| 研究生: |
梁元議 Liang, Yuan-Yi |
|---|---|
| 論文名稱: |
在物聯網中基於物理不可仿造功能之安全喚醒機制 A Secure Wake-up Scheme based on PUF for IoT |
| 指導教授: |
林輝堂
Lin, Hui-Tang |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 電腦與通信工程研究所 Institute of Computer & Communication Engineering |
| 論文出版年: | 2019 |
| 畢業學年度: | 107 |
| 語文別: | 英文 |
| 論文頁數: | 90 |
| 中文關鍵詞: | 物聯網 、喚醒無線電 、喚醒令牌 、物理不可仿造功能 |
| 外文關鍵詞: | Internet of things (IoT), wake-up radio, wake-up token, Physically unclonable functions (PUF) |
| 相關次數: | 點閱:100 下載:5 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
配備喚醒無線電的物聯網設備可以使用超低功耗的喚醒接收器來監控頻道,而主要無線電收發器可以保持省電的睡眠模式,直到喚醒接收器收到其他物聯網設備的喚醒令牌(WuT)。但是裝備喚醒無線電的設備容易受到拒絕睡眠攻擊,攻擊者可以通過監聽頻道輕鬆獲取舊的喚醒令牌,並多次重播舊的喚醒令牌喚醒目標設備,這將快速耗盡設備的電池並縮短設備壽命。另外,物聯網設備的體積小,方便佈署物聯網設備在戶外的環境中收集感測數據。然而,攻擊者可以透過捕獲物聯網設備,更進一步訪問設備的非防篡改記憶體來獲取秘密訊息並將秘密資訊複製到其他設備,偽裝成真正的物聯網設備來進行其他攻擊。
為了解決上述問題,我們對於想加入物聯網的設備設計身份認證和喚醒令牌的建立機制,使設備和閘道可以互相驗證對方身份並建立一次性喚醒令牌,並且設計喚醒令牌的更新和重新同步閘道和設備之間的非同步喚醒令牌,確保設備不會因為非同步的喚醒令牌而無法被喚醒。另外,為了提高通信效率並節省能源,設計了組喚醒令牌的建立機制。本研究提出的機制使用了物理不可仿製功能(Physical Unclonable Function)來生成金鑰並保護存儲在記憶體中的秘密訊息免於物理和克隆攻擊。最後,通過邏輯分析和實作證明本機制的正確性和可行性。
Wake-up radio (WuR) is an ultra-low-power hardware component to monitor the channel all the time. An IoT device equipped with a wake-up radio usually puts its main radio in a power-saving sleep mode while not conducting any communication to conserve energy. Upon receiving a pre-defined pattern called Wake-up Token (WuT) on the WuR, the IoT device turns on its main transceiver to conduct communication. However, WuR-based devices are susceptible to the Denial-of-Sleep attack as an attacker can quickly drain all their energy and put them out of service by eavesdropping and replay the WuT. On the other hand, an adversary can also conduct cloning attacks on a legitimate IoT device and then launches impersonation attacks.
To resolve the aforementioned problems, we design an identity authentication and wake-up token establishment scheme for IoT devices with the Physical Unclonable Function (PUF). The proposed scheme allows IoT devices to conduct mutual authentication and establish a one-time encryption key and a one-time WuT between them. Furthermore, a WuT update and resynchronization scheme is designed to make sure that the WuT between the communication parties is always synchronized. To defend the cloning attacks, a strong PUF is used in the proposed scheme to generate secret keys and subsequently derive the WuTs. Hence, the proposed scheme is further extended to support group communication while enhancing communication efficiency and conserve energy. Finally, the correctness and feasibility of the proposed schemes are proved through logic analysis and implementation.
Bibliography
[1] Carroll, Aaron, and Gernot Heiser, "An Analysis of Power Consumption in a Smartphone," USENIX annual technical conference. Vol. 14. , pp. 21-21, June 2010.
[2] Azarmehr, Mahzad, Arash Ahmadi, and Rashid Rashidzadeh, "Secure authentication and access mechanism for IoT wireless sensors," IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1-4, May 2017.
[3] Montoya, Maxime, et al., "SWARD: A Secure WAke-up RaDio Against Denial-of-Service on IoT Devices," Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. pp. 190-195, June 2018.
[4] Stecklina, Oliver, Stephan Kornemann, and Michael Methfessel, "A secure wake-up scheme for low power wireless sensor nodes," International Conference on Collaboration Technologies and Systems (CTS), pp. 279-286, May 2014.
[5] Falk, Rainer, and Hans-Joachim Hof, "Fighting insomnia: A secure wake-up scheme for wireless sensor networks," Third International Conference on Emerging Security Information, Systems and Technologies, pp. 191-196, June 2009.
[6] Knud Lasse Lueth, “State of the IoT 2018: Number of IoT devices now at 7B – Market accelerating,” August 2018. [Online]. Available: https://iot-analytics.com/state-of-the-iot-update-q1-q2-2018-number-of-iot-devices-now-7b/
[7] Alam, Muhammad Mahtab, et al., "A survey on the roles of communication technologies in IoT-based personalized healthcare applications," IEEE Access, Vol. 6, pp.36611-36631, July 2018.
[8] Zanella, Andrea, et al., "Internet of things for smart cities," IEEE Internet of Things Journal, Vol. 1, no. 1, pp. 22-32, February 2014.
[9] Al-Fuqaha, Ala, et al., "Internet of things: A survey on enabling technologies, protocols, and applications," IEEE communications surveys & tutorials, Vol. 17, no. 4, pp. 2347-2376, June 2015.
