Protecting Private Communications in Cyber-Physical Systems through Physical Unclonable Functions
Abstract
:1. Introduction
2. State of the Art: Physical Unclonable Functions and Encryption in CPS
- Non-electronic PUFs [28] include all functions based on non-electric phenomena, although some electrical components are employed to create challenges or collect responses. These technologies are the oldest techniques in PUFs and are usually based on optical effects. Optical fibers, lasers, etc., present random and uncontrollable behaviors that may be employed to create a PUF. However, these mechanisms are expensive, complex, and require a very precise manipulation. These conditions do not fit CPS requirements, in general.
- Electronic PUFs [29] are those based on electric analog signals suffering random effects. For example, random and unclonable changes in the voltage threshold of solid-state devices such as diodes or transistors. These changes create a personal behavior for each device. The main problem of these PUFs is they may be difficult to measure.
- Intrinsic PUFs [25] are those that naturally arise when manufacturing a system, whose main function is usually different. For example, in logic circuits, time required by signals to go through different paths is slightly different and depends on the manufacturing conditions of each specific circuit (a type of PUF known as an ‘arbitrary PUF’). ‘Ring oscillator PUF’ is also another example of intrinsic PUF.
3. Proposed Encryption Scheme
3.1. Proposed Architecture and Global Overview
3.2. Encryption Mechanism
- REQ#1: The pseudorandom sequence (which is periodical) must present a long period; enough to encrypt each information message using only one key period
- REQ#2: The same sequence cannot be employed to encrypt an undefined number of messages. The pseudorandom sequences must be changed each certain operation time.
- REQ#3: The algorithm generating the number sequence must be secret.
3.3. Key Generator
3.3.1. Exchange-Bias Effect: Overview
3.3.2. Unclonable Behavior in EB devices
3.3.3. Global Behavior and Seed Obtention
4. Performance Evaluation and Results
4.1. Experiment Description
4.2. Results
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Bordel, B.; Alcarria, R.; Robles, T.; Martín, D. Cyber–physical systems: Extending pervasive sensing from control theory to the Internet of Things. Pervasive Mob. Comput. 2017, 40, 156–184. [Google Scholar] [CrossRef]
- Sánchez, B.B.; Alcarria, R.; de Rivera, D.S.; Sánchez-Picot, A. Enhancing Process Control in Industry 4.0 Scenarios using Cyber-Physical Systems. JoWUA 2016, 7, 41–64. [Google Scholar]
- Lee, E.A. Cyber-physical systems-are computing foundations adequate. In Proceedings of the Position Paper for NSF Workshop on Cyber-Physical Systems: Research Motivation, Techniques and Roadmap, Austin, TX, USA, 16–17 October 2006; Volume 2, pp. 1–9. [Google Scholar]
- Bordel, B.; Alcarria, R.; Jara, A. Process execution in humanized Cyber-physical systems: Soft processes. In Proceedings of the 12th Iberian Conference on Information Systems and Technologies (CISTI), Lisbon, Portugal, 21–24 June 2017; pp. 1–7. [Google Scholar]
- Bordel, B.; Alcarria, R.; Sánchez-de-Rivera, D.; Robles, T. Protecting industry 4.0 systems against the malicious effects of cyber-physical attacks. In Proceedings of the International Conference on Ubiquitous Computing and Ambient Intelligence, Philadelphia, PA, USA, 7–10 November 2017; pp. 161–171. [Google Scholar]
- Bordel, B.; Alcarria, R.; Robles, T.; Sánchez-Picot, Á. Stochastic and information theory techniques to reduce large datasets and detect cyberattacks in Ambient Intelligence Environments. IEEE Access 2018, 6, 34896–34910. [Google Scholar] [CrossRef]
- Ashibani, Y.; Mahmoud, Q.H. Cyber physical systems security: Analysis, challenges and solutions. Comput. Secur. 2017, 68, 81–97. [Google Scholar] [CrossRef]
- Xu, Z.; Liu, X.; Zhang, G.; He, W.; Dai, G.; Shu, W. A certificateless signature scheme for mobile wireless cyber-physical systems. In Proceedings of the 28th International Conference on Distributed Computing Systems Workshops, ICDCS’08, Beijing, China, 17–20 June 2008; pp. 489–494. [Google Scholar]
