skip to main content
10.1145/2459976.2459978acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Resilient device authentication system (RDAS) through SIOMETRICS

Published: 08 January 2013 Publication History

Abstract

In recent decades, human biometrics have been used authenticate the identity of human beings and provide access control. In this paper, we describe the use of Silicon-based "Biometrics" (SIOMETRICS) as the root of trust for Identity Management. This disruptive technological approach is a result of a combination of recent advances in Physical Unclonable Function (PUF) technology, which uses the inherent minute manufacturing variations in semiconductor devices as a silicon "fingerprint," and advanced identity management techniques. Collaboration between academia, leading industry innovators, and a high assurance security DoD provider has resulted in an architectural approach to change the paradigm in cyber security by reducing the attack surface and total cost of security. This approach is applicable to addressing the supply chain risk management problem by providing a lifecycle chain of custody/trust and securing: content/services ("the Cloud"), Mobile Device Integrity (MDI), Bring Your Own Device (BYOD), weapon systems, critical infrastructure protection, and other use cases.

References

[1]
Devadas, S., Suh, E., Paral, S., Sowell, R., Ziola, T., and Khandelwal, V. 2008. Design and implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications. IEEE International Conference on RFID, 2008, pp. 58--64.
[2]
Gassend, B., Clarke, D., Dijk, M.-V., and Devadas, S. 2002. Silicon physical random functions. ACM Computer and Communication Security (CCS) Conference, 2002.
[3]
Holcomb, D., Burleson, W., and Fu, K. 2007. Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. IEEE International Conference on RFID, 2007.
[4]
Lim, D. 2004. Extracting secret keys from integrated circuits. Master's thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology (MIT), 2004.
[5]
Paral, Z., and Devadas, S. 2011. Reliable and efficient PUF-based key generation using pattern matching, IEEE Symposium on Hardware-Oriented Security and Trust (HOST), 2011.
[6]
Ruhrmair, U., Sehnke, F., Sorter, J., Dror, G., Devadas S., and Schmidhuber, J. 2010. Modeling attacks on Physical Unclonable Functions. ACM Computer and Communication Security (CCS) Conference, 2010.
[7]
Su, Y., Holleman, J., and Otis, B. 2007. A 1.6pJ/bit 96 (percent) stable chip ID generating circuit using process variations. IEEE International Solid-State Circuits Conference (ISSCC), 2007, pp. 200--201.
[8]
Suh, G. 2005. AEGIS: a single-chip secure processor. PhD thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology (MIT), 2005.
[9]
Suh, G. and Devadas, S., 2007. Physical Unclonable Functions for device authentication and secret key generation. Design Automation Conference (DAC), 2007, pp. 9--14.
[10]
Yu, M., and Devadas, S. 2010. Recombination of Physical Unclonable Functions. Government Microcircuit Applications and Critical Technology Conference (GOMACTech), 2010.
[11]
Yu, M., Sowell, R., Singh, A., M'Raïhi, D., and Devadas, S. 2012. Performance Metrics and Empirical Results of a PUF Cryptographic Key Generation ASIC. IEEE Symposium on Hardware-Oriented Security and Trust (HOST), 2012

Cited By

View all
  • (2015)Physically Unclonable Digital IDProceedings of the 2015 IEEE International Conference on Mobile Services10.1109/MobServ.2015.24(105-111)Online publication date: 27-Jun-2015

Index Terms

  1. Resilient device authentication system (RDAS) through SIOMETRICS

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
    January 2013
    282 pages
    ISBN:9781450316873
    DOI:10.1145/2459976

    Sponsors

    • Los Alamos National Labs: Los Alamos National Labs
    • Sandia National Labs: Sandia National Laboratories
    • DOE: Department of Energy
    • Oak Ridge National Laboratory
    • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
    • BERKELEYLAB: Lawrence National Berkeley Laboratory
    • Argonne Natl Lab: Argonne National Lab
    • Idaho National Lab.: Idaho National Laboratory
    • Pacific Northwest National Laboratory
    • Nevada National Security Site: Nevada National Security Site

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 January 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. identity management
    2. information assurance (IA)
    3. key management
    4. physical unclonable function (PUF)
    5. siometrics
    6. supply chain risk management (SCRM)

    Qualifiers

    • Research-article

    Conference

    CSIIRW '13
    Sponsor:
    • Los Alamos National Labs
    • Sandia National Labs
    • DOE
    • Lawrence Livermore National Lab.
    • BERKELEYLAB
    • Argonne Natl Lab
    • Idaho National Lab.
    • Nevada National Security Site
    CSIIRW '13: Cyber Security and Information Intelligence
    January 8 - 10, 2013
    Tennessee, Oak Ridge, USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2015)Physically Unclonable Digital IDProceedings of the 2015 IEEE International Conference on Mobile Services10.1109/MobServ.2015.24(105-111)Online publication date: 27-Jun-2015

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media