<doi_batch xmlns="http://www.crossref.org/schema/4.4.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" version="4.4.0"><head><doi_batch_id>21811929-9ab4-46d8-a198-b17d2e8e04c8</doi_batch_id><timestamp>20240617064316346</timestamp><depositor><depositor_name>wseas:wseas</depositor_name><email_address>mdt@crossref.org</email_address></depositor><registrant>MDT Deposit</registrant></head><body><journal><journal_metadata language="en"><full_title>WSEAS TRANSACTIONS ON SYSTEMS AND CONTROL</full_title><issn media_type="electronic">2224-2856</issn><issn media_type="print">1991-8763</issn><archive_locations><archive name="Portico"/></archive_locations><doi_data><doi>10.37394/23203</doi><resource>http://wseas.org/wseas/cms.action?id=4073</resource></doi_data></journal_metadata><journal_issue><publication_date media_type="online"><month>1</month><day>17</day><year>2024</year></publication_date><publication_date media_type="print"><month>1</month><day>17</day><year>2024</year></publication_date><journal_volume><volume>19</volume><doi_data><doi>10.37394/23203.2024.19</doi><resource>https://wseas.com/journals/sac/2024.php</resource></doi_data></journal_volume></journal_issue><journal_article language="en"><titles><title>Enhanced Device-Specific Encryption for IoT: Leveraging Microcontroller UIDs and Dedicated Cryptographic Hardware</title></titles><contributors><person_name sequence="first" contributor_role="author"><given_name>Edwar</given_name><surname>Jacinto</surname><affiliation>Facultad Tecnológica Universidad Distrital Francisco José de Caldas Carrera 7 No. 40b-53, Bogotá COLOMBIA</affiliation></person_name><person_name sequence="additional" contributor_role="author"><given_name>Fredy</given_name><surname>Martinez</surname><affiliation>Facultad Tecnológica Universidad Distrital Francisco José de Caldas Carrera 7 No. 40b-53, Bogotá COLOMBIA</affiliation></person_name><person_name sequence="additional" contributor_role="author"><given_name>Fernando</given_name><surname>Martinez</surname><affiliation>Facultad Tecnológica Universidad Distrital Francisco José de Caldas Carrera 7 No. 40b-53, Bogotá COLOMBIA</affiliation></person_name></contributors><jats:abstract xmlns:jats="http://www.ncbi.nlm.nih.gov/JATS1"><jats:p>In this research, we introduce an advanced encryption system that aligns with global cryptographic standards, emphasizing device identification and adherence to the PKCS#5 standard. Instead of relying on pseudorandom numbers, our innovative key expansion approach capitalizes on the microcontroller’s UID, merged with the session key, and subjected to a repetitive Digest algorithm, thus achieving a dimension apt for asymmetric encryption protocols. Leveraging the dedicated hardware support for the SHA-256 algorithm, we compute a distinctive digest through varying iteration counts, gauging computational prowess. We employ AES128 for data encryption, given its ubiquity and its hardware inclusion in the NXP FDRM-K82F device. This device boasts a Cryptographic Acceleration Unit (CAU), optimizing processing durations and memory consumption, paving the way for autonomous cryptographic systems with viable throughput rates tailored for IoT scenarios. The microcontroller’s specialized LP Trusted Cryptography (LTC) hardware champions diverse algorithms, enriched with atomic directives. We integrate Physical Unclonable Functions (PUFs) into our design, harnessing inherent manufacturing disparities to spawn unique, hard-to-replicate keys. The key expansion is rooted in the PKI infrastructure, sourcing a distinct number per device from the FRDM-K82F’s UID and culminating in a 256-bit Digest, employed as the AES-CBC key and Initialization Vector (I.V.). Our empirical assessment underscores the superior efficiency of the CAU against counterparts lacking such modules, showcasing remarkable boosts in performance and diminished encryption/decryption intervals. Consequently, our pioneering approach emerges as a prime candidate for fortifying IoT applications.