Securing IoT monitoring device using PUF and physical layer authentication
IoT is rapidly becoming a reality. Forecasts predict more than 20 billion connected devices in 2020. These devices bring many benefits, but securing them in IoT environment can be a quandary. With the advent of technology, it is very easy for an adversary to clone a device and replace it, or tamper...
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2018
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/80436 http://hdl.handle.net/10220/46665 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-80436 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-804362020-03-07T13:24:44Z Securing IoT monitoring device using PUF and physical layer authentication Zheng, Yue Dhabu, Sumedh Somnath Chang, Chip Hong School of Electrical and Electronic Engineering 2018 IEEE International Symposium on Circuits and Systems (ISCAS) Physical Unclonable Functions Physical Layer Authentication DRNTU::Engineering::Electrical and electronic engineering IoT is rapidly becoming a reality. Forecasts predict more than 20 billion connected devices in 2020. These devices bring many benefits, but securing them in IoT environment can be a quandary. With the advent of technology, it is very easy for an adversary to clone a device and replace it, or tamper the data. In the context of wireless communications in IoT, the definition of message authentication should be extended to include verification of the device along with the integrity of the message it produced. In this paper we propose a device- and data-dependent physical layer authentication scheme by using a device-specific, dynamically variable key to generate a data-dependent tag. This tag is embedded in the data transmission using an information hiding scheme to reliably extract it at the receiver, and without compromising the performance of the underlying wireless communication system. Simulation results show that our scheme can achieve high authentication rate while rejecting the tampered transmissions in typical noisy communication channel. Accepted version 2018-11-20T03:16:07Z 2019-12-06T13:49:23Z 2018-11-20T03:16:07Z 2019-12-06T13:49:23Z 2018 Conference Paper Zheng, Y., Dhabu, S. S., & Chang, C. H. (2018). Securing IoT monitoring device using PUF and physical layer authentication. 2018 IEEE International Symposium on Circuits and Systems (ISCAS). doi:10.1109/ISCAS.2018.8351844 https://hdl.handle.net/10356/80436 http://hdl.handle.net/10220/46665 10.1109/ISCAS.2018.8351844 en © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: [http://dx.doi.org/10.1109/ISCAS.2018.8351844]. 5 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
topic |
Physical Unclonable Functions Physical Layer Authentication DRNTU::Engineering::Electrical and electronic engineering |
spellingShingle |
Physical Unclonable Functions Physical Layer Authentication DRNTU::Engineering::Electrical and electronic engineering Zheng, Yue Dhabu, Sumedh Somnath Chang, Chip Hong Securing IoT monitoring device using PUF and physical layer authentication |
description |
IoT is rapidly becoming a reality. Forecasts predict more than 20 billion connected devices in 2020. These devices bring many benefits, but securing them in IoT environment can be a quandary. With the advent of technology, it is very easy for an adversary to clone a device and replace it, or tamper the data. In the context of wireless communications in IoT, the definition of message authentication should be extended to include verification of the device along with the integrity of the message it produced. In this paper we propose a device- and data-dependent physical layer authentication scheme by using a device-specific, dynamically variable key to generate a data-dependent tag. This tag is embedded in the data transmission using an information hiding scheme to reliably extract it at the receiver, and without compromising the performance of the underlying wireless communication system. Simulation results show that our scheme can achieve high authentication rate while rejecting the tampered transmissions in typical noisy communication channel. |
author2 |
School of Electrical and Electronic Engineering |
author_facet |
School of Electrical and Electronic Engineering Zheng, Yue Dhabu, Sumedh Somnath Chang, Chip Hong |
format |
Conference or Workshop Item |
author |
Zheng, Yue Dhabu, Sumedh Somnath Chang, Chip Hong |
author_sort |
Zheng, Yue |
title |
Securing IoT monitoring device using PUF and physical layer authentication |
title_short |
Securing IoT monitoring device using PUF and physical layer authentication |
title_full |
Securing IoT monitoring device using PUF and physical layer authentication |
title_fullStr |
Securing IoT monitoring device using PUF and physical layer authentication |
title_full_unstemmed |
Securing IoT monitoring device using PUF and physical layer authentication |
title_sort |
securing iot monitoring device using puf and physical layer authentication |
publishDate |
2018 |
url |
https://hdl.handle.net/10356/80436 http://hdl.handle.net/10220/46665 |
_version_ |
1681042157250543616 |