Next Article in Journal
Morphological Effects in SnO2 Chemiresistors for Ethanol Detection: A Review in Terms of Central Performances and Outliers
Next Article in Special Issue
IoT Data Qualification for a Logistic Chain Traceability Smart Contract
Previous Article in Journal
MME-YOLO: Multi-Sensor Multi-Level Enhanced YOLO for Robust Vehicle Detection in Traffic Surveillance
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy

1
Power Networks Demonstration Centre (PNDC), University of Strathclyde, Glasgow G1 1XQ, UK
2
Department of Electronics and Electrical Engineering, University of Strathclyde, Glasgow G1 1XQ, UK
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(1), 28; https://doi.org/10.3390/s21010028
Submission received: 9 November 2020 / Revised: 16 December 2020 / Accepted: 17 December 2020 / Published: 23 December 2020

Abstract

:
A detailed review on the technological aspects of Blockchain and Physical Unclonable Functions (PUFs) is presented in this article. It stipulates an emerging concept of Blockchain that integrates hardware security primitives via PUFs to solve bandwidth, integration, scalability, latency, and energy requirements for the Internet-of-Energy (IoE) systems. This hybrid approach, hereinafter termed as PUFChain, provides device and data provenance which records data origins, history of data generation and processing, and clone-proof device identification and authentication, thus possible to track the sources and reasons of any cyber attack. In addition to this, we review the key areas of design, development, and implementation, which will give us the insight on seamless integration with legacy IoE systems, reliability, cyber resilience, and future research challenges.

1. Introduction

The expeditious development in the areas of information and communications technology (ICT), cybersecurity, encryption, cloud computing, as well as energy systems has led to the emergence of a new concept called as Internet-of-energy (IoE) [1]. The IoE is the result of the implementation of Internet-of-Things (IoT) technology [2], smart senors [3,4], and intelligent data analytics [5] with distributed energy systems. The foremost purpose is to maximise the efficiency of the generation, transmission, digitisation, and utilisation of electricity [6]. IoT technology enables the IoE by creating networks of smart sensors that have numerous smart grid applications [7]. These include power monitoring, demand-side energy management, secure OT/IT convergence, distributed storage, and renewable energy integration among others as depicted in Figure 1.
Distribution Network Operators (DNOs) continue to move into a future, where IoE [8,9,10] is driven by the combination of secure intelligent mobile-edge devices and high-bandwidth communications with real-time data analytics [11]. These next-generation technologies lead towards virtualisation [12,13], security [14,15,16], automation [17,18], and digitalisation [19] capabilities that enable the use and management of more sustainable resources in operational technology (OT). However, the utility sector still faces the challenge of integrating the data and software subsystems [20] required with using complex security protocols [21] and communication architectures [22,23] to unlock and enable the desired functionalities. The quintessential solution for this challenge lies in the security framework, virtualisation, intelligent cloud-based platforms for computational efficiency, data storage, and implementing codeveloped cloud-based grid applications [24]. The cost of industrially focused resilient and robust computing hardware can be substantial and dependent on the number of edge devices required per substation [25] and the level of redundancy required. For providing seamless hardware integration and cost effective solutions to the substation automation, the use of identification, verification, and virtualisation can be deployed to provide cyber-secure remote access [26].
When edge devices are implemented in IoE networks, they are vulnerable to external cyber threats and are an easy target [27,28]. Not only are these cyber threats restricted to the hacking of data contained on the computer itself, they may also use the trustworthy device status to obtain access to other interconnected networks [29]. During the deployment process or during the firmware upgrade, malicious hackers may take advantage of the opportunities to inject unauthorised code to get access to the processing hardware. To create counterfeits and clones, sophisticated cyber criminals or insider attackers with privileged access to the devices may take advantage of unsecured manufacturing systems, resulting in significant financial, environmental, and infrastructure disruption [30]. The security frameworks and protocols are vital at remote or third-party facilities, where the devices and the data-management is centrally connected via a control room [31]. Over the last few years, there has been a tremendous interest in developing fit-for-purpose algorithms to include IoT data and system level security/privacy [32,33,34,35,36]. IoT systems typically accumulate big data sets, some of which require encryption depending on criteria for sensitivity or compliance [37]. IoT data protection solutions must be an end-to-end solution, i.e., span between edge to the cloud, provide scalable encryption and key management [38]. We have summarised the cyber attacks in the IoE environment in Table 1. In general, the most effective way to protect IoE devices in a fragile setting is currently by cryptographic methods. However, when applying these cryptographic approaches in IoE networks, power consumption and key storage are among the major concerns.
Blockchain has received world wide attention among the industry, the Government, and academia alike to dispense security and privacy to the assets. Blockchain, sometimes referred to as Distributed Ledger Technology (DLT), makes the transaction records of any digital asset unalterable and transparent via decentralisation and cryptographic hashing [39]. Despite using Blockchain in the IoT networks [40,41], there should be protection mechanisms in place to verify and authenticate the edge devices through hybrid technologies such as Blockchain in combination with Physical Unclonable Functions (PUFs) [42]. PUFs evaluate manufacturing variations in integrated circuits (ICs) and generate an individual response for each device, also known as fingerprint [43]. This response significantly varies from chip to chip and can be used for identification and authentication purpose.
Table 1. Taxonomy of attacks based on different layers of the TCP/IP model in IoE domain [44].
Table 1. Taxonomy of attacks based on different layers of the TCP/IP model in IoE domain [44].
TCP/IP LayerAttackAttack Vector
PhysicalJamming [45]With radio interference
Tampering [46]Making fake nodes
Data LinkCollision [47]Transmit data at the same time
in the same frequency channel
Exhaustion [48]Multiple collisions and continuous re-transmission
until the node runs out of resource
Unfairness [49]Repeatedly ask for the channel to
limit others request
NetworkSpoofed, or
Replayed routing
information [49,50]
Routing loops, changing the source of the
route, Repelling network from selected nodes
Selective forwarding [51]Send selected information
to the legitimate receiver
Sinkhole [52]Become the target of all nodes in order to
gather all information
Sybil [53]Create lots of pseudonymous identities
to undermine the authorised system
Wormholes [54]Re-transmit information to the IoT nodes
Hello flood [55]Use Hello messages to flood the
network with these tiny messages
Acknowledgement spoofing [56]Spoof the link layer acknowledgement
TransportSYN flooding [57]Resend request multiple times to
fill the capacity of the transport layer
Desynchronisation [58]Reinitialise the connection in order to disrupt it
ApplicationReliability attacks:
Clock skewing,
Selective message
Forwarding,
Data aggregation distortion [59,60]
Impersonate itself as a reliable node in
the IoT network and sends corrupted data
In this article, we have reviewed the hybrid use of PUFs and Blockchain for IC traceability, verification and authentication in IoE systems. The consensus framework, based on Proof-of-PUF (PoP), aims to guarantee authentication of the devices and the miner with a rapid verification process compared to existing Blockchain consensus algorithms. The combination of Blockchain and PUF allows us to propose an efficient framework that guarantees data provenance and device integrity in IoT networks. This review contributes to: (a) an in-depth market survey of the IoE systems and energy utilities, (b) current research and development work on Blockchain and PUFs, their implementation methods and algorithms, (c) cross-disciplinary study of PUFChain approach that can simultaneously handle device and data security, (d) evaluation of the cyber resilience of the PUFChain, (e) applications and use-case study of PUFChain and (f) research challenges, issues, and future developments.

2. Market Survey of IoE

The global IoE market has been segmented by hardware and software based real-time data analytics [61], security frameworks, data storage management, remote monitoring, and others [62]. Among these categories, remote monitoring software in the energy sector is projected to expand over the forecast period at a substantial compound annual growth rate (CAGR). This can be due to the growing need for remote monitoring systems with devices activated by the internet. Energy management also makes it possible for different end-use industries such as electricity, oil, and gas and mining industries to reduce energy shortages, further reducing running costs [63]. One of the key reasons driving the demand for Internet-of-Things (IoT) devices and applications is the rising concern about energy management.
In 2015, the global IoE market hit USD 6.8 billion and is forecast to hit USD 26.5 billion by 2023, with a CAGR of 15.5% percent over the 2016–2023 period. Factors such as increasing globalisation combined with urbanisation are projected by the end of the forecast period to broaden the IoE market by notable sales. IoE’s large market share applies to inter- and intraconnected IoT devices. The number of devices connected to the internet now exceeds the number of people on the planet. According to analyst firm Gartner, (Gartner, Newsletter August, 2019) there are 8.4 billion devices—or ”things”—connected to the Internet in 2017. By 2020 it predicts the number of IoT devices will rise to 20.4 billion worldwide. Furthermore, this growth is not only in the home, with devices such as smart TVs, smart fridges, and security cameras but also massively at the industrial level. Increasingly businesses are connecting devices to the internet and turning them into intelligent assets that can help drive greater efficiencies, increase competitiveness, develop new business models, and provide solutions to problems. By 2023 new low-power Internet-of-Things technologies such as lower-power wide-area network (LP-WAN) will help drive the next wave of IoT adoption, with its promise of increased secure network coverage and cost effective seamless integration. Furthermore, IoT can help businesses take up other technologies such as cloud services, end-to-end lightweight encryption, Blockchain, artificial intelligence (AI), and machine learning (ML).
Energy sector will be the highest consumer of IoT edge devices [62], totalling 1.17 billion devices in 2019 and increasing 17% in 2020 to reach 1.37 billion devices. In 2020, domestic energy smart metering, which can be used for more intelligent metering and forecasting, will be the top usage case for Greater China and Western Europe, comprising 26% and 12% of total IoT devices, respectively, as compared to 2019 (Global Market Insights, IoT Utilities Market Size, Growth—Industry Share Forecast Report 2024). In contrast, North America will see the largest acceptance of IoT endpoints in the electricity, renewables, and asset security industries, comprising 8% of the overall IoT devices. Despite the progress made on standards and technologies, i.e., edge computing, LPWAN, cloud integration, bandwidth allocations, private mobile connectivity and data analytics, IoT ecosystems remain complex because of the unavailability of the unified standards, lightweight security/communication protocols, and a unified firmware platform that can provide the orchestration between the multivendor equipment [64]. The current fragmentation in IoT connectivity and technical solutions has impacted equipment costs and reduced interoperability. The latest market survey (Ofcom, Data Assets, Final Report, April 2014) focused on 12 key growth areas in IoT and found the complex nature of IoT ecosystems but massive increase in the number of connections. The number of IoT connections in the identified sectors are predicted to grow from around 13 million in 2016 to over 150 million by 2024 in the UK.
The key variables driving the demand for IoT and intelligent edge computing, as in Figure 2, growing industry-wide acceptance of IoT connectivity; increasing demand for low-latency and real-time, automatic decision-making solutions; and the need to overcome the exponentially increasing volume of data and network traffic [65]. Countries around the world are introducing edge computing technologies to increase the efficiency of the energy market, EV infrastructure, building safety, home automation, parking and traffic management, and community resources management with the growing drive into smart city initiatives. Edge computing empowers IoT deployments in smart cities with low-latency and high bandwidth connectivity together with cloud integration and data analytics as a service. The advantage of this modern matrixed thought on the optimisation of intelligent edges is that it:
  • Improves responsiveness by reducing decision-making latency
  • Increases data security and privacy
  • Requires less power
  • Uses less network bandwidth
  • Maximises efficiencies, reliability, and autonomy
  • Reduces infrastructure and operational costs
It is also worth mentioning that 7% of all world-wide IoT projects incorporated the new generation and upcoming Low-Power Wide-Area (LPWA) connectivity technology [66]. Approximately 64% of the projects are focusing on smart city initiatives, smart energy infrastructures, mobile edge computing and industry 4.0. LoRa technology shared 37% of these projects followed by SigFox (21%) and NB-IoT (19%) (IoT Analytics, Projects Data, Jan 2018). The main value driver for most IoT enterprise projects is cost savings (54%). Only 35% of IoT projects are used to increase per annum capital (e.g., by offering new IoT-connected products and services). Twenty-four percent of projects also increase overall safety, i.e., by offering enhanced telemonitoring systems with real-time emergency notifications, authentication, and verification [67].

3. Distributed Ledger Technology (DLT) and Blockchain

DLT is moving quickly from theory to practical applications, transforming the data management and exchange in a secure manner. Unlike centralised databases, DLT stores information on synchronised independent processors, controlled by the individual participants in the network, which increases security, privacy, and interoperability [68]. DLT is an umbrella technology with benefits such as decentralisation, persistence, anonymity and audit-ability [69]. While Blockchain is termed as the first fully functional implementation of DLT, as shown in Figure 3. There is a wide spectrum of Blockchain applications ranging from 5G/4G-LTE communications, energy utilities, health care, smart cities, crypto-currency, financial services, risk management, Internet-of-Things (IoT) to public and social services [70].
More specifically, Blockchain technology incorporates a decentralised ledger that operates in a transparent environment. Each block of the ledger contains data about transactions that have been executed on the platform. The blocks are formulated by the data information, hash functions and hash of the previous blocks, as depicted in Figure 4, hash is a mathematical computation that fulfils the encrypted demands required to solve for a Blockchain computation. A hash, like a nonce or a solution, is considered as the backbone of the Blockchain network [71]. Hashing requires processing the data from a block through a mathematical function, which results in an output of a fixed length. Using a fixed-length output increases security [72] since anyone trying to decode the hash won’t be able to tell how long or short the input is, as they are one-way functions. In order to add a block to the ledger, every edge node of the IoE network needs to be verified and identified. Thanks to this verification the system does not need an intermediary to check transactions. Information stored in a Blockchain can never be deleted and serves as a verifiable and accurate ledger of every transaction made within the system [73,74].
The benefit of using Blockchain algorithms in the IoE networks [75,76,77,78,79,80] is twofold. It can not only provide data security and privacy but also can be used for the mobile edge devices verification and identification [81,82]. For energy utilities, large amounts of data are gathered from edge terminals or Internet-of-Things (IoT) devices; however, data trust and security in edge computing environment are very important issues to be considered for future OT/IT converged solutions, especially when the gathered data are fraud or dishonest, or the data are misused or spread without any authorisation, which may lead to serious cybersecurity problems. Blockchain can also facilitate the development of the Digital Twins (DTs) in IoE, to guarantee secure, private and trusted traceability, accessibility, and immutability of records, logs, and data provenance [83]. Beside the inherited capabilities of Blockchain to provide security and privacy, the orchestrated Blockchain networks [84] decrease system drop rate and further offload the cloud data-centre with seamless integration in existing IoE ecosystem. The reduced computational workload from cloud data-centre does not only help in saving the CAPEX and OPEX; it is beneficial for the energy constrained devices and minimising carbon emissions in environment.

