Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3312614.3312650acmotherconferencesArticle/Chapter ViewAbstractPublication PagescoinsConference Proceedingsconference-collections
research-article

Employing Blockchain and Physical Unclonable Functions for Counterfeit IoT Devices Detection

Published: 05 May 2019 Publication History

Abstract

Counterfeit copycat devices have become one of the most important problems in IoT ecosystem. The number of IoT devices manufactured has grown exponentially through last years. In order to be competitive in terms of production cost, they usually need to assemble devices by using ready components built by other manufacturers. This scheme results in a high risk that produced IoT devices do not function properly due to malfunctioning components. This can either be related to component manufacturers trying to minimize costs or even to malicious practices for violating privacy or security of end users of such devices. In this paper a novel approach for preventing such counterfeit copycat practices is presented. The proposed methodology is based on identifying each one of the used components through the use of PUF responses and employing blockchain technology, in order to set-up a platform for tracking the supply chain of both component and IoT devices, without requiring the existence of any central authority.

References

[1]
S. Ahmad. 2018. Using Physical Unclonable Functions for Data-Link Layer Authenticity Verification to Mitigate Attacks on IEEE 802.11ad Beam Training. Master's thesis. Technische Universität Darmstadt.
[2]
M. N. Aman, K. C. Chua, and B. Sikdar. 2016. Position Paper: Physical Unclonable Functions for IoT Security. In Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security (IoTPTS '16). ACM, New York, NY, USA, 10--13.
[3]
N. A. Anagnostopoulos, T. Arul, Y. Fan, C. Hatzfeld, A. Schaller, W. Xiong, M. Jain, M. U. Saleem, J. Lotichius, S. Gabmeyer, J. Szefer, and S. Katzenbeisser. 2018. Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security. Cryptography 2, 3 (2018).
[4]
N. A. Anagnostopoulos, T. Arul, Y. Fan, J. Lotichius, C. Hatzfeld, F. Fernandes, R. Sharma, F. Tehranipoor, and S. Katzenbeisser. 2018. Securing IoT Devices Using Robust DRAM PUFs. In 2018 Global Information Infrastructure and Networking Symposium (GIIS'18). Thessaloniki, Greece.
[5]
N. A. Anagnostopoulos, T. Arul, M. Rosenstihl, A. Schaller, S. Gabmeyer, and S. Katzenbeisser. 2018. Low-Temperature Data Remanence Attacks Against Intrinsic SRAM PUFs. In 2018 21st Euromicro Conference on Digital System Design (DSD). 581--585.
[6]
B. M. S. Bahar Talukder, B. Ray, M. Tehranipoor, D. Forte, and M. T. Rahman. 2018. LDPUF: Exploiting DRAM Latency Variations to Generate Robust Device Signatures. ArXiv e-prints (Aug 2018). arXiv:1808.02584 http://arxiv.org/abs/1808.02584
[7]
G. Bloom, B. Alsulami, E. Nwafor, and I. C. Bertolotti. 2018. Design Patterns for the Industrial Internet of Things. In 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS). IEEE, 1--10.
[8]
R. Casado-Vara, J. Prieto, F. De la Prieta, and J. M. Corchado. 2018. How Blockchain Improves the Supply Chain: Case Study Alimentary Supply Chain. Procedia computer science 134 (2018), 393--398.
[9]
C. Chaintoutis, M. Akriotou, C. Mesaritakis, I. Komnios, D. Karamitros, A. Fragkos, and D. Syvridis. 2018. Optical PUFs as Physical Root of Trust for Blockchain-Driven Applications. IET Software (2018).
[10]
Z. Guan, Y. Zhao, D. Li, and J. Liu. 2018. TBDCT: A Framework of Trusted Big Data Collection and Trade System Based on Blockchain and TSM. In 2018 IEEE International Conference on Smart Cloud (SmartCloud). 77--83.
[11]
GuardTime & Intrinsic ID. 2016. Internet of Things Authentication: A Blockchain Solution Using SRAM Physical Unclonable Functions. https://www.intrinsic-id.com/wp-content/uploads/2017/05/gt_KSI-PUF-web-1611.pdf
