TY - GEN
T1 - Unequally powered cryptography with physical unclonable functions for networks of internet of things terminals
AU - Cambou, Bertrand
N1 - Funding Information:
The author acknowledge the outstanding contribution of the graduate, and undergraduate students working in the cybersecurity laboratory of Northern Arizona University. Christopher Philabaum, Duane Booher, and Sareh Assiri developed several software implementations of this architecture. Vince Rodriguez, and Ian Burke designed and characterized the electronic board driving the SRAM PUFs that were used in the experimental section of this paper. Christopher Coffey, the Engineer in charge of NAUs HPC provided highly valuable insights in the architecture. And, Cristy Salanga, and Dr. William Aylor from the research and innovation organization provided extraordinary support.
Publisher Copyright:
© 2019 SCS.
PY - 2019/4
Y1 - 2019/4
N2 - In this paper, cryptographic architectures based on unequal computing resources are modelled, and experimentally verified with Window-10 PCs powered with Intel I-7 processor. Low power IoT terminal devices generate keys from physical unclonable functions, which can be recognized by the server through a matching engine. We are here proposing methods to modulate the efficiency of the matching engine by injecting erratic bits in the keys, and/or by fragmenting the keys in smaller sub-keys. When the environment is hostile, the difficulty in matching the keys can be adjusted in such a way that the server needs access to increasingly powerful computing power to recognize the terminal device thereby placing attackers with inferior computing power at a strong disadvantage. The objective of this research work is to find, through the modelling effort, the conditions where unequally powered cryptography can take advantage of high performance computers to protect networks of IoT terminals.
AB - In this paper, cryptographic architectures based on unequal computing resources are modelled, and experimentally verified with Window-10 PCs powered with Intel I-7 processor. Low power IoT terminal devices generate keys from physical unclonable functions, which can be recognized by the server through a matching engine. We are here proposing methods to modulate the efficiency of the matching engine by injecting erratic bits in the keys, and/or by fragmenting the keys in smaller sub-keys. When the environment is hostile, the difficulty in matching the keys can be adjusted in such a way that the server needs access to increasingly powerful computing power to recognize the terminal device thereby placing attackers with inferior computing power at a strong disadvantage. The objective of this research work is to find, through the modelling effort, the conditions where unequally powered cryptography can take advantage of high performance computers to protect networks of IoT terminals.
KW - IoT security
KW - Network security
KW - Physical functions
UR - http://www.scopus.com/inward/record.url?scp=85068600177&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85068600177&partnerID=8YFLogxK
U2 - 10.23919/SpringSim.2019.8732853
DO - 10.23919/SpringSim.2019.8732853
M3 - Conference contribution
AN - SCOPUS:85068600177
T3 - 2019 Spring Simulation Conference, SpringSim 2019
BT - 2019 Spring Simulation Conference, SpringSim 2019
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2019 Spring Simulation Conference, SpringSim 2019
Y2 - 29 April 2019 through 2 May 2019
ER -