- Robles, T.; Bordel, B.; Alcarria, R.; Sánchez-de-Rivera, D. Blockchain Technologies for Private Data Management in AmI Environments. Proceedings 2018, 2, 1230. [Google Scholar] [CrossRef]
- Sánchez-de-Rivera, D.; Martín, D.; Alcarria, R.; Bordel, B.; Robles, T. Towards a Wireless and Low-Power Infrastructure for Representing Information Based on E-Paper Displays. Sustainability 2017, 9, 76. [Google Scholar] [CrossRef]
- Herder, C.; Yu, M.D.; Koushanfar, F.; Devadas, S. Physical unclonable functions and applications: A tutorial. Proc. IEEE 2014, 102, 1126–1141. [Google Scholar] [CrossRef]
- Lai, X. On the Design and Security of Block Ciphers; Eidgenössische Technische Hochschule Zürich: Zürich, Switzerland, 1992. [Google Scholar]
- Koopman, P.; Chakravarty, T. Cyclic redundancy code (CRC) polynomial selection for embedded networks. In Proceedings of the International Conference on Dependable Systems and Networks (DNS’04), Florence, Italy, 28 June–1 July 2004; pp. 145–154. [Google Scholar]
- Martin, H.; Peris-Lopez, P.; Tapiador, J.E.; San Millan, E. An Estimator for the ASIC Footprint Area of Lightweight Cryptographic Algorithms. IEEE Trans. Ind. Inform. 2014, 10, 1216–1225. [Google Scholar] [CrossRef]
- Bordel, B.; Orue, A.B.; Alcarria, R.; Sanchez-De-Rivera, D. An Intra-Slice Security Solution for Emerging 5G Networks Based on Pseudo-Random Number Generators. IEEE Access 2018, 6, 16149–16164. [Google Scholar] [CrossRef]
- Miller, V.S. Use of Elliptic Curves in Cryptography. In Advances in Cryptology—CRYPTO ’85 Proceedings; Lecture Notes in Computer Science; Springer: Berlin, Heidelberg, 1985; Volume 218. [Google Scholar]
- Porambage, P.; Schmitt, C.; Kumar, P.; Gurtov, A.; Ylianttila, M. Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In Proceedings of the 2014 IEEEWireless Communications and Networking Conference (WCNC’14), Istanbul, Turkey, 6–9 April 2014; pp. 2728–2733. [Google Scholar]
- Vegh, L.; Miclea, L. Enhancing security in cyber-physical systems through cryptographic and steganographic techniques. In Proceedings of the 2014 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR), Cluj-Napoca, Romania, 22–24 May 2014; pp. 1–6. [Google Scholar]
- Kogiso, K.; Fujita, T. Cyber-security enhancement of networked control systems using homomorphic encryption. In Proceedings of the 54th Annual Conference on Decision and Control (CDC), Osaka, Japan, 15–18 December 2015; pp. 6836–6843. [Google Scholar]
- Pohls, H.C. JSON Sensor Signatures (JSS): End-to-End Integrity Protection from Constrained Device to IoT Application. In Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’15), Blumenau, Brazil, 8–10 July 2015; pp. 306–312. [Google Scholar]
- Yampolskiy, M.; Horváth, P.; Koutsoukos, X.D.; Xue, Y.; Sztipanovits, J. A language for describing attacks on cyber-physical systems. Int. J. Crit. Infrastruct. Prot. 2015, 8, 40–52. [Google Scholar] [CrossRef]
- Mo, Y.; Kim, T.H.-J.; Brancik, K.; Dickinson, D.; Lee, H.; Perrig, A.; Sinopoli, B. Cyber–Physical Security of a Smart Grid Infrastructure. Proc. IEEE 2012, 100, 195–209. [Google Scholar]
- Pasqualetti, F.; Dorfler, F.; Bullo, F. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design. In Proceedings of the 50th IEEE Conference on Decision and Control, a European Control Conference (CDC-ECC’11), Orlando, FL, USA, 12–15 December 2011; pp. 2195–2201. [Google Scholar]
- Sridhar, S.; Hahn, A.; Govindarasu, M. Cyber–Physical System Security for the Electric Power Grid. Proc. IEEE 2012, 100, 210–224. [Google Scholar] [CrossRef]
- Maes, R.; Verbauwhede, I. Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions; Springer: Berlin, Heidelberg, 2010. [Google Scholar]
- Gassend, B.; Clarke, D.; Van Dijk, M.; Devadas, S. Silicon physical random functions. In Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, USA, 18–22 November 2002; pp. 148–160. [Google Scholar]
- Gassend, B.; Clarke, D.; Van Dijk, M.; Devadas, S. Controlled physical random functions. In Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, NV, USA, 9–13 December 2002; pp. 149–160. [Google Scholar]
