Gołofit Krzysztof
Institute of Electronic Systems, Department of Electronics and Information Technology, Warsaw University of Technology, Nowowiejska 15/19, 00-665, Warsaw, Poland.
Sci Rep. 2024 Oct 14;14(1):24060. doi: 10.1038/s41598-024-75373-6.
The article describes various security primitives for significantly resource-constrained devices, such as sensors or sensor networks, IoT devices, wearables, etc. - i.e., devices without programmable memory. It is dedicated to parts which cannot handle complex algorithms of modern secure cryptography, cannot be equipped with programmable memories, or their circuits or data in permanent memories can be easily reverse-engineered. Instead, all security techniques (e.g., identification, authentication, and encryption) are based on modern hardware cryptography, mainly: physical unclonable functions (PUFs) and true random number generators (TRNGs). The paper addresses numerous issues from untraceable identification to mutual authentication to one-time pad encryption. The communication security is considered to be a trade-off between the device's resources (processing ability, energy consumption, implementation size, response time), preparation complicity (initialization time, size of a server data storage) and the security capabilities and protection levels. Primitives can be included into the communication protocol based on particular needs and available hardware resources.
本文描述了适用于资源严重受限设备的各种安全原语,例如传感器或传感器网络、物联网设备、可穿戴设备等,即没有可编程存储器的设备。它适用于那些无法处理现代安全密码学复杂算法、无法配备可编程存储器,或者其永久存储器中的电路或数据能够轻易被逆向工程的部件。相反,所有安全技术(如识别、认证和加密)都基于现代硬件密码学,主要包括:物理不可克隆函数(PUF)和真随机数发生器(TRNG)。本文探讨了从不可追踪识别到相互认证再到一次性密码加密等诸多问题。通信安全被视为设备资源(处理能力、能耗、实现尺寸、响应时间)、准备复杂度(初始化时间、服务器数据存储大小)与安全能力和保护级别之间的权衡。可以根据特定需求和可用硬件资源将这些原语纳入通信协议。