PUF-Based Key Generation Scheme for Secure Group Communication Using MEMS
Abstract
:1. Introduction
1.1. Contributions
- This research studies the MEMS accelerometer as a suitable Physical Unclonable Function. To establish the suitability of MEMS PUF in the IoT security, a sensor testbed has been established that studies identical sensors statistically. Hence the MEMS accelerometers have been analyzed statistically to show that there are enough inter sample variances along with sufficient intra sample similarities.
- To provision security services via PUF, this study presents a novel symmetric key generation algorithm based on which groups of IoT devices can communicate. The group key generation scheme is based on using the inherent device PUF to create a device identity which leads to the creation of a group key. Thus, the participants in a group can communicate with each other using the PUF as a root of trust for the group. The key generation scheme has been studied for varying key sizes and group sizes.
- A contribution of the proposed system is that it eliminates the need for stored keys. By eliminating stored keys, issues related to key theft are greatly reduced therefore increasing the overall security and reliability of the established group communications. Therefore, an extensive security analysis is also performed to verify the security of this research.
1.2. Organization
2. Internet of Things and the Threat Landscape
Applications of IoT Enabled Smart Environments
3. Cryptographic Key Theft
Incorporating a Novel Cryptographic Root of Trust
4. Problems in Sensor Group Communications
4.1. Dishonest Participants
4.2. Dynamic Memberships and Forward/Backward Secrecy
4.3. Single Point of Failure
4.4. DDoS/DoS Attack
4.5. Collaborative Keying vs. Dictative Keying
- Dictative Key: In dictative key approach, the responsibility of generating a key is given to a single or nominated participants. Normally Group Controllers (GC) or Key Generation Center (KGC) are responsible for generation of the key for the entire group. The problem with this approach is that the GC or KGC should be protected from the attacks because if the GC or KGC becomes compromised or are under D/DoS attack, then the security of group communication is also compromised. Thus, these type of schemes could lead to a single point of failure. Dictative key generation architecture is also not coherent with the philosophy of PUF because it will not take the input from the participants of the group.
- Collaborative Key: In collaborative keying approach, the participants of the groups are required to provide their inputs for generation of the key. In this key generation architecture, the risk of compromised GC or KGC is addressed because all the members are responsible for generating a group key and the GC/KGC are eliminated from the architecture. Another advantage of collaborative key generation architecture is that there will be no single point of failure and in case a member is not available its contribution will not be involved, and the key generation process will continue its works but would take the contributions from other participants of the group.
5. System Model
5.1. PUF ID Establishment
5.2. System Implementation
5.3. Data Collection
5.4. Statistical Analysis of Collected Data
- 1.
- A one-way analysis is used when three or more groups are compared based on a single factor
- 2.
- A two-way analysis is used when two or more groups are compared based on more than two factors.
- 3.
- A K-way analysis is used when the factor variables are K in number.
6. Group Key Agreement
6.1. Proposed Scheme
6.1.1. Create Unique Individual ID
6.1.2. Contribution Collection
Algorithm 1: TakeContribution. |
Input: Bigint G, N, R, Previous[ ] Output: Values[ ] Values[Previous.Length + 1] Cardinal←0, PreviousCV←0, Intermediate←0, Temp←0 Temp ← Previous[0] Cardinal←(Temp) mod N Values[0]←Cardinal PreviousCV←Temp Values[1]←PreviousCV |
6.1.3. Symmetric Group Key Generation
Algorithm 2: CalculateFinalKey. |
Input: BigInteger “IntermediateValueRelavent, R, N” Output: BigInteger “FinalKey” FinalKey ← (IntermediateValueRelavent ), mod, N |
7. System Analysis
7.1. Key Size vs. Participant Size Analysis
7.2. Scalability Analysis
7.3. RAM Consumption Analysis
7.4. Security Analysis
7.5. Procedural Considerations
8. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Liu, R.; Wang, J. Internet of Things: Application and Prospect. In MATEC Web of Conferences; EDP Sciences, 2017; Volume 100, p. 02034. Available online: https://www.matec-conferences.org/articles/matecconf/pdf/2017/14/matecconf_gcmm2017_02034.pdf (accessed on 8 July 2021).
