PUF based Smart Meter Security with Sx Chain

نویسنده

  • Seonghan Ryu
چکیده

A smart meter is resource-constrained device, therefore lightweight cryptographic methods are required. Physical unclonable function(PUF) is promising hardware based lightweight security solution, which makes use of the inherent process variation in semiconductor fabrication process to generate unique ID. This paper presents an PUF based smart meter security with frequency synthesizer(Sx) chain composed of VCO and dynamic divider(DDiv), which use oscillation frequency variation characteristics. In the Sx chain PUF implementation, the output bits are obtained by comparing the oscillation frequencies of different VCO inductor banks or dynamic dividers. For the lightweight operability, simple VCO or DDiv-PUF based authentication protocol is also proposed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

PUF-based solutions for secure communications in Advanced Metering Infrastructure (AMI)

In this paper, by considering the constraints of Advanced Metering Infrastructure (AMI) systems, we propose an authenticated key exchange protocol and an authenticated message broadcasting protocol. The proposed protocols are based on two well-known protocols, Okamoto and Schnorr, and inherit their security features. For providing the security of the system against physical attacks, we utilize ...

متن کامل

A Novel Non-cryptographic Security Services for Advanced Metering Infrastructure in Smart Grid

Advanced metering infrastructure (AMI) is an architecture for automated, two-way communication between a smart utility meter and a utility company. It is responsible for collecting all the data and information from the loads and consumers. These data and information are critical as it threats the reliability of electrical energy delivery and consumers' privacy. Traditional security solution rel...

متن کامل

PUF – Physical Unclonable Functions

from historical banking and telecommunication applications to electronic passports, electronic IDs, anti-counterfeiting devices, smartgrid applications, and more. The security requirements for most of these applications are crucial and evolving. In addition, more and more sophisticated attacks are being developed every day. As a result, design of Smart Card ICs is a growing challenge. This pape...

متن کامل

Secret Share Based Program Access Authorization Protocol for Smart Metering

Varieties of data security protection technologies have been developed in smart metering. However, there are almost no researches focusing on the security of smart meter parameters. In fact, smart meter parameters, such as the total/sharp/peak/flat/valley period time, can be written locally or remotely by power companies or users through sending programming commands. Modifying smart meter param...

متن کامل

Exploiting PUF Unreliability to Secure Wireless Sensing

Wireless sensors attract increased attention from both academia and industry owing to emerging applications such as Internet of Things (IoT), smart homes, e-health, etc. It is widely accepted that security assessment to this super large distributed ubiquitous devices and privacy of collected data are ultimate important, Sensor security that relies on traditional cryptography is vulnerable to va...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016