| Literature DB >> 30297609 |
Rosario Arjona1, Miguel A Prada-Delgado2, Javier Arcenegui3, Iluminada Baturone4.
Abstract
Nowadays, there is an increasing number of cameras placed on mobile devices connected to the Internet. Since these cameras acquire and process sensitive and vulnerable data in applications such as surveillance or monitoring, security is essential to avoid cyberattacks. However, cameras on mobile devices have constraints in size, computation and power consumption, so that lightweight security techniques should be considered. Camera identification techniques guarantee the origin of the data. Among the camera identification techniques, Physically Unclonable Functions (PUFs) allow generating unique, distinctive and unpredictable identifiers from the hardware of a device. PUFs are also very suitable to obfuscate secret keys (by binding them to the hardware of the device) and generate random sequences (employed as nonces). In this work, we propose a trusted camera based on PUFs and standard cryptographic algorithms. In addition, a protocol is proposed to protect the communication with the trusted camera, which satisfies authentication, confidentiality, integrity and freshness in the data communication. This is particularly interesting to carry out camera control actions and firmware updates. PUFs from Static Random Access Memories (SRAMs) are selected because cameras typically include SRAMs in its hardware. Therefore, additional hardware is not required and security techniques can be implemented at low cost. Experimental results are shown to prove how the proposed solution can be implemented with the SRAM of commercial Bluetooth Low Energy (BLE) chips included in the communication module of the camera. A proof of concept shows that the proposed solution can be implemented in low-cost cameras.Entities:
Keywords: SRAM PUFs; camera identification; camera security; cameras on mobile devices; physically unclonable functions (PUFs); trusted cameras
Year: 2018 PMID: 30297609 PMCID: PMC6210058 DOI: 10.3390/s18103352
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Block diagram of a trusted camera based on SRAM PUFs.
Figure 2Proposed lightweight protocol.
Figure 3Fractional hamming distances obtained from the PUF responses (a) considering all SRAM cells and (b) considering only STB cells.
Figure 4Fractional Hamming Distances obtained from the PUF responses considering only ID cells.
Figure 5Inter Fractional Hamming Distance of Helper Data obtained: (a) with the same secret key for all the cameras; (b) with different key for each camera.
Figure 6Fractional Hamming Distances between the correct secret key and the secret keys reconstructed by genuine cameras (on the left) and by impostor cameras (on the right).
Comparison with other proposals using hardware-based PUFs.
| Proposal | Worst-case Average Intra HD (%) | Average Inter HD (%) | Results | Specific Hardware |
|---|---|---|---|---|
| Frame-based image sensor [ | 12 ( | 49.37 | Experimental, with variations of nominal conditions | Required |
| Event-based image sensor [ | 3.70 | 49.96 | Simulated, with variations of nominal conditions | Required |
| Trusted visual sensor node [ | 1.40 | ~49.0 | Experimental, with no variations of nominal conditions | Required |
| This work | 2.61 | 49.67 | Experimental, with variations of nominal conditions | Not required |
Figure 7Convergence of the minimum entropy to its asymptotic value for responses of RND cells.
Basic NIST tests evaluated for the sequences provided by RND cells.
| C1 | C2 | C3 | C4 | C5 | C6 | C7 | C8 | C9 | C10 | P-value | Proportion | Statistical Test |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 12 | 9 | 11 | 7 | 6 | 20 | 8 | 10 | 6 | 11 | 0.085587 | 96/100 | Frequency |
| 9 | 10 | 6 | 9 | 8 | 12 | 3 | 17 | 15 | 11 | 0.090936 | 96/100 | CumulativeSums(fw) |
| 10 | 7 | 8 | 6 | 7 | 22 | 4 | 9 | 12 | 15 | 0.003201 | 96/100 | CumulativeSums(bw) |
| 15 | 8 | 11 | 12 | 10 | 9 | 9 | 14 | 10 | 6 | 0.494392 | 98/100 | Runs |
Figure 8(a) prototype of a trusted camera; (b) original image acquired; (c) authenticated encrypted image.