Next Article in Journal
Linear Cryptanalysis of Reduced-Round Simon Using Super Rounds
Next Article in Special Issue
NotchPUF: Printed Circuit Board PUF Based on Microstrip Notch Filter
Previous Article in Journal
QUARC: Quantum Research Cubesat—A Constellation for Quantum Communication
Previous Article in Special Issue
Physical Security for Fleet Management Systems
Article

A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications

Department of Electrical and Computer Engineering, Auburn University, Auburn, AL 36849, USA
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in 31st International Conference on VLSI Design (VLSID) (Pune, India, 6–10 January 2018).
Cryptography 2020, 4(1), 8; https://doi.org/10.3390/cryptography4010008
Received: 20 February 2020 / Revised: 5 March 2020 / Accepted: 6 March 2020 / Published: 8 March 2020
(This article belongs to the Special Issue Feature Papers in Hardware Security)
The edge devices connected to the Internet of Things (IoT) infrastructures are increasingly susceptible to piracy. These pirated edge devices pose a serious threat to security, as an adversary can get access to the private network through these non-authentic devices. It is necessary to authenticate an edge device over an unsecured channel to safeguard the network from being infiltrated through these fake devices. The implementation of security features demands extensive computational power and a large hardware/software overhead, both of which are difficult to satisfy because of inherent resource limitation in the IoT edge devices. This paper presents a low-cost authentication protocol for IoT edge devices that exploits power-up states of built-in SRAM for device fingerprint generations. Unclonable ID generated from the on-chip SRAM could be unreliable, and to circumvent this issue, we propose a novel ID matching scheme that alleviates the need for enhancing the reliability of the IDs generated from on-chip SRAMs. Security and different attack analysis show that the probability of impersonating an edge device by an adversary is insignificant. The protocol is implemented using a commercial microcontroller, which requires a small code overhead. However, no modification of device hardware is necessary. View Full-Text
Keywords: IoT security; SRAM; edge device; authentication IoT security; SRAM; edge device; authentication
Show Figures

Figure 1

MDPI and ACS Style

Mahmod, M.J.a.; Guin, U. A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications. Cryptography 2020, 4, 8. https://doi.org/10.3390/cryptography4010008

AMA Style

Mahmod MJa, Guin U. A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications. Cryptography. 2020; 4(1):8. https://doi.org/10.3390/cryptography4010008

Chicago/Turabian Style

Mahmod, Md J.a., and Ujjwal Guin. 2020. "A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications" Cryptography 4, no. 1: 8. https://doi.org/10.3390/cryptography4010008

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop