Abstract
The omnipresence of resource-constrained sensors connected to the cloud has enabled numerous Internet of Things (IoT) applications. However, the trust in these IoT applications is severely compromised by security concerns. We introduce a lightweight and effective security approach for such applications by protecting the sensors. Our approach leverages Physically Unclonable Functions (PUF) on the sensor platform to ensure non-repudiation of sensed data and integrity of sensor hardware and firmware. We compare the performance of different PUF implementations on Atmel, ARM, and FPGA-based sensing platforms, analyze the security properties of the proposed protocols and determine the overhead in terms of latency, storage and logic area. Our evaluation shows that it only incurs insignificant overhead on low-end sensors.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Saroiu, S., Wolman, A.: I am a sensor, and i approve this message. In: Proceedings of Mobile Computing Systems & Applications, pp. 37–42. ACM (2010)
Dua, A., Bulusu, N., Feng, W.-C., Hu, W.: Towards trustworthy participatory sensing. In: Proceedings on Hot topics in security, p. 8. USENIX (2009)
Kapadia, A., Kotz, D., Triandopoulos, N.: Opportunistic sensing: security challenges for the new paradigm. In: Proceedings of Communication Systems and Networks and Workshops, pp. 1–10. IEEE (2009)
Haider, I., Höberl, M., Rinner, B.: Trusted sensors for participatory sensing and iot applications based on physically unclonable functions. In: Proceedings of Workshop on IoT Privacy, Trust, and Security, pp. 14–21. ACM (2016)
Winkler, T., Rinner, B.: Securing embedded smart cameras with trusted computing. EURASIP J. Wirel. Commun. Netw. 2011, 530354 (2011)
Potkonjak, M., Meguerdichian, S., Wong, J.L.: Trusted sensors and remote sensing. In: Proceedings on Sensors. IEEE (2010)
Rosenfeld, K., Gavas, E., Karri, R.: Sensor physical unclonable functions. In: Proceedings on Hardware-Oriented Security and Trust (HOST). IEEE (2010)
Maes, R.: Physically unclonable functions: constructions, properties and applications. Ph.D. dissertation, University of KU Leuven (2012)
Tuyls, P., Batina, L.: RFID-tags for anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115–131. Springer, Heidelberg (2006). doi:10.1007/11605805_8
Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. J. Cryptol. 22(1), 1–61 (2009)
Cao, Y., Zhang, L., Zalivaka, S.S., Chang, C., Chen, S.: CMOS image sensor based physical unclonable function for coherent sensor-level authentication. IEEE Trans. Circu. Syst. I Regular Papers 62(11), 2629–2640 (2015)
Rajendran, J., Tang, J., Karri, R.: Securing pressure measurements using SensorPUFs. In: Proceedings of Circuits and Systems, pp. 1330–1333. IEEE (2016)
Acknowledgment
This research has been funded by the Austrian Research Promotion Agency (FFG) under grant number 842432. Michael Höberl has implemented RO PUF and was supported by the FP7 research project MATTHEW under grant number 610436.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Haider, I., Rinner, B. (2018). Securing Cloud-Based IoT Applications with Trustworthy Sensing. In: Longo, A., et al. Cloud Infrastructures, Services, and IoT Systems for Smart Cities. IISSC CN4IoT 2017 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 189. Springer, Cham. https://doi.org/10.1007/978-3-319-67636-4_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-67636-4_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-67635-7
Online ISBN: 978-3-319-67636-4
eBook Packages: Computer ScienceComputer Science (R0)