Font Size: a A A

Security fusion: A new security architecture for resource-constrained embedded environments

Posted on:2013-09-03Degree:Ph.DType:Thesis
University:Southern Methodist UniversityCandidate:Al Ibrahim, OmarFull Text:PDF
GTID:2458390008472203Subject:Computer Science
Abstract/Summary:
There is a huge demand for embedded systems in remote surveillance and tracking. However, in order for such technologies to gain wide acceptance in industry, there needs to be strong security integrated into them. Traditional cryptographic schemes are infeasible due to hardware, computation, and power constraints. To that end, we introduce a new paradigm in security, namely security fusion. In this approach, strong security properties are synthesized from weaker point-to-point properties, thereby minimizing the resource requirements at each node without compromising the system-level security.;In this thesis, we describe a state machine-based architecture and pertinent protocols to realize security fusion. We evaluate the proposed architecture against various types of attacks. Two fusion techniques are proposed in this architecture. The first technique is based on majority logic. The second technique is based on state machine compositions. Furthermore, we describe an approach of unilateral key deployment using emerging device-centric technologies, in particular, Physical Unclonable Functions (PUFs). We also describe the notion of a system-level PUF to capture the component-level integrity of systems. To achieve this goal, we develop a novel protocol primitive, namely Overt-Covert Challenge-Response Authentication (OCCRA), to enable scalable, reliable and efficient PUF-based authentication and key distribution.
Keywords/Search Tags:Security, Architecture
Related items