3.1. Blockchain Networks

The functionality and the performance of the Blockchain depends on the architecture of deployed network. Based on the implementation, the Blockchain networks are broadly categorised as Public [81] and Enterprise networks [85]. The pros and cons of the two network categories are discussed in this section.

3.1.1. Public Blockchain (Permission-Less Blockchain)

A public Blockchain network is an architecture that can be read, sent records and expected to be included by everyone in the world provided they are checked as a node and anyone can take part in the consensus process [86]. The fusion of economic rewards and cryptographic authentication using methods such as proof-of-work (Bitcoin) or proof-of-stake (Ethereum) is primarily covered by cryptoeconomics. These Blockchains are generally considered to be “fully decentralized” [87]. One of the disadvantages is the considerable amount of computing power (resources) needed to sustain a large-scale distributed ledger, especially in the densely deployed IoE network [88]. Shared Blockchain networks have a means of shielding the end-user from the developers, establishing that there are stringent requirements in place.

3.1.2. Enterprise Blockchain (Permissioned Blockchain)

Enterprise networks are often referred to as networks of private entities or consortium. An enterprise is a Blockchain where consensus is managed by a number of preselected nodes [89]. The consortium comes together and make decisions for the whole network. Hence, it is termed as consortium Blockchain or federation Blockchain. In a completely private Blockchain, the only drawback being that rights are held by one entity. The Blockchain enterprise decreases processing expenses and data redundancies, removes obsolete processes, simplifies record management, and avoids semimanual enforcement frameworks [90]. This network architecture for densely deployed IoE networks is strongly recommended. Since read permissions are restricted, enterprise Blockchains offer a higher degree of privacy and protection [91].

3.2. Consensus Algorithms in Blockchain

A consensus algorithm is a process that allows users or machines to coordinate in a distributed network [92]. These algorithms make sure that all nodes in the system can agree on a single source of truth (verification or proofs), even if some nodes fail [93]. The need for a single source of truth originated the notion of replicated database systems in order to ensure resilience against node failures within an architecture. Such database systems ensure that data is not lost when one or more nodes fail to function in an excepted fashion [94]. In this section, we explore different incentivised consensus algorithms. Such algorithms can be grouped in two major categories: Proof-of-Work (PoW) and Proof-of-Stake (PoS) [95].

3.2.1. Proof-of-Work (PoW)

In PoW algorithm, the probability of mining a block is determined by how much computational work is done by the miner (verified node). A PoW mechanism involves two different parties (nodes): prover (requestor) and verifier (provider). The prover performs a resource-intensive computational task intending to achieve a goal and presents it to a verifier or a set of verifiers for validation that requires significantly less resource [96]. In PoW, the framework sets out conditions for what makes a block valid and verified. It might say, for instance, only a block whose hash begins with 00 will be valid. The only way for the miner to create one that matches that combination is to brute-forcing inputs. They can iterate a parameters in the data-pool to produce a different outcome for every guess until they get the right hash. With major Blockchains, it is cumbersome to compete with other miners, as high performance computing and special hashing hardware (ASICs) [97] is required to achieve the required validation of the block.

3.2.2. Proof-of-Stake (PoS)

In PoS algorithm, the probability of validating a new block is determined by how large of a stake an individual possesses [98]. The core idea of PoS evolves around the concept that the nodes who would like to participate in the Blockchain architecture must prove that they own a certain number of coins at first [99] that can be translated as credibility and experience. Besides, they must lock a certain amount of their stakes, into an escrow account [100,101] in order to participate in the block creation process. The stake acts as a guarantee that it will behave as per the protocol rules.
In recent years, there has been a lot of interest in developing consensus algorithms, they are summarised in Table 2.
Table 2. Summarised Consensus Algorithms for Blockchain.
Table 2. Summarised Consensus Algorithms for Blockchain.
PropertyPoW [96]PoS [98]PBFT [102]DPoS [103]Ripple [104]Tendermint [105]
Node Identity ManagementOpenOpenPermissionedOpenOpenPermissioned
Energy SavingsNoPartialYesPartialYesYes
Tolerated Power of Adversary<25% Computing Power<51% Stake<33% Faulty Replicas<51% Validators<20% Faulty Nodes<33% Byzantine Voting
Transactions (per second)7–3030–173100–250025–2500500–150010,000
Transactions FeeHighLowVery LowLowVery LowHigh
Use-CasesBitcoinPeercoinHyperledger FabricBitsharesRippleTendermint

3.3. Interoperable DLT and Blockchain Standards

Currently, under various societies, many standards-development projects are ongoing around the world. Global Standards Developing Organizations (SDOs), business groups and partnerships are undertaking these processes, with the latter requiring broad cooperation from the implementation sector and the end-users of these platform-specific standards. Most of these specifications are still being developed, with only a few versions released for review; the vast majority are still in the early blueprint process. It is planned to release further work and preliminary documents of these DLT/Blockchain specifications around 2020. The most important DLT/Blockchain standards currently under review are described below.
  • IEEE DLT/Blockchain Standards: The IEEE is developing the IEEE P2418 series, focusing on generic frameworks and architectures, interoperability, building blocks for enabling technology, and vertical industry standards [106,107]. In addition, this system tackles the issues of scalability, security, and privacy in implementation and service [108]. It covers different facets and features of Blockchain, including tokens, intelligent contracts, storing of offchain data, as well as Blockchain that is both permissioned and permission-less.
  • ISO/TC 307 Blockchain and DLT: TC 307, driven by the Australian Standards Body and the International Organization for Standardization ( ISO), is an important global initiative. The TC 307 for ISO 307 is in its early stages. Architecture and taxonomy, usage cases, protection and privacy, identification, smart contracts, governance, and interoperability between Blockchain apps are some focal areas here. The first reference design, privacy description, and security of publicly identifiable information will be available by 2021 [109].
  • Enterprise Ethereum Alliance (EEA): This partnership is a member-driven association of standards whose charter is to create transparent Blockchain specifications that facilitate harmonisation and interoperability for global companies and customers [110]. With more than 500 participants working on transparency, standards-based architectures and requirements to speed up the acceptance of Enterprise Ethereum, the EEA is one of the most involved industry partnerships, focused on the creation of software specifications and Ethereum enterprise certification.
  • ITU-T Blockchain: In order to examine the standardisation criteria of DLT-based applications and services, the ITU has developed an open participation ITU-T focus group DLT. The key emphasis of the focus group is the recognition and review of DLT-based applications and services, along with the development of best practises and recommendations to facilitate the global deployment of such applications and services [111].
  • W3C: The W3C has a Blockchain Community Group working on a Network Ledger Protocol (WLP) to produce ISO 20022-based Blockchain message format standards and create storage usage guidelines, including torrent, public Blockchain, private Blockchain, and side-chain storage [112]. This group will review and analyse emerging Blockchain-related technologies and use cases such as interbank communications, crypto-currencies, etc.
Essentially, the above mentioned requirements are commonly categorised as four types of DLT/Blockchain, shown in Figure 5. These divisions are characterised by their points of view, degree of depth, boundaries and demarcation, including industry cooperation with each component of the device and subsystems covered by the technology. It is expected that, in the coming years, there will be an urgent call for cross-chain interoperability among different enterprise-grade (permissioned) and public (permission-less) DLT/Blockchain systems, with various platforms interacting with each other to make the development of DApps much easier and more pervasive [113]. Multiple side-chains (a special type of Blockchain) will be needed and interoperability between these various network segments will be specified using a common-ground protocol, a network agent (e.g., a gateway) or a edge gateway [114]. This would be the ultimate prerequisite for the growth and convergence of DLT technology as a future for decentralised networks and services.

4. Physical Unclonable Functions (PUF)

Security and privacy have been a crucial concern in IoE applications in recent years [115]. In fact, IoT Edge technologies have arisen as one of the most serious problems due to electronic devices entering any aspect of smart city applications or energy utilities [116,117]. In addition, due to the trend in globalisation, system integrators have had to cope more than ever with integrated circuit (IC)/intellectual property (IP) counterfeiting. This counterfeit hardware has motivated the need for error-free safe chip authentication, as standard ID or key verification algorithms have been shown to be vulnerable to different forms of cyber attacks [118].
As edge devices become ubiquitous and interconnected in IoE networks must rely on Integrated Circuits (ICs) for data protection and privacy. Providing this protection relies on well-established key generation, data confidentiality and integrity, authentication, and identification [119]. It is therefore necessary for ICs to be able to provide plug-and-play protection in a cost-effective manner. Unfortunately, the classical methodologies [120,121,122] (e.g., digital signatures, encryption, etc.) suffer from numerous weaknesses; they are very sluggish, computationally exhaustive, costly, and increasingly susceptible to physical and side-channel attacks.
Hardware-based security paradigms such as Physical Unclonable Functions (PUFs) [123] and True Random Number Generators (TRNGs) [124] can transcend these limitations and provide random functions on edge modules to create security and reliability for IoE systems. PUFs can be used to retrieve hardware-based chip signatures and eruptive private keys, while TRNGs are used to generate random bits, initialisation vectors and nonces in encryption protocols. It should be remembered that whilst these paradigms will benefit ICs [125,126], there are physical properties and chip architectures that need to be addressed (e.g., power consumption, overhead, heat).
Since IoE and the digitization of energy utilities is a rapidly evolving model, protection and privacy of devices and data are the most challenging criteria for their widespread implementation. Using hardware-based security primitives integrating PUFs [127] and TRNGs [128], it is possible to apply cost-effective security solutions to a large-scale IoT sensor network and even Cyber-Physical Systems (CPSs) sector. Providing a stable environment and forum for IoE systems will defend them from malicious cyber attacks. One of the most critical issues for the production of stable IoT devices is the restricted resource existence of the edge devices. Security historically needs a significant amount of computing capital to perform the computations required for encryption, certificate verification, third-party authentication, etc. By integrating hardware security primitives, i.e., PUFs and TRNGs, developers can easily solve restricted IoT resource reliability and verifiability issues in a cost-effective and efficient manner. In the following sections we shall look into comprehensive details of working and implementation of PUFs for IoE systems [129].

4.1. Basics of PUFs

Small differences in the semiconductor manufacturing process make each transistor and each piece of silicon unique. This variants are spontaneous and obtrusive, because it is impossible to create an exact replica of an IC, so we refer to it as Physically Unclonable Function or PUF [130], as depicted in Figure 6a. These differences can be amplified and tested with the normal built-in Static Random-Access Memory (SRAM) cells [131] and the start-up activity of the SRAM chip results in a distinctive pattern that is similar to the IC fingerprint. There are two basic conditions for constructing a PUF: spontaneous and uncontrollable variants. Variations must be random, minimising the probability of producing the same signature [132]. Often, variants must be uncontrollable in such a manner where the adversary cannot replicate the units. The input and output of the PUFs maps a particular set of challenges to the corresponding answer set called Challenge-Response Pairs (CRPs) as shown in Figure 6b. In other words, PUF is a multiple-input (challenges) multiple-output (responses) function that has a dependency on outputs and inputs. The functional relationship between challenge and response is close to that of the random function [133]. Since the PUF is extracted from random process variance, it is very challenging, if not impossible, to predict the answer from a specific problem or to create a function to do so in hardware or software.

4.1.1. Implementation of PUFs

PUFs are gradually being used as the root-of-trust hardware for the protection and privacy of IoT devices, data, and services. In order to implement stable applications, the development process variation of the IC can be explicitly used as a source of randomness for the generation of device-unique cryptographic keys, as illustrated in Figure 7. They required minimum on-board power to function as well as memory based on regular SRAM cells (1 kbyte minimum) [134]. In most IoT implementations, edge devices transmit data to the central gateway. It is important to preserve the quality and privacy of these data from the sensors. To preserve the confidentiality of the data to guarantee that it cannot be tampered with, the data can be secured by encrypting the date with the PUF key or mechanisms such as the Message Authentication Code (MAC) and the Advanced Encryption Standard (AES) 256 [135].
The two broad types of application of PUFs are intrinsic and extrinsic [136]. Extrinsic PUFs depend on certain external stimulus to produce CRPs, e.g., light for an optical PUF. Intrinsic PUFs, on the other hand, are those that rely on the inherited internal manufacturing semiconductor properties (process variations) of the system. These implementation methods are summarised in Table 3. The most commonly deployed, cost-effective, and low-energy implementation of PUF is fundamentally the weak SRAM PUF [137,138]. Weak PUFs are basically a modern way to store cryptographic keys on insecure hardware, providing an alternative to read-only memory (ROM), Flash, or other nonvolatile memory (NVMs). Like all PUFs, Weak PUFs have internal, unclonable physical properties, and some sort of challenge-response mechanism that exploits this unusual fingerprint.
Table 3. PUFs Taxonomy based on Origin of Stimulus.
Table 3. PUFs Taxonomy based on Origin of Stimulus.
PUFs Taxonomy
IntrinsicExtrinsic
Memory-BasedDelay-BasedMiscellaneousGeneric
DRAM PUF [139]Arbiter PUF [140]Metal Based PUF [141]Optical PUF [142]
SRAM PUF [138,143]XOR Arbiter PUF [144]Photonic PUF [145]Coating PUF [146]
MRAM PUF [147]Butterfly PUF [148]Glitch PUF [149]
Flash Memory PUF [150]Bistable Ring PUF [151]Quantum Confinement PUF [152]
Ring Oscillator PUF [153]

4.1.2. Working of PUFs

Due to differences in the semiconductor manufacturing process, each transistor in an IC has various physical properties as shown in Figure 7. These contribute to minor but observable variations in threshold voltage electronics and gain factors [154]. Although these IC processes’ differences are not completely controllable during development, these physical unit properties cannot be replicated or cloned. Threshold voltages are sensitive to external factors such as temperature and voltage, meaning that their values cannot be used explicitly as special hidden keys or identifiers. Specifically, the activity of the SRAM cell depends on the difference in the threshold voltages of the transistors. Even the slightest variations will be exacerbated and the SRAM cell will be driven into one of the two stable states. Thus, the achieved functional-state is more stable than the underlying threshold voltages, making it the simplest way to use the threshold voltages to create a specific fingerprint [155].
The SRAM memory consists of intertwined SRAM cells. Each SRAM cell consists of two cross-coupled inverters, each consisting of a p- and n-MOS transistor. When the power is added to the SRAM cell, its logical state is determined by the relationship between the threshold voltages of the p-MOS transistors in the inverters. The transistor that begins the first operation decides the result, the logical “0” or “1”. It turns out that every SRAM cell has its own favoured state every time the SRAM is powered due to random variations in threshold voltages. This choice is independent of the preference of the adjacent cells and is independent of the position of the cell on the chip or wafer. Hence an SRAM region yields a unique and random pattern of 0’s and 1’s based on the stimulus applied, as depicted in Figure 6b (i.e., challenges and responses). The long-lasting and reliable efficiency of SRAM PUFs over time makes them the perfect candidate for use in IoE systems. However, the noise characteristics of the SRAM-based PUF reaction have been extensively characterised and evaluated under a wide range of circumstances and semiconductor foundry processes:
  • Temperature: −55 °C to +150 °C (−67 °F to +300 °F)
  • Voltage Variation: ± 20%
  • Humidity: 80%
  • EMC Test: 3 V/m (EN55020 0.15–150 MHz and IEC 61000-4-3 80–1000 MHz)
The durability of SRAM PUFs under varied atmospheric conditions has made them the leading candidate for automobile, energy, industrial, and military grade applications. In all the above conditions, the average noise level of the SRAM-based PUF response was found to be less than 15%. Despite this amount of noise, the high-entropy unit can be rebuilt with a special and stable key any time the SRAM is operated [156]. This can be done by applying error correction techniques [157], such as data algorithms and fuzzy extractors, as shown in Figure 8.

