Secure Authentication in Wireless IoT: Hamming Code Assisted SRAM PUF as Device Fingerprint
Florian Lehn, Pascal Ahr, Hans D. Schotten
TLDR
This paper proposes a secure, threshold-based authentication for IoT devices using Hamming code-assisted SRAM PUFs to achieve reliable, hardware-rooted fingerprints.
Key contributions
- Proposes a threshold-based authentication for constrained IIoT devices using SRAM PUFs.
- Addresses SRAM PUF unreliability with a resource-efficient Hamming code EC and Temporal Majority Voting.
- Quantifies the threshold gap between reliability and security for resource-aware calibration.
- Establishes a comprehensive design space for PUF EC, balancing quality against resource constraints.
Why it matters
This paper offers a practical and secure authentication method for resource-constrained IoT devices, leveraging hardware-rooted fingerprints. It tackles the inherent unreliability of SRAM PUFs through efficient error correction, providing crucial design guidance for balancing security, reliability, and resource constraints in future implementations.
Original Abstract
Static Random Access Memory (SRAM) Physically Unclonable Functions (PUFs) make use of intrinsic manufacturing variations in memory cells to derive device-unique responses. Employing such hardware-rooted fingerprints for authentication, this work demonstrates a threshold-based authentication proof of concept for constrained Industrial Internet of Things (IIoT) devices. The proposed scheme can reliably cap the the post-authentication bit error rate (BER) below 1 %. Inherent SRAM PUF unreliability is addressed by a resource-efficient combination of Hamming code (HC) Error Correction (EC) and Temporal Majority Voting (TMV). Increasing HC redundancy or TMV count significantly reduces the BER, albeit with diminishing returns and increasingly prohibitive computational overhead. Furthermore, this work quantifies the threshold gap between strict reliability and security constraints. This gap is reframed as a design budget which enables the resource-aware calibration of the acceptance threshold, PUF response length, and stabilization technique, without violating designed-for error limits. Larger responses make reliability optimizations increasingly obsolete. This comparative analysis establishes a comprehensive design space for PUF EC, guiding future implementations in balancing EC quality against resource constraints such as computational demand, power consumption, and implementation complexity.
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.