{"title":"基于物理不可克隆功能的轻量级安全密钥管理","authors":"M. Barbareschi, V. Casola, Daniele Lombardi","doi":"10.1109/IWASI58316.2023.10164402","DOIUrl":null,"url":null,"abstract":"The concept behind Internet of Things (IoT) involves connecting physical objects to the internet and endowing them with the ability to identify one another and exchange data. This communication paradigm arises new security challenges. Mainly, authenticity of network nodes, to let ones with malicious intent not thrive in such a network; and confidentiality, when sensitive data have to be exchanged. Most classical security techniques are not suitable to address such issues, especially in Wireless Sensor Network (WSN) where network nodes are developed using resource-constrained devices. Consequently, the scientific literature has been starting to investigate how Physically Unclonable Functions (PUFs), a unique digital identifier obtained from physical variability induced by integrated circuit manufacturing process, could be exploited to provide security mechanisms. In this paper, we present ConPHEMAP, a new lightweight PUF-based key management-scheme for point-to-point communications. The proposed scheme extends the PHEMAP protocol and inherits same properties, including flexibility since can be adopted either in the case where both nodes are provided with PUFs or when only one of them includes it. We also conducted a security analysis to verify the protocol resilience against different kinds of attacks, which proves its suitability in a heterogeneous insecure context such as WSNs.","PeriodicalId":261827,"journal":{"name":"2023 9th International Workshop on Advances in Sensors and Interfaces (IWASI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Lightweight Secure Keys Management Based on Physical Unclonable Functions\",\"authors\":\"M. Barbareschi, V. Casola, Daniele Lombardi\",\"doi\":\"10.1109/IWASI58316.2023.10164402\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The concept behind Internet of Things (IoT) involves connecting physical objects to the internet and endowing them with the ability to identify one another and exchange data. This communication paradigm arises new security challenges. Mainly, authenticity of network nodes, to let ones with malicious intent not thrive in such a network; and confidentiality, when sensitive data have to be exchanged. Most classical security techniques are not suitable to address such issues, especially in Wireless Sensor Network (WSN) where network nodes are developed using resource-constrained devices. Consequently, the scientific literature has been starting to investigate how Physically Unclonable Functions (PUFs), a unique digital identifier obtained from physical variability induced by integrated circuit manufacturing process, could be exploited to provide security mechanisms. In this paper, we present ConPHEMAP, a new lightweight PUF-based key management-scheme for point-to-point communications. The proposed scheme extends the PHEMAP protocol and inherits same properties, including flexibility since can be adopted either in the case where both nodes are provided with PUFs or when only one of them includes it. We also conducted a security analysis to verify the protocol resilience against different kinds of attacks, which proves its suitability in a heterogeneous insecure context such as WSNs.\",\"PeriodicalId\":261827,\"journal\":{\"name\":\"2023 9th International Workshop on Advances in Sensors and Interfaces (IWASI)\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 9th International Workshop on Advances in Sensors and Interfaces (IWASI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IWASI58316.2023.10164402\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 9th International Workshop on Advances in Sensors and Interfaces (IWASI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWASI58316.2023.10164402","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Lightweight Secure Keys Management Based on Physical Unclonable Functions
The concept behind Internet of Things (IoT) involves connecting physical objects to the internet and endowing them with the ability to identify one another and exchange data. This communication paradigm arises new security challenges. Mainly, authenticity of network nodes, to let ones with malicious intent not thrive in such a network; and confidentiality, when sensitive data have to be exchanged. Most classical security techniques are not suitable to address such issues, especially in Wireless Sensor Network (WSN) where network nodes are developed using resource-constrained devices. Consequently, the scientific literature has been starting to investigate how Physically Unclonable Functions (PUFs), a unique digital identifier obtained from physical variability induced by integrated circuit manufacturing process, could be exploited to provide security mechanisms. In this paper, we present ConPHEMAP, a new lightweight PUF-based key management-scheme for point-to-point communications. The proposed scheme extends the PHEMAP protocol and inherits same properties, including flexibility since can be adopted either in the case where both nodes are provided with PUFs or when only one of them includes it. We also conducted a security analysis to verify the protocol resilience against different kinds of attacks, which proves its suitability in a heterogeneous insecure context such as WSNs.