You are safe with ICTK
History



We Protect Your Values!

2020 PUF meets QuantumPhysical layer security for IoT applications

Physical layer security for IoT applications 

Miroslav Mitev 

Supervisors: Martin Reed, Arsenia Chorti A thesis submitted for the degree of PhD

School of Computer Science and Electronic Engineering University of Essex August 2020



Abstract 

The increasing demands for Internet of things (IoT) applications and the tremendous increase in the volume of IoT generated data bring novel challenges for the fifth generation (5G) network. Verticals such as e-Health, vehicle to everything (V2X) and unmanned aerial vehicles (UAVs) require solutions that can guarantee low latency, energy efficiency, massive connectivity, and high reliability. In particular, finding strong security mechanisms that satisfy the above is of central importance for bringing the IoT to life. In this regards, employing physical layer security (PLS) methods could be greatly beneficial for IoT networks. While current security solutions rely on computational complexity, PLS is based on information theoretic proofs. By removing the need for computational power, PLS is ideally suited for resource constrained devices. In detail, PLS can ensure security using the inherit randomness already present in the physical channel. Promising schemes from the physical layer include physical unclonable functions (PUFs), which are seen as the hardware fingerprint of a device, and secret key generation (SKG) from wireless fading coefficients, which provide the wireless fingerprint of the communication channel between devices. The present thesis develops several PLS-based techniques that pave the way for a new breed of latency-aware, lightweight, security protocols. In particular, the work proposes: i) a fast multi-factor authentication solution with verified security properties based on PUFs, proximity detection and SKG; ii) an authenticated encryption SKG approach that interweaves data transmission and key generation; and, iii) a set of countermeasures to man-in-the-middle and jamming attacks. Overall, PLS solutions show promising performance, especially in the context of IoT applications, therefore, the advances in this thesis should be considered for beyond-5G networks.  


Acknowledgments

I would like to thank the University of Essex, School of Computer Science and Electronic Engineering (CSEE) Doctoral Training Programme for sponsoring my studies and made my dream of pursuing a PhD degree reality. I would like to sincerely thank my supervisors, Dr Martin Reed and Dr Arsenia (Ersi) Chorti for their valued advice and motivation while conducting this research, thanks to their continuous guidance I enjoyed a stress-free working environment. They let me freely choose my research directions and demonstrated a great deal of support. Our meetings and discussions were the key that brought this thesis to life. Furthermore, I would like to express my gratitude for the networking and travelling opportunities which greatly contributed in enhancing my research experience. My sincere thanks also go to the members of staff of the School of Computer Science and Electronic Engineering and the Department of Mathematical Sciences, University of Essex who provided me the opportunity to become a Graduate teaching assistant and Graduate lab assistant. This was an amazing experience which helped me to advance with my PhD studies. I would like to thank my co-authors Dr. Leila Musavian and Dr. Veronica Belmega for their insightful comments and support. I would also like to thank Dr. Mahdi Herfeh for our ongoing collaboration and future publication on the short-block length solution which is not fully contained in this thesis. Finally, I wish to express my deepest gratitude to my family members, my friends, my colleagues, and my life-partner Elena, for their constant support throughout writing this thesis.


To read more:

http://repository.essex.ac.uk/29410/1/Thesis_final_MITEV.pdf








Introduction to vertical business areas 

Go >










Introduction to vertical business areas 

Go >










Introduction to vertical business areas 

Go >



We do these things.
PUF Technology



What is PUF?

Unique Inborn ID 
(PUF, Physically Unclonable Functions)

•Silicon Inborn ID using the randomness of passive device generation in the semiconductor manufacturing process

• As a Physical ID created with physical characteristics, it is fundamentally impossible to falsify or duplicate the value

• Since each semiconductor chip generates a different unique ID, it is called a semiconductor fingerprint.

PUF Advantages

AS Via PUF provides unique Silicon Inborn ID characteristics,  It provides the Root of Trust (RoT), the source of all trust

•Via PUF guarantees stability that is impervious to 
various types of hacking attacks.

•Via PUF is a method of forming via holes between 
metal layers during semiconductor processing.

•As a passive device method, it is an innovative method
that solves all the problems of existing technologies.

•PUF that satisfies all randomness, homeostasis and 
security •Unlike other technologies, no error correction
circuit (ECC) is required.

What you can do with PUF

VIA PUF can be applied to various IoT devices and solutions  that require strong security.

•ICTK's security chip generates a key pair of a private key and a public key in the security chip using an algorithm called ECC based on the key generated by PUF.

•ICTK's PUF security chip provides encrypted RAM (Random Access Memory) and encrypted eFlash (flash memory) inside.

•ICTK's security chip can be operated in PQC (Post Quantum Cryptography), a quantum security algorithm.

ICTK's security chip is the most powerful existing method to provide the Root of Trust function based on PUF.

Resource
  Product

Resource

Product

News