{"title":"迈向可信的物联网传感系统:实现PUF作为信任根和消息认证码的安全密钥生成器","authors":"Kota Yoshida, K. Suzaki, T. Fujino","doi":"10.1145/3505253.3505258","DOIUrl":null,"url":null,"abstract":"Trustworthy sensor data is important for IoT sensing systems. As such, these systems need to guarantee that the sensor data is acquired by the correct device and has not been tampered with. However, IoT sensing systems can be quite complex and are often composed of multiple components, i.e., a main device and subordinate sensors. The main device is responsible for gathering and processing the data from the subordinate sensor and reports the result to a server. In order to guarantee data correctness, we introduce two types of physically unclonable function (PUF): one for the main device and one for the subordinate sensor. The main device has a trusted execution environment (TEE) for critical processing, and the correctness of the TEE is guaranteed by remote attestation based on a PUF. The subordinate sensor sends the sensor data to the main device with a message authentication code (MAC) based on a PUF. We implemented a trusted IoT sensing system using a RISC-V Keystone with a PRINCE Glitch PUF for the main device and a Raspberry Pi that simulates a CMOS image sensor PUF for the subordinate sensor.","PeriodicalId":342645,"journal":{"name":"Workshop on Hardware and Architectural Support for Security and Privacy","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Towards Trusted IoT Sensing Systems: Implementing PUF as Secure Key Generator for Root of Trust and Message Authentication Code\",\"authors\":\"Kota Yoshida, K. Suzaki, T. Fujino\",\"doi\":\"10.1145/3505253.3505258\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Trustworthy sensor data is important for IoT sensing systems. As such, these systems need to guarantee that the sensor data is acquired by the correct device and has not been tampered with. However, IoT sensing systems can be quite complex and are often composed of multiple components, i.e., a main device and subordinate sensors. The main device is responsible for gathering and processing the data from the subordinate sensor and reports the result to a server. In order to guarantee data correctness, we introduce two types of physically unclonable function (PUF): one for the main device and one for the subordinate sensor. The main device has a trusted execution environment (TEE) for critical processing, and the correctness of the TEE is guaranteed by remote attestation based on a PUF. The subordinate sensor sends the sensor data to the main device with a message authentication code (MAC) based on a PUF. We implemented a trusted IoT sensing system using a RISC-V Keystone with a PRINCE Glitch PUF for the main device and a Raspberry Pi that simulates a CMOS image sensor PUF for the subordinate sensor.\",\"PeriodicalId\":342645,\"journal\":{\"name\":\"Workshop on Hardware and Architectural Support for Security and Privacy\",\"volume\":\"49 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Workshop on Hardware and Architectural Support for Security and Privacy\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3505253.3505258\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Workshop on Hardware and Architectural Support for Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3505253.3505258","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Towards Trusted IoT Sensing Systems: Implementing PUF as Secure Key Generator for Root of Trust and Message Authentication Code
Trustworthy sensor data is important for IoT sensing systems. As such, these systems need to guarantee that the sensor data is acquired by the correct device and has not been tampered with. However, IoT sensing systems can be quite complex and are often composed of multiple components, i.e., a main device and subordinate sensors. The main device is responsible for gathering and processing the data from the subordinate sensor and reports the result to a server. In order to guarantee data correctness, we introduce two types of physically unclonable function (PUF): one for the main device and one for the subordinate sensor. The main device has a trusted execution environment (TEE) for critical processing, and the correctness of the TEE is guaranteed by remote attestation based on a PUF. The subordinate sensor sends the sensor data to the main device with a message authentication code (MAC) based on a PUF. We implemented a trusted IoT sensing system using a RISC-V Keystone with a PRINCE Glitch PUF for the main device and a Raspberry Pi that simulates a CMOS image sensor PUF for the subordinate sensor.