[12]
J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami. 2013. Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions. Future generation computer systems 29, 7 (2013), 1645--1660.
[13]
B.Halak, M. Zwolinski, and M. S. Mispan. 2016. Overview of PUF-Based Hardware Security Solutions for the Internet of Things. In 2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS). 1--4.
[14]
M. N. Islam, V. C. Patii, and S. Kundu. 2018. On IC Traceability via Blockchain. In 2018 International Symposium on VLSI Design, Automation and Test (VLSI-DAT). 1--4.
[15]
U. Javaid, M. N. Aman, and B. Sikdar. 2018. BlockPro: Blockchain Based Data Provenance and Integrity for Secure IoT Environments. In Proceedings of the 1st Workshop on Blockchain-Enabled Networked Sensor Systems (BlockSys'18). ACM, New York, NY, USA, 13--18.
[16]
J. J. Karst and G. Brodar. 2017. Connecting Multiple Devices with Blockchain in the Internet of Things. https://courses.cs.ut.ee/MTAT.03.323/2016_fall/uploads/Main/002.pdf Research paper for "Seminar on Blockchain Technology (MTAT.03.323)".
[17]
G. Keramidas, N. Voros, and M. Hübner. 2016. Components and Services for IoT Platforms: Paving the Way for IoT Standards. Springer.
[18]
P. Koeberl, J. Li, R. Maes, A. Rajan, C. Vishik, and M. Wójcik. 2012. Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM. In Trusted Systems, L. Chen, M. Yung, and L. Zhu (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 271--288.
[19]
J. Kong, F. Koushanfar, P. K. Pendyala, A. Sadeghi, and C. Wachsmann. 2014. PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs. In 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC). 1--6.
[20]
I. Kumari, M. Oh, Y. Kang, and D. Choi. 2018. Rapid Run-Time DRAM PUF Based on Bit-Flip Position for Secure IoT Devices. In 2018 IEEE SENSORS. 1--4.
[21]
A. Kundu, Z. Sura, and U. Sharma. 2018. Collaborative and Accountable Hardware Governance Using Blockchain. In 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC). 114--121.
[22]
K. H. Kwak, J. T. Kong, S. I. Cho, H. T. Phuong, and G. Y. Gim. 2019. A Study on the Design of Efficient Private Blockchain. Springer International Publishing, Cham, 93--121.
[23]
C. Lipps, A. Weinand, D. Krummacker, C. Fischer, and H. D. Schotten. 2018. Proof of Concept for IoT Device Authentication Based on SRAM PUFs Using ATMEGA 2560-MCU. In 2018 1st International Conference on Data Intelligence and Security (ICDIS). 36--42.
[24]
Y. Madhwal and P. B. Panfilov. 2018. Blockchain and Supply Chain Management: Aircrafts' Parts' Business Case. Annals of DAAAM & Proceedings (2018), 1051--1057.
[25]
J. C. Montes Díaz, A. Rincón Piñeros, R. V. Páez Méndez, G. A. Ramírez Espinosa, and M. R. Pérez Cerquera. 2018. A Model for National Electronic Identity Document and Authentication Mechanism Based on Blockchain. International Journal of Modeling and Optimization (IJMO) 8, 3 (2018), 160--165.
[26]
S. Nakamoto. 2008. Bitcoin: A Peer-to-peer Electronic Cash System. https://bitcoin.org/bitcoin.pdf
[27]
H. Ping, J. Wang, Z. Ma, and Y. Du. 2018. Mini-Review of Application of IoT Technology in Monitoring Agricultural Products Quality and Safety. International Journal of Agricultural and Biological Engineering 11, 5 (2018), 35--45.
[28]
P. Prabhu, A. Akel, L. M. Grupp, W.-K. S. Yu, G. E. Suh, E. Kan, and S. Swanson. 2011. Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations. In Trust and Trustworthy Computing, J. M. McCune, B. Balacheff, A. Perrig, A.-R. Sadeghi, A. Sasse, and Y. Beres (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 188--201.
[29]
K. Rahim, H. Tahir, and N. Ikram. 2018. Sensor Based PUF IoT Authentication Model for a Smart Home with Private Blockchain. In 2018 International Conference on Applied and Engineering Mathematics (ICAEM). 102--108.
[30]
