1
|
Son J, Jeon J, Cho K, Kim S. Generation and Storage of Random Voltage Values via Ring Oscillators Comprising Feedback Field-Effect Transistors. NANOMATERIALS (BASEL, SWITZERLAND) 2024; 14:562. [PMID: 38607097 PMCID: PMC11013403 DOI: 10.3390/nano14070562] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/19/2024] [Revised: 03/20/2024] [Accepted: 03/21/2024] [Indexed: 04/13/2024]
Abstract
In this study, we demonstrate the generation and storage of random voltage values using a ring oscillator consisting of feedback field-effect transistors (FBFETs). This innovative approach utilizes the logic-in-memory function of FBFETs to extract continuous output voltages from oscillatory cycles. The ring oscillator exhibited uniform probability distributions of 51.6% for logic 0 and 48.4% for logic 1. The generation of analog voltages provides binary random variables that are stored for over 5000 s. This demonstrates the potential of the ring oscillator in advanced physical functions and true random number generator technologies.
Collapse
Affiliation(s)
| | | | - Kyoungah Cho
- Department of Electrical Engineering, Korea University, 145 Anam-ro, Seongbuk-gu, Seoul 02841, Republic of Korea; (J.S.); (J.J.)
| | - Sangsig Kim
- Department of Electrical Engineering, Korea University, 145 Anam-ro, Seongbuk-gu, Seoul 02841, Republic of Korea; (J.S.); (J.J.)
| |
Collapse
|
2
|
Sun DZ, Gao YN, Tian Y. On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices. SENSORS (BASEL, SWITZERLAND) 2023; 23:6559. [PMID: 37514853 PMCID: PMC10383870 DOI: 10.3390/s23146559] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/10/2023] [Revised: 07/05/2023] [Accepted: 07/13/2023] [Indexed: 07/30/2023]
Abstract
Recently, Roy et al. proposed a physically unclonable function (PUF)-based authentication and key exchange protocol for Internet of Things (IoT) devices. The PUF protocol is efficient, because it integrates both the Node-to-Node (N2N) authentication and the Node-to-Server (N2S) authentication into a standalone protocol. In this paper, we therefore examine the security of the PUF protocol under the assumption of an insider attack. Our cryptanalysis findings are the following. (1) A legitimate but malicious IoT node can monitor the secure communication among the server and any other IoT nodes in both N2N authentication and N2S authentication. (2) A legitimate but malicious IoT node is able to impersonate a target IoT node to cheat the server and any other IoT nodes in N2N authentication and the server in N2S authentication, respectively. (3) A legitimate but malicious IoT node can masquerade as the server to cheat any other target IoT nodes in both N2N authentication and N2S authentication. To the best of our knowledge, our work gives the first non-trivial concrete security analysis for the PUF protocol. In addition, we employ the automatic verification tool of security protocols, i.e., Scyther, to confirm the weaknesses found in the PUF protocol. We finally consider how to prevent weaknesses in the PUF protocol.
Collapse
Affiliation(s)
- Da-Zhi Sun
- Tianjin Key Laboratory of Advanced Networking (TANK), College of Intelligence and Computing, Tianjin University, Tianjin 300350, China
| | - Yi-Na Gao
- Tianjin Key Laboratory of Advanced Networking (TANK), College of Intelligence and Computing, Tianjin University, Tianjin 300350, China
| | - Yangguang Tian
- Department of Computer Science, University of Surrey, Surrey GU2 7XH, UK
| |
Collapse
|
3
|
Zhou D, Xu K, Lv Z, Yang J, Li M, He F, Xu G. Intelligent Manufacturing Technology in the Steel Industry of China: A Review. SENSORS (BASEL, SWITZERLAND) 2022; 22:8194. [PMID: 36365891 PMCID: PMC9658665 DOI: 10.3390/s22218194] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/22/2022] [Revised: 10/21/2022] [Accepted: 10/24/2022] [Indexed: 06/16/2023]
Abstract
Intelligent manufacturing, defined as the integration of manufacturing with modern information technologies such as 5G, digitalization, networking, and intelligence, has grown in popularity as a means of boosting the productivity, intelligence, and flexibility of traditional manufacturing processes. The steel industry is a necessary support for modern life and economic development, and the Chinese steel industry's capacity has expanded to roughly half of global production. However, the Chinese steel industry is now confronted with high labor costs, massive carbon emissions, a low level of intelligence, low production efficiency, and unstable quality control. Therefore, China's steel industry has launched several large-scale intelligent manufacturing initiatives to improve production efficiency, product quality, manual labor intensity, and employee working conditions. Unfortunately, there is no comprehensive overview of intelligent manufacturing in China's steel industry. We began this research by summarizing the construction goals and overall framework for intelligent manufacturing of the steel industry in China. Following that, we offered a brief review of intelligent manufacturing for China's steel industry, as well as descriptions of two typical intelligent manufacturing models. Finally, some major technologies employed for intelligent production in China's steel industry were introduced. This research not only helps to comprehend the development model, essential technologies, and construction techniques of intelligent manufacturing in China's steel industry, but it also provides vital inspiration for the manufacturing industry's digital and intelligence updates and quality improvement.
Collapse
Affiliation(s)
- Dongdong Zhou
- Collaborative Innovation Center of Steel Technology, University of Science and Technology Beijing, 30 Xueyuan Road, Haidian District, Beijing 100083, China
- Yangjiang Alloy Material Laboratory, 1 Luoqin Road, Jiangcheng District, Yangjiang 529500, China
| | - Ke Xu
- Collaborative Innovation Center of Steel Technology, University of Science and Technology Beijing, 30 Xueyuan Road, Haidian District, Beijing 100083, China
- Yangjiang Alloy Material Laboratory, 1 Luoqin Road, Jiangcheng District, Yangjiang 529500, China
| | - Zhimin Lv
- Collaborative Innovation Center of Steel Technology, University of Science and Technology Beijing, 30 Xueyuan Road, Haidian District, Beijing 100083, China
| | - Jianhong Yang
- School of Mechanical Engineering, University of Science and Technology Beijing, 30 Xueyuan Road, Haidian District, Beijing 100083, China
| | - Min Li
- Collaborative Innovation Center of Steel Technology, University of Science and Technology Beijing, 30 Xueyuan Road, Haidian District, Beijing 100083, China
| | - Fei He
- Collaborative Innovation Center of Steel Technology, University of Science and Technology Beijing, 30 Xueyuan Road, Haidian District, Beijing 100083, China
| | - Gang Xu
- Collaborative Innovation Center of Steel Technology, University of Science and Technology Beijing, 30 Xueyuan Road, Haidian District, Beijing 100083, China
| |
Collapse
|
4
|
LPWAN Key Exchange: A Centralised Lightweight Approach. SENSORS 2022; 22:s22135065. [PMID: 35808559 PMCID: PMC9269823 DOI: 10.3390/s22135065] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/19/2022] [Revised: 06/22/2022] [Accepted: 06/24/2022] [Indexed: 02/05/2023]
Abstract
The Internet of Things (IoT) is one of the fastest emerging technologies in the industry. It includes diverse applications with different requirements to provide services to users. Secure, low-powered, and long-range transmissions are some of the most vital requirements in developing IoT applications. IoT uses several communication technologies to fulfill transmission requirements. However, Low Powered Wide Area Networks (LPWAN) transmission standards have been gaining attention because of their exceptional low-powered and long-distance transmission capabilities. The features of LPWAN transmission standards make them a perfect candidate for IoT applications. However, the current LPWAN standards lack state-of-the-art security mechanism s because of the limitations of the IoT devices in energy and computational capacity. Most of the LPWAN standards, such as Sigfox, NB-IoT, and Weightless, use static keys for node authentication and encryption. LoRaWAN is the only LPWAN technology providing session key mechanisms for better security. However, the session key mechanism is vulnerable to replay attacks. In this paper, we propose a centralized lightweight session key mechanism for LPWAN standards using the Blom-Yang key agreement (BYka) mechanism. The security of the session key mechanism is tested using the security verification tool Scyther. In addition, an energy consumption model is implemented on the LoRaWAN protocol using the NS3 simulator to verify the energy depletion in a LoRaWAN node because of the proposed session key mechanisms. The proposed session key is also verified on the Mininet-WiFi emulator for its correctness. The analysis demonstrates that the proposed session key mechanism uses a fewer number of transmissions than the existing session key mechanisms in LPWAN and provides mechanisms against replay attacks that are possible in current LPWAN session key schemes.
Collapse
|