BLOCKCHAIN-BASED AUTHENTICATION FOR IIOT DEVICES WITH PUF
Presented By
Guided By
Jerin T Varghese
Prof Bino Thomas
SJC19CS056
1
COURSE OUTCOME
o CO-1 : Identify academic documents from the literature which are related to her/his areas of interest
(Cognitive knowledge level: Apply).
o CO-2 : Read and apprehend an academic document from the literature which is related to her/ his
areas of interest (Cognitive knowledge level: Analyze).
o CO-3 : Prepare a presentation about an academic document (Cognitive knowledge level: Create).
o CO-4 : Give a presentation about an academic document (Cognitive knowledge level: Apply).
o CO-5 : Prepare a technical report (Cognitive knowledge level: Create).
2
CONTENT
INTRODUCTION SYSTEM MODEL
PUF’s CONCLUSION
RELATED WORK REFERENCES
3
INTRODUCTION
4
IIOT
• The industrial internet of things (IIoT) refers to the extension and
use of the internet of things (IoT) in industrial sectors and
applications.
• With a strong focus on machine-to-machine (M2M) communication,
big data, and machine learning, the IIoT enables industries and
enterprises to have better efficiency and reliability in their
operations.
5
BLOCKCHAIN
• A blockchain is a type of distributed ledger
technology that consists of growing list of
records, called blocks, that are securely linked
together using cryptography.
• Each block contains a cryptographic hash of the
previous block, a timestamp, and transaction
data
• As the backbone technology of cryptocurrencies,
blockchain is developing rapidly since it has
been introduced, which has been applied to
several fields.
6
• With the gradual development of blockchain technology it is a common practice to use blockchain to
manage devices in the industrial Internet environment.
• The storage of industrial data on blockchain can accelerate the efficient flow of industrial Internet
systems, and make data management decentralized,
• It enhances the reliability of data in the entire industrial system. While, the authentication process for
industrial device of blockchain network data management is easily ignored.
7
PUFS
8
PUF
• Physically unclonable functions (PUFs) are used in hardware security primarily for chip identification and
authentication.
• Every chip ever produced has natural process variations that make it physically unique from one another
• Differences in threshold voltages due to microscopically small variations between transistors
9
PUF
Features of the PUFs :
Unclonabili Randomnes
ty s
Uniqueness Stability
10
PUF
11
Working Mechanism of PUF
𝑟 = 𝑃𝑈𝐹(𝑐 )
where 𝑐 is a challenge and the output 𝑟 is called response. For a PUF circuit, it generates a specific response 𝑟
only when it was input a challenge 𝑐, which is called a challenge-response pair (CRP).
12
SRAM BASED PUF
• It depends on the difference of the threshold voltages of its transistors.
• Even the smallest differences will be amplified and push the SRAM cell into one of two
stable states.
• Its PUF behavior is therefore much more stable than the underlying threshold voltages,
13
RELATED WORKS
PUF BASED AUTHENTICATION
• The authentication with PUFs consists of two phases, namely, registration phase and authentication
phase.
• In the registration phase, the devices execute the PUFs to obtain and store the CRPs.
• In the authentication phase, the authenticator picks a random challenge queried before and sends it to
the device, and then compares the received response and the response in the database to determine
whether the device passes the authentication or not.
14
SYSTEM MODEL
15
The system is composed of four parts
IIoT devices
Certificate authority (CA)
Blockchain
Authentication Committee
16
IIoT devices All the IIoT devices involved in the protocol are embedded with multiple
PUFs, which are used for device authentication
CA constructs PUF Models by obtaining several CRPs through machine
Certificate authority (CA) learning. CA distributes the PUF Models to 𝑛 different nodes, where each
node holds a PUF Model of the device
Blockchain is used to record all authentication results and transactions
Blockchain
generated over P2P network,
The participant peers holding PUF Models constitute an authentication
Blockchain committee in the P2P network
17
RESULT
From the results of time consumption, the
authentication of a device is relatively efficient in
the IIoT system, which could be feasible to deploy
the authentication scheme in real IIoT scenarios
18
CONCLUSION
From this paper, we learned the system model for the blockchain-based IIoT device authentication protocol,
and gave a concrete scheme for blockchain-based IIoT device authentication which is based on SRAM PUF
and The former has good compatibility and can be directly applied to existing devices, and the has stronger
security guarantee.
The implementation results show that the authentication success rate is high, which demonstrates that our
proposal is feasible in practice.
19
REFERENCES
• Z. Gu, M. Qiu, Introduction to the special issue on embedded artificial
intelligence and smart computing, J. Syst. Archit. 84 (2018) 1.
• L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, I. Verbauwhede, Publickey
cryptography for rfid-tags, in: Fifth Annual IEEE PerCom Workshops USA,
2007, pp. 217–222.
• Y. Yilmaz, S.R. Gunn, B. Halak, Lightweight puf-based authentication protocol
for iot devices, in: 3rd IEEE IVSW, 2018, pp. 38–43.
• Y. Yilmaz, S.R. Gunn, B. Halak, Lightweight puf-based authentication protocol
for iot devices, in: 3rd IEEE IVSW, 2018, pp. 38–43.
20
THANK YOU!
21