Advertisement

The IoT Identification Procedure Based on the Degraded Flash Memory Sector

  • Sergey VladimirovEmail author
  • Ruslan Kirichek
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10531)

Abstract

The article presents general principles of IoT identification on the basis of the degraded bucket of NOR flash memory used in network devices for storing microprograms. We proposed the identification procedure based on the sector of forcibly degraded flash memory and considered variants of its application for identifying network devices. The proposed identification method can be used both on the basis of chips already existing in network devices and on the basis of embedded units specially designed for identification.

Keywords

Internet of things IoT Identification Information security Flash memory 

Notes

Acknowledgments

The publication was financially supported by the Ministry of Education and Science of the Russian Federation (the Agreement number 02.a03.21.0008).

References

  1. 1.
    Kirichek, R., Koucheryavy, A.: Internet of Things laboratory test bed. In: Zeng, Q.-A. (ed.) Wireless Communications, Networking and Applications. LNEE, vol. 348, pp. 485–494. Springer, New Delhi (2016). doi: 10.1007/978-81-322-2580-5_44 CrossRefGoogle Scholar
  2. 2.
    Kirichek, R., Kulik, V., Koucheryavy, A.: False clouds for Internet of Things and methods of protection. In: IEEE 18th International Conference on Advanced Communication Technology: ICACT 2016, Phoenix Park, Korea, pp. 201–205 (2016)Google Scholar
  3. 3.
    Vermesan, O., Friess, P. (eds.): Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems. River Publishers, Aalborg (2013)Google Scholar
  4. 4.
    Russell, B., Van Duren, D.: Practical Internet of Things Security. Packt Publishing, Birmingham (2016)Google Scholar
  5. 5.
    Dhanjani, N.: Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts. O’Reilly Media, Sebastopol (2015)Google Scholar
  6. 6.
    Hu, F. (ed.): Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations. CRC Press, Boca Raton (2016)Google Scholar
  7. 7.
    Leloglu, E.: A review of security concerns in Internet of Things. J. Comput. Commun. 5, 121–136 (2017)CrossRefGoogle Scholar
  8. 8.
    Soldatos, J., Yuming, G. (eds.): Internet of Things. EU-China Joint White Paper on Internet-of-Things Identification. European Research Cluster on the Internet of Things (2014)Google Scholar
  9. 9.
    Hegde, A.: MAC spoofing detection and prevention. Int. J. Adv. Res. Comput. Commun. Eng. 5(1), 229–232 (2016)MathSciNetGoogle Scholar
  10. 10.
    DeJean, G., Kirovski, D.: RF-DNA: radio-frequency certificates of authenticity. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 346–363. Springer, Heidelberg (2007). doi: 10.1007/978-3-540-74735-2_24 CrossRefGoogle Scholar
  11. 11.
    Wang, Y., et al.: Flash memory for ubiquitous hardware security functions: true random number generation and device fingerprints. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy. IEEE Computer Society, Washington, 20–25 May 2012. doi: 10.1109/SP.2012.12
  12. 12.
    Jia, S., Xia, L., Wang, Z., Lin, J., Zhang, G., Ji, Y.: Extracting robust keys from NAND flash physical unclonable functions. In: Lopez, J., Mitchell, C.J. (eds.) ISC 2015. LNCS, vol. 9290, pp. 437–454. Springer, Cham (2015). doi: 10.1007/978-3-319-23318-5_24 CrossRefGoogle Scholar
  13. 13.
    Jakobsson, M., Johansson, K.-A.: Unspoofable Device Identity Using NAND Flash Memory (2010). http://www.securityweek.com/unspoofable-device-identity-using-nand-flash-memory. Accessed 1 May 2017
  14. 14.
    Bez, R., Camerlenghi, E., Modelli, A., Visconti, A.: Introduction to flash memory. Proc. IEEE 91(4), 489–502 (2003). doi: 10.1109/JPROC.2003.811702 CrossRefGoogle Scholar
  15. 15.
    Tal, A.: Two Flash Technologies Compared: NOR vs NAND. 91-SR-012-04-8 L REV. 1.0. M-Systems Flash Disk Pioneers. Newark (2002)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.The Bonch-Bruevich State University of TelecommunicationsSt. PetersburgRussian Federation
  2. 2.Peoples’ Friendship University of Russia (RUDN University)MoscowRussian Federation

Personalised recommendations