Online citations, reference lists, and bibliographies.

Token-Based Security For The Internet Of Things With Dynamic Energy-Quality Tradeoff

Muhammad Naveed Aman, Sachin Taneja, B. Sikdar, K. C. Chua, M. Alioto
Published 2019 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
In this paper, token-based security protocols with dynamic energy-security level tradeoff for Internet of Things (IoT) devices are explored. To assure scalability in the mechanism to authenticate devices in large-sized networks, the proposed protocol is based on the OAuth 2.0 framework, and on secrets generated by on-chip physically unclonable functions. This eliminates the need to share the credentials of the protected resource (e.g., server) with all connected devices, thus overcoming the weaknesses of conventional client–server authentication. To reduce the energy consumption associated with secure data transfers, dynamic energy-quality tradeoff is introduced to save energy when lower security level (or, equivalently, quality in the security subsystem) is acceptable. Energy-quality scaling is introduced at several levels of abstraction, from the individual components in the security subsystem to the network protocol level. The analysis on an MICA 2 mote platform shows that the proposed scheme is robust against different types of attacks and reduces the energy consumption of IoT devices by up to 69% for authentication and authorization, and up to 45% during data transfer, compared to a conventional IoT device with fixed key size.
This paper references
Implications of Historical Trends in the Electrical Efficiency of Computing
J. Koomey (2011)
Physically Unclonable Function Database
M. Alioto (2018)
Verification of network security protocols
V. Varadharajan (1989)
Silicon physical random functions
B. Gassend (2002)
AES architectures for minimum-energy operation and silicon demonstration in 65nm with lowest energy per encryption
Wenfeng Zhao (2015)
Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. A Report by an Ad Hoc Group of Cryptographers and Computer Scientists
Matt Blaze (1996)
Complexity Of Computations
S. Winograd (1978)
Physical Unclonable Functions for IoT Security
M. N. Aman (2016)
IoT-Specific IPv6 Stateless Address Autoconfiguration with Modified EUI-64
Pyung-Soo Kim (2015)
Reconfigurable ECC for adaptive protection of memory
A. Basak (2013)
Guid to Elliptic Curve Cryptography, 1st ed
D. Hankerson (2010)
Design Principles for Tamper-Resistant Smartcard Processors
Oliver Kömmerling (1999)
More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE)
Tero Kivinen (2003)
VL-ECC: Variable Data-Length Error Correction Code for Embedded Memory in DSP Applications
Jangwon Park (2014)
A semantic model for authentication protocols
T. Woo (1993)
Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database
Urbi Chatterjee (2019)
53Gbps native GF(24)2 composite-field AES-encrypt/decrypt accelerator for content-protection in 45nm high-performance microprocessors
S. Mathew (2010)
Authentication protocols for computer networks: I
D. Sidhu (1986)
The SIMON and SPECK lightweight block ciphers
Ray Beaulieu (2015)
Finite state description of communication protocols
G. V. Bochman (1978)
The Computational Complexity of Universal Hashing
Y. Mansour (1993)
Fully Synthesizable PUF Featuring Hysteresis and Temperature Compensation for 3.2% Native BER and 1.02 fJ/b in 40 nm
Sachin Taneja (2018)
Enabling the Internet of Things: From Integrated Circuits to Integrated Systems
M. Alioto (2017)
Towards formal analysis of security protocols
W. Mao (1993)
Avrora: scalable sensor network simulation with precise timing
Ben L. Titzer (2005)
Reviving smart card analysis
K. Nohl (2011)
Bagad, Networks and Information
V.S.I.A. Dhotre (2008)
Digital Signature Standard (DSS) | NIST
Elaine B. Barker (1998)
Physically Unclonable Functions: Concept and Constructions
R. Maes (2013)
A Deep Learning Approach to IoT Authentication
Rajshekhar Das (2018)
A technique to build a secret key in integrated circuits for identification and authentication applications
J. Lee (2004)
Energy-quality scalable adaptive VLSI circuits and systems beyond approximate computing
M. Alioto (2017)
ProVerif 1.85: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial
B. Blanchet (2011)
Properties of universal hashing
Martin Babka (2013)
System on chip and method for cryptography using a physically unclonable function
M. Kirkpatrick (2012)
8.3 A 553F2 2-transistor amplifier-based Physically Unclonable Function (PUF) with 1.67% native instability
Kaiyuan Yang (2017)
A PUF-Based Secure Communication Protocol for IoT
Urbi Chatterjee (2016)
The Complexity of Computations
Pavel Pudlák (2013)
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
X. Li (2018)
A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
X. Li (2018)
Design challenges of technology scaling
S. Borkar (1999)
UMAC: Message Authentication Code using Universal Hashing
Ted Krovetz (2006)
Aegis: A Single-Chip Secure Processor
G. Suh (2007)
Robust Authentication Using Physically Unclonable Functions
Keith B. Frikken (2009)
Unifying Zero-Knowledge Proofs of Knowledge
U. Maurer (2009)
Physical Unclonable Functions for Device Authentication and Secret Key Generation
G. Suh (2007)
Hardware obfuscation using PUF-based logic
James Bradley Wendt (2014)
Using Blockchain for IOT Access Control and Authentication Management
Abdallah Zoubir Ourad (2018)
Mutual Authentication in IoT Systems Using Physical Unclonable Functions
M. N. Aman (2017)
A logic of authentication
M. Burrows (1990)
SoCs security: a war against side-channels
S. Guilley (2004)

This paper is referenced by
Semantic Scholar Logo Some data provided by SemanticScholar