The growing convergence among Information and Operation Technology worlds in modern Industrial Internet of Things (IIoT) systems is posing new security challenges, requiring the adoption of novel security mechanisms involving light architectures and protocols to cope with IIoT devices resource constraints. In this paper, we investigate the adoption of Physically Unclonable Functions (PUF) in the IIoT context, and propose the design of a PUF-based architecture (Pseudo-PUF), obtained by suitably combining a weak PUF and an encryption module, that can be successfully adopted to implement advanced security primitives while meeting the existing requirements of IIoT devices in terms of cost and resource demand. To demonstrate the feasibility of our proposal, we analyzed the overall quality of different Pseudo-PUF instances with respect to well-known PUF quality metrics, and found that it is possible to obtain good results with a negligible impact on the devices, thus making our approach suited to IIoT deployments.

On the adoption of Physically Unclonable Functions to secure IIoT devices / Barbareschi, M.; Casola, V.; De Benedictis, A.; La Montagna, E.; Mazzocca, N.. - In: IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS. - ISSN 1551-3203. - (2021), pp. 1-1. [10.1109/TII.2021.3059656]

On the adoption of Physically Unclonable Functions to secure IIoT devices

Barbareschi M.;Casola V.;De Benedictis A.;La Montagna E.;Mazzocca N.
2021

Abstract

The growing convergence among Information and Operation Technology worlds in modern Industrial Internet of Things (IIoT) systems is posing new security challenges, requiring the adoption of novel security mechanisms involving light architectures and protocols to cope with IIoT devices resource constraints. In this paper, we investigate the adoption of Physically Unclonable Functions (PUF) in the IIoT context, and propose the design of a PUF-based architecture (Pseudo-PUF), obtained by suitably combining a weak PUF and an encryption module, that can be successfully adopted to implement advanced security primitives while meeting the existing requirements of IIoT devices in terms of cost and resource demand. To demonstrate the feasibility of our proposal, we analyzed the overall quality of different Pseudo-PUF instances with respect to well-known PUF quality metrics, and found that it is possible to obtain good results with a negligible impact on the devices, thus making our approach suited to IIoT deployments.
2021
On the adoption of Physically Unclonable Functions to secure IIoT devices / Barbareschi, M.; Casola, V.; De Benedictis, A.; La Montagna, E.; Mazzocca, N.. - In: IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS. - ISSN 1551-3203. - (2021), pp. 1-1. [10.1109/TII.2021.3059656]
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11588/842648
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 20
  • ???jsp.display-item.citation.isi??? 15
social impact