Online citations, reference lists, and bibliographies.

Token-Based Security For The Internet Of Things With Dynamic Energy-Quality Tradeoff

Muhammad Naveed Aman, Sachin Taneja, B. Sikdar, K. C. Chua, M. Alioto
Published 2019 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
In this paper, token-based security protocols with dynamic energy-security level tradeoff for Internet of Things (IoT) devices are explored. To assure scalability in the mechanism to authenticate devices in large-sized networks, the proposed protocol is based on the OAuth 2.0 framework, and on secrets generated by on-chip physically unclonable functions. This eliminates the need to share the credentials of the protected resource (e.g., server) with all connected devices, thus overcoming the weaknesses of conventional client–server authentication. To reduce the energy consumption associated with secure data transfers, dynamic energy-quality tradeoff is introduced to save energy when lower security level (or, equivalently, quality in the security subsystem) is acceptable. Energy-quality scaling is introduced at several levels of abstraction, from the individual components in the security subsystem to the network protocol level. The analysis on an MICA 2 mote platform shows that the proposed scheme is robust against different types of attacks and reduces the energy consumption of IoT devices by up to 69% for authentication and authorization, and up to 45% during data transfer, compared to a conventional IoT device with fixed key size.
This paper references
10.1109/MAHC.2010.28
Implications of Historical Trends in the Electrical Efficiency of Computing
J. Koomey (2011)
Physically Unclonable Function Database
M. Alioto (2018)
10.1016/0167-4048(89)90008-4
Verification of network security protocols
V. Varadharajan (1989)
10.1145/586110.586132
Silicon physical random functions
B. Gassend (2002)
10.1109/ISCAS.2015.7169155
AES architectures for minimum-energy operation and silicon demonstration in 65nm with lowest energy per encryption
Wenfeng Zhao (2015)
10.21236/ada385264
Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. A Report by an Ad Hoc Group of Cryptographers and Computer Scientists
Matt Blaze (1996)
10.1145/800127.804083
Complexity Of Computations
S. Winograd (1978)
Physical Unclonable Functions for IoT Security
M. N. Aman (2016)
IoT-Specific IPv6 Stateless Address Autoconfiguration with Modified EUI-64
Pyung-Soo Kim (2015)
10.1109/MWSCAS.2013.6674841
Reconfigurable ECC for adaptive protection of memory
A. Basak (2013)
Guid to Elliptic Curve Cryptography, 1st ed
D. Hankerson (2010)
Design Principles for Tamper-Resistant Smartcard Processors
Oliver Kömmerling (1999)
10.17487/RFC3526
More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE)
Tero Kivinen (2003)
10.1109/TCSII.2013.2291091
VL-ECC: Variable Data-Length Error Correction Code for Embedded Memory in DSP Applications
Jangwon Park (2014)
10.1109/RISP.1993.287633
A semantic model for authentication protocols
T. Woo (1993)
10.1109/TDSC.2018.2832201
Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database
Urbi Chatterjee (2019)
10.1109/VLSIC.2010.5560310
53Gbps native GF(24)2 composite-field AES-encrypt/decrypt accelerator for content-protection in 45nm high-performance microprocessors
S. Mathew (2010)
10.1016/0167-7136(86)90044-2
Authentication protocols for computer networks: I
D. Sidhu (1986)
10.1145/2744769.2747946
The SIMON and SPECK lightweight block ciphers
Ray Beaulieu (2015)
Finite state description of communication protocols
G. V. Bochman (1978)
10.1016/0304-3975(93)90257-T
The Computational Complexity of Universal Hashing
Y. Mansour (1993)
10.1109/JSSC.2018.2865584
Fully Synthesizable PUF Featuring Hysteresis and Temperature Compensation for 3.2% Native BER and 1.02 fJ/b in 40 nm
Sachin Taneja (2018)
Enabling the Internet of Things: From Integrated Circuits to Integrated Systems
M. Alioto (2017)
10.1109/CSFW.1993.246631
Towards formal analysis of security protocols
W. Mao (1993)
10.1109/IPSN.2005.1440978
Avrora: scalable sensor network simulation with precise timing
Ben L. Titzer (2005)
Reviving smart card analysis
K. Nohl (2011)
Bagad, Networks and Information
V.S.I.A. Dhotre (2008)
Digital Signature Standard (DSS) | NIST
Elaine B. Barker (1998)
10.1007/978-3-642-41395-7_2
Physically Unclonable Functions: Concept and Constructions
R. Maes (2013)
10.1109/ICC.2018.8422832
A Deep Learning Approach to IoT Authentication
Rajshekhar Das (2018)
10.1109/VLSIC.2004.1346548
A technique to build a secret key in integrated circuits for identification and authentication applications
J. Lee (2004)
10.23919/DATE.2017.7926970
Energy-quality scalable adaptive VLSI circuits and systems beyond approximate computing
M. Alioto (2017)
ProVerif 1.85: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial
B. Blanchet (2011)
Properties of universal hashing
Martin Babka (2013)
System on chip and method for cryptography using a physically unclonable function
M. Kirkpatrick (2012)
10.1109/ISSCC.2017.7870303
8.3 A 553F2 2-transistor amplifier-based Physically Unclonable Function (PUF) with 1.67% native instability
Kaiyuan Yang (2017)
10.1145/3005715
A PUF-Based Secure Communication Protocol for IoT
Urbi Chatterjee (2016)
10.1007/978-3-319-00119-7_5
The Complexity of Computations
Pavel Pudlák (2013)
10.1016/j.jnca.2017.07.001
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
X. Li (2018)
10.1109/TII.2017.2773666
A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
X. Li (2018)
10.1109/40.782564
Design challenges of technology scaling
S. Borkar (1999)
10.17487/RFC4418
UMAC: Message Authentication Code using Universal Hashing
Ted Krovetz (2006)
10.1109/MDT.2007.179
Aegis: A Single-Chip Secure Processor
G. Suh (2007)
10.1007/978-3-642-04474-8_22
Robust Authentication Using Physically Unclonable Functions
Keith B. Frikken (2009)
10.1007/978-3-642-02384-2_17
Unifying Zero-Knowledge Proofs of Knowledge
U. Maurer (2009)
10.1145/1278480.1278484
Physical Unclonable Functions for Device Authentication and Secret Key Generation
G. Suh (2007)
10.1109/ICCAD.2014.7001362
Hardware obfuscation using PUF-based logic
James Bradley Wendt (2014)
10.1007/978-3-319-94370-1_11
Using Blockchain for IOT Access Control and Authentication Management
Abdallah Zoubir Ourad (2018)
10.1109/JIOT.2017.2703088
Mutual Authentication in IoT Systems Using Physical Unclonable Functions
M. N. Aman (2017)
10.1145/77648.77649
A logic of authentication
M. Burrows (1990)
10.1007/BF03180031
SoCs security: a war against side-channels
S. Guilley (2004)



This paper is referenced by
Semantic Scholar Logo Some data provided by SemanticScholar