Optical PUFs as physical root of trust for blockchain-driven applications

被引:11
作者
Chaintoutis, Charidimos [1 ,2 ]
Akriotou, Marialena [1 ]
Mesaritakis, Charis [2 ,3 ]
Komnios, Ioannis [4 ]
Karamitros, Dimitris [4 ]
Fragkos, Alexandros [2 ]
Syvridis, Dimitris [1 ]
机构
[1] Natl & Kapodistrian Univ Athens, Dept Informat & Telecommun, Athens 15784, Greece
[2] Eulambia Adv Technol, Ag Ioannou 24, Athens 15342, Greece
[3] Univ Aegean, Dept Informat & Commun Syst Engn, 2 Palama Str, Karlovassi 83200, Samos, Greece
[4] EXUS Software Ltd, 25 Old Broad St, London EC2N 1PB, England
关键词
Internet of Things; cryptography; distributed databases; data privacy; optical PUFs; blockchain-driven applications; cyber attacks; physical unclonable functions; one-way mathematical transformations; random key generators; optical PUF implementation; private blockchain modalities; security; cyber-harden Internet of Things ecosystems; RANDOM-ACCESS MEMORY; UNCLONABLE FUNCTION; ATTACKS;
D O I
10.1049/iet-sen.2018.5291
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In an environment where cyber attacks are increasing, both in frequency and complexity, novel ways to shield data, users, and procedures have to be envisioned. Physical unclonable functions (PUFs) are the physical equivalent of one-way mathematical transformations with the exception that their inherent physical complexity renders them resilient to cloning. One interesting deployment scenario includes PUFs as random key generators. The deterministic nature of their operation alleviates the necessity to store the keys in non-volatile means. Along the same lines, blockchain is inherently resistant to modification of the data once stored while their overall security depends on the quality and secrecy of users' keys. Here, the authors propose a novel optical PUF implementation that can be combined with private blockchain modalities in order to cyber-harden Internet of things ecosystems. PUF-related experimental results are presented, alongside implementation scenarios.
引用
收藏
页码:182 / 186
页数:5
相关论文
共 38 条
[1]  
Akriotou M., 2018, P 2018 ISCIS SEC WOR
[2]  
Aman M., 2016, Proc. Int'l Workshop on IoT Privacy, Trust, P10, DOI [10.1145/2899007.2899013, DOI 10.1145/2899007.2899013]
[3]  
[Anonymous], 2010, HARDWARE INTRINSIC S
[4]  
[Anonymous], 2007, Security with noisy data: on private biometrics, secure key storage and anti-counterfeiting
[5]   A Formal Foundation for the Security Features of Physical Functions [J].
Armknecht, Frederik ;
Maes, Roel ;
Sadeghi, Ahmad-Reza ;
Standaert, Francois-Xavier ;
Wachsmann, Christian .
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, :397-412
[6]   Hardware/software co-design of physical unclonable function based authentications on FPGAs [J].
Aysu, Aydin ;
Schaumont, Patrick .
MICROPROCESSORS AND MICROSYSTEMS, 2015, 39 (07) :589-597
[7]   The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs [J].
Becker, Georg T. .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 :535-555
[8]   Fingerprinting' documents and packaging [J].
Buchanan, JDR ;
Cowburn, RP ;
Jausovec, AV ;
Petit, D ;
Seem, P ;
Xiong, G ;
Atkinson, D ;
Fenton, K ;
Allwood, DA ;
Bryan, MT .
NATURE, 2005, 436 (7050) :475-475
[9]  
Candès EJ, 2008, IEEE SIGNAL PROC MAG, V25, P21, DOI 10.1109/MSP.2007.914731
[10]   CMOS Image Sensor Based Physical Unclonable Function for Coherent Sensor-Level Authentication [J].
Cao, Yuan ;
Zhang, Le ;
Zalivaka, Siarhei S. ;
Chang, Chip-Hong ;
Chen, Shoushun .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2015, 62 (11) :2629-2640