4.2. PUFs Standardisation

In this section, we will study the state-of-the-art mechanism for standardisation of PUFs. Protection specifications are now being addressed in ISO Sub-Committee ISO/IEC JTC1/SC27 (WG3) as document 20897 [158]. The ISO/IEC DIS 20897 manual defines the protection specifications and test methods for physically unclonable functions for the generation of nonstored cryptographic parameters. The primary reason for this standardisation is to structure and extend the demand for PUFs as solutions for nonmoderable electronic chips identifiers. In addition, this paper further incorporates two redundant protection criteria (i.e., diffuseness and unpredictability) into one (i.e., randomness) which is a stronger output assessment metric for all forms of PUFs. The security requirements for PUFs as mentioned in this document are given here-after:
  • Steadiness: It is an indicator of the stability of the response time of the PUF. This initiative can be used as a protection necessity. However, PUFs with unsteady responses may be prone to cyber attacks (if the response is very biased) or related key attacks.
  • Randomness: It assesses the unpredictability of PUF responses when considering the set of stimulus inputs. Ideally, the fingerprints collected could be unpredictable. This protection criterion certifies the unclonability of the PUF.
  • Uniqueness: It calculates how different the two pairs of different PUFs are. This inter-PUF metric is necessary to measure the degree to which the semiconductor manufacturing process is not capable of producing PUF clones.
  • Unpredictability: It calculates the difficulty of predicting the response of a (n+1)th PUF that knows all previous “n” instances. This calculation refers to randomness but is more realistic when it includes machine learning or ad hoc research.
  • Unclonability: This metric means that no easy-to-use bias or parameter occurs by nature in the PUF architecture. The purpose of this protection criterion is to verify the absence of loop holes in PUF systems.
There are various testing parameters that are discussed in the ISO/IEC DIS 20897 document, focusing on the reliability, unpredictability, and diffuseness [159].
  • Reliability: Bit error rate of 10 9 (or less)
  • Unpredictability: Entropy of 128 bit (or more)
  • Diffuseness: Pearson correlation coefficient between challenges and responses of 10 9 (or less)

4.3. Cyber Resilience of PUFs

PUFs are gradually being proposed as central building blocks for cryptographic protocols and security architectures for IoT and IoE systems [160]. Unlike other classic cryptographic primitives, where the degree of security can be compared to well-established security proof, the security of PUFs relies on assumptions about physical properties and is a subject of great interest these days [161]. SRAM PUFs can facilitate IoE security by providing integrated, lightweight cryptographic primitives for authentication, and certification without substantial modifications to the design or manufacturing process. However, extreme caution must be taken when developing IoE networks for edge-based PUF devices in order to prevent pitfalls that could endanger protection. SRAM PUFs can facilitate IoE security by providing integrated, lightweight cryptographic primitives for authentication and certification without substantial modifications to the design or manufacturing process. However, extreme caution [162] must be taken when developing IoE networks [163] for edge-based PUF devices in order to prevent pitfalls that could endanger protection.
The most substantial cyber threat to the PUF edge devices are the attackers who can provide the correct response to the challenges [164,165]. It is hard to replicate a PUF because of the semiconductor properties, but with enough computational resources attackers can predict CRPs with a modelling attack [166]. In this review, we are discussing two major attacker models [129]. In the first one, the attacker is able to expropriate the communication framework of devices in the field, whereas, in the second one, an adversary has physical access to the device.
Man-in-the-Middle (MITM)
As stated earlier the security of the PUFs is dependent on the size of the CRPs. Large set of CRPs make strong PUFs potentially vulnerable to machine learning assisted cyber attacks only [161]. These attacks originates as MITM and hackers getting hold of the CRPs database of the PUFs. Using this hacked CRPs subset the external hacker tries to process the numerical model to correctly predict the PUFs responses against the challenges given to the device for identification and verification purpose [167]. This attack can further penetrate in the OT field deployed network in IoE, once MITM launches impersonate attack on the neighbouring edge devices and get hold of information on the secret-key generation protocol, i.e., device and data both are under attack. MITM attacks can be performed with comparatively little effort in the IoE, since devices often connect dynamically to the central gateways. An external hacker can place a low-cost computing device in proximity to the attacked device and let it join the same (possibly encrypted) wireless network. Therefore, the risk for such an attack is relatively high, and suitable defense mechanisms [42] must be used, i.e., lightweight cryptography or Blockchain for the verification a identification of the devices.
Side Channel Attacks
This type of cyber attack originates when the adversary physically get access to the device. They can be classified as invasive, semi-invasive, and noninvasive attacks [168]. Invasive attacks are the type of cyber threat where the hacker gets hold of the physical device and accesses the internal circuitry. Though it is not very common, as any physical access can damage the PUF chip but there are reports that prove that PUFs are in fact vulnerable against invasive attacks, including creating a full physical clone of a PUF [169]. Usually these attacks need proper knowledge of input/output interfaces, communication protocols, and penetration testing skills. Above all, physical access to the device made these attacks less attractive in modern smart grid applications. Moreover, physical cloning needs the replication of time delay, synchronisation, and error correction modules along with the PUF chip, making it hard to achieve the right combination to get exact CRPs.
Timing attacks, power monitoring attacks, electromagnetic attacks and differential fault detection are prominent attacks in this group [170]. Timing attacks generally require mathematical analysis of the timing required by a CPU to carry out cryptographic operations and thereby decide the secret key. However, instead of secret keys, PUFs use a challenge response system and it is considerably more difficult to calculate the timing delays of a circuit in an IC, reliably. Power monitoring attacks depend on monitoring power usage during computations. We may, however, make PUFs stable against these attacks by designing the PUF in such a way that the number of zeros and ones in the latches is constant. Whereas, in electromagnetic attacks, PUFs are exploited by inserting faults into protection hardware by exposing it to irregular environmental conditions, as differential fault analysis is done. Although PUFs are pretty sensitive to the environmental conditions, these attacks can be mitigated by opting for a delay-based modification in the PUF design [171].
A few other prominent attack [128] types in PUF devices are:
  • Overbuilding: These types of cyber attacks originate because of the lack of intellectual property (IP) on the chip information or devices. The extra devices can be then sold in open market. The design could also be sold to third parties and PUF devices can be replicated easily.
  • Theft-of-Service: In the era of digitisation, the edge devices are virtualised with different services and processing algorithms from the cloud. In case of any adversary on the IoE nodes, the services not authorised to some of the nodes can be accessed by creating a perfect clone or CRPs.
  • Denial-of-Service: The regular upgradation of the edge devices in IoE should be audited and encrypted. For any malicious node, if it can get the respective upgraded firmware code it can launch the cyber attacks. This results in the malfunctioning of the operations and denial-of-service attack. The PUF developer should design firmware update procedures very securely to make sure they cannot be used without proper authentication.
The PUF modules can be modified to mitigate the external cyber attacks. One of the well-known solutions is Controlled Physical Unclonable Functions (C-PUFs) [44]. The C-PUF is accomplished in this scheme using several layers. For example, by avoiding a chosen challenge attack on PUF, one random hash function before the PUF can be modelled to avoid the MITM attack. This strategy does not allow the hacker to extract the PUF parameters using the model-based adversary attack. In order to have another layer of security, an error correcting code is placed after the PUF output to reduce the noisy output measurements which result in more resilient responses. The second solution for mitigating the cyber attack is via Public Physical Unclonable Functions (P-PUFs) [172]. This methodology is used to prevent the side-channel attacks by delaying the response from the gates (XOR).
The IoE network designers can have end-to-end system security by opting the hybrid software-hardware approach. Software encryption is deemed to be cost-effective and relatively easy to implement and update [173]. However, software security is relatively easy to modify, and malware can infiltrate or penetrate the software. Hardware-based security is known to be a more powerful choice for IoE. Hardware protection makes it impossible for the OT networks to breach [174] because it is hard to adjust the physical layer and protect ICs with the root of confidence. CRPs should be encrypted and installed in the safe ROM of the microcontroller, the root of confidence includes trustworthy functionality that can be used to validate and authenticate the [175] software signature of the program. By introducing a hardware-based root-of-trust, designers will basically close more possible entry points into their work.

5. Proof-of-PUF Authentication in IoE

Data management, security and privacy of data, devices, and individual SCADA systems are some of the key aspects in the IoE architecture that need to be resolved. Integrating the Blockchain into the IoE environment can help solve these issues and helps in achieving a unified secure data technology [176]. In this section, we will review the implementation and the performance of a hybrid framework of Blockchain, based on the secret computational model of a PUF [177,178,179,180], also known as PUFChain. The key factors that make this algorithm a leading candidate for concurrent data and device security in an IoE network are:
  • Key storage and key vault in high-security and mass-volume edge devices
  • Secure cloud integration (OT/IT Convergence)
  • Preventing reverse engineering of IP and software
  • Combating counterfeiting and cloned devices
  • Securing FPGAs and ASICs
In an IoE environment, most of the devices are low power and low computational devices. Various other characteristics of the devices, such as security and privacy, power consumption, on-board memory, and ability to host computational heavy algorithms [181] become bottlenecks when integrating a Blockchain environment into the IoE. The Blockchain has been computationally intensive especially in a dense node network. So there are some challenges that need to be dealt with before integrating it into IoE sector [182]. To overcome this limitation, PUFChain has been proposed [177,178,183] for resource constraint devices. The combination of PUF and hash decreases the numerical complexity of the processing, making it suitable for integration into most scenarios. With the PUF’s ultra-low power architectures, power overhead can also be drastically minimised to achieve low-carbon networks. In addition, Proof-of-PUF authentication is known to be a lightweight consensus algorithm that can easily guarantee protection and privacy in a scalable manner [184]. Initial findings [177] on PUF-based authentication showed 1000x faster processing times than well-established PoW and 5x faster than previously recorded hardware-based solutions. Transaction time reduction relative to hardware dependent implementations is 79.15%. This is due to the fact that PUFChain uses a hybrid PUF and hash system that does all the requisite cryptographic processing. The mining method is then offloaded to the hardware module, which reduces loading times.

5.1. Hardware Assisted Proof-of-PUF Authentication

The basic network of the PUFChain architecture is seen in Figure 9. IoE systems deployed in the sector, also known as Operational Technology (OT), track large quantities of critical energy infrastructure data. The signature PUF and hash is applied to the system at the OT stage of the PUFChain architecture. This lowers the computing pressure on the edge gateways, decreases the bandwidth, and increases the latency requirements of the stable IoE network [185]. A variety of transactions are initiated, validated, and linked to the Blockchain for authentication and identification purposes. A two-step protocol was proposed where, after the implementation of a new IoE device into the network [186], the device needs to go through the enrolment phase.
The nodes in the PUFChain architecture, as in Figure 9, can be categorised into two main types; (a) client nodes, that are responsible for data collection and broadcasting it in the network and (b) trusted nodes, that are assigned the task to authenticate the end-node devices and broadcast it back to the network. There are multiple trusted nodes available in the Blockchain network that can extract the device ID, PUF challenge input, and the hash from the block data coming from the clients. The trusted node obtains the response outputs from the encrypted database by using the device ID. At the trusted node, the extracted response, system ID, and sensor data from the block are sent to the hashing module and a hash is determined. The node is authenticated and the block is broadcasted to the network for the rest of the devices to connect it to their local Blockchains, if the hash in the block and the created hash correlate with each other. If the hash does not match, the procedure is replicated with the device ID for the rest of the keys present in the encrypted database. The block is discarded if none of the hashes correlate.
PUFChain guarantees safe OT/IT integration in IoE networks with reduced complexity and also provides concurrent device/data protection. Centred on the Proof-of-PUF authentication, Blockchain stores data that has been encrypted with identical PUF-derived keys and attributes, offering immutable confirmation that data has not been tampered with, in addition to providing traceability and straightforward auditing capabilities [187]. The protection of the PUFChain is dependent on the randomness of the PUF technology as discussed in the preceding sections. For PUF responses to be more stable and immune to foreign cyber threats, the number of 0s and 1s should be the same. For example, there should be 64 0-bits and 64 1-bits in the output key of 128 bits. This makes the PUF response more stable and immune to numerous attacks by [177]. PUFs together with Blockchain are exciting cryptographic primitives. On the other hand, the commercial problems for the large-scale implementation of this strategy in IoE networks are the probability of the randomness and stability properties of PUFs. We should strive to mitigate risk factors and develop effective error reducing strategies for PUFChain.

