Securing IoT monitoring device using PUF and physical layer authentication

IoT is rapidly becoming a reality. Forecasts predict more than 20 billion connected devices in 2020. These devices bring many benefits, but securing them in IoT environment can be a quandary. With the advent of technology, it is very easy for an adversary to clone a device and replace it, or tamper...

Full description

Saved in:
Bibliographic Details
Main Authors: Zheng, Yue, Dhabu, Sumedh Somnath, Chang, Chip Hong
Other Authors: School of Electrical and Electronic Engineering
Format: Conference or Workshop Item
Language:English
Published: 2018
Subjects:
Online Access:https://hdl.handle.net/10356/80436
http://hdl.handle.net/10220/46665
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-80436
record_format dspace
spelling sg-ntu-dr.10356-804362020-03-07T13:24:44Z Securing IoT monitoring device using PUF and physical layer authentication Zheng, Yue Dhabu, Sumedh Somnath Chang, Chip Hong School of Electrical and Electronic Engineering 2018 IEEE International Symposium on Circuits and Systems (ISCAS) Physical Unclonable Functions Physical Layer Authentication DRNTU::Engineering::Electrical and electronic engineering IoT is rapidly becoming a reality. Forecasts predict more than 20 billion connected devices in 2020. These devices bring many benefits, but securing them in IoT environment can be a quandary. With the advent of technology, it is very easy for an adversary to clone a device and replace it, or tamper the data. In the context of wireless communications in IoT, the definition of message authentication should be extended to include verification of the device along with the integrity of the message it produced. In this paper we propose a device- and data-dependent physical layer authentication scheme by using a device-specific, dynamically variable key to generate a data-dependent tag. This tag is embedded in the data transmission using an information hiding scheme to reliably extract it at the receiver, and without compromising the performance of the underlying wireless communication system. Simulation results show that our scheme can achieve high authentication rate while rejecting the tampered transmissions in typical noisy communication channel. Accepted version 2018-11-20T03:16:07Z 2019-12-06T13:49:23Z 2018-11-20T03:16:07Z 2019-12-06T13:49:23Z 2018 Conference Paper Zheng, Y., Dhabu, S. S., & Chang, C. H. (2018). Securing IoT monitoring device using PUF and physical layer authentication. 2018 IEEE International Symposium on Circuits and Systems (ISCAS). doi:10.1109/ISCAS.2018.8351844 https://hdl.handle.net/10356/80436 http://hdl.handle.net/10220/46665 10.1109/ISCAS.2018.8351844 en © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: [http://dx.doi.org/10.1109/ISCAS.2018.8351844]. 5 p. application/pdf
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
topic Physical Unclonable Functions
Physical Layer Authentication
DRNTU::Engineering::Electrical and electronic engineering
spellingShingle Physical Unclonable Functions
Physical Layer Authentication
DRNTU::Engineering::Electrical and electronic engineering
Zheng, Yue
Dhabu, Sumedh Somnath
Chang, Chip Hong
Securing IoT monitoring device using PUF and physical layer authentication
description IoT is rapidly becoming a reality. Forecasts predict more than 20 billion connected devices in 2020. These devices bring many benefits, but securing them in IoT environment can be a quandary. With the advent of technology, it is very easy for an adversary to clone a device and replace it, or tamper the data. In the context of wireless communications in IoT, the definition of message authentication should be extended to include verification of the device along with the integrity of the message it produced. In this paper we propose a device- and data-dependent physical layer authentication scheme by using a device-specific, dynamically variable key to generate a data-dependent tag. This tag is embedded in the data transmission using an information hiding scheme to reliably extract it at the receiver, and without compromising the performance of the underlying wireless communication system. Simulation results show that our scheme can achieve high authentication rate while rejecting the tampered transmissions in typical noisy communication channel.
author2 School of Electrical and Electronic Engineering
author_facet School of Electrical and Electronic Engineering
Zheng, Yue
Dhabu, Sumedh Somnath
Chang, Chip Hong
format Conference or Workshop Item
author Zheng, Yue
Dhabu, Sumedh Somnath
Chang, Chip Hong
author_sort Zheng, Yue
title Securing IoT monitoring device using PUF and physical layer authentication
title_short Securing IoT monitoring device using PUF and physical layer authentication
title_full Securing IoT monitoring device using PUF and physical layer authentication
title_fullStr Securing IoT monitoring device using PUF and physical layer authentication
title_full_unstemmed Securing IoT monitoring device using PUF and physical layer authentication
title_sort securing iot monitoring device using puf and physical layer authentication
publishDate 2018
url https://hdl.handle.net/10356/80436
http://hdl.handle.net/10220/46665
_version_ 1681042157250543616