Instituto de Microelectrónica de Sevilla, IMSE-CNM, CSIC/Universidad de Sevilla, 41092 Sevilla, Spain.
Sensors (Basel). 2023 Apr 18;23(8):4070. doi: 10.3390/s23084070.
The proliferation of devices for the Internet of Things (IoT) and their implication in many activities of our lives have led to a considerable increase in concern about the security of these devices, posing a double challenge for designers and developers of products. On the one hand, the design of new security primitives, suitable for resource-limited devices, can facilitate the inclusion of mechanisms and protocols to ensure the integrity and privacy of the data exchanged over the Internet. On the other hand, the development of techniques and tools to evaluate the quality of the proposed solutions as a step prior to their deployment, as well as to monitor their behavior once in operation against possible changes in operating conditions arising naturally or as a consequence of a stress situation forced by an attacker. To address these challenges, this paper first describes the design of a security primitive that plays an important role as a component of a hardware-based root of trust, as it can act as a source of entropy for True Random Number Generation (TRNG) or as a Physical Unclonable Function (PUF) to facilitate the generation of identifiers linked to the device on which it is implemented. The work also illustrates different software components that allow carrying out a self-assessment strategy to characterize and validate the performance of this primitive in its dual functionality, as well as to monitor possible changes in security levels that may occur during operation as a result of device aging and variations in power supply or operating temperature. The designed PUF/TRNG is provided as a configurable IP module, which takes advantage of the internal architecture of the Xilinx Series-7 and Zynq-7000 programmable devices and incorporates an AXI4-based standard interface to facilitate its interaction with soft- and hard-core processing systems. Several test systems that contain different instances of the IP have been implemented and subjected to an exhaustive set of on-line tests to obtain the metrics that determine its quality in terms of uniqueness, reliability, and entropy characteristics. The results obtained prove that the proposed module is a suitable candidate for various security applications. As an example, an implementation that uses less than 5% of the resources of a low-cost programmable device is capable of obfuscating and recovering 512-bit cryptographic keys with virtually zero error rate.
物联网 (IoT) 设备的普及及其在我们生活诸多活动中的应用,导致人们对这些设备的安全性产生了极大的关注,这给产品的设计者和开发者带来了双重挑战。一方面,设计适合资源有限的设备的新安全原语,可以方便地纳入机制和协议,以确保通过互联网交换的数据的完整性和隐私性。另一方面,开发技术和工具来评估所提出解决方案的质量,作为在部署之前的一个步骤,以及在操作过程中监测其行为,以应对由于自然或攻击者强制施加的压力情况而导致的操作条件变化。为了应对这些挑战,本文首先描述了一种安全原语的设计,该原语作为基于硬件的信任根的组件起着重要作用,因为它可以作为真随机数生成器 (TRNG) 的熵源,或作为物理不可克隆函数 (PUF) 来方便生成与其实现的设备相关的标识符。该工作还说明了不同的软件组件,这些组件允许执行自我评估策略,以表征和验证该原语在其双重功能中的性能,以及监测在操作过程中由于设备老化、电源或工作温度变化可能导致的安全级别变化。设计的 PUF/TRNG 作为可配置的 IP 模块提供,该模块利用 Xilinx Series-7 和 Zynq-7000 可编程设备的内部架构,并采用基于 AXI4 的标准接口,以方便其与软核和硬核处理系统的交互。已经实现了几个包含不同 IP 实例的测试系统,并对其进行了详尽的在线测试,以获得确定其在唯一性、可靠性和熵特性方面质量的指标。所得到的结果证明,所提出的模块是各种安全应用的合适候选者。例如,使用低成本可编程设备不到 5%的资源的实现能够以几乎为零的错误率混淆和恢复 512 位加密密钥。