5.2. Enrolment and Authentication Steps in Proof-of-PUF Authentication

This section presents the enrolment and authentication steps of PUFChain based devices [187]. The use-case under consideration in this review paper is a resource rich edge-gateway communicates with constrained IoE devices in an untrusted field. The two basic assumptions regarding this untrusted sector are that, since there is so little or no control over the devices, device security is vulnerable to both passive and active cyber attacks. The different steps involved in various phases of the Proof-of-PuF authentication are presented in Figure 10. The first step, as explained in Figure 10a, is the device enrolment phase. IoE usually have a dense operational network (i.e., 100s of devices). Those end-nodes need to be enrolled and authenticated before they act as a client. There is a PUF module on every end-node device in the network that can produce unique identification numbers that are later used in the enrolment process for each device. The secure database is linked to the multiple trusted nodes in the network. A collection of challenge inputs ((R) and (C) functions) for the PUF module will be chosen during the enrolment stage [188]. These challenge response pairs are stored in the secure database that can be accessed by the trusted nodes of the IoE network.
If the edge node is securely enrolled in the network, it becomes capable of initiating active transactions authenticated by a trusted server, as depicted in Figure 10b. The edge devices in the IoE network collect data from the sensors and initiate the transactions. In this case, the transaction data includes the sensor data obtained and the device’s MAC address. For the rest of the nodes in the network and the trustworthy node, the MAC address acts as the identifier. It is sent to the hardware accelerator until the transaction is produced. It includes the PUF and the cryptographic hash can be computed. Before it is connected to the Blockchain, the block that is broadcast to the network needs to be approved by the trusted node. Once the block is received by the trusted node, the data (D n ) and the hash (H n ) are retrieved, Figure 10c. These two parameters help the IoE network to verify and authorise the edge nodes. In addition to the special identity that the PUF produces, the MAC address is used. The trustworthy node gets the PUF keys from the secure database with the help of the MAC address. To execute the cryptographic hash, the PUF key and the data are sent to the hardware accelerator. The input data and the PUF key are hashed and the denouement hash is compared to the H n received from the node. If both the hashes match, the device is authenticated. If they do not match, the process continues for all the PUF keys that are stored in the database during the enrolment phase of the device. The associated algorithms for all the three phases, as in Figure 10a–c, are explained in [177].

5.3. Hardware Implementation of PUFChain

Developments in electronics and wireless networking technology have led to exponential advances in a stable, mobile, and smart environment. This has resulted in an growth in the number of appropriate mobile devices in many countries, a decrease in their cost of manufacture, and a paradigm change from the physical world to the digital world. Due to the density of IoE edge devices in the region, energy utilities opt for low-cost but effective devices that can provide smooth integration [189]. Classical IoT systems are extremely centralised architectures that suffer from a range of technological shortcomings, such as cyber threats and single failure points. To overcome this bottleneck, IoT networks can quickly follow a decentralised Blockchain-PUF model while retaining real-time monitoring and control between end-user and edge gateways. Blockchain and PUF can complement IoE by providing a secure sharing service where information is reliable and traceable. Data sources may be detected at any time and data stays immutable over time, thereby increasing its security [190]. This section summarises the hardware implementation of Blockchain and PUF based IoT networks, as depicted in Figure 11, using the cost effective devices, i.e., Arduino, Raspberry, and Orange Pi boards.
For the cost-effective deployment of the Blockchain-based IoE network, a layered approach has been implemented to simplify the hardware specifications of [191]. With advances in hardware technologies, edge devices such as Raspberry Pi (RPi) will directly benefit from network resources by invoking state-of-the-art Representation Transition Application Programming Interfaces (REST APIs). This layered, focused approach, as seen in Figure 11 allows the IoE network maximum versatility for potential expansions and developers can substitute or install any new module without disrupting the rest of the [73,189] infrastructure. However, it is important to know that not all forms of PUFs can be introduced by using cost-effective hardware tools such as RPi. Decay-based DRAM-PUF [192] is the most common technique that can be used in IoE networks. The implementation design of the RPi is seen in Figure 12, with three key parameters: PUF address, initial value, and decay time. The address of the DRAM may be used as a PUF identifier. The initial value is the set of digital data that was used before the PUF query to trigger the PUF identifier. In the PUF query, decay-time determine how long the DRAM PUF has been disabled. These parameters are then compiled with the aid of the RPi Universal Asynchronous Receiver/Transmitter (UART). Then the PUF query code running on the Graphics Processing Unit (GPU) can retrieve these Central Processing Unit (CPU) parameters from the mailbox. The programs running on the CPU and GPU can only communicate through mailboxes [192].
Researchers are still designing mainstream platforms for the deployment of Blockchain in IoE [190], but few of them have earned positive consideration from the consortium, i.e., Ethereum [193] and Hyperledger Fabric [194]. The summarised comparison of the Blockchain platforms for creating IoE applications are given in the Table 4.
To test the viability of running Blockchain-PUF platforms on IoE devices, the execution time to register the devices, sensor readings, data query, and block processing overheads have been extensively analysed in [191] and are enlisted in Table 5. Blockchain based IoE nodes can be implemented via Raspberry Pi3 [195] with 1GB on-board memory, Android Things v0.8 operating system, CoAP server, Android Studio for integrated development environment, and programming language support such as Java, Python etc. Connection with the centralised system and the IoE nodes usually uses the restricted application protocol (CoAP) while HTTP is used for communication between the system host and the Blockchain network. It is critical that the architecture of hardware and network infrastructure should be robust to significant network traffic. Although the hybrid Blockchain-PUF and IoE research studies are still in its infancy, this review article explores the potential applications of IoE and Blockchain to improve efficiency and bring automation, to revolutionise robust business solutions in energy sector. Current and future research challenges are discussed in the later section, aiming at testing the interoperability of the cost-effective system with different IoE frameworks.

6. Applications and Use-Cases

The most common applications of PUFs proposed in the relevant literature [43,136] include identification, authentication, attestation, secure boot, anticounterfeiting, and secure key agreement protocols. Additionally, PUFs can serve as the basis for the implementation of true ultra-high entropy random number generators. PUFs can also be combined with other security primitives and entropy sources for combine data and device security, so that the overall architecture will produce a divergent unique response for the same challenge, when queried at different times. Since edge devices and PUFs are cost-effective monitoring solutions for IoE [196], they can be incorporated in the network for the following applications.
  • Authentication: PUFs on devices can be used for authentication and binding hardware to software platforms, secure key storage, key-less secure communication in the OT/IT convergence. Two different schemes of authentication exist, namely client authentication and server authentication, both being based on the CRPs.
  • Device Identification: The use of PUFs for device identification purposes effectively turns the device into the authentication token. It reduces the necessity to store cryptographic keys and look-up tables inside the device, which can be a cyber threat and adversary can extract cryptographic material from nonvolatile memory. Instead, the PUF device generates an transient key “on-the-fly” on the basis of it‘s unique fingerprint, minimising the attack surface to extract the key.
  • Random Number Generation: An important building block for many cryptographic systems is the random number generator. Random numbers with high entropy are required in these frameworks, because they are unclonable for potential attackers. Since an interesting source of randomness is readily available in PUFs due to semiconductor manufacturing process. This property can be exploited to use PUF as a truly random number generator.
  • Secure Environment: The idea of this application is to provide hybrid software-hardware security and generate a cryptographic key. Subsequently, the key is used to decrypt software, which is installed on the chip. The basic function is to decrypt the boot-loader, which is executed first during PUF start-up or embedded devices. After the boot-loader has been decrypted using the key, derived from the PUF response, it subsequently unlocks the kernel, which in turn decrypts user space applications.
  • IP Protection: The integrated circuit (IC) design flow is globalised due to increase in design, fabrication, testing, and verification costs. While globalisation has provided cost benefits and reduced the time-to-market, it has introduced several attacks such as piracy, malicious modifications, and counterfeiting. IP of the devices can make use of unique PUFs fingerprint to protect the devices.

IC Traceability via PUF and Blockchain (Use-Case)

Driven by the continuous and exponential scaling of semiconductor manufacturing technologies, integrated circuits (ICs) and their installation in the IoE have been more complex than ever before [197]. The globalisation of the IC supply chain has raised the possibility of counterfeit, tampered, and repackaged chips on the market with the least protection from IP. Protection of device updates, firmware, and contact networks has gained a lot of attention due to various hardware bugs, threats, and cyber attacks. The security aspect of ICs and electronic devices has been restricted to a range of bugs and attacks, such as side-channel analysis that exploits hardware implementation of cryptographic algorithms for leaking hidden keys and invasive/semi-invasive attacks, as discussed in the previous section. However, the credibility of the supply chain of ICs and electronic systems is equally critical, as hardware derived from an untrusted supply chain cannot act as the underlying root-of-trust hardware [198].
With the new developments in PUF and Blockchain [176], an end-to-end protected IC traceability can be accomplished, thanks to Blockchain, a public immutable ledger that holds an ever-increasing collection of data records (ICs, PUFs, and CRPs) guarded from tampering and revision, as seen in Figure 13. The authenticity of IP knowledge and traceability is a critical case-study for IoE, which refers to the combination of the ability to know the actual possession of the edge system at all times (track) and the ability to find the origin [199], the history of ownership, the time spent at each point (trace) by means of registered identifications via Blockchain. The supply chain of semiconductor products, from processing to installation of OT devices and product-life, is protected by blocks containing PUF specific signatures, hash and time stamps, transactions, never forming a chronological chain, as seen in Figure 13. It can make it possible to validate, record, and deter any malicious party from modifying or questioning the authenticity of the information reported by IP authentication and IC proprietary transmission of information [200]. This verifiable and permanent ledger will also allow the identity and traceability of the IC across the entire supply chain and its lifetime of deployment. Real-time monitoring of IP secured devices across several supply chains includes a clear, tamper-proof meta-data network architecture [201], i.e., edge computing and cloud convergence, which is not only trusted by all stakeholders but also adaptable to changing markets and regulations.

7. Current Challenges and Future Research

The promising and commercial implementation of hybrid approach, i.e., Blockchain and PUF, is leading the security of smart grid applications. Despite the wide spread use in IoE systems, there are significant challenges in the development and deployment of existing and planned systems that will need further investigation:
  • Blockchain Design Types: Decision from the energy utilities of whether your Blockchain design will be a public Blockchain (generally open to participation by anyone and not permissioned), private Blockchain (involving limited participation and having permission structures), or a hybrid (Blockchain systems with both public and private designs). Specially, privacy laws and data jurisdiction/sovereignty should be considered for all of the digital data on the system.
  • Scalability: One major technology challenge of Blockchain and PUF is related to the technical scalability and integration of the network which can put a strain on the adoption process, especially for public Blockchains. As more and more edge devices are integrated into the legacy energy networks, they need to be verified, authenticated, and orchestrated with existing Blockchain network.
  • Standardisation and Interoperability: Another vital challenge is the lack of interoperability between the large number of Blockchain networks that coexist in the same smart grid domain. The lack of such uniformity across Blockchain frameworks also takes away consistency from basic processes like security, making network wide adoption an almost impracticable task.
  • Seamless Integration with IoE: This is the biggest challenge for energy utilities and IoE systems to integrate the advancements with legacy systems. In most cases, if they decide to use Blockchain and PUF, the organisations are required to completely restructure their classical system or design a way to successfully integrate the two technologies.
  • Data Sharing and Access: Sharing and access to critical monitoring data is subject to various privacy, legal, and regulatory laws. Decisions need to be made about what type of data will be shared with the Blockchain participants. Thoughtful network architecture is required to see if data will be stored on-chain, offchain or on a side-chain, and the type of permission structures that will be utilised.
  • Productivity Paradox: The effectiveness with which PUF and Blockchain networks can execute peer-to-peer data transfer comes at a high aggregate cost/bandwidth, which is greater for a dense edge system. This inefficiency come into play because each node performs the same tasks as every other node on it’s own copy of the data in an attempt to be the first to find a solution.

8. Conclusions

To comprehend the secure IoE development, this review paper provides the current state-of-the-art on the Blockchain technology and PUFs by employing Proof-of-PUF as a consensus algorithm (PUFChain). Devices constituting the IoE have become widely used in energy utilities, therein generating a large amount of data from critical infrastructure that needs an end-to-end security and privacy solution. The pragmatic industrial option is PUFchain, which is an efficient security framework that can have a seamless integration in an IoE network inherently having energy and processing power constraints. Classical authentication mechanisms can no longer be based on simply storing secret data or PKI as the secret keys on the edge devices that could get stolen or leaked. This issue is addressed in PUFchain where physical properties of the devices are used as unique fingerprint and recorded as a proof of authentication. The added benefit of PUFChain for the IoE networks is that PUF key generated is not transmitted over the communication channel in the Proof-of-PUF consensus algorithm which not only makes the system resilient to communication attacks but also eases the bandwidth and latency requirements.

