Affiliation:
1. Laboratoire de Conception et d'Intégration des Systèmes, France
Abstract
Connected devices have become increasingly prevalent in the daily lives of human users, forming the basis of smart spaces designed to provide valuable services, such as remote control of users' homes or efficient energy usage in large buildings. However, they also pose significant challenges, particularly in terms of security. This chapter aims to clearly define these challenges, focusing on device authentication, data confidentiality, and integrity. It begins by outlining a classical architecture for connecting devices and applications in commercial or industrial smart spaces. Various facets of this framework are explored, emphasizing the security requisites. The authors then delve into several key points of this architecture and explore the associated security needs. Current technologies are introduced, along with proof of concept from recent research work, including the promising physically unclonable function (PUF) technology, which offers a cost-effective hardware primitive for enhancing security in connected devices.
Reference35 articles.
1. Bhargava, M., & Mai, K. (2014). An efficient reliable PUF-based cryptographic key generator in 65nm CMOS. In Design, Automation & Test in Europe Conference & Exhibition, DATE 2014, Dresden, Germany, March 24-28, 2014. European Design and Automation Association.
2. Boeyen, S., Santesson, S., Polk, T., Housley, R., Farrell, S., & Cooper, D. (2008). Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280.
3. Delvaux, J., Peeters, R., Gu, D., & Verbauwhede, I. (2015). A Survey on Lightweight Entity Authentication with Strong PUFs. Academic Press.
4. Refillable PUF authentication protocol for constrained devices
5. DworkinM.BarkerE.NechvatalJ.FotiJ.BasshamL.RobackE.DrayJ. (2001). Advanced Encryption Standard. AES.