ABSTRACT

This chapter explores the unique challenges of secure Internet of Things (IoT) implementations, especially from the perspective of hardware security, and their solutions. The major challenge for networked systems is how to handle billions of devices generating volumes of real-time data and their security aspects. The designer is supposed to build the circuit in a way so that the security proofs can be verified easily from it at the consumer side, to detect if the Internet Protocol has been modified. Physically Unclonable Function (PUF) circuits have recently attracted plenty of attention as a promising hardware security primitive with diverse applications, including IoT devices. PUF attacks are mainly classified into two main categories: statistical attacks and modeling attacks. Modeling robustness of a strong PUF design relies on the complexity in its challenge-response behavior. The modeling attacks are the most potent threats to strong PUFs.