Author Contributions

Conceptualisation, R.A., K.G., and J.I.; resources, R.A.; data curation, R.A. and K.G.; writing original draft preparation, R.A.; review and editing, R.A. and K.G.; supervision, J.I.; project administration, R.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Acknowledgments

The authors would like to thank Hannah Rudman (Strategic Transformation Director) at Wallet Services, Edinburgh, UK for providing in-depth knowledge on Distributed Ledger Technology (DLT) and use-cases in the energy utilities.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
5GFifth Generation Cellular Network
AESAdvanced Encryption Standard
ASICSApplication-Specific Integrated Circuits
AIArtificial Intelligence
BaaSBlockchain-as-a-Service
CAGRCompound Annual Growth Rate
CAPEXCapital Expenses
CPSCyber Physical System
CRPSChallenge-Response Pairs
CSCybersecurity
DAppssDated, Achievable, Personal, Positive and Specific
DLTDistributed Ledger Technology
DNOsDistribution Network Operators
DPoSDelegated Proof-of-Stake
DTsDigital Twins
DUTDevice Under Test
E2EEnd-to-End
EEAEnterprise Ethereum Alliance
EMCElectromagnetic Compatibility
FIBFocused Ion Beam
FPGAsField Programmable Gate Arrays
ICsIntegrated Circuits
ICTInformation and Communication Technology
IoEInternet-of-Energy
IIoTIndustrial Internet-of-Things
IoTInternet-of-Things
IPIntellectual Property
ISOInternational Organization for Standardization
ITInformational Technology
ITU-TInternational Telecommunication Union
LTELong Term Evaluation
LPWANLow-Power Wide-Area Network
MACMessage Authentication Code
MITMMan-in-the-Middle
NVMNon-Volatile Memories
OPEXOperational Expenses
OTOperational Technology
PBFTPractical Byzantine Fault Tolerance
PKIPublic Key Infrastructure
PoPProof-of-Physical Unclonable Function
PoSProof-of-Stake
PoWProof-of-Work
PUFPhysical Unclonable Function
PUFChainPhysical Unclonable Function assisted Blockchain
RESTRepresentational State Transfer
ROMRead-Only-Memory
SCADASupervisory Control and Data Acquisition
SDOsStandards Developing Organization
SRAMStatic Random-Access Memory
TRNGsTrue Random Number Generators
WLPWeb Ledger Protocol

References

  1. Bui, N.; Castellani, A.P.; Casari, P.; Zorzi, M. The internet of energy: A web-enabled smart grid system. IEEE Netw. 2012, 26, 39–45. [Google Scholar] [CrossRef]
  2. Moness, M.; Moustafa, A.M. A Survey of Cyber-Physical Advances and Challenges of Wind Energy Conversion Systems: Prospects for Internet of Energy. IEEE Internet Things J. 2016, 3, 134–145. [Google Scholar] [CrossRef]
  3. Shit, R.C.; Sharma, S.; Puthal, D.; Zomaya, A.Y. Location of Things (LoT): A Review and Taxonomy of Sensors Localization in IoT Infrastructure. IEEE Commun. Surv. Tutor. 2018, 20, 2028–2061. [Google Scholar] [CrossRef]
  4. Bedi, G.; Venayagamoorthy, G.K.; Singh, R.; Brooks, R.R.; Wang, K. Review of Internet of Things (IoT) in Electric Power and Energy Systems. IEEE Internet Things J. 2018, 5, 847–870. [Google Scholar] [CrossRef]
  5. Ma, M.; Wang, P.; Chu, C. Data Management for Internet of Things: Challenges, Approaches and Opportunities. In Proceedings of the 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, Beijing, China, 20–23 August 2013; pp. 1144–1151. [Google Scholar]
  6. Ma, Z.; Xie, J.; Li, H.; Sun, Q.; Si, Z.; Zhang, J.; Guo, J. The Role of Data Analysis in the Development of Intelligent Energy Networks. IEEE Netw. 2017, 31, 88–95. [Google Scholar] [CrossRef] [Green Version]
  7. Vermesan, O.; Blystad, L.C.; Zafalon, R.; Moscatelli, A.; Kriegel, K.; Mock, R.; John, R.; Ottella, M.; Perlo, P. Internet of Energy—Connecting Energy Anywhere Anytime. In Advanced Microsystems for Automotive Applications 2011; Meyer, G., Valldorf, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 33–48. [Google Scholar]
  8. Fang, X.; Misra, S.; Xue, G.; Yang, D. Smart Grid—The New and Improved Power Grid: A Survey. IEEE Commun. Surv. Tutor. 2012, 14, 944–980. [Google Scholar] [CrossRef]
  9. Farhangi, H. The path of the smart grid. IEEE Power Energy Mag. 2010, 8, 18–28. [Google Scholar] [CrossRef]
  10. Gungor, V.C.; Sahin, D.; Kocak, T.; Ergut, S.; Buccella, C.; Cecati, C.; Hancke, G.P. Smart Grid Technologies: Communication Technologies and Standards. IEEE Trans. Ind. Inform. 2011, 7, 529–539. [Google Scholar] [CrossRef] [Green Version]
  11. Wang, K.; Wang, Y.; Hu, X.; Sun, Y.; Deng, D.; Vinel, A.; Zhang, Y. Wireless Big Data Computing in Smart Grid. IEEE Wirel. Commun. 2017, 24, 58–64. [Google Scholar] [CrossRef]
  12. Combe, T.; Martin, A.; Di Pietro, R. To Docker or Not to Docker: A Security Perspective. IEEE Cloud Comput. 2016, 3, 54–62. [Google Scholar] [CrossRef]
  13. Blenk, A.; Basta, A.; Reisslein, M.; Kellerer, W. Survey on Network Virtualization Hypervisors for Software Defined Networking. IEEE Commun. Surv. Tutor. 2016, 18, 655–685. [Google Scholar] [CrossRef] [Green Version]
  14. Ruland, K.C.; Sassmannshausen, J.; Waedt, K.; Zivic, N. Smart grid security-an overview of standards and guidelines. Elektrotechnik Informationstechnik 2017, 134, 19–25. [Google Scholar] [CrossRef]
  15. Dorri, A.; Kanhere, S.S.; Jurdak, R.; Gauravaram, P. Blockchain for IoT security and privacy: The case study of a smart home. In Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Kona, HI, USA, 13–17 March 2017; pp. 618–623. [Google Scholar]
  16. Hellaoui, H.; Koudil, M.; Bouabdallah, A. Energy-efficient mechanisms in security of the internet of things: A survey. Comput. Netw. 2017, 127, 173–189. [Google Scholar] [CrossRef]
  17. Zhabelova, G.; Vyatkin, V. Multiagent Smart Grid Automation Architecture Based on IEC 61850/61499 Intelligent Logical Nodes. IEEE Trans. Ind. Electron. 2012, 59, 2351–2362. [Google Scholar] [CrossRef]
  18. Zhabelova, G.; Vyatkin, V.; Dubinin, V.N. Toward Industrially Usable Agent Technology for Smart Grid Automation. IEEE Trans. Ind. Electron. 2015, 62, 2629–2641. [Google Scholar] [CrossRef]
  19. Yan, Y.; Qian, Y.; Sharif, H.; Tipper, D. A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and Challenges. IEEE Commun. Surv. Tutor. 2013, 15, 5–20. [Google Scholar] [CrossRef] [Green Version]
  20. Lundstrom, B.; Chakraborty, S.; Lauss, G.; Bründlinger, R.; Conklin, R. Evaluation of system-integrated smart grid devices using software- and hardware-in-the-loop. In Proceedings of the 2016 IEEE Power Energy Society Innovative Smart Grid Technologies Conference (ISGT), Minneapolis, MN, USA, 6–9 September 2016; pp. 1–5. [Google Scholar]
  21. Metke, A.R.; Ekl, R.L. Security Technology for Smart Grid Networks. IEEE Trans. Smart Grid 2010, 1, 99–107. [Google Scholar] [CrossRef]
  22. Fan, Z.; Kulkarni, P.; Gormus, S.; Efthymiou, C.; Kalogridis, G.; Sooriyabandara, M.; Zhu, Z.; Lambotharan, S.; Chin, W.H. Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities. IEEE Commun. Surv. Tutor. 2013, 15, 21–38. [Google Scholar] [CrossRef] [Green Version]
  23. Saputro, N.; Akkaya, K.; Uludag, S. A survey of routing protocols for smart grid communications. Comput. Netw. 2012, 56, 2742–2771. [Google Scholar] [CrossRef]
  24. Lytras, M.D.; Chui, K.T. The Recent Development of Artificial Intelligence for Smart and Sustainable Energy Systems and Applications. Energies 2019, 12, 3108. [Google Scholar] [CrossRef] [Green Version]
  25. Moslehi, K.; Kumar, R. A Reliability Perspective of the Smart Grid. IEEE Trans. Smart Grid 2010, 1, 57–64. [Google Scholar] [CrossRef]
  26. Sharma, P.K.; Chen, M.; Park, J.H. A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT. IEEE Access 2018, 6, 115–124. [Google Scholar] [CrossRef]
  27. Xu, T.; Wendt, J.B.; Potkonjak, M. Security of IoT systems: Design challenges and opportunities. In Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), San Jose, CA, USA, 2–6 November 2014; pp. 417–423. [Google Scholar]
  28. Alaba, F.A.; Othman, M.; Hashem, I.A.T.; Alotaibi, F. Internet of Things security: A survey. J. Netw. Comput. Appl. 2017, 88, 10–28. [Google Scholar] [CrossRef]
  29. Radoglou Grammatikis, P.I.; Sarigiannidis, P.G.; Moscholios, I.D. Securing the Internet of Things: Challenges, threats and solutions. Internet Things 2019, 5, 41–70. [Google Scholar] [CrossRef]
  30. Prinsloo, J.; Sinha, S.; von Solms, B. A Review of Industry 4.0 Manufacturing Process Security Risks. Appl. Sci. 2019, 9, 5105. [Google Scholar] [CrossRef] [Green Version]
  31. Sadeghi, A.; Wachsmann, C.; Waidner, M. Security and privacy challenges in industrial Internet of Things. In Proceedings of the 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), San Francisco, CA, USA, 8–12 June 2015; pp. 1–6. [Google Scholar]
  32. Hao, P.; Wang, X.; Shen, W. A Collaborative PHY-Aided Technique for End-to-End IoT Device Authentication. IEEE Access 2018, 6, 42279–42293. [Google Scholar] [CrossRef]
  33. Zhang, Y.; Xu, L.; Dong, Q.; Wang, J.; Blaauw, D.; Sylvester, D. Recryptor: A Reconfigurable Cryptographic Cortex-M0 Processor With In-Memory and Near-Memory Computing for IoT Security. IEEE J. Solid-State Circuits 2018, 53, 995–1005. [Google Scholar] [CrossRef]
  34. Khari, M.; Garg, A.K.; Gandomi, A.H.; Gupta, R.; Patan, R.; Balusamy, B. Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques. IEEE Trans. Syst. Man Cybern. Syst. 2020, 50, 73–80. [Google Scholar] [CrossRef]
  35. Almajed, H.N.; Almogren, A.S. SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography. IEEE Access 2019, 7, 175865–175878. [Google Scholar] [CrossRef]
  36. Li, R.; Song, T.; Mei, B.; Li, H.; Cheng, X.; Sun, L. Blockchain for Large-Scale Internet of Things Data Storage and Protection. IEEE Trans. Serv. Comput. 2019, 12, 762–771. [Google Scholar] [CrossRef]
  37. Shen, M.; Tang, X.; Zhu, L.; Du, X.; Guizani, M. Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities. IEEE Internet Things J. 2019, 6, 7702–7712. [Google Scholar] [CrossRef]
  38. Duan, Y.; Sun, X.; Che, H.; Cao, C.; Li, Z.; Yang, X. Modeling Data, Information and Knowledge for Security Protection of Hybrid IoT and Edge Resources. IEEE Access 2019, 7, 99161–99176. [Google Scholar] [CrossRef]
  39. Underwood, S. Blockchain beyond Bitcoin. Commun. ACM 2016, 59, 15–17. [Google Scholar] [CrossRef]
  40. Huh, S.; Cho, S.; Kim, S. Managing IoT devices using blockchain platform. In Proceedings of the 2017 19th International Conference on Advanced Communication Technology (ICACT), Bongpyeong, Korea, 19–22 February 2017; pp. 464–467. [Google Scholar]
  41. Khan, M.A.; Salah, K. IoT security: Review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 2018, 82, 395–411. [Google Scholar] [CrossRef]
  42. Ángel Prada-Delgado, M.; Baturone, I.; Dittmann, G.; Jelitto, J.; Kind, A. PUF-derived IoT identities in a zero-knowledge protocol for blockchain. Internet Things 2020, 9, 100057. [Google Scholar] [CrossRef]
  43. Herder, C.; Yu, M.; Koushanfar, F.; Devadas, S. Physical Unclonable Functions and Applications: A Tutorial. Proc. IEEE 2014, 102, 1126–1141. [Google Scholar] [CrossRef]
  44. Shamsoshoara, A.; Korenda, A.; Afghah, F.; Zeadally, S. A survey on physical unclonable function (PUF)-based security solutions for Internet of Things. Comput. Netw. 2020, 183, 107593. [Google Scholar] [CrossRef]
  45. Mpitziopoulos, A.; Gavalas, D.; Konstantopoulos, C.; Pantziou, G. A survey on jamming attacks and countermeasures in WSNs. IEEE Commun. Surv. Tutor. 2009, 11, 42–56. [Google Scholar] [CrossRef]
  46. Becher, A.; Benenson, Z.; Dornseif, M. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. In Security in Pervasive Computing; Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J., Eds.; Springer Berlin Heidelberg: Berlin/Heidelberg, Germany, 2006; pp. 104–118. [Google Scholar]
  47. Bogdanov, A. Multiple-Differential Side-Channel Collision Attacks on AES. In Cryptographic Hardware and Embedded Systems—CHES 2008; Oswald, E., Rohatgi, P., Eds.; Springer: Berlin/Heidelberg, Germany, 2008; pp. 30–44. [Google Scholar]
  48. Heer, T.; Garcia-Morchon, O.; Hummen, R.; Keoh, S.L.; Kumar, S.S.; Wehrle, K. Security Challenges in the IP-based Internet of Things. Wirel. Pers. Commun. 2011, 61, 527–542. [Google Scholar] [CrossRef] [Green Version]
  49. Liu, J.; Xiao, Y.; Chen, C.L.P. Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012; pp. 588–592. [Google Scholar]
  50. Hossain, M.M.; Fotouhi, M.; Hasan, R. Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things. In Proceedings of the 2015 IEEE World Congress on Services, New York, NY, USA, 27 June–2 July 2015; pp. 21–28. [Google Scholar]
  51. Bysani, L.K.; Turuk, A.K. A Survey on Selective Forwarding Attack in Wireless Sensor Networks. In Proceedings of the 2011 International Conference on Devices and Communications (ICDeCom), Mesra, India, 24–25 February 2011; pp. 1–5. [Google Scholar]
  52. Krontiris, I.; Giannetsos, T.; Dimitriou, T. Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side. In Proceedings of the 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Avignon, France, 12–14 October 2008; pp. 526–531. [Google Scholar]
  53. Pongle, P.; Chavan, G. A survey: Attacks on RPL and 6LoWPAN in IoT. In Proceedings of the 2015 International Conference on Pervasive Computing (ICPC), Pune, India, 8–10 January 2015; pp. 1–6. [Google Scholar]
  54. Sankara Narayanan, S.; Murugaboopathi, G. Modified secure AODV protocol to prevent wormhole attack in MANET. Concurr. Comput. Pract. Exp. 2020, 32, e5017. [Google Scholar] [CrossRef]
  55. Magotra, S.; Kumar, K. Detection of HELLO flood attack on LEACH protocol. In Proceedings of the 2014 IEEE International Advance Computing Conference (IACC), Gurgaon, India, 21–22 February 2014; pp. 193–198. [Google Scholar]
  56. Duggempudi, S.R.; Anil Kumar, V.; Sethumadhavan, M. Acknowledgement Spoofing at Kernel Level and TCP Sender Behaviour Analysis. In Soft Computing and Signal Processing; Reddy, V.S., Prasad, V.K., Wang, J., Reddy, K.T.V., Eds.; Springer: Singapore, 2020; pp. 673–681. [Google Scholar]
  57. Siris, V.A.; Papagalou, F. Application of anomaly detection algorithms for detecting SYN flooding attacks. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM ’04), Dallas, TX, USA, 29 November–3 December 2004; Volume 4, pp. 2050–2054. [Google Scholar]
  58. Lo, N.W.; Yeh, K. De-synchronization attack on RFID authentication protocols. In Proceedings of the 2010 International Symposium On Information Theory Its Applications, Taichung, Taiwan, 17–20 October 2010; pp. 566–570. [Google Scholar]
  59. Joo, D.; Kim, T. Managing clock skews in clock trees with local clock skew requirements using adjustable delay buffers. In Proceedings of the 2015 International SoC Design Conference (ISOCC), Gyungju, Korea, 2–5 November 2015; pp. 137–138. [Google Scholar]
  60. Buttyan, L.; Schaffer, P.; Vajda, I. Resilient aggregation with attack detection in sensor networks. In Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW’06), Pisa, Italy, 13–17 March 2006; pp. 5–336. [Google Scholar]
  61. Verma, S.; Kawamoto, Y.; Fadlullah, Z.M.; Nishiyama, H.; Kato, N. A Survey on Network Methodologies for Real-Time Analytics of Massive IoT Data and Open Research Issues. IEEE Commun. Surv. Tutor. 2017, 19, 1457–1477. [Google Scholar] [CrossRef]
  62. Hossein Motlagh, N.; Mohammadrezaei, M.; Hunt, J.; Zakeri, B. Internet of Things (IoT) and the Energy Sector. Energies 2020, 13, 494. [Google Scholar] [CrossRef] [Green Version]
  63. Liu, Y.; Yang, C.; Jiang, L.; Xie, S.; Zhang, Y. Intelligent Edge Computing for IoT-Based Energy Management in Smart Cities. IEEE Netw. 2019, 33, 111–117. [Google Scholar] [CrossRef]
  64. Patel, P.; Intizar Ali, M.; Sheth, A. On Using the Intelligent Edge for IoT Analytics. IEEE Intell. Syst. 2017, 32, 64–69. [Google Scholar] [CrossRef]
  65. Huang, M.; Liu, A.; Xiong, N.N.; Wang, T.; Vasilakos, A.V. A Low-Latency Communication Scheme for Mobile Wireless Sensor Control Systems. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 317–332. [Google Scholar] [CrossRef]
  66. Mekki, K.; Bajic, E.; Chaxel, F.; Meyer, F. A comparative study of LPWAN technologies for large-scale IoT deployment. ICT Express 2019, 5, 1–7. [Google Scholar] [CrossRef]
  67. Zhou, W.; Jia, Y.; Peng, A.; Zhang, Y.; Liu, P. The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved. IEEE Internet Things J. 2019, 6, 1606–1616. [Google Scholar] [CrossRef] [Green Version]
  68. Trump, B.D.; Florin, M.; Matthews, H.S.; Sicker, D.; Linkov, I. Governing the Use of Blockchain and Distributed Ledger Technologies: Not One-Size-Fits-All. IEEE Eng. Manag. Rev. 2018, 46, 56–62. [Google Scholar] [CrossRef]
  69. Belotti, M.; Božić, N.; Pujolle, G.; Secci, S. A Vademecum on Blockchain Technologies: When, Which, and How. IEEE Commun. Surv. Tutor. 2019, 21, 3796–3838. [Google Scholar] [CrossRef] [Green Version]
  70. Nofer, M.; Gomber, P.; Hinz, O.; Schiereck, D. Blockchain. Bus. Inf. Syst. Eng. 2017, 59, 183–187. [Google Scholar] [CrossRef]
  71. Wang, M.; Duan, M.; Zhu, J. Research on the Security Criteria of Hash Functions in the Blockchain. In Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, Incheon, Korea, 4 June 2018; Association for Computing Machinery: New York, NY, USA, 2018; pp. 47–55. [Google Scholar]
  72. Mingxiao, D.; Xiaofeng, M.; Zhe, Z.; Xiangwei, W.; Qijun, C. A review on consensus algorithm of blockchain. In Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Banff, AB, Canada, 5–8 October 2017; pp. 2567–2572. [Google Scholar]
  73. Huang, K.; Zhang, X.; Mu, Y.; Rezaeibagha, F.; Du, X.; Guizani, N. Achieving Intelligent Trust-Layer for Internet-of-Things via Self-Redactable Blockchain. IEEE Trans. Ind. Inform. 2020, 16, 2677–2686. [Google Scholar] [CrossRef]
  74. Wang, Q.; Jia, Z.; Wang, T.; Shen, Z.; Zhao, M.; Chen, R.; Shao, Z. A Highly Parallelized PIM-Based Accelerator for Transaction-Based Blockchain in IoT Environment. IEEE Internet Things J. 2020, 7, 4072–4083. [Google Scholar] [CrossRef]
  75. Mylrea, M.; Gourisetti, S.N.G. Blockchain for Supply Chain Cybersecurity, Optimization and Compliance. In Proceedings of the 2018 Resilience Week (RWS), Denver, CO, USA, 20–23 August 2018; pp. 70–76. [Google Scholar]
  76. Mylrea, M.; Gourisetti, S.N.G. Blockchain for smart grid resilience: Exchanging distributed energy at speed, scale and security. In Proceedings of the 2017 Resilience Week (RWS), Wilmington, DE, USA, 18–22 September 2017; pp. 18–23. [Google Scholar]
  77. Peck, M.E.; Wagman, D. Energy trading for fun and profit buy your neighbor’s rooftop solar power or sell your own-it’ll all be on a blockchain. IEEE Spectr. 2017, 54, 56–61. [Google Scholar] [CrossRef]
  78. Mylrea, M.; Gupta Gourisetti, S.N.; Bishop, R.; Johnson, M. Keyless Signature Blockchain Infrastructure: Facilitating NERC CIP Compliance and Responding to Evolving Cyber Threats and Vulnerabilities to Energy Infrastructure. In Proceedings of the 2018 IEEE/PES Transmission and Distribution Conference and Exposition (T & D), Denver, CO, USA, 16–19 April 2018; pp. 1–9. [Google Scholar]
  79. Andoni, M.; Robu, V.; Flynn, D.; Abram, S.; Geach, D.; Jenkins, D.; McCallum, P.; Peacock, A. Blockchain technology in the energy sector: A systematic review of challenges and opportunities. Renew. Sustain. Energy Rev. 2019, 100, 143–174. [Google Scholar] [CrossRef]
  80. Sanseverino, E.R.; Di Silvestre, M.L.; Gallo, P.; Zizzo, G.; Ippolito, M. The Blockchain in Microgrids for Transacting Energy and Attributing Losses. In Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, UK, 21–23 June 2017; pp. 925–930. [Google Scholar]
  81. Lei, K.; Du, M.; Huang, J.; Jin, T. Groupchain: Towards a Scalable Public Blockchain in Fog Computing of IoT Services Computing. IEEE Trans. Serv. Comput. 2020, 13, 252–262. [Google Scholar] [CrossRef]
  82. Zhaofeng, M.; Xiaochang, W.; Jain, D.K.; Khan, H.; Hongmin, G.; Zhen, W. A Blockchain-Based Trusted Data Management Scheme in Edge Computing. IEEE Trans. Ind. Inform. 2020, 16, 2013–2021. [Google Scholar] [CrossRef]
  83. Hasan, H.R.; Salah, K.; Jayaraman, R.; Omar, M.; Yaqoob, I.; Pesic, S.; Taylor, T.; Boscovic, D. A Blockchain-Based Approach for the Creation of Digital Twins. IEEE Access 2020, 8, 34113–34126. [Google Scholar] [CrossRef]
  84. Memon, R.A.; Li, J.P.; Nazeer, M.I.; Khan, A.N.; Ahmed, J. DualFog-IoT: Additional Fog Layer for Solving Blockchain Integration Problem in Internet of Things. IEEE Access 2019, 7, 169073–169093. [Google Scholar] [CrossRef]
  85. Fu, Y.; Zhu, J. Big Production Enterprise Supply Chain Endogenous Risk Management Based on Blockchain. IEEE Access 2019, 7, 15310–15319. [Google Scholar] [CrossRef]
  86. Peck, M.E. Blockchain world - Do you need a blockchain? This chart will tell you if the technology can solve your problem. IEEE Spectr. 2017, 54, 38–60. [Google Scholar] [CrossRef]
  87. Zheng, Z.; Xie, S.; Dai, H.; Chen, X.; Wang, H. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. In Proceedings of the 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, USA, 25–30 June 2017; pp. 557–564. [Google Scholar]
  88. Marsalek, A.; Zefferer, T. A Correctable Public Blockchain. In Proceedings of the 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), Rotorua, New Zealand, 5–8 August 2019; pp. 554–561. [Google Scholar]
  89. Huang, D.; Ma, X.; Zhang, S. Performance Analysis of the Raft Consensus Algorithm for Private Blockchains. IEEE Trans. Syst. Man Cybern. Syst. 2020, 50, 172–181. [Google Scholar] [CrossRef] [Green Version]
  90. Zhang, X.; Chen, X. Data Security Sharing and Storage Based on a Consortium Blockchain in a Vehicular Ad-hoc Network. IEEE Access 2019, 7, 58241–58254. [Google Scholar] [CrossRef]
  91. Fan, M.; Zhang, X. Consortium Blockchain Based Data Aggregation and Regulation Mechanism for Smart Grid. IEEE Access 2019, 7, 35929–35940. [Google Scholar] [CrossRef]
  92. Bach, L.M.; Mihaljevic, B.; Zagar, M. Comparative analysis of blockchain consensus algorithms. In Proceedings of the 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 21–25 May 2018; pp. 1545–1550. [Google Scholar]
  93. Gramoli, V. From blockchain consensus back to Byzantine consensus. Future Gener. Comput. Syst. 2020, 107, 760–769. [Google Scholar] [CrossRef]
  94. Sankar, L.S.; Sindhu, M.; Sethumadhavan, M. Survey of consensus protocols on blockchain applications. In Proceedings of the 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 6–7 January 2017; pp. 1–5. [Google Scholar]
  95. Zoican, S.; Vochin, M.; Zoican, R.; Galatchi, D. Blockchain and Consensus Algorithms in Internet of Things. In Proceedings of the 2018 International Symposium on Electronics and Telecommunications (ISETC), Timisoara, Romania, 8–9 November 2018; pp. 1–4. [Google Scholar]
  96. Kumar, G.; Saha, R.; Rai, M.K.; Thomas, R.; Kim, T. Proof-of-Work Consensus Approach in Blockchain Technology for Cloud and Fog Computing Using Maximization-Factorization Statistics. IEEE Internet Things J. 2019, 6, 6835–6842. [Google Scholar] [CrossRef]
  97. Cho, H. ASIC-Resistance of Multi-Hash Proof-of-Work Mechanisms for Blockchain Consensus Protocols. IEEE Access 2018, 6, 66210–66222. [Google Scholar] [CrossRef]
  98. Niya, S.R.; Schiller, E.; Cepilov, I.; Maddaloni, F.; Aydinli, K.; Surbeck, T.; Bocek, T.; Stiller, B. Adaptation of Proof-of-Stake-based Blockchains for IoT Data Streams. In Proceedings of the 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Seoul, Korea, 14–17 May 2019; pp. 15–16. [Google Scholar]
  99. Bentov, I.; Lee, C.; Mizrahi, A.; Rosenfeld, M. Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake [Extended Abstract]y. SIGMETRICS Perform. Eval. Rev. 2014, 42, 34–37. [Google Scholar] [CrossRef]
  100. Denning, D.E.; Branstad, D.K. A Taxonomy for Key Escrow Encryption Systems. Commun. ACM 1996, 39, 34–40. [Google Scholar] [CrossRef]
  101. O’Neil, P.E. The Escrow Transactional Method. ACM Trans. Database Syst. 1986, 11, 405–430. [Google Scholar] [CrossRef]
  102. Sukhwani, H.; Martínez, J.M.; Chang, X.; Trivedi, K.S.; Rindos, A. Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric). In Proceedings of the 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), Hong Kong, China, 26–29 September 2017; pp. 253–255. [Google Scholar]
  103. Fan, X.; Chai, Q. Roll-DPoS: A Randomized Delegated Proof of Stake Scheme for Scalable Blockchain-Based Internet of Things Systems. In Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, New York, NY, USA, 5–7 November 2018; Association for Computing Machinery: New York, NY, USA, 2018; pp. 482–484. [Google Scholar]
  104. Benji, M.; Sindhu, M. A Study on the Corda and Ripple Blockchain Platforms. In Advances in Big Data and Cloud Computing; Peter, J.D., Alavi, A.H., Javadi, B., Eds.; Springer: Singapore, 2019; pp. 179–187. [Google Scholar]
  105. Di Silvestre, M.L.; Gallo, P.; Ippolito, M.G.; Sanseverino, E.R.; Sciumè, G.; Zizzo, G. An Energy Blockchain, a Use Case on Tendermint. In Proceedings of the 2018 IEEE International Conference on Environment and Electrical Engineering and 2018 IEEE Industrial and Commercial Power Systems Europe (EEEIC/I CPS Europe), Palermo, Italy, 12–15 June 2018; pp. 1–5. [Google Scholar]
  106. IEEE Blockchain Standards, P2418 Series. 2018. Available online: https://blockchain.ieee.org/standards. (accessed on 31 August 2020).
  107. Lima, C. Developing Open and Interoperable DLTBlockchain Standards [Standards]. Computer 2018, 51, 106–111. [Google Scholar] [CrossRef]
  108. Anjum, A.; Sporny, M.; Sill, A. Blockchain Standards for Compliance and Trust. IEEE Cloud Comput. 2017, 4, 84–90. [Google Scholar] [CrossRef] [Green Version]
  109. Blockchain and Distributed Ledger Technologies, ISO/TC307. Available online: https://www.iso.org/committee/6266604.html (accessed on 31 August 2020).
  110. Enterprise Ethereum Alliance. 2018. Available online: https://entethalliance.org/ (accessed on 2 September 2020).
  111. International Telecommunication Union, Focus Group on Application of Distributed Ledger Technology. 2018. Available online: https://www.itu.int/en/ITU-D/Statistics/Pages/publications/misr2018.aspx (accessed on 2 September 2020).
  112. W3C Community and Business, Blockchain Community Group. 2018. Available online: https://www.w3.org/community/blockchain/ (accessed on 2 September 2020).
  113. Gordon, W.J.; Catalini, C. Blockchain Technology for Healthcare: Facilitating the Transition to Patient-Driven Interoperability. Comput. Struct. Biotechnol. J. 2018, 16, 224–230. [Google Scholar] [CrossRef] [PubMed]
  114. Swan, M. Chapter Five–Blockchain for Business: Next-Generation Enterprise Artificial Intelligence Systems. In Blockchain Technology: Platforms, Tools and Use Cases; Advances in Computers; Raj, P., Deka, G.C., Eds.; Elsevier: New York, NY, USA, 2018; Volume 111, pp. 121–162. [Google Scholar]
  115. Lin, H.; Bergmann, N. IoT Privacy and Security Challenges for Smart Home Environments. Information 2016, 7, 44. [Google Scholar] [CrossRef] [Green Version]
  116. Yang, Y.; Wu, L.; Yin, G.; Li, L.; Zhao, H. A Survey on Security and Privacy Issues in Internet-of-Things. IEEE Internet Things J. 2017, 4, 1250–1258. [Google Scholar] [CrossRef]
  117. Arias, O.; Wurm, J.; Hoang, K.; Jin, Y. Privacy and Security in Internet of Things and Wearable Devices. IEEE Trans. Multi-Scale Comput. Syst. 2015, 1, 99–109. [Google Scholar] [CrossRef]
  118. Haowen, C.; Perrig, A. Security and privacy in sensor networks. Computer 2003, 36, 103–105. [Google Scholar] [CrossRef]
  119. Hunter, P. Hardware-based security: FPGA-based devices. Comput. Fraud Secur. 2004, 2004, 11–12. [Google Scholar]
  120. Asif, R.; Buchanan, W.J. Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment. Secur. Commun. Netw. 2017, 2017, 7616847. [Google Scholar] [CrossRef] [Green Version]
  121. Rivest, R.L.; Shamir, A.; Adleman, L. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
  122. Chen, Y.; Ku, W. Self-Encryption Scheme for Data Security in Mobile Devices. In Proceedings of the 2009 6th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, USA, 10–13 January 2009; pp. 1–5. [Google Scholar]
  123. Suh, G.E.; Devadas, S. Physical Unclonable Functions for Device Authentication and Secret Key Generation. In Proceedings of the 2007 44th ACM/IEEE Design Automation Conference, San Diego, CA, US, 4–8 June 2007; pp. 9–14. [Google Scholar]
  124. Yoo, S.K.; Karakoyunlu, D.; Birand, B.; Sunar, B. Improving the Robustness of Ring Oscillator TRNGs. ACM Trans. Reconfigurable Technol. Syst. 2010, 3, 1–30. [Google Scholar] [CrossRef]
  125. Anderson, J.H. A PUF design for secure FPGA-based embedded systems. In Proceedings of the 2010 15th Asia and South Pacific Design Automation Conference (ASP-DAC), Taipei, Taiwan, 18–21 January 2010; pp. 1–6. [Google Scholar]
  126. İsmail, K.; Turan Özcerit, A. The design and realization of a new high speed FPGA-based chaotic true random number generator. Comput. Electr. Eng. 2017, 58, 203–214. [Google Scholar]
  127. Pérez-Jiménez, M.; Sánchez, B.; Migliorini, A.; Alcarria, R. Protecting Private Communications in Cyber-Physical Systems through Physical Unclonable Functions. Electronics 2019, 8, 390. [Google Scholar] [CrossRef] [Green Version]
  128. Ibrahim, O.A.; Nair, S. Cyber-physical security using system-level PUFs. In Proceedings of the 2011 7th International Wireless Communications and Mobile Computing Conference, Istanbul, Turkey, 4–8 July 2011; pp. 1672–1676. [Google Scholar]
  129. Babaei, A.; Schiele, G. Physical Unclonable Functions in the Internet of Things: State of the Art and Open Challenges. Sensors 2019, 19, 3208. [Google Scholar] [CrossRef] [Green Version]
  130. Gao, Y.; Al-Sarawi, S.F.; Abbott, D. Physical unclonable functions. Nat. Electron. 2020, 3, 81–91. [Google Scholar] [CrossRef]
  131. Sebastian, A.; Le Gallo, M.; Khaddam-Aljameh, R.; Eleftheriou, E. Memory devices and applications for in-memory computing. Nat. Nanotechnol. 2020, 15, 529–544. [Google Scholar] [CrossRef]
  132. Leem, J.W.; Kim, M.S.; Choi, S.H.; Kim, S.R.; Kim, S.W.; Song, Y.M.; Young, R.J.; Kim, Y.L. Edible unclonable functions. Nat. Commun. 2020, 11, 328. [Google Scholar] [CrossRef] [Green Version]
  133. Chen, A. Utilizing the Variability of Resistive Random Access Memory to Implement Reconfigurable Physical Unclonable Functions. IEEE Electron. Device Lett. 2015, 36, 138–140. [Google Scholar] [CrossRef]
  134. Claes, M.; van der Leest, V.; Braeken, A. Comparison of SRAM and FF PUF in 65nm Technology. In Information Security Technology for Applications; Laud, P., Ed.; Springer: Berlin/Heidelberg, Germany, 2012; pp. 47–64. [Google Scholar]
  135. Saha, R.; Geetha, G.; Kumar, G.; Kim, T.H. RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys. Secur. Commun. Netw. 2018, 2018, 9802475. [Google Scholar] [CrossRef]
  136. McGrath, T.; Bagci, I.E.; Wang, Z.M.; Roedig, U.; Young, R.J. A PUF taxonomy. Appl. Phys. Rev. 2019, 6, 011303. [Google Scholar] [CrossRef] [Green Version]
  137. Vijayakumar, A.; Patil, V.; Kundu, S. On Improving Reliability of SRAM-Based Physically Unclonable Functions. J. Low Power Electron. Appl. 2017, 7, 2. [Google Scholar] [CrossRef]
  138. Shifman, Y.; Miller, A.; Keren, O.; Weizmann, Y.; Shor, J. A Method to Improve Reliability in a 65-nm SRAM PUF Array. IEEE Solid-State Circuits Lett. 2018, 1, 138–141. [Google Scholar] [CrossRef]
  139. Tehranipoor, F.; Karimian, N.; Yan, W.; Chandy, J.A. DRAM-Based Intrinsic Physically Unclonable Functions for System-Level Security and Authentication. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2017, 25, 1085–1097. [Google Scholar] [CrossRef]
  140. Zalivaka, S.S.; Ivaniuk, A.A.; Chang, C. Reliable and Modeling Attack Resistant Authentication of Arbiter PUF in FPGA Implementation With Trinary Quadruple Response. IEEE Trans. Inf. Forensics Secur. 2019, 14, 1109–1123. [Google Scholar] [CrossRef]
  141. Mazady, A.; Rahman, M.T.; Forte, D.; Anwar, M. Memristor PUF—A Security Primitive: Theory and Experiment. IEEE J. Emerg. Sel. Top. Circuits Syst. 2015, 5, 222–229. [Google Scholar] [CrossRef]
  142. Lu, X.; Hong, L.; Sengupta, K. CMOS Optical PUFs Using Noise-Immune Process-Sensitive Photonic Crystals Incorporating Passive Variations for Robustness. IEEE J. Solid-State Circuits 2018, 53, 2709–2721. [Google Scholar] [CrossRef]
  143. Chellappa, S.; Clark, L.T. SRAM-Based Unique Chip Identifier Techniques. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2016, 24, 1213–1222. [Google Scholar] [CrossRef]
  144. Avvaru, S.V.S.; Zeng, Z.; Parhi, K.K. Homogeneous and Heterogeneous Feed-Forward XOR Physical Unclonable Functions. IEEE Trans. Inf. Forensics Secur. 2020, 15, 2485–2498. [Google Scholar] [CrossRef]
  145. Grubel, B.C.; Bosworth, B.T.; Kossey, M.R.; Sun, H.; Cooper, A.B.; Foster, M.A.; Foster, A.C. Silicon photonic physical unclonable function. Opt. Express 2017, 25, 12710–12721. [Google Scholar] [CrossRef]
  146. Skoric, B.; Schrijen, G.J.; Ophey, W.; Wolters, R.; Verhaegh, N.; van Geloven, J. Experimental Hardware for Coating PUFs and Optical PUFs. In Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting; Tuyls, P., Skoric, B., Kevenaar, T., Eds.; Springer: London, UK, 2007; pp. 255–268. [Google Scholar]
  147. Das, J.; Scott, K.; Rajaram, S.; Burgett, D.; Bhanja, S. MRAM PUF: A Novel Geometry Based Magnetic PUF with Integrated CMOS. IEEE Trans. Nanotechnol. 2015, 14, 436–443. [Google Scholar] [CrossRef]
  148. Xu, X.; Liang, H.; Huang, Z.; Jiang, C.; Ouyang, Y.; Fang, X.; Ni, T.; Yi, M. A highly reliable butterfly PUF in SRAM-based FPGAs. IEICE Electron. Express 2017. [Google Scholar] [CrossRef] [Green Version]
  149. Dong, Y.; Xu, J.; Guo, P. An Anti-interference Design based on Glitch PUF. In Proceedings of the 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC), Beijing, China, 12–14 July 2019; pp. 217–221. [Google Scholar]
  150. Kim, M.; Moon, D.; Yoo, S.; Lee, S.; Choi, Y. Investigation of Physically Unclonable Functions Using Flash Memory for Integrated Circuit Authentication. IEEE Trans. Nanotechnol. 2015, 14, 384–389. [Google Scholar] [CrossRef]
  151. Chen, Q.; Csaba, G.; Lugli, P.; Schlichtmann, U.; Rührmair, U. The Bistable Ring PUF: A new architecture for strong Physical Unclonable Functions. In Proceedings of the 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, San Diego, CA, USA, 5–6 June 2011; pp. 134–141. [Google Scholar]
