skip to main content
10.1145/3583781.3590206acmconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
research-article

PUFchain 4.0: Integrating PUF-based TPM in Distributed Ledger for Security-by-Design of IoT

Published:05 June 2023Publication History

ABSTRACT

This work presents a sustainable cybersecurity solution using Physical Unclonable Functions (PUF), Trusted Platform Module (TPM), and Tangle Distributed Ledger Technology (DLT) for sustainable device and data security. Security-by-Design (SbD) or Hardware- Assisted Security (HAS) solutions have gained much prominence due to the requirement of tamper-proof storage for hardwareassisted cryptography solutions. Designing complex security mechanisms can impact their efficiency as IoT applications are more decentralized. In the proposed architecture, we presented a novel TPM-enabled PUF-based security mechanism with effective integration of PUF with TPM. The proposed mechanism is based on the process of sealing the PUF key in the TPM, which cannot be accessed outside the TPM and can only be unsealed by the TPM itself. A specified NV-index is assigned to each IoT node for sealing the PUF key to TPM using the Media Access Control (MAC) address. Access to the TPM's Non-Volatile Random Access Memory (NVRAM) is defined by the TPM's Enhanced Authorization policies as specified by the Trust Computing Group (TCG). The proposed architecture uses Tangle for sustainable data security and storage in decentralized IoT systems through a Masked Authentication Messaging (MAM) scheme for efficient and secure access control to Tangle. We validated the proposed approach through experimental analysis and implementation, which substantiates the potential of the presented PUFchain 4.0 for decentralized IoT-driven security solutions.

References

  1. Mohammed Achemlal, Said Gharout, and Chrystel Gaber. 2011. Trusted Platform Module as an Enabler for Security in Cloud Computing. In Proc. Conference on Network and Information Systems Security. https://doi.org/10.1109/sar-ssi.2011.5931361Google ScholarGoogle ScholarCross RefCross Ref
  2. Will Arthur and David Challener. 2015. A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security 1st ed.). Apress, USA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Mudassar Aslam, Bushra Mohsin, Abdul Nasir, and Shahid Raza. 2020. FoNAC - An automated Fog Node Audit and Certification scheme. Computers & Security, Vol. 93 (2020), 101759. https://doi.org/10.1016/j.cose.2020.101759Google ScholarGoogle ScholarCross RefCross Ref
  4. Venkata K. V. V. Bathalapalli, Saraju P. Mohanty, Elias Kougianos, Babu K. Baniya, and Bibhudutta Rout. 2022. PUFchain 3.0: Hardware-Assisted Distributed Ledger for Robust Authentication in the Internet of Medical Things. In Internet of Things. IoT through a Multi-disciplinary Perspective. Springer International Publishing, 23--40. https://doi.org/10.1007/978-3-031-18872-5_2Google ScholarGoogle Scholar
  5. Venkata K. V. V. Bathalapalli, Saraju P. Mohanty, Elias Kougianos, Venkata P. Yanambaka, Babu K. Baniya, and Bibhudutta Rout. 2021. A PUF-based Approach for Sustainable Cybersecurity in Smart Agriculture. In Proc. 19th OITS International Conference on Information Technology (OCIT). 375--380. https://doi.org/10.1109/ocit53463.2021.00080Google ScholarGoogle ScholarCross RefCross Ref
  6. Miguel Calvo and Marta Beltrán. 2021. Remote Attestation as a Service for Edge-Enabled IoT. In Proc. IEEE International Conference on Services Computing (SCC). 329--339. https://doi.org/10.1109/SCC53864.2021.00046Google ScholarGoogle ScholarCross RefCross Ref
  7. Jin Cao, Tong Zhu, Ruhui Ma, Zhenyang Guo, Yinghui Zhang, and Hui Li. 2022. A Software-based Remote Attestation Scheme for Internet of Things Devices. IEEE Transactions on Dependable and Secure Computing (2022), 1--1. https://doi.org/10.1109/tdsc.2022.3154887Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Bhaskara S. Egala, Ashok K. Pradhan, Venkataramana Badarla, and Saraju P. Mohanty. 2021. Fortified-Chain: A Blockchain-Based Framework for Security and Privacy-Assured Internet of Medical Things With Effective Access Control. IEEE Internet of Things Journal, Vol. 8, 14 (July 2021), 11717--11731. https://doi.org/10.1109/jiot.2021.3058946Google ScholarGoogle ScholarCross RefCross Ref
  9. Janusz Furtak. 2022. Data Exchange Protocol for Cryptographic Key Distribution System Using MQTT Service. In Proc. 17th Conference on Computer Science and Intelligence Systems (FedCSIS). 611--615. https://doi.org/10.15439/2022F260Google ScholarGoogle ScholarCross RefCross Ref
  10. Hala Hamadeh and Akhilesh Tyagi. 2019. Physical Unclonable Functions (PUFs) Entangled Trusted Computing Base. In Proc. IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS). 177--180. https://doi.org/10.1109/iSES47678.2019.00047Google ScholarGoogle ScholarCross RefCross Ref
  11. Ira Ray Jenkins and Sean W. Smith. 2020. Distributed IoT Attestation via Blockchain. In Proc. 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID). 798--801. https://doi.org/10.1109/CCGrid49817.2020.000--7Google ScholarGoogle Scholar
  12. Dawei Li, Yingpeng Zhang, Jian Cui, Di Liu, Yu Sun, Zhenyu Guan, and Xu Wang. 2022. Remote Audit Scheme of Embedded Device Software Based on TPM. In Proc. 8th IEEE Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS). 61--66. https://doi.org/10.1109/BigDataSecurityHPSCIDS54978.2022.00021Google ScholarGoogle ScholarCross RefCross Ref
  13. Di Lu, Ruidong Han, Yulong Shen, Xuewen Dong, Jianfeng Ma, Xiaojiang Du, and Mohsen Guizani. 2021. xTSeH: A Trusted Platform Module Sharing Scheme Towards Smart IoT-eHealth Devices. IEEE Journal on Selected Areas in Communications, Vol. 39, 2 (February 2021), 370--383. https://doi.org/10.1109/jsac.2020.3020658Google ScholarGoogle ScholarCross RefCross Ref
  14. Saraju P. Mohanty. 2020. Security and Privacy by Design is Key in the Internet of Everything (IoE) Era. IEEE Consumer Electronics Magazine, Vol. 9, 2 (March 2020), 4--5. https://doi.org/10.1109/mce.2019.2954959Google ScholarGoogle ScholarCross RefCross Ref
  15. Saraju P. Mohanty, Venkata P. Yanambaka, Elias Kougianos, and Deepak Puthal. 2020. PUFchain: A Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE). IEEE Consumer Electronics Magazine, Vol. 9, 2 (2020), 8--16. https://doi.org/10.1109/mce.2019.2953758Google ScholarGoogle ScholarCross RefCross Ref
  16. Han Qiu, Meikang Qiu, Meiqin Liu, and Gerard Memmi. 2020. Secure Health Data Sharing for Medical Cyber-Physical Systems for the Healthcare 4.0. IEEE Journal of Biomedical and Health Informatics, Vol. 24, 9 (September 2020), 2499--2505. https://doi.org/10.1109/jbhi.2020.2973467Google ScholarGoogle ScholarCross RefCross Ref
  17. Vinay Kumar Calastry Ramesh, Yoohwan Kim, and Ju-Yeon Jo. 2020. Secure IoT Data Management in a Private Ethereum Blockchain. In Proc. 44th IEEE Annual Computers, Software, and Applications Conference (COMPSAC). https://doi.org/10.1109/compsac48688.2020.0-219Google ScholarGoogle Scholar
  18. Shyam Sundar, Prabhakara Yellai, Siva Sankara Sai Sanagapati, Prayas Chandra Pradhan, and Sai Kiran Kumar Reddy Y. 2019. Remote Attestation based Software Integrity of IoT devices. In Proc. IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). 1--4. https://doi.org/10.1109/ants47819.2019.9117946Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. PUFchain 4.0: Integrating PUF-based TPM in Distributed Ledger for Security-by-Design of IoT

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          GLSVLSI '23: Proceedings of the Great Lakes Symposium on VLSI 2023
          June 2023
          731 pages
          ISBN:9798400701252
          DOI:10.1145/3583781

          Copyright © 2023 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 5 June 2023

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate312of1,156submissions,27%

          Upcoming Conference

          GLSVLSI '24
          Great Lakes Symposium on VLSI 2024
          June 12 - 14, 2024
          Clearwater , FL , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader