DocumentCode :
169721
Title :
System-of-PUFs: Multilevel security for embedded systems
Author :
Choden Konigsmark, S.T. ; Hwang, Leslie K. ; Deming Chen ; Wong, Martin D. F.
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Illinois at Urbana-Champaign, Urbana, IL, USA
fYear :
2014
fDate :
12-17 Oct. 2014
Firstpage :
1
Lastpage :
10
Abstract :
Embedded systems continue to provide the core for a wide range of applications, from smart-cards for mobile payment to smart-meters for power-grids. The resource and power dependency of embedded systems continues to be a challenge for state-of-the-art security practices. Moreover, even theoretically secure algorithms are often vulnerable in their implementation. With decreasing cost and complexity, physical attacks are an increasingly important threat. This threat led to the development of Physically Unclonable Functions (PUFs) which are disordered physical systems with various applications in hardware security. However, consistent security oriented design of embedded systems remains a challenge, as most formalizations and security models are concerned with isolated physical components or high-level concept. We provide four unique contributions: (i) We propose a system-level security model to overcome the chasm between secure components and requirements of high-level protocols; this enables synergy between component-oriented security formalizations and theoretically proven protocols. (ii) An analysis of current practices in PUF protocols using the proposed system-level security model; we identify significant issues and expose assumptions that require costly security techniques. (iii) A System-of-PUF (SoP) that utilizes the large PUF design-space to achieve security requirements with minimal resource utilization; SoP requires 64% less gate-equivalent units than recently published schemes. (iv) A multilevel authentication protocol based on SoP which is validated using our system-level security model and which overcomes current vulnerabilities. Furthermore, this protocol offers breach recognition and recovery.
Keywords :
cryptographic protocols; embedded systems; security; PUF design space; PUF protocols; SoP; breach recognition; component-oriented security formalizations; disordered physical systems; embedded systems; gate-equivalent units; hardware security; high-level protocols; mobile payment; multilevel authentication protocol; multilevel security; physically unclonable functions; power grids; resource utilization; security models; security techniques; smart cards; smart meters; system-level security model; system-of-PUF; Authentication; Computational modeling; Embedded systems; Hardware; Integrated circuit modeling; Protocols; Hardware Authentication; Physically Unclonable Functions;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Hardware/Software Codesign and System Synthesis (CODES+ISSS), 2014 International Conference on
Conference_Location :
New Delhi
Type :
conf
DOI :
10.1145/2656075.2656099
Filename :
6971843
Link To Document :
بازگشت