  152. Roberts, J.; Bagci, I.E.; Zawawi, M.A.M.; Sexton, J.; Hulbert, N.; Noori, Y.J.; Young, M.P.; Woodhead, C.S.; Missous, M.; Migliorato, M.A.; et al. Using Quantum Confinement to Uniquely Identify Devices. Sci. Rep. 2015, 5, 16456. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  153. Bossuet, L.; Ngo, X.T.; Cherif, Z.; Fischer, V. A PUF Based on a Transient Effect Ring Oscillator and Insensitive to Locking Phenomenon. IEEE Trans. Emerg. Top. Comput. 2014, 2, 30–36. [Google Scholar] [CrossRef]
  154. Qin, S.J.; Cherry, G.; Good, R.; Wang, J.; Harrison, C.A. Semiconductor manufacturing process control and monitoring: A fab-wide framework. J. Process Control. 2006, 16, 179–191. [Google Scholar] [CrossRef]
  155. Clark, L.T.; Medapuram, S.B.; Kadiyala, D.K.; Brunhaver, J. Physically Unclonable Functions Using Foundry SRAM Cells. IEEE Trans. Circuits Syst. I Regul. Pap. 2019, 66, 955–966. [Google Scholar] [CrossRef]
  156. Colombier, B.; Bossuet, L.; Fischer, V.; Hély, D. Key Reconciliation Protocols for Error Correction of Silicon PUF Responses. IEEE Trans. Inf. Forensics Secur. 2017, 12, 1988–2002. [Google Scholar] [CrossRef] [Green Version]
  157. Yu, M.; Devadas, S. Secure and robust error correction for physical unclonable functions. IEEE Des. Test Comput. 2010, 27, 48–65. [Google Scholar] [CrossRef]
  158. Bruneau, N.; Danger, J.L.; Facon, A.; Guilley, S.; Hamaguchi, S.; Hori, Y.; Kang, Y.; Schaub, A. Development of the Unified Security Requirements of PUFs During the Standardization Process. In Innovative Security Solutions for Information Technology and Communications; Lanet, J.L., Toma, C., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 314–330. [Google Scholar]
  159. Danger, J.; Guilley, S.; Nguyen, P.; Rioul, O. PUFs: Standardization and Evaluation. In Proceedings of the 2016 Mobile System Technologies Workshop (MST), Milan, Italy, 23 September 2016; pp. 12–18. [Google Scholar]
  160. Chatterjee, B.; Das, D.; Maity, S.; Sen, S. RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning. IEEE Internet Things J. 2019, 6, 388–398. [Google Scholar] [CrossRef] [Green Version]
  161. Delvaux, J. Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2043–2058. [Google Scholar] [CrossRef]
  162. Delvaux, J.; Verbauwhede, I. Fault Injection Modeling Attacks on 65 nm Arbiter and RO Sum PUFs via Environmental Changes. IEEE Trans.on Circuits Syst. I Regul. Pap. 2014, 61, 1701–1713. [Google Scholar] [CrossRef] [Green Version]
  163. Wallgren, L.; Raza, S.; Voigt, T. Routing Attacks and Countermeasures in the RPL-Based Internet of Things. Int. J. Distrib. Sens. Netw. 2013, 9, 794326. [Google Scholar] [CrossRef]
  164. Rührmair, U.; Sehnke, F.; Sölter, J.; Dror, G.; Devadas, S.; Schmidhuber, J. Modeling Attacks on Physical Unclonable Functions. In Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 4–8 October 2010; pp. 237–249. [Google Scholar]
  165. Helfmeier, C.; Boit, C.; Nedospasov, D.; Seifert, J. Cloning Physically Unclonable Functions. In Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Austin, TX, USA, 2–3 June 2013; pp. 1–6. [Google Scholar]
  166. Rührmair, U.; Sölter, J. PUF modeling attacks: An introduction and overview. In Proceedings of the 2014 Design, Automation Test in Europe Conference Exhibition (DATE), Dresden, Germany, 24–28 March 2014; pp. 1–6. [Google Scholar]
  167. Sahoo, D.P.; Nguyen, P.H.; Mukhopadhyay, D.; Chakraborty, R.S. A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 2015, 34, 1334–1343. [Google Scholar] [CrossRef]
  168. Delvaux, J.; Verbauwhede, I. Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise. In Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Austin, TX, USA, 2–3 June 2013; pp. 137–142. [Google Scholar]
  169. Nedospasov, D.; Seifert, J.; Helfmeier, C.; Boit, C. Invasive PUF Analysis. In Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Santa Barbara, CA, USA, 20–20 August 2013; pp. 30–38. [Google Scholar]
  170. Merli, D.; Schuster, D.; Stumpf, F.; Sigl, G. Semi-Invasive EM Attack on FPGA RO PUFs and Countermeasures. In Proceedings of the Workshop on Embedded Systems Security, Taipei, Taiwan, 9–14 October 2011; Association for Computing Machinery: New York, NY, USA, 2011. [Google Scholar]
  171. Zhang, J.; Wu, Q.; Lyu, Y.; Zhou, Q.; Cai, Y.; Lin, Y.; Qu, G. Design and Implementation of a Delay-Based PUF for FPGA IP Protection. In Proceedings of the 2013 International Conference on Computer-Aided Design and Computer Graphics, Guangzhou, China, 16–18 November 2013; pp. 107–114. [Google Scholar]
  172. Potkonjak, M.; Goudar, V. Public Physical Unclonable Functions. Proc. IEEE 2014, 102, 1142–1156. [Google Scholar] [CrossRef]
  173. McGraw, G. Software security. IEEE Secur. Priv. 2004, 2, 80–83. [Google Scholar] [CrossRef] [Green Version]
  174. Potlapally, N. Hardware security in practice: Challenges and opportunities. In Proceedings of the 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, San Diego, CA, USA, 5–6 June 2011; pp. 93–98. [Google Scholar]
  175. Jin, Y. Introduction to Hardware Security. Electronics 2015, 4, 763–784. [Google Scholar] [CrossRef]
  176. Islam, M.N.; Kundu, S. Enabling IC Traceability via Blockchain Pegged to Embedded PUF. ACM Trans. Des. Autom. Electron. Syst. 2019, 24, 1–23. [Google Scholar] [CrossRef]
  177. Mohanty, S.P.; Yanambaka, V.P.; Kougianos, E.; Puthal, D. PUFchain: A Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE). IEEE Consum. Electron. Mag. 2020, 9, 8–16. [Google Scholar] [CrossRef] [Green Version]
  178. Patil, A.S.; Hamza, R.; Yan, H.; Hassan, A.; Li, J. Blockchain-PUF-Based Secure Authentication Protocol for Internet of Things. In Algorithms and Architectures for Parallel Processing; Wen, S., Zomaya, A., Yang, L.T., Eds.; Springer International Publishing: Cham, Switzerland, 2020; pp. 331–338. [Google Scholar]
  179. Barbareschi, M.; De Benedictis, A.; La Montagna, E.; Mazzeo, A.; Mazzocca, N. PUF-Enabled Authentication-as-a-Service in Fog-IoT Systems. In Proceedings of the 2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Napoli, Italy, 12–14 June 2019; pp. 58–63. [Google Scholar]
  180. Bordel Sánchez, B.; Alcarria, R.; Robles, T.; Jara, A. Protecting Physical Communications in 5G C-RAN Architectures through Resonant Mechanisms in Optical Media. Sensors 2020, 20, 4104. [Google Scholar] [CrossRef]
  181. Buchanan, W.J.; Li, S.; Asif, R. Lightweight cryptography methods. J. Cyber Secur. Technol. 2017, 1, 187–201. [Google Scholar] [CrossRef] [Green Version]
  182. Ometov, A.; Masek, P.; Malina, L.; Florea, R.; Hosek, J.; Andreev, S.; Hajny, J.; Niutanen, J.; Koucheryavy, Y. Feasibility characterization of cryptographic primitives for constrained (wearable) IoT devices. In Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), Sydney, Australia, 14–18 March 2016; pp. 1–6. [Google Scholar]
  183. Yanambaka, V.P.; Mohanty, S.P.; Kougianos, E. Making Use of Manufacturing Process Variations: A Dopingless Transistor Based-PUF for Hardware-Assisted Security. IEEE Trans. Semicond. Manuf. 2018, 31, 285–294. [Google Scholar] [CrossRef]
  184. Zhu, F.; Li, P.; Xu, H.; Wang, R. A Lightweight RFID Mutual Authentication Protocol with PUF. Sensors 2019, 19, 2957. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  185. Zhang, J.; Hu, X.; Ning, Z.; Ngai, E.C.; Zhou, L.; Wei, J.; Cheng, J.; Hu, B. Energy-Latency Tradeoff for Energy-Aware Offloading in Mobile Edge Computing Networks. IEEE Internet Things J. 2018, 5, 2633–2645. [Google Scholar] [CrossRef]
  186. Yang, Z.; Yang, K.; Lei, L.; Zheng, K.; Leung, V.C.M. Blockchain-Based Decentralized Trust Management in Vehicular Networks. IEEE Internet Things J. 2019, 6, 1495–1505. [Google Scholar] [CrossRef]
  187. Braeken, A. PUF Based Authentication Protocol for IoT. Symmetry 2018, 10, 352. [Google Scholar] [CrossRef] [Green Version]
  188. Gao, Y.; Li, G.; Ma, H.; Al-Sarawi, S.F.; Kavehei, O.; Abbott, D.; Ranasinghe, D.C. Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices. In Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), Sydney, NSW, Australia, 14–18 March 2016; pp. 1–6. [Google Scholar]
  189. Lunardi, R.C.; Michelin, R.A.; Neu, C.V.; Zorzo, A.F. Distributed access control on IoT ledger-based architecture. In Proceedings of the NOMS 2018—2018 IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan, 23–27 April 2018; pp. 1–7. [Google Scholar]
  190. Reyna, A.; Martín, C.; Chen, J.; Soler, E.; Díaz, M. On blockchain and its integration with IoT. Challenges and opportunities. Future Gener. Comput. Syst. 2018, 88, 173–190. [Google Scholar] [CrossRef]
  191. Hang, L.; Kim, D.H. Design and Implementation of an Integrated IoT Blockchain Platform for Sensing Data Integrity. Sensors 2019, 19, 2228. [Google Scholar] [CrossRef] [Green Version]
  192. Chen, S.; Li, B.; Cao, Y. Intrinsic Physical Unclonable Function (PUF) Sensors in Commodity Devices. Sensors 2019, 19, 2428. [Google Scholar] [CrossRef] [Green Version]
  193. Debe, M.; Salah, K.; Rehman, M.H.U.; Svetinovic, D. IoT Public Fog Nodes Reputation System: A Decentralized Solution Using Ethereum Blockchain. IEEE Access 2019, 7, 178082–178093. [Google Scholar] [CrossRef]
  194. Liu, H.; Han, D.; Li, D. Fabric-iot: A Blockchain-Based Access Control System in IoT. IEEE Access 2020, 8, 18207–18218. [Google Scholar] [CrossRef]
  195. Dai, W.; Deng, J.; Wang, Q.; Cui, C.; Zou, D.; Jin, H. SBLWT: A Secure Blockchain Lightweight Wallet Based on Trustzone. IEEE Access 2018, 6, 40638–40648. [Google Scholar] [CrossRef]
  196. Yilmaz, Y.; Gunn, S.R.; Halak, B. Lightweight PUF-Based Authentication Protocol for IoT Devices. In Proceedings of the 2018 IEEE 3rd International Verification and Security Workshop (IVSW), Costa Brava, Spain, 2–4 July 2018; pp. 38–43. [Google Scholar]
  197. Liao, B.; Ali, Y.; Nazir, S.; He, L.; Khan, H.U. Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review. IEEE Access 2020, 8, 120331–120350. [Google Scholar] [CrossRef]
  198. Negka, L.; Gketsios, G.; Anagnostopoulos, N.A.; Spathoulas, G.; Kakarountas, A.; Katzenbeisser, S. Employing Blockchain and Physical Unclonable Functions for Counterfeit IoT Devices Detection. In Proceedings of the International Conference on Omni-Layer Intelligent Systems, Crete, Greece, 5–7 May 2019; Association for Computing Machinery: New York, NY, USA, 2019; pp. 172–178. [Google Scholar]
  199. Jansen-Vullers, M.; van Dorp, C.; Beulens, A. Managing traceability information in manufacture. Int. J. Inf. Manag. 2003, 23, 395–413. [Google Scholar] [CrossRef]
  200. Lu, Q.; Xu, X. Adaptable Blockchain-Based Systems: A Case Study for Product Traceability. IEEE Softw. 2017, 34, 21–27. [Google Scholar] [CrossRef]
  201. Liu, H.; Zhang, Y.; Yang, T. Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing. IEEE Netw. 2018, 32, 78–83. [Google Scholar] [CrossRef]
Figure 1. Basic IoE Framework. [Integration of information and communications technology (ICT), cybersecurity, encryption, cloud computing, and energy systems to form Internet-of-Energy (IoE)].
Figure 1. Basic IoE Framework. [Integration of information and communications technology (ICT), cybersecurity, encryption, cloud computing, and energy systems to form Internet-of-Energy (IoE)].
Sensors 21 00028 g001
Figure 2. Statistics of Internet-of-Things (IoT) segments according to 2018 project and market survey with increasing trends in smart energy, edge computing, and smart supply chain. (Data Source: IoT-Analytics, Janury 2018. Based on 1600 enterprise projects announced world wide and not including consumer wearable IoT projects).
Figure 2. Statistics of Internet-of-Things (IoT) segments according to 2018 project and market survey with increasing trends in smart energy, edge computing, and smart supply chain. (Data Source: IoT-Analytics, Janury 2018. Based on 1600 enterprise projects announced world wide and not including consumer wearable IoT projects).
Sensors 21 00028 g002
Figure 3. Implementation of; (a) Distributed Ledger Technology (DLT) and (b) Blockchain (Centralised Ledger).
Figure 3. Implementation of; (a) Distributed Ledger Technology (DLT) and (b) Blockchain (Centralised Ledger).
Sensors 21 00028 g003
Figure 4. The basic block architecture of Blockchain and information encoded in each step.
Figure 4. The basic block architecture of Blockchain and information encoded in each step.
Sensors 21 00028 g004
Figure 5. The classification of DLT/Blockchain standards.
Figure 5. The classification of DLT/Blockchain standards.
Sensors 21 00028 g005
Figure 6. (a) Basic design and (b) authentication process of Physical Unclonable Function (PUF) chip.
Figure 6. (a) Basic design and (b) authentication process of Physical Unclonable Function (PUF) chip.
Sensors 21 00028 g006
Figure 7. Flow of PUF technology used for secure key management.
Figure 7. Flow of PUF technology used for secure key management.
Sensors 21 00028 g007
Figure 8. Enrolment and reconstruction phase for the generation of PUF keys. Note that R is the initial PUF response during enrolment, while R’ is a PUF response in the field with a noise component and error correction.
Figure 8. Enrolment and reconstruction phase for the generation of PUF keys. Note that R is the initial PUF response during enrolment, while R’ is a PUF response in the field with a noise component and error correction.
Sensors 21 00028 g008
Figure 9. Networking architecture of PUFChain.
Figure 9. Networking architecture of PUFChain.
Sensors 21 00028 g009
Figure 10. (a) Device enrolment steps, (b) Transactions initiation steps and (c) Device authentication steps in Proof-of-PUF authentication [177].
Figure 10. (a) Device enrolment steps, (b) Transactions initiation steps and (c) Device authentication steps in Proof-of-PUF authentication [177].
Sensors 21 00028 g010
Figure 11. Proof-of-Concept Layered Architecture for IoE-Blockchain Hardware Integration.
Figure 11. Proof-of-Concept Layered Architecture for IoE-Blockchain Hardware Integration.
Sensors 21 00028 g011
Figure 12. Structure of DRAM PUF implementation on Raspberry Pi.
Figure 12. Structure of DRAM PUF implementation on Raspberry Pi.
Sensors 21 00028 g012
Figure 13. IC traceability from manufacturer to the end-user via PUF and Blockchain.
Figure 13. IC traceability from manufacturer to the end-user via PUF and Blockchain.
Sensors 21 00028 g013
Table 4. Blockchain methodologies for designing IoE applications.
Table 4. Blockchain methodologies for designing IoE applications.
PlatformBlockchainConsensusSmart Contracts
EthereumPublic and Permission-BasedPoSYes
IBM Watson Hyper-ledgerPermission-BasedPBTF/SIEVEYes
MultichainPermission-BasedPBTFYes
LitecoinPublicScryptNo
WaltonchainPermission-BasedPoCNo
LiskPublic and Permission-BasedDPoSYes
EdenchainPermission-BasedPoSYes
QuorumPermission-BasedMultipleYes
MoecoPrivate and Permission-BasedExonumYes
HDACPermission-BasedePoW, Trust-basedYes
IOTAPermission-BasedPoWYes
NetObjexPermissionlessHedera HashgraphYes
Table 5. Performance Analysis of Blockchain-based IoE Hardware.
Table 5. Performance Analysis of Blockchain-based IoE Hardware.
Service Execution Time (ms)
Device RegistrationSensor Reading
MinAvgMaxMinAvgMax
50 Devices226222862375197424902770
150 Devices225723352801169626793005
250 Devices225425853004204327673322
500 Devices226729234013268930124983
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Asif, R.; Ghanem, K.; Irvine, J. Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy. Sensors 2021, 21, 28. https://doi.org/10.3390/s21010028

AMA Style

Asif R, Ghanem K, Irvine J. Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy. Sensors. 2021; 21(1):28. https://doi.org/10.3390/s21010028

Chicago/Turabian Style

Asif, Rameez, Kinan Ghanem, and James Irvine. 2021. "Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy" Sensors 21, no. 1: 28. https://doi.org/10.3390/s21010028

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop