TY - GEN
T1 - Secure Content Protection Schemes for Industrial IoT with SRAM PUF-Based One-Time Use Cryptographic Keys
AU - Jain, Saloni
AU - Korenda, Ashwija Reddy
AU - Cambou, Bertrand
AU - Lucero, Chris
N1 - Publisher Copyright: © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.
PY - 2024
Y1 - 2024
N2 - This paper outlines our primary objectives, which revolved around devising a robust and lightweight solution for safeguarding industrial Internet of Things (IoT) device’s content. Our study delves into the critical issue of potential vulnerabilities in cryptographic keys within insecure communication networks, vulnerable to side-channel attacks and data leaks. Additionally, it introduces practical flexibility in real-world applications by enabling the generation of keys with the required length while upholding a high level of security. To counteract the risk of losing cryptographic keys in insecure environments, our proposed solution integrates Physical Unclonable Functions (PUFs) and available Error Correction Code (ECC). This integration produces a flexible-length, one-time-use key tailored to specific software requirements. Our protocol employs commercially available Static Random Access Memory (SRAM) devices, one-way hashing functions, incorporates various error-correcting schemes, and utilizes standardized cryptographic algorithms like AES128 and AES256 to enhance security. Rigorous characterization of SRAMs, achieved through multiple readings under diverse conditions and temperatures, optimizes randomness while minimizing bit error rates. Validation of the protocol encompasses demonstrating low bit error rates at low latency, understanding the random cell selection for key generation, and analyzing and comparing three different ECCs like Reed Solomon (RS), Bose-Chaudhuri-Hocquenghem (BCH), and Response-Based Cryptography (RBC). Furthermore, ECCs are refined to reduce latencies while maintaining negligible failure rates in cryptographic key recovery and ensuring that helper data remains secure. This comprehensive approach aims to significantly enhance the security and efficiency of data transfers in IoT devices, particularly in the face of potential threats in insecure communication networks.
AB - This paper outlines our primary objectives, which revolved around devising a robust and lightweight solution for safeguarding industrial Internet of Things (IoT) device’s content. Our study delves into the critical issue of potential vulnerabilities in cryptographic keys within insecure communication networks, vulnerable to side-channel attacks and data leaks. Additionally, it introduces practical flexibility in real-world applications by enabling the generation of keys with the required length while upholding a high level of security. To counteract the risk of losing cryptographic keys in insecure environments, our proposed solution integrates Physical Unclonable Functions (PUFs) and available Error Correction Code (ECC). This integration produces a flexible-length, one-time-use key tailored to specific software requirements. Our protocol employs commercially available Static Random Access Memory (SRAM) devices, one-way hashing functions, incorporates various error-correcting schemes, and utilizes standardized cryptographic algorithms like AES128 and AES256 to enhance security. Rigorous characterization of SRAMs, achieved through multiple readings under diverse conditions and temperatures, optimizes randomness while minimizing bit error rates. Validation of the protocol encompasses demonstrating low bit error rates at low latency, understanding the random cell selection for key generation, and analyzing and comparing three different ECCs like Reed Solomon (RS), Bose-Chaudhuri-Hocquenghem (BCH), and Response-Based Cryptography (RBC). Furthermore, ECCs are refined to reduce latencies while maintaining negligible failure rates in cryptographic key recovery and ensuring that helper data remains secure. This comprehensive approach aims to significantly enhance the security and efficiency of data transfers in IoT devices, particularly in the face of potential threats in insecure communication networks.
KW - Communication networks
KW - Cryptographic algorithms
KW - Cryptography
KW - Error Correction Code (ECC)
KW - Internet of things (IoT)
KW - Low bit error rates
KW - One-time key generation
KW - One-way hashing function
KW - Physical Unclonable Function (PUF)
KW - Randomness
KW - Security
KW - Static Random Access Memory (SRAM)
UR - http://www.scopus.com/inward/record.url?scp=85197448276&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85197448276&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-62277-9_31
DO - 10.1007/978-3-031-62277-9_31
M3 - Conference contribution
SN - 9783031622762
T3 - Lecture Notes in Networks and Systems
SP - 478
EP - 498
BT - Intelligent Computing - Proceedings of the 2024 Computing Conference
A2 - Arai, Kohei
PB - Springer Science and Business Media Deutschland GmbH
T2 - Science and Information Conference, SAI 2024
Y2 - 11 July 2024 through 12 July 2024
ER -