[10] Padraig Scully, “The Top 10 IoT Segments in 2018 – based on 1,600 real IoT projects,” February 2018. [Online]. Available: https://iot-analytics.com/top-10-iot-segments-2018-real-iot-projects/. [Accessed: 22 February 2018].
[11] Lin, Jie, et al., "A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications," IEEE Internet of Things Journal, Vol. 4, no. 5, pp. 1125-1142, Oct. 2017.
[12] Mahmoud, Rwan, et al., "Internet of things (IoT) security: Current status, challenges and prospective measures," 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp.14-16, Dec. 2015.
[13] Buettner, Michael, et al., "X-MAC: a short preamble MAC protocol for duty-cycled wireless sensor networks," Proceedings of the 4th international conference on Embedded networked sensor systems, pp. 307-320, November 2006.
[14] Carrano, Ricardo C., et al., "Survey and taxonomy of duty cycling mechanisms in wireless sensor networks," IEEE Communications Surveys & Tutorials Vol. 16, no. 1, pp 181-194, June 2013.
[15] Demirkol, Ilker, Cem Ersoy, and Fatih Alagoz, "MAC protocols for wireless sensor networks: a survey," IEEE Communications Magazine, Vol. 44, no. 4, pp.115-121, April 2006.
[16] Oller, Joaquim, et al., "Has time come to switch from duty-cycled MAC protocols to wake-up radio for wireless sensor networks?," IEEE/ACM Transactions on Networking, Vol. 24, no. 2, pp. 674-687, January 2015.
[17] Piyare, Rajeev, et al., "Ultra low power wake-up radios: A hardware and networking survey," IEEE Communications Surveys & Tutorials, Vol. 19, no. 4, pp. 2117-2157, July 2017.
[18] Mahalakshmi, G., and P. Subathra, "A survey on prevention approaches for denial of sleep attacks in wireless networks," Journal of Emerging Technologies in Web Intelligence, Vol. 6, no.1, pp. 106-110, February 2014.
[19] Herder, Charles, et al., "Physical unclonable functions and applications: A tutorial," Proceedings of the IEEE, Vol. 102, no. 8, pp. 1126-1141, Aug. 2014.
[20] Suh, G. Edward, and Srinivas Devadas, "Physical unclonable functions for device authentication and secret key generation," 2007 44th ACM/IEEE Design Automation Conference, June 2007.
[21] Gassend, Blaise, et al., "Controlled physical random functions," 18th Annual Computer Security Applications Conference, 2002. Proceedings, Dec. 2002.
[22] Rührmair, Ulrich, and Daniel E. Holcomb, "PUFs at a glance," Proceedings of the conference on Design, Automation & Test in Europe. European Design and Automation Association, March 2014.
[23] Holcomb, Daniel E., Wayne P. Burleson, and Kevin Fu, "Power-up SRAM state as an identifying fingerprint and source of true random numbers," IEEE Transactions on Computers, Vol.58, no.9, pp. 1198-1210, November 2008.
[24] Liu, Chao Qun, Yuan Cao, and Chip Hong Chang, "ACRO-PUF: A low-power, reliable and aging-resilient current starved inverter-based ring oscillator physical unclonable function," IEEE Transactions on Circuits and Systems I: Regular Papers, Vol. 64, no. 12, pp. 3138-3149, August 2017.
[25] M’Raihi, David, et al., "Hotp: An hmac-based one-time password algorithm," The Internet Society, Network Working Group. RFC4226, Dec. 2005.
[26] Ooi, Joo Guan, and Kok Horng Kam, "A proof of concept on defending cold boot attack," 2009 1st Asia Symposium on Quality Electronic Design, July 2009.
[27] Xi Chen, Robert P. Dick, and Alok Choudhary, "Operating system controlled processor-memory bus encryption," 2008 Design, Automation and Test in Europe, March 2008.
[28] M. Burrows, M. Abadi, R. Needham, “A Logic of Authentication,” ACM Transactions on Computer Systems, vol. 8, p. 18–36, 1990
[29] M. Warnier, "Bilateral Key Exchange analysed in BAN logic," February 2002. [Online]. Available: http://homepage.tudelft.nl/68x7e/Papers/ bke.pdf. [Accessed 18 May 2014]
[30] Suh, G. Edward, and Srinivas Devadas, "Physical unclonable functions for device authentication and secret key generation," 2007 44th ACM/IEEE Design Automation Conference, June 2007.
[31] Tuyls, Pim, and Lejla Batina, "RFID-tags for anti-counterfeiting." Cryptographers’ Track at the RSA Conference. Springer, Berlin, Heidelberg, pp. 115–131 2006.
[32] Rachmawati, D., J. T. Tarigan, and A. B. C. Ginting, "A comparative study of Message Digest 5 (MD5) and SHA256 algorithm," Journal of Physics: Conference Series, Vol. 978. No. 1, March 2018.
[33] ESP8266 Datasheet, “ESP8266EX Datasheet,” Espr. Syst. Datasheet, pp. 1–31, 2015.
[34] Cheng, Kuang-Wei, and Shih-En Chen, "An ultralow-power wake-up receiver based on direct active RF detection," IEEE Transactions on Circuits and Systems I: Regular Papers, Vol. 64, no. 7, pp. 1661-1672, July 2017.
[35] Chiou, Lih-Yih, Chung-Han Wu, and Po-Cheng Wei, "A Reliable Delay-Based Physical Unclonable Function with Dark-Bit Avoidance," 2019 IEEE International Symposium on Circuits and Systems (ISCAS), May 2019.
校內:2023-09-01公開