Skip to main content
Log in

An FPGA Implementation of Privacy Preserving Data Provenance Model Based on PUF for Secure Internet of Things

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

Data provenance to maintain data integrity and authenticity is a significant challenge in the Internet of Things (IoT) environments. Data provenance protocols must communicate provenance metadata while preserving its privacy. This enables trust in IoT systems expanding its acceptance within society. In this paper, we present a scheme to combine data provenance and privacy-preserving solutions. Our scheme utilizes Physical Unclonable Functions (PUFs) with non-interactive zero knowledge proof to provide trustworthy and dependable IoT systems. An IoT device can anonymously send data to the corresponding server associated with the proof of ownership. We propose a privacy-preserving data provenance protocol. This protocol was synthesized with Altera Quartus. It was implemented on an Altera Cyclone IV FPGA to demonstrate its practicality and feasibility. Most of the protocol steps take time of the order of 40 \(\upmu\)s establishing its practicality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Conti M, Dehghantanha A, Franke K, Watson S. Internet of things security and forensics: challenges and opportunities; 2018.

  2. Srinivasan C, Rajesh B, Saikalyan P, Premsagar K, Yadav ES. A review on the different types of internet of things (iot). J Adv Res Dyn Control Syst. 2019;11(1):154–8.

    Google Scholar 

  3. Lu Y, Da Xu L. Internet of things (iot) cybersecurity research: a review of current research topics. IEEE Internet Things J. 2018;6(2):2103–15.

    Article  Google Scholar 

  4. Firouzi F, Rahmani AM, Mankodiya K, Badaroglu M, Merrett GV, Wong P, Farahani B. Internet-of-things and big data for smarter healthcare: from device to architecture, applications and analytics; 2018.

  5. Ray PP. A survey on internet of things architectures. J King Saud Univ Comput Inf Sci. 2018;30(3):291–319.

    Google Scholar 

  6. Abdel-Basset M, Manogaran G, Mohamed M, Rushdy E. Internet of things in smart education environment: supportive framework in the decision-making process. Concurr Comput Practice Exp. 2019;31(10):e4515.

    Article  Google Scholar 

  7. Aman MN, Chua KC, Sikdar B. Secure data provenance for the internet of things. In: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, pp 11–14, ACM; 2017.

  8. Hamadeh H, Tyagi A. Physical unclonable functions (pufs) entangled trusted computing base. In: Under review for other conference; 2019.

  9. Rackoff C, Simon DR. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Annual International Cryptology Conference; 1991. pp. 433–444, Springer.

  10. Adhikary T, Jana AD, Chakrabarty A, Jana SK. The internet of things (iot) augmentation in healthcare: An application analytics. In: International conference on intelligent computing and communication technologies; 2019. pp. 576–583, Springer.

  11. Kamal M, et al. Light-weight security and data provenance for multi-hop internet of things. IEEE Access. 2018;6:34439–48.

    Article  Google Scholar 

  12. Elkhodr M, Alsinglawi B, Alshehri M. Data provenance in the internet of things. In: 2018 32nd international conference on advanced information networking and applications workshops (WAINA); 2018. pp. 727–731, IEEE.

  13. Jaigirdar FT, Rudolph C, Bain C. Can i trust the data i see?: a physician’s concern on medical data in iot health architectures. In: Proceedings of the Australasian computer science week multiconference; 2019. p. 27, ACM.

  14. Sigwart M, Borkowski M, Peise M, Schulte S, Tai S. A secure and extensible blockchain-based data provenance framework for the internet of things. Person Ubiquitous Comput. 2020;2020:1–15.

    Google Scholar 

  15. Sigwart M, Borkowski M, Peise M, Schulte S, Tai S. Blockchain-based data provenance for the internet of things. In: Proceedings of the 9th International Conference on the Internet of Things; 2019. pp. 1–8.

  16. Muniswamy-Reddy K-K, Holland DA, Braun U, Seltzer MI. Provenance-aware storage systems. In: Usenix annual technical conference, general track; 2006. pp. 43–56.

  17. Baracaldo N, Bathen LAD, Ozugha RO, Engel R, Tata S, Ludwig H. Securing data provenance in internet of things (iot) systems. In: International conference on service-oriented computing; 2016. pp. 92–98, Springer.

  18. Jayakody JA, Rupasinghe L, Mapa N, Disanayaka T, Kandawala D, Dinusha K. A light weight provenance aware trust negotiation algorithm for smart objects in iot; 2018.

  19. Sanchez JLC, Bernabe JB, Skarmeta AF. Towards privacy preserving data provenance for the internet of things. In: 2018 IEEE 4th World Forum on Internet of Things (WF-IoT); 2018. pp. 41–46, IEEE.

  20. Alharbi K, Lin X. Pdp: a privacy-preserving data provenance scheme. In: 2012 32nd international conference on distributed computing systems workshops; 2012. pp. 500–505, IEEE.

  21. Javaid U, Aman MN, Sikdar B. Blockpro: blockchain based data provenance and integrity for secure iot environments. In: Proceedings of the 1st workshop on blockchain-enabled networked sensor systems; 2018. pp. 13–18, ACM.

  22. Camenisch J, Van Herreweghen E. Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM conference on Computer and communications security; 2002. pp. 21–30, ACM.

  23. Wallrabenstein JR. Practical and secure iot device authentication using physical unclonable functions. In: 2016 IEEE 4th international conference on future internet of things and cloud (FiCloud); 2016. pp. 99–106, IEEE.

  24. Srinivas NS, Akramuddin M. Fpga based hardware implementation of aes rijndael algorithm for encryption and decryption. In: 2016 international conference on electrical, electronics, and optimization techniques (ICEEOT); 2016. pp. 1769–1776, IEEE.

  25. Ahirwal RR, Ahke M. Elliptic curve diffie-hellman key exchange algorithm for securing hypertext information on wide area network. Int J Comput Sci Inf Technol. 2013;4(2):363–8.

    Google Scholar 

  26. Reddi VJ, Settle A, Connors DA, Cohn RS. Pin: a binary instrumentation tool for computer architecture research and education. In: Proceedings of the 2004 workshop on computer architecture education: held in conjunction with the 31st international symposium on computer architecture, WCAE ’04. New York: NY, USA), ACM; 2004.

  27. Locke G, Gallagher P. Fips pub 186–3: digital signature standard (dss). Federal Inf Process Stand Publ. 2009;3:186–93.

    Google Scholar 

  28. Li S, Da Xu L, Zhao S. 5g internet of things: a survey. J Ind Inf Integr. 2018;10:1–9.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hala Hamadeh.

Ethics declarations

Conflict of interest

On behalf of all authors, the corresponding author states that there is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Technologies and Components for Smart Cities” guest edited by Himanshu Thapliyal, Saraju P. Mohanty, Srinivas Katkoori and Kailash Chandra Ray.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hamadeh, H., Tyagi, A. An FPGA Implementation of Privacy Preserving Data Provenance Model Based on PUF for Secure Internet of Things. SN COMPUT. SCI. 2, 65 (2021). https://doi.org/10.1007/s42979-020-00428-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-020-00428-0

Keywords

Navigation