Skip to main content

A Lightweight and Robust Authentication and Key Agreements with Physically Unclonable Function in Manufacturing Environments

  • Conference paper
  • First Online:
New Trends in Computer Technologies and Applications (ICS 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1723))

Included in the following conference series:

  • 666 Accesses

Abstract

With the growth of networks and semi-conduction, the Internet of things (IoT) is undergoing a golden year nowadays. At the same time, the Internet of Things (IoT) in the manufacturing environment has faced a critical problem with information security. As the network technology flourish, the way of attack is richer and richer. The traditional defense solution no longer fits with manufacturing environments. Therefore, the industry is willing to get a lighter weight and stronger security mechanism to confront security challenges in the future. In order to achieve the state above, the new mechanism needs to have the ability to generate the truly random value to avoid the collision that the algorithm used now may face, although it seldom happens. Simultaneously, it needs to reduce power consumption as much as possible. Thus, Physically Unclonable Function (PUF) is a solution. Because it has the property which can generate truly random values to avoid collision and save power when executing, our proposed scheme aims to improve the performance and reliability of Physically Unclonable Functions (PUF) to authentication to create a secure channel. When devices in the manufacturing environment transmit a message, it will be bypassed by a secure channel to the destination safely.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gurunath, R., et al.: An overview: security issue in IoT network. In: 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC). IEEE (2018)

    Google Scholar 

  2. Lo’ai, T., et al.: IoT privacy and security: challenges and solutions. Appl. Sci. 10(12), 4102 (2020)

    Article  Google Scholar 

  3. Charles, H., et al.: Physical unclonable functions and applications: a tutorial. Proc. IEEE 102(8), 1126–1141 (2014)

    Article  Google Scholar 

  4. Shamsoshoara, A., Korenda, A., Afghah, F., Zeadally, S.: A survey on physical unclonable function (PUF)-based security solutions for Internet of Things. Comput. Netw. 183, 107593 (2020)

    Article  Google Scholar 

  5. Babaei, A., Schiele, G.: Physical unclonable functions in the internet of things: state of the art and open challenges. Sensors 19(14), 3208 (2019)

    Article  Google Scholar 

  6. John, R.A., et al.: Halide perovskite memristors as flexible and reconfigurable physical unclonable functions. Nat. Commun. 12(1), 1–11 (2021)

    Article  Google Scholar 

  7. Gao, Y., Al-Sarawi, S.F., Abbott, D.: Physical unclonable functions. Nat. Electron. 3(2), 81–91 (2020)

    Article  Google Scholar 

  8. tiny-AES-c. https://github.com/kokke/tiny-AES-c. Accessed 22 Dec 2021

  9. sha256. https://github.com/LekKit/sha256. Accessed 9 Aug 2020

Download references

Acknowledgement

This work was partially supported by the Ministry of Science and Technology of Taiwan under grant MOST 111-2218-E-011-016- and MOST 111-2221-E-011-112.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jheng-Jia Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lai, BA., Yeh, YH., Chen, GY., Huang, JJ., Lo, NW. (2022). A Lightweight and Robust Authentication and Key Agreements with Physically Unclonable Function in Manufacturing Environments. In: Hsieh, SY., Hung, LJ., Klasing, R., Lee, CW., Peng, SL. (eds) New Trends in Computer Technologies and Applications. ICS 2022. Communications in Computer and Information Science, vol 1723. Springer, Singapore. https://doi.org/10.1007/978-981-19-9582-8_34

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-9582-8_34

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-9581-1

  • Online ISBN: 978-981-19-9582-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics