ABSTRACT
This work presents a sustainable cybersecurity solution using Physical Unclonable Functions (PUF), Trusted Platform Module (TPM), and Tangle Distributed Ledger Technology (DLT) for sustainable device and data security. Security-by-Design (SbD) or Hardware- Assisted Security (HAS) solutions have gained much prominence due to the requirement of tamper-proof storage for hardwareassisted cryptography solutions. Designing complex security mechanisms can impact their efficiency as IoT applications are more decentralized. In the proposed architecture, we presented a novel TPM-enabled PUF-based security mechanism with effective integration of PUF with TPM. The proposed mechanism is based on the process of sealing the PUF key in the TPM, which cannot be accessed outside the TPM and can only be unsealed by the TPM itself. A specified NV-index is assigned to each IoT node for sealing the PUF key to TPM using the Media Access Control (MAC) address. Access to the TPM's Non-Volatile Random Access Memory (NVRAM) is defined by the TPM's Enhanced Authorization policies as specified by the Trust Computing Group (TCG). The proposed architecture uses Tangle for sustainable data security and storage in decentralized IoT systems through a Masked Authentication Messaging (MAM) scheme for efficient and secure access control to Tangle. We validated the proposed approach through experimental analysis and implementation, which substantiates the potential of the presented PUFchain 4.0 for decentralized IoT-driven security solutions.
- Mohammed Achemlal, Said Gharout, and Chrystel Gaber. 2011. Trusted Platform Module as an Enabler for Security in Cloud Computing. In Proc. Conference on Network and Information Systems Security. https://doi.org/10.1109/sar-ssi.2011.5931361Google ScholarCross Ref
- Will Arthur and David Challener. 2015. A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security 1st ed.). Apress, USA.Google ScholarDigital Library
- Mudassar Aslam, Bushra Mohsin, Abdul Nasir, and Shahid Raza. 2020. FoNAC - An automated Fog Node Audit and Certification scheme. Computers & Security, Vol. 93 (2020), 101759. https://doi.org/10.1016/j.cose.2020.101759Google ScholarCross Ref
- Venkata K. V. V. Bathalapalli, Saraju P. Mohanty, Elias Kougianos, Babu K. Baniya, and Bibhudutta Rout. 2022. PUFchain 3.0: Hardware-Assisted Distributed Ledger for Robust Authentication in the Internet of Medical Things. In Internet of Things. IoT through a Multi-disciplinary Perspective. Springer International Publishing, 23--40. https://doi.org/10.1007/978-3-031-18872-5_2Google Scholar
- Venkata K. V. V. Bathalapalli, Saraju P. Mohanty, Elias Kougianos, Venkata P. Yanambaka, Babu K. Baniya, and Bibhudutta Rout. 2021. A PUF-based Approach for Sustainable Cybersecurity in Smart Agriculture. In Proc. 19th OITS International Conference on Information Technology (OCIT). 375--380. https://doi.org/10.1109/ocit53463.2021.00080Google ScholarCross Ref
- Miguel Calvo and Marta Beltrán. 2021. Remote Attestation as a Service for Edge-Enabled IoT. In Proc. IEEE International Conference on Services Computing (SCC). 329--339. https://doi.org/10.1109/SCC53864.2021.00046Google ScholarCross Ref
- Jin Cao, Tong Zhu, Ruhui Ma, Zhenyang Guo, Yinghui Zhang, and Hui Li. 2022. A Software-based Remote Attestation Scheme for Internet of Things Devices. IEEE Transactions on Dependable and Secure Computing (2022), 1--1. https://doi.org/10.1109/tdsc.2022.3154887Google ScholarDigital Library
- Bhaskara S. Egala, Ashok K. Pradhan, Venkataramana Badarla, and Saraju P. Mohanty. 2021. Fortified-Chain: A Blockchain-Based Framework for Security and Privacy-Assured Internet of Medical Things With Effective Access Control. IEEE Internet of Things Journal, Vol. 8, 14 (July 2021), 11717--11731. https://doi.org/10.1109/jiot.2021.3058946Google ScholarCross Ref
- Janusz Furtak. 2022. Data Exchange Protocol for Cryptographic Key Distribution System Using MQTT Service. In Proc. 17th Conference on Computer Science and Intelligence Systems (FedCSIS). 611--615. https://doi.org/10.15439/2022F260Google ScholarCross Ref
- Hala Hamadeh and Akhilesh Tyagi. 2019. Physical Unclonable Functions (PUFs) Entangled Trusted Computing Base. In Proc. IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS). 177--180. https://doi.org/10.1109/iSES47678.2019.00047Google ScholarCross Ref
- Ira Ray Jenkins and Sean W. Smith. 2020. Distributed IoT Attestation via Blockchain. In Proc. 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID). 798--801. https://doi.org/10.1109/CCGrid49817.2020.000--7Google Scholar
- Dawei Li, Yingpeng Zhang, Jian Cui, Di Liu, Yu Sun, Zhenyu Guan, and Xu Wang. 2022. Remote Audit Scheme of Embedded Device Software Based on TPM. In Proc. 8th IEEE Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS). 61--66. https://doi.org/10.1109/BigDataSecurityHPSCIDS54978.2022.00021Google ScholarCross Ref
- Di Lu, Ruidong Han, Yulong Shen, Xuewen Dong, Jianfeng Ma, Xiaojiang Du, and Mohsen Guizani. 2021. xTSeH: A Trusted Platform Module Sharing Scheme Towards Smart IoT-eHealth Devices. IEEE Journal on Selected Areas in Communications, Vol. 39, 2 (February 2021), 370--383. https://doi.org/10.1109/jsac.2020.3020658Google ScholarCross Ref
- Saraju P. Mohanty. 2020. Security and Privacy by Design is Key in the Internet of Everything (IoE) Era. IEEE Consumer Electronics Magazine, Vol. 9, 2 (March 2020), 4--5. https://doi.org/10.1109/mce.2019.2954959Google ScholarCross Ref
- Saraju P. Mohanty, Venkata P. Yanambaka, Elias Kougianos, and Deepak Puthal. 2020. PUFchain: A Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE). IEEE Consumer Electronics Magazine, Vol. 9, 2 (2020), 8--16. https://doi.org/10.1109/mce.2019.2953758Google ScholarCross Ref
- Han Qiu, Meikang Qiu, Meiqin Liu, and Gerard Memmi. 2020. Secure Health Data Sharing for Medical Cyber-Physical Systems for the Healthcare 4.0. IEEE Journal of Biomedical and Health Informatics, Vol. 24, 9 (September 2020), 2499--2505. https://doi.org/10.1109/jbhi.2020.2973467Google ScholarCross Ref
- Vinay Kumar Calastry Ramesh, Yoohwan Kim, and Ju-Yeon Jo. 2020. Secure IoT Data Management in a Private Ethereum Blockchain. In Proc. 44th IEEE Annual Computers, Software, and Applications Conference (COMPSAC). https://doi.org/10.1109/compsac48688.2020.0-219Google Scholar
- Shyam Sundar, Prabhakara Yellai, Siva Sankara Sai Sanagapati, Prayas Chandra Pradhan, and Sai Kiran Kumar Reddy Y. 2019. Remote Attestation based Software Integrity of IoT devices. In Proc. IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). 1--4. https://doi.org/10.1109/ants47819.2019.9117946Google ScholarDigital Library
Index Terms
- PUFchain 4.0: Integrating PUF-based TPM in Distributed Ledger for Security-by-Design of IoT
Recommendations
DISA - A Blockchain-Based Distributed Information Security Audit
Information Integration and Web IntelligenceAbstractInformation security audits are essential for the assessment of enterprise cyber security maturity levels, both from a technical and organizational perspective. A common way of conducting such an assessment is to carry out a security audit based ...
Low-cost Security for Next-generation IoT Networks
SI: Evolution of IoT Networking Architectures papersIn recent years, the ubiquitous nature of Internet-of-Things (IoT) applications as well as the pervasive character of next-generation communication protocols, such as the 5G technology, have become widely evident. In this work, we identify the need for ...
Comments