In this work, we propose a secure bootstrap protocol for Cyber-Physical Systems (CPS) that compose IIoT Networks. The main contribution of our work is a solution to establish secure communication channels in CPSs through a protocol that enables authentication and confidentiality without the need for constant external verification or pre-stored keys. The proposed protocol relies on the unclonable property of Physical Unclonable Functions (PUF) to build authentication tokens to establish trust between the devices, the gateway, and the Cloud. Devices registration is triggered by an authenticated operator, which informs the PUF responses of the respective device to an External Security Agent (ESA) alongside the identification of the target gateway. ESA and gateway are mutually authenticated using a Certificate Authority and communicate via a secure channel built with HTTPS. The device registration relies on the properties of PUFs to avoid the establishment of security channels via key agreement protocols (e.g., ECDH) and the usage of pre-stored keys. In this way, the PUF challenge response can be used as a secret between the gateway and the device to build trust and establish a secure channel. The presented solution addresses attacks like message replication, Man-in-the-Middle (MITM), and nodes impersonation while supporting gateway integrity check solutions and being free of pre-stored key vulnerabilities.

A PUF-based Secure Bootstrap Protocol for Cyber-Physical System Networks

Hoffmann, Jose Luis Conradi
Primo
;
2022-01-01

Abstract

In this work, we propose a secure bootstrap protocol for Cyber-Physical Systems (CPS) that compose IIoT Networks. The main contribution of our work is a solution to establish secure communication channels in CPSs through a protocol that enables authentication and confidentiality without the need for constant external verification or pre-stored keys. The proposed protocol relies on the unclonable property of Physical Unclonable Functions (PUF) to build authentication tokens to establish trust between the devices, the gateway, and the Cloud. Devices registration is triggered by an authenticated operator, which informs the PUF responses of the respective device to an External Security Agent (ESA) alongside the identification of the target gateway. ESA and gateway are mutually authenticated using a Certificate Authority and communicate via a secure channel built with HTTPS. The device registration relies on the properties of PUFs to avoid the establishment of security channels via key agreement protocols (e.g., ECDH) and the usage of pre-stored keys. In this way, the PUF challenge response can be used as a secret between the gateway and the device to build trust and establish a secure channel. The presented solution addresses attacks like message replication, Man-in-the-Middle (MITM), and nodes impersonation while supporting gateway integrity check solutions and being free of pre-stored key vulnerabilities.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11568/1299870
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? 1
social impact