- Catarinucci, L.; de Donno, D.; Mainetti, L.; Palano, L.; Stefanizzi, M.L.; Tarricone, L. An IoT-Aware Architecture for Smart Healthcare Systems. IEEE Internet Things J. 2015, 2, 515–526. [Google Scholar] [CrossRef]
- Lee, J.; Bagheri, B.; Kao, H.A. A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems. Manuf. Lett. 2015, 3, 18–23. [Google Scholar] [CrossRef]
- Alkatheiri, M.S.; Sangi, A.R.; Anamalamudi, S. Physical Unclonable Function (PUF)-Based Security in Internet of Things (IoT): Key Challenges and Solutions. In Handbook of Computer Networks and Cyber Security; Springer Publishing Company: Berlin/Heidelberg, Germany, 2020; pp. 461–473. [Google Scholar]
- Syed, A.S.; Sierra-Sosa, D.; Kumar, A.; Elmaghraby, A. IoT in Smart Cities: A Survey of Technologies, Practices and Challenges. Smart Cities 2021, 4, 429–475. [Google Scholar] [CrossRef]
- Kepuska, V.; Bohouta, G. Next-generation of virtual personal assistants (Microsoft Cortana, Apple Siri, Amazon Alexa and Google Home). In Proceedings of the 2018 IEEE 8th Annual Computing and Communication Workshop and Conference, Las Vegas, NV, USA, 8–10 January 2018; pp. 99–103. [Google Scholar]
- Ullo, S.L.; Sinha, G.R. Advances in Smart Environment Monitoring Systems Using IoT and Sensors. Sensors 2020, 20, 3113. [Google Scholar] [CrossRef] [PubMed]
- Ghasempour, A. Internet of Things in Smart Grid: Architecture, Applications, Services, Key Technologies, and Challenges. Inventions 2019, 4, 22. [Google Scholar] [CrossRef] [Green Version]
- Friha, O.; Ferrag, M.A.; Shu, L.; Maglaras, L.; Wang, X. Internet of Things for the Future of Smart Agriculture: A Comprehensive Survey of Emerging Technologies. IEEE/CAA J. Autom. Sin. 2021, 8, 718–752. [Google Scholar] [CrossRef]
- Trappe, W.; Howard, R.; Moore, R.S. Low-energy security: Limits and opportunities in the internet of things. IEEE Secur. Priv. 2015, 13, 14–21. [Google Scholar] [CrossRef]
- Dhanjani, N. Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts; O’Reilly: Sevastopol, CA, USA, 2015. [Google Scholar]
- Shannon, C.E. Communication Theory of Secrecy Systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
- Alizai, Z.A.; Tahir, H.; Murtaza, M.H.; Tahir, S.; Mcdonald-Maier, K. Key-Based Cookie-Less Session Management Framework for Application Layer Security. IEEE Access 2019, 7, 128544–128554. [Google Scholar] [CrossRef]
- Surendran, S.; Nassef, A.; Beheshti, B.D. A survey of cryptographic algorithms for IoT devices. In Proceedings of the 2018 IEEE Long Island Systems, Applications and Technology Conference, Farmingdale, NY, USA, 4 May 2018; pp. 1–8. [Google Scholar]
- Yitbarek, S.F.; Aga, M.T.; Das, R.; Austin, T. Cold Boot Attacks are Still Hot: Security Analysis of Memory Scramblers in Modern Processors. In Proceedings of theInternational Symposium on High-Performance Computer Architecture, Austin, TX, USA, 4–8 February 2017; pp. 313–324. [Google Scholar]
- Genkin, D.; Pachmanov, L.; Pipman, I.; Tromer, E. Stealing keys from pcs using a radio: Cheap electromagnetic attacks on windowed exponentiation. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Berlin/Heidelberg, Germany, 2015; Volume 9293, pp. 207–228. [Google Scholar]
- Genkin, D.; Pachmanov, L.; Pipman, I.; Shamir, A.; Tromer, E. Physical key extraction attacks on PCs. Commun. ACM 2016, 59, 70–79. [Google Scholar] [CrossRef]
- Suo, H.; Wan, J.; Zou, C.; Liu, J. Security in the internet of things: A review. In Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering, Hangzhou, China, 23–25 March 2012; Volume 3, pp. 648–651. [Google Scholar]
- Pappu, R.; Recht, B.; Taylor, J.; Gershenfeld, N. Physical one-way functions. Science 2002, 297, 2026–2030. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Ingemarsson, I.; Tang, D.T.; Wong, C.K. A Conference Key Distribution System. IEEE Trans. Inf. Theory 1982, 28, 714–720. [Google Scholar] [CrossRef]
- Harney, H.; Muckenhirn, C. Group Key Management Protocol (GKMP) Architecture. Available online: https://dl.acm.org/doi/pdf/10.17487/RFC2094 (accessed on 8 July 2021).
