Skip to main content

The IoT Identification Procedure Based on the Degraded Flash Memory Sector

  • Conference paper
  • First Online:
Internet of Things, Smart Spaces, and Next Generation Networks and Systems (ruSMART 2017, NsCC 2017, NEW2AN 2017)

Abstract

The article presents general principles of IoT identification on the basis of the degraded bucket of NOR flash memory used in network devices for storing microprograms. We proposed the identification procedure based on the sector of forcibly degraded flash memory and considered variants of its application for identifying network devices. The proposed identification method can be used both on the basis of chips already existing in network devices and on the basis of embedded units specially designed for identification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kirichek, R., Koucheryavy, A.: Internet of Things laboratory test bed. In: Zeng, Q.-A. (ed.) Wireless Communications, Networking and Applications. LNEE, vol. 348, pp. 485–494. Springer, New Delhi (2016). doi:10.1007/978-81-322-2580-5_44

    Chapter  Google Scholar 

  2. Kirichek, R., Kulik, V., Koucheryavy, A.: False clouds for Internet of Things and methods of protection. In: IEEE 18th International Conference on Advanced Communication Technology: ICACT 2016, Phoenix Park, Korea, pp. 201–205 (2016)

    Google Scholar 

  3. Vermesan, O., Friess, P. (eds.): Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems. River Publishers, Aalborg (2013)

    Google Scholar 

  4. Russell, B., Van Duren, D.: Practical Internet of Things Security. Packt Publishing, Birmingham (2016)

    Google Scholar 

  5. Dhanjani, N.: Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts. O’Reilly Media, Sebastopol (2015)

    Google Scholar 

  6. Hu, F. (ed.): Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations. CRC Press, Boca Raton (2016)

    Google Scholar 

  7. Leloglu, E.: A review of security concerns in Internet of Things. J. Comput. Commun. 5, 121–136 (2017)

    Article  Google Scholar 

  8. Soldatos, J., Yuming, G. (eds.): Internet of Things. EU-China Joint White Paper on Internet-of-Things Identification. European Research Cluster on the Internet of Things (2014)

    Google Scholar 

  9. Hegde, A.: MAC spoofing detection and prevention. Int. J. Adv. Res. Comput. Commun. Eng. 5(1), 229–232 (2016)

    MathSciNet  Google Scholar 

  10. DeJean, G., Kirovski, D.: RF-DNA: radio-frequency certificates of authenticity. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 346–363. Springer, Heidelberg (2007). doi:10.1007/978-3-540-74735-2_24

    Chapter  Google Scholar 

  11. Wang, Y., et al.: Flash memory for ubiquitous hardware security functions: true random number generation and device fingerprints. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy. IEEE Computer Society, Washington, 20–25 May 2012. doi:10.1109/SP.2012.12

  12. Jia, S., Xia, L., Wang, Z., Lin, J., Zhang, G., Ji, Y.: Extracting robust keys from NAND flash physical unclonable functions. In: Lopez, J., Mitchell, C.J. (eds.) ISC 2015. LNCS, vol. 9290, pp. 437–454. Springer, Cham (2015). doi:10.1007/978-3-319-23318-5_24

    Chapter  Google Scholar 

  13. Jakobsson, M., Johansson, K.-A.: Unspoofable Device Identity Using NAND Flash Memory (2010). http://www.securityweek.com/unspoofable-device-identity-using-nand-flash-memory. Accessed 1 May 2017

  14. Bez, R., Camerlenghi, E., Modelli, A., Visconti, A.: Introduction to flash memory. Proc. IEEE 91(4), 489–502 (2003). doi:10.1109/JPROC.2003.811702

    Article  Google Scholar 

  15. Tal, A.: Two Flash Technologies Compared: NOR vs NAND. 91-SR-012-04-8 L REV. 1.0. M-Systems Flash Disk Pioneers. Newark (2002)

    Google Scholar 

Download references

Acknowledgments

The publication was financially supported by the Ministry of Education and Science of the Russian Federation (the Agreement number 02.a03.21.0008).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sergey Vladimirov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Vladimirov, S., Kirichek, R. (2017). The IoT Identification Procedure Based on the Degraded Flash Memory Sector. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. ruSMART NsCC NEW2AN 2017 2017 2017. Lecture Notes in Computer Science(), vol 10531. Springer, Cham. https://doi.org/10.1007/978-3-319-67380-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67380-6_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67379-0

  • Online ISBN: 978-3-319-67380-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics