., Torres, L., Indaco, M., Prinetto, P.: Stt-mram-based puf architecture exploiting magnetic tunnel junction fabrication-induced variability. ACM J. Emerg. Technol. Comput. Syst. 12(4) (2015)
Yang, K., Zheng, K., Guo, Y., Wei, D.: Puf-based node mutual authentication scheme for delay tolerant mobile sensor network. In: 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1–4. IEEE (2011)
Acknowledgments
The list of Authors is in alphabetical order. The corresponding authors are Mario Barbareschi and Ermanno Battista. This research work was partially supported by CeRICT for the project NEMBO—PONPE_00159.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Amelino, D., Barbareschi, M., Battista, E., Mazzeo, A. (2016). How to Manage Keys and Reconfiguration in WSNs Exploiting SRAM Based PUFs. In: Pietro, G., Gallo, L., Howlett, R., Jain, L. (eds) Intelligent Interactive Multimedia Systems and Services 2016. Smart Innovation, Systems and Technologies, vol 55. Springer, Cham. https://doi.org/10.1007/978-3-319-39345-2_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-39345-2_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-39344-5
Online ISBN: 978-3-319-39345-2
eBook Packages: EngineeringEngineering (R0)