- Rao, R.V.; Selvamani, K.; Elakkiya, R. A secure key transfer protocol for group communication. arXiv 2012, arXiv:1212.2720. [Google Scholar]
- Neuman, C.B.; Ts’o, T. Kerberos: An Authentication Service for Computer Networks. IEEE Commun. Mag. 1994, 32, 33–38. [Google Scholar] [CrossRef]
- Bhatia, S.; Behal, S.; Ahmed, I. Distributed Denial of Service Attacks and Defense Mechanisms: Current Landscape and Future Directions. In Advances in Information Security; Springer: New York, NY, USA, 2018; pp. 55–97. [Google Scholar]
- Zhang, C.; Green, R. Communication security in internet of thing: Preventive measure and avoid DDoS attack over IoT network. In Proceedings of the 18th Symposium on Communications & Networking, Alexandria, VA, USA, 12–15 April 2015; pp. 8–15. [Google Scholar]
- InvenSense Inc. MPU-6000 and MPU-6050 Product Specification Revision 3.4 MPU-6000/MPU-6050 Product Specification. 2013. Available online: https://invensense.tdk.com/wp-content/uploads/2015/02/MPU-6000-Datasheet1.pdf (accessed on 8 July 2021).
- Hanusz, Z.; Tarasińska, J. Normalization of the Kolmogorov–Smirnov and Shapiro–Wilk tests of normality. Biometrical Lett. 2015, 52, 85–93. [Google Scholar] [CrossRef] [Green Version]
- Leech, N.L.; Barrett, K.C.; Morgan, G.A. IBM SPSS for Intermediate Statistics: Use and Interpretation, 5th ed.; Routledge: London, UK, 2014. [Google Scholar]
- Joaquim, P.; Marques, S. Applied Statistics Using SPSS, STATISTICA, MATLAB and R, 2nd ed.; Springer Publishing Company: Berlin/Heidelberg, Germany, 2007. [Google Scholar]
- Goldwasser, S. Advances in Cryptology—CRYPTO’ 88: Proceedings; Springer Publishing Company: Berlin/Heidelberg, Germany, 1990. [Google Scholar]
- Steiner, M.; Tsudik, G.; Waidner, M. Diffie-Hellman key distribution extended to group communication. In Proceedings of the ACM Conference on Computer and Communications Security, New Delhi, India, 14–16 March 1996; pp. 31–37. [Google Scholar]
Normality Test | ||||||
---|---|---|---|---|---|---|
Device A | Kolmogorov–Smirnov | Shapiro–Wilk | ||||
Statistic | df | Sig. | Statistic | df | Sig. | |
RSS1 | 0.032 | 503 | 0.200 | 0.996 | 503 | 0.204 |
RSS2 | 0.029 | 503 | 0.200 | 0.997 | 503 | 0.567 |
RSS3 | 0.034 | 503 | 0.200 | 0.995 | 503 | 0.096 |
RSS4 | 0.022 | 503 | 0.200 | 0.997 | 503 | 0.503 |
RSS5 | 0.036 | 503 | 0.159 | 0.996 | 503 | 0.172 |
RSS6 | 0.036 | 503 | 0.155 | 0.966 | 503 | 0.298 |
RSS7 | 0.042 | 503 | 0.033 | 0.997 | 503 | 0.511 |
RSS8 | 0.032 | 503 | 0.200 | 0.997 | 503 | 0.548 |
RSS9 | 0.039 | 503 | 0.070 | 0.996 | 503 | 0.227 |
RSS10 | 0.043 | 503 | 0.029 | 0.996 | 503 | 0.241 |
Test of Homogeneity of Variances | ||||
---|---|---|---|---|
Device A | Levene Statistic | df1 | df2 | Sig. |
Based on Mean | 1.681 | 9 | 5030 | 0.088 |