- Chen, Q.; Csaba, G.; Lugli, P.; Schlichtmann, U.; Ruhrmair, U. The Bistable Ring PUF: A new architecture for strong Physical Unclonable Functions. In Proceedings of the 2011 IEEE International Symposium on Hardware- Oriented Security and Trust (HOST’11), San Diego, CA, USA, 5–6 June 2011; pp. 134–141. [Google Scholar]
- Bohm, C.; Hofer, M. Physical Unclonable Functions in Theory and Practice; Springer: New York, NY, USA, 2013. [Google Scholar]
- Devadas, S.; Suh, E.; Paral, S.; Sowell, R.; Ziola, T.; Khandelwal, V. Design and Implementation of PUFBased “Unclonable” RFID ICs for Anti-Counterfeiting and Security Applications. In Proceedings of the 2008 IEEE International Conference on RFID (IEEE RFID’08), Las Vegas, NV, USA, 16–17 April 2008; pp. 58–64. [Google Scholar]
- Guajardo, J.; Kumar, S.S.; Schrijen, G.-J.; Tuyls, P. Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection. In Proceedings of the 2007 International Conference on Field Programmable Logic and Applications (FPL’07), Amsterdam, The Netherlands, 27–29 August 2007; pp. 189–195. [Google Scholar]
- Kumar, S.S.; Guajardo, J.; Maes, R.; Schrijen, G.-J.; Tuyls, P. Extended abstract: The butterfly PUF protecting IP on every FPGA. In Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST’08), Anaheim, CA, USA, 9 June 2008; pp. 67–70. [Google Scholar]
- Yu, M.-D.; Sowell, R.; Singh, A.; M’Raihi, D.; Devadas, S. Performance metrics and empirical results of a PUF cryptographic key generation ASIC. In Proceedings of the 2012 IEEE International Symposium on Hardware- Oriented Security and Trust (HOST’12), San Francisco, CA, USA, 3–4 June 2012; pp. 108–115. [Google Scholar]
- Maes, R.; Van Herrewege, A.; Verbauwhede, I. PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems (CHES’12), Leuven, Belgium, 9–12 September 2012; Springer: Berlin, Heidelberg, 2012; Volume 7428, pp. 302–319. [Google Scholar]
- Suh, G.E.; Devadas, S. Physical Unclonable Functions for Device Authentication and Secret Key Generation. In Proceedings of the 44th ACM/IEEE Design Automation Conference, San Diego, CA, USA, 4–8 June 2007; pp. 9–14. [Google Scholar]
- Mareca, P.; Bordel, B. Robust hardware-supported chaotic cryptosystems for streaming commutations among reduced computing power nodes. Analog Integr. Circuits Signal Process. 2019, 98, 11–26. [Google Scholar] [CrossRef]
- Ryabko, B.Y. The Vernam cipher is robust to small deviations from randomness. Probl. Inf. Trans. 2015, 51, 82–86. [Google Scholar] [CrossRef] [Green Version]
- Dodis, Y.; Spencer, J. On the (non) universality of the one-time pad. In Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science, Vancouver, BC, Canada, 16–19 November 2002; pp. 376–385. [Google Scholar]
- Buchanan, W.J.; Li, S.; Asif, R. Lightweight cryptography methods. J. Cyber Secur. Technol. 2017, 1, 187–201. [Google Scholar] [CrossRef]
- Orue, A.B.; Montoya, F.; Hernández Encinas, L. Trifork, a new pseudorandom number generator based on lagged fibonacci maps. J. Comput. Sci. Eng. 2010, 2, 46–51. [Google Scholar]
- Meiklejohn, W.H.P.; Bean, C.P. New Magnetic Anisotropy. Phys. Rev. 1956, 102, 1413–1414. [Google Scholar] [CrossRef]
- Fulcomer, E.; Charap, S.H. Temperature and frequency dependence of exchange anisotropy effects in oxidized NiFe films. J. Appl. Phys. 1972, 43, 4184–4190. [Google Scholar] [CrossRef]
- O’Grady, K.; Fernandez-Outon, L.E.; Vallejo-Fernandez, G. A new paradigm for exchange bias polycrystalline thin films. J. Magn. Magn. Mater. 2010, 322, 883–889. [Google Scholar] [CrossRef]
- Paetzold, A.; Röll, K. Thermally activated self-alignment of exchange coupling in NiO/NiFe bilayers. J. Appl. Phys. 2002, 91, 7748. [Google Scholar] [CrossRef]
- Migliorini, A.; Kuerbanjiang, B.; Huminiuc, T.; Kepaptsoglou, D.; Muñoz, M.; Cuñado, J.L.F.; Camarero, J.; Aroca, C.; Vallejo-Fernández, G.; Lazarov, V.K.; et al. Spontaneous exchange bias formation driven by a structural phase transition in the antiferromagnetic material. Nat. Mater. 2018, 17, 28. [Google Scholar] [CrossRef] [PubMed]
- NIST Special Publication 800-22 (2001). Available online: https://csrc.nist.gov/publications/detail/sp/800-22/rev-1a/final (accessed on 30 March 2019).