S. Schurig. 2014. Public-Key Kryptographie mit Hilfe von SRAM PUFs. Bachelor's thesis. Technische Universität Darmstadt.
[31]
S. Schurig. 2017. Development of a User Interface and Implementation of Specific Software Tools for the Evaluation and Realization of PUFs With Respect to Security Applications. Master's thesis. Technische Universität Darmstadt.
[32]
A. Sengupta and S. Kundu. 2017. Guest Editorial -- Securing IoT Hardware: Threat Models and Reliable, Low-Power Design Solutions. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25, 12 (2017), 3265--3267.
[33]
M. Shiozaki, T. Kubota, T. Nakai, A. Takeuchi, T. Nishimura, and T. Fujino. 2015. Tamper-Resistant Authentication System with Side-Channel Attack Resistant AES and PUF Using MDR-ROM.In 2015 IEEE International Symposium on Circuits and Systems (ISCAS). 1462--1465.
[34]
K. Sok, J. N. Colin, and K. Po. 2018. Blockchain and Internet of Things: Opportunities and Challenges. In Proceedings of the Ninth International Symposium on Information and Communication Technology (SoICT 2018). ACM, New York, NY, USA, 150--154.
[35]
I. Stellios, P. Kotzanikolaou, M. Psarakis, C. Alcaraz, and J. Lopez. 2018. A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services. IEEE Communications Surveys & Tutorials 20, 4 (2018), 3453--3495.
[36]
Q. Tang, C. Zhou, W. Choi, G. Kang, J. Park, K. K. Parhi, and C. H. Kim. 2017. A DRAM Based Physical Unclonable Function Capable of Generating > 1032 Challenge Response Pairs per 1Kbit Array for Secure Chip Authentication. In 2017 IEEE Custom Integrated Circuits Conference (CICC). 1--4.
[37]
F. Tehranipoor. 2017. Design and Architecture of Hardware-Based Random Function Security Primitives. Ph.D. Dissertation. University of Connecticut (UConn). http://opencommons.uconn.edu/dissertations/1512
[38]
F. Tehranipoor. 2018. Towards Implementation of Robust and Low-Cost Security Primitives for Resource-Constrained IoT Devices. ArXiv e-prints (June 2018). arXiv:1806.05332 http://arxiv.org/abs/1806.05332
[39]
F. Tehranipoor, N. Karimian, P. A. Wortman, and J. A. Chandy. 2017. Investigation of the Internet of Things in Its Application to Low-Cost Authentication Within Healthcare. In IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI). Poster.
[40]
F. Tehranipoor, N. Karimian, P. A. Wortman, and J. A. Chandy. 2018. Low-Cost Authentication Paradigm for Consumer Electronics Within the Internet of Wearable Fitness Tracking Applications. In 2018 IEEE International Conference on Consumer Electronics (ICCE). 1--6.
[41]
F. Tian. 2016. An Agri-Food Supply Chain Traceability System for China Based on RFID & Blockchain Technology. In Service Systems and Service Management (ICSSSM), 2016 13th International Conference on. IEEE, 1--6.
[42]
F. Tian. 2017. A Supply Chain Traceability System for Food Safety Based on HACCP, Blockchain & Internet of Things. In Service Systems and Service Management (ICSSSM), 2017 International Conference on. IEEE, 1--6.
[43]
K. Toyoda, P. T. Mathiopoulos, I. Sasase, and T. Ohtsuki. 2017. A Novel Blockchain-Based Product Ownership Management System (POMS) for Anti-Counterfeits in the Post Supply Chain. IEEE Access 5 (2017), 17465--17477.
[44]
S. Venkatesan, S. S. Srivastava, and S. K. Shukla. 2017. Decentralized Authentication Scheme for IoT using the Blockchain Technology. In 2nd Advanced Workshop on Blockchain: Technology, Applications, Challenges.
[45]
O. Vermesan and P. Friess (Eds.). 2015. Building the Hyperconnected Society: Internet of Things Research and Innovation Value Chains, Ecosystems and Markets. River Publishers Series in Communications, Vol. 43. River Publishers, Aalborg Øst, Denmark.
[46]
H. Watanabe. 2018. Can Blockchain Protect Internet-of-Things? A New Concept to Allow Blockchain to Protect Internet-of-Things. ArXiv e-prints (July 2018). arXiv:1807.06357 http://arxiv.org/abs/1807.06357

Cited By

View all
  • (2024)Global supply chains security: a comparative analysis of emerging threats and traceability solutionsBenchmarking: An International Journal10.1108/BIJ-08-2023-0535Online publication date: 4-Mar-2024
  • (2024)Anonymous Federated Learning via Named-Data NetworkingFuture Generation Computer Systems10.1016/j.future.2023.11.009152:C(288-303)Online publication date: 4-Mar-2024
  • (2023)IoT and Blockchain Integration: Applications, Opportunities, and ChallengesNetwork10.3390/network30100063:1(115-141)Online publication date: 24-Jan-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
COINS '19: Proceedings of the International Conference on Omni-Layer Intelligent Systems
May 2019
241 pages
ISBN:9781450366403
DOI:10.1145/3312614
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 May 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Blockchain
  2. IoT
  3. PUF
  4. anti-counterfeiting
  5. hardware security
  6. internet of things
  7. physical unclonable function

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

COINS '19

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)35
  • Downloads (Last 6 weeks)1
Reflects downloads up to 14 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Global supply chains security: a comparative analysis of emerging threats and traceability solutionsBenchmarking: An International Journal10.1108/BIJ-08-2023-0535Online publication date: 4-Mar-2024
  • (2024)Anonymous Federated Learning via Named-Data NetworkingFuture Generation Computer Systems10.1016/j.future.2023.11.009152:C(288-303)Online publication date: 4-Mar-2024
  • (2023)IoT and Blockchain Integration: Applications, Opportunities, and ChallengesNetwork10.3390/network30100063:1(115-141)Online publication date: 24-Jan-2023
  • (2023)Decentralised Authentication Protocol for Devices & Users to Access Private Network Services Using Blockchain2023 33rd Conference of Open Innovations Association (FRUCT)10.23919/FRUCT58615.2023.10143051(46-53)Online publication date: 24-May-2023
  • (2023)Implementation of a Physically Unclonable Function using LEDs and LDRs2023 12th International Conference on Modern Circuits and Systems Technologies (MOCAST)10.1109/MOCAST57943.2023.10176623(1-4)Online publication date: 28-Jun-2023
  • (2023)Secure and Cost Effective IoT Authentication and Data Storage Framework using Blockchain NFT2023 32nd International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN58024.2023.10230124(1-7)Online publication date: Jul-2023
  • (2023)Deep Learning/PUF-based Item Identification for Supply Chain Management in a Distributed Ledger Framework2023 Fifth International Conference on Blockchain Computing and Applications (BCCA)10.1109/BCCA58897.2023.10338853(28-35)Online publication date: 24-Oct-2023
  • (2023)Robust Federated Learning for execution time-based device model identification under label-flipping attackCluster Computing10.1007/s10586-022-03949-w27:1(313-324)Online publication date: 2-Jan-2023
  • (2022)Investigation of the optimal method for generating and verifying the Smartphone’s fingerprint: A reviewJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2020.06.00734:5(1919-1932)Online publication date: May-2022
  • (2022)Sensor-based identification to detect counterfeit smartphones using BlockchainJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-022-03907-914:12(16521-16538)Online publication date: 7-Jun-2022
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media