Title | ||
---|---|---|
12.3 Exploring PUF-Controlled PA Spectral Regrowth for Physical-Layer Identification of IoT Nodes |
Abstract | ||
---|---|---|
It is projected that 75 billion Internet-of-Things (IoT) devices will be deployed for applications such as wearable electronics and smart home by 2025. Securing IoT devices is one of the most significant barriers we need to overcome for large-scale IoT adoption. Conventional wireless security has been implemented solely using upper-layer cryptography [1]. Unfortunately, IoT nodes are often energy-constrained and may not have enough computational resources to implement advanced asymmetric cryptographic algorithms and public-key-infrastructures (PKI) [2]-[3]. To overcome this challenge, there has been growing interest in leveraging the physical impairments of the radios that are bonded to specific TX for secure identification [4] -[6], a.k.a. RF fingerprinting. If Bob (the RX) has sufficient sensitivity, it can identify Alice (the legitimate TX) and the malicious impersonator during demodulation based on their inherent radio signatures, similar to how we distinguish different people based on their unique voice signatures (Fig. 12.3.1). As the device-dependent radio impairments come from process variation, it is challenging for impersonators to forge in practice. In addition, unlike conventional identification approach that device IDs are inserted in preambles and checked only once a while, RF fingerprinting enables continuous identification at any moment during communication, leading to a tighter bond between the data packet and device. |
Year | DOI | Venue |
---|---|---|
2021 | 10.1109/ISSCC42613.2021.9365941 | 2021 IEEE International Solid- State Circuits Conference (ISSCC) |
Keywords | DocType | Volume |
PA spectral regrowth,physical-layer identification,IoT nodes,Internet-of-Things devices,wearable electronics,smart home,IoT devices,large-scale IoT adoption,upper-layer cryptography,computational resources,advanced asymmetric cryptographic algorithms,public-key-infrastructures,physical impairments,secure identification,RF fingerprinting,Alice,inherent radio signatures,unique voice signatures,device-dependent radio impairments,conventional identification approach that device IDs,data packet,PUF | Conference | 64 |
ISSN | ISBN | Citations |
0193-6530 | 978-1-7281-9550-6 | 0 |
PageRank | References | Authors |
0.34 | 0 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Qiang Zhou | 1 | 0 | 0.34 |
Yan He | 2 | 6 | 2.18 |
Kuiyuan Yang | 3 | 148 | 20.89 |
Taiyun Chi | 4 | 43 | 9.85 |