- Argyris, A.; Syvridis, D.; Larger, L.; Annovazzi-Lodi, V.; Colet, P.; Fischer, I.; García-Ojalvo, J.; Mirasso, C.R.; Pesquera, L.; Shore, K.A. Chaos-based communications at high bit rates using commercial fibre-optic links. Nature 2005, 438, 343–346. [Google Scholar] [CrossRef] [PubMed]
- Schrijen, G.J.; Van Der Leest, V. Comparative analysis of SRAM memories used as PUF primitives. In Proceedings of the 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, Germany, 12–16 March 2012; pp. 1319–1324. [Google Scholar]
- Günlü, O.; Kernetzky, T.; İşcan, O.; Sidorenko, V.; Kramer, G.; Schaefer, R. Secure and Reliable Key Agreement with Physical Unclonable Functions. Entropy 2018, 20, 340. [Google Scholar] [CrossRef]
Test | p-Value | Result |
---|---|---|
Runs | 0.973 | Successful |
Frequency Monobit | 0.974 | Successful |
Overlapping Template Matching | 0.319 | Successful |
Frequency Test within a Block | 0.654 | Successful |
Longest Run of Ones in a Block | 0.807 | Successful |
Universal | 0.388 | Successful |
Linear Complexity | 0.309 | Successful |
Binary Matrix Rank | 0.419 | Successful |
Serial | 0.999 | Successful |
Discrete Fourier Transform | 0.215 | Successful |
Random Excursions Test * | 0.461 | Successful |
Random Excursions Variant Test * | 0.399 | Successful |
Approximate Entropy | 0.921 | Successful |
Non-Overlapping Template Matching | 0.979 | Successful |
Cumulative Sums | 0.955 | Successful |
N | Use of RAM | Use of Program Space | Processing Time to Generate the First Key Sample |
---|---|---|---|
4 | 12% | 65% | 120 μs |
8 | 14% | 67% | 3.9 ms |
10 | 14% | 67% | 5 ms |
12 | 14% | 67% | 5 ms |
16 | 14% | 67% | 5 ms |
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Pérez-Jiménez, M.; Sánchez, B.B.; Migliorini, A.; Alcarria, R. Protecting Private Communications in Cyber-Physical Systems through Physical Unclonable Functions. Electronics 2019, 8, 390. https://doi.org/10.3390/electronics8040390
Pérez-Jiménez M, Sánchez BB, Migliorini A, Alcarria R. Protecting Private Communications in Cyber-Physical Systems through Physical Unclonable Functions. Electronics. 2019; 8(4):390. https://doi.org/10.3390/electronics8040390
Chicago/Turabian StylePérez-Jiménez, Marina, Borja Bordel Sánchez, Andrea Migliorini, and Ramón Alcarria. 2019. "Protecting Private Communications in Cyber-Physical Systems through Physical Unclonable Functions" Electronics 8, no. 4: 390. https://doi.org/10.3390/electronics8040390
APA StylePérez-Jiménez, M., Sánchez, B. B., Migliorini, A., & Alcarria, R. (2019). Protecting Private Communications in Cyber-Physical Systems through Physical Unclonable Functions. Electronics, 8(4), 390. https://doi.org/10.3390/electronics8040390