SecuCode: Intrinsic PUF Entangled <u>Secu</u>re Wireless <u>Code</u> Dissemination for Computational RFID Devices
نویسندگان
چکیده
The simplicity of deployment and perpetual operation energy harvesting devices provides a compelling proposition for new class edge the Internet Things. In particular, Computational Radio Frequency Identification (CRFID) are an emerging battery-free, computational, sensing enhanced that harvest all their operation. Despite wireless connectivity powering, secure firmware updates remains open challenge CRFID due to: intermittent limited computational capabilities, absence supervisory operating system. We present, first time, code dissemination (SecuCode) mechanism CRFIDs by entangling device intrinsic hardware security primitive Static Random Access Memory Physical Unclonable Function (SRAM PUF) to update protocol. design SecuCode: i) overcomes resource-constrained intermittently powered nature devices; ii) is fully compatible with existing communication protocols employed in ISO-18000-6C protocol; built upon standard industry compliant compilation method realized extending recent framework provided Texas Instruments. build end-to-end SecuCode implementation conduct extensive experiments demonstrate standards compliance, evaluate performance security.
منابع مشابه
Puf-enabled Rfid Tags in Electronic Banking
Radio Frequency Identification (RFID) tags have a variety of applications in e-banking. For effective utilization of the technology, this should be reinforced toward security holes and attacks. One of the common attacks on RFID systems is RFID tags cloning. In this paper we review cloning attacks in ebanking. We propose solutions based on physical unclonable functions (PUF) and provide a suitab...
متن کاملEmerging Issues in Wireless Computational Grids for Mobile Devices
An important factor influencing task execution time is the mobility of the devices. Higher mobility is a critical factor affecting the grid performance. In other words, if the devices in the grid are highly mobile, this adversely impacts the time taken to perform a computationally-intensive task. A related issue is that of subordinates and/or the initiator leaving the cell while partial tasks a...
متن کاملPUF-Based Software Protection for Low-End Embedded Devices
In recent years, low-end embedded devices have been used increasingly in various scenarios, ranging from consumer electronics to industrial equipment. However, this evolution made embedded devices profitable targets for software piracy and software manipulation. Aggravating this situation, low-end embedded devices typically lack secure hardware to effectively protect against such attacks. In th...
متن کاملPUMAP: A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol
Radio Frequency Identification (RFID) is a technology used for automatic identification of objects, people, and virtually anything one can think of. Applications of RFID technology are expanding and its usage is being adopted worldwide. As such, major efforts have been made to secure the communications in RFID systems and to protect them from various attacks. This paper surveys RFID systems, ci...
متن کاملSecurity Analysis of a PUF based RFID Authentication Protocol
In this paper we consider the security of a PUF based RFID Authentication protocol which has been recently proposed by Bassil et al. [2]. The designers have claimed that their protocol offers immunity against a broad range of attacks while it provides excellent performance. However, we prove in contrary to its designers claim, this protocol does not provide any security. We present an efficient...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2021
ISSN: ['1941-0018', '1545-5971', '2160-9209']
DOI: https://doi.org/10.1109/tdsc.2019.2934438