Based on Median | 1.676 | 9 | 5030 | 0.089 |
Based on Median and with adjusted df | 1.676 | 9 | 4996.156 | 0.089 |
Based on Trimmed Mean | 1.682 | 9 | 5030 | 0.088 |
ANOVA | |||||
---|---|---|---|---|---|
Device A | Sum of Squares | df | Mean Square | F | Sig. |
Between Groups | 0.000 | 9 | 0.000 | 1.233 | 0.270 |
Within Groups | 0.157 | 5030 | 0.000 | ||
Total | 0.157 | 5039 |
Device A | RSS1 | RSS2 | RSS3 | RSS4 | RSS5 | RSS6 | RSS7 | RSS8 | RSS9 | RSS10 |
---|---|---|---|---|---|---|---|---|---|---|
Mean | 0.9287 | 0.9286 | 0.9289 | 0.9288 | 0.9293 | 0.9293 | 0.9287 | 0.9287 | 0.9285 | 0.92880 |
Standard Deviation | 0.0054 | 0.0055 | 0.0058 | 0.0057 | 0.0055 | 0.0052 | 0.0055 | 0.0054 | 0.0055 | 0.0052 |
Interquartile Range | 0.0080 | 0.0076 | 0.0083 | 0.0079 | 0.0073 | 0.0071 | 0.007 | 0.0067 | 0.0072 | 0.0075 |
Device B | RSS1 | RSS2 | RSS3 | RSS4 | RSS5 | RSS6 | RSS7 | RSS8 | RSS9 | RSS10 |
---|---|---|---|---|---|---|---|---|---|---|
Mean | 1.2133 | 1.2128 | 2.2135 | 1.2128 | 1.2134 | 1.2129 | 1.2131 | 1.2131 | 1.2132 | 1.2126 |
Standard Deviation | 0.0051 | 0.0050 | 0.0051 | 0.0052 | 0.0052 | 0.0052 | 0.0050 | 0.0051 | 0.0050 | 0.0049 |
Interquartile Range | 0.0072 | 0.0065 | 0.0068 | 0.0076 | 0.0072 | 0.0070 | 0.0070 | 0.0069 | 0.0069 | 0.00675 |
Key Size | Total Number of Participants | Total Time (Milliseconds) |
---|---|---|
160 Bits | 100 | 2914.2 |
200 | 5551.8 | |
300 | 8310.6 | |
400 | 15,753.8 | |
500 | 24,848.2 | |
256 Bits | 100 | 3559 |
200 | 9953 | |
300 | 19,276.2 | |
400 | 33,401.6 | |
500 | 49,265.4 | |
512 Bits | 100 | 8546.6 |
200 | 29,635.2 | |
300 | 80,917.6 | |
400 | 147,624.8 | |
500 | 236,857.2 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Mehdi, M.; Ajani, M.T.; Tahir, H.; Tahir, S.; Alizai, Z.; Khan, F.; Riaz, Q.; Hussain, M. PUF-Based Key Generation Scheme for Secure Group Communication Using MEMS. Electronics 2021, 10, 1691. https://doi.org/10.3390/electronics10141691
Mehdi M, Ajani MT, Tahir H, Tahir S, Alizai Z, Khan F, Riaz Q, Hussain M. PUF-Based Key Generation Scheme for Secure Group Communication Using MEMS. Electronics. 2021; 10(14):1691. https://doi.org/10.3390/electronics10141691
Chicago/Turabian StyleMehdi, Mubarak, Muhammad Taha Ajani, Hasan Tahir, Shahzaib Tahir, Zahoor Alizai, Fawad Khan, Qaiser Riaz, and Mehdi Hussain. 2021. "PUF-Based Key Generation Scheme for Secure Group Communication Using MEMS" Electronics 10, no. 14: 1691. https://doi.org/10.3390/electronics10141691
APA StyleMehdi, M., Ajani, M. T., Tahir, H., Tahir, S., Alizai, Z., Khan, F., Riaz, Q., & Hussain, M. (2021). PUF-Based Key Generation Scheme for Secure Group Communication Using MEMS. Electronics, 10(14), 1691. https://doi.org/10.3390/electronics10141691