Microcontroller-Based PUF for Identity Authentication and Tamper Resistance of Blockchain-Compliant IoT Devices
- PMID: 37571554
- PMCID: PMC10422494
- DOI: 10.3390/s23156769
Microcontroller-Based PUF for Identity Authentication and Tamper Resistance of Blockchain-Compliant IoT Devices
Abstract
Blockchain-based applications necessitate the authentication of connected devices if they are employed as blockchain oracles. Alongside identity authentication, it is crucial to ensure resistance against tampering, including safeguarding against unauthorized alterations and protection against device counterfeiting or cloning. However, attaining these functionalities becomes more challenging when dealing with resource-constrained devices like low-cost IoT devices. The resources of IoT devices depend on the capabilities of the microcontroller they are built around. Low-cost devices utilize microcontrollers with limited computational power, small memory capacity, and lack advanced features such as a dedicated secure cryptographic chip. This paper proposes a method employing a Physical Unclonable Function (PUF) to authenticate identity and tamper resistance in IoT devices. The suggested PUF relies on a microcontroller's internal pull-up resistor values and, in conjunction with the microcontroller's built-in analog comparator, can also be utilized for device self-checking. A main contribution of this paper is the proposed PUF method which calculates the PUF value as the average value of many single PUF measurements, resulting in a significant increase in accuracy. The proposed PUF has been implemented successfully in a low-cost microcontroller device. Test results demonstrate that the device, specifically the microcontroller chip, can be identified with high accuracy (99.98%), and the proposed PUF method exhibits resistance against probing attempts.
Keywords: authentication; blockchain; internet of things; physical unclonable function.
Conflict of interest statement
The authors declare no conflict of interest. The funders had no role in the study’s design; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.
Figures
References
-
- Roman A.-S., Genge B., Duka A.-V., Haller P. Privacy-Preserving Tampering Detection in Automotive Systems. Electronics. 2021;10:3161. doi: 10.3390/electronics10243161. - DOI
-
- Alyahya S., Khan W.U., Ahmed S., Marwat S.N.K., Habib S. Cyber Secure Framework for Smart Agriculture: Robust and Tamper-Resistant Authentication Scheme for IoT Devices. Electronics. 2022;11:963. doi: 10.3390/electronics11060963. - DOI
-
- Grecuccio J., Giusto E., Fiori F., Rebaudengo M. Combining Blockchain and IoT: Food-Chain Traceability and Beyond. Energies. 2020;13:3820. doi: 10.3390/en13153820. - DOI
-
- Cano-Quiveu G., Ruiz-De-Clavijo-Vazquez P., Bellido M.J., Juan-Chico J., Viejo-Cortes J., Guerrero-Martos D., Ostua-Aranguena E. Embedded LUKS (E-LUKS): A Hardware Solution to IoT Security. Electronics. 2021;10:3036. doi: 10.3390/electronics10233036. - DOI
LinkOut - more resources
Full Text Sources