</jats:p></jats:abstract><publication_date media_type="online"><month>6</month><day>17</day><year>2024</year></publication_date><publication_date media_type="print"><month>6</month><day>17</day><year>2024</year></publication_date><pages><first_page>177</first_page><last_page>184</last_page></pages><publisher_item><item_number item_number_type="article_number">19</item_number></publisher_item><ai:program xmlns:ai="http://www.crossref.org/AccessIndicators.xsd" name="AccessIndicators"><ai:free_to_read start_date="2024-06-17"/><ai:license_ref applies_to="am" start_date="2024-06-17">https://wseas.com/journals/sac/2024/a385103-015(2024).pdf</ai:license_ref></ai:program><archive_locations><archive name="Portico"/></archive_locations><doi_data><doi>10.37394/23203.2024.19.19</doi><resource>https://wseas.com/journals/sac/2024/a385103-015(2024).pdf</resource></doi_data><citation_list><citation key="ref0"><doi>10.14569/ijacsa.2020.0110189</doi><unstructured_citation>R. Bharathi and N. Parvatham, “Lea-siot: Hardware architecture of lightweight encryption algorithm for secure iot on fpga platform,” (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 11, no. 1, pp. 720–725, 2020, ISSN: 2156-5570. DOI: 10.14569/IJACSA.2020.0110189. </unstructured_citation></citation><citation key="ref1"><doi>10.14569/ijacsa.2021.0120642</doi><unstructured_citation>K. Gurumanapalli and N. Muthuluru, “Feistel network assisted dynamic keying based spn lightweight encryption for iot security,” 6, vol. 12, 2021. </unstructured_citation></citation><citation key="ref2"><unstructured_citation>F. Maqsood, M. Ahmed, M. Mumtaz, and M. Sha, “Cryptography: A comparative analysis for modern techniques,” 2017. </unstructured_citation></citation><citation key="ref3"><unstructured_citation>M. Sawand and N. Khan, “Privacy and security mechanisms for ehealth monitoring systems,” IEEE, 2012. </unstructured_citation></citation><citation key="ref4"><doi>10.14569/ijacsa.2018.090349</doi><unstructured_citation>H. Akram, D. Konstantas, and M. Mahyoub, “A comprehensive iot attacks survey based on a building-blocked reference model,” 3, vol. 9, 2018. </unstructured_citation></citation><citation key="ref5"><doi>10.1049/el.2018.0735</doi><unstructured_citation>W. Yu and J. Chen, “Masked aes puf: A new puf against hybrid sca-mlas,” Electronics Letters, vol. 54, no. 10, pp. 618–620, 2018. DOI: 10.1049/el.2018.0735. </unstructured_citation></citation><citation key="ref6"><doi>10.14569/ijacsa.2022.0130660</doi><unstructured_citation>M. Fariss, H. Gafif, and A. Toumanari, “A lightweight ECC-based three-factor mutual authentication and key agreement protocol for WSNs in IoT,” 6, vol. 13, 2022. </unstructured_citation></citation><citation key="ref7"><doi>10.14569/ijacsa.2021.0120291</doi><unstructured_citation>V. V. Thavavel Vaiyapuri Adel Binbusayyis, “Security, privacy and trust in iomt enabled smarthealthcare system: A systematic review of currentand future trends,” 2, vol. 12, 2021. </unstructured_citation></citation><citation key="ref8"><doi>10.1109/isvlsi.2018.00131</doi><unstructured_citation>D. Kumar, C. Labrado, R. Badhan, H. Thapliyal, and V. Singh, “Solar cell based physically unclonable function for cybersecurity in IoT devices,” in 2018 IEEE Computer Society Annual Symposium on VLSI ISVLSI, 2018. DOI: 10.1109/isvlsi.2018.00131. </unstructured_citation></citation><citation key="ref9"><doi>10.1109/access.2019.2926578</doi><unstructured_citation>S. Banerjee, V. Odelu, A. K. Das, S. Chattopadhyay, J. J. P. C. Rodrigues, and Y. Park, “Physically secure lightweight anonymous user authentication protocol for internet of things using physically unclonable functions,” IEEE Access, vol. 7, pp. 85 627–85 644, 2019. DOI: 10. 1109/access.2019.2926578. </unstructured_citation></citation><citation key="ref10"><doi>10.1109/et2ecn.2014.7044973</doi><unstructured_citation>R. Bhadada and A. Sharma, “Montgomery implantation of ecc over rsa onfpga for public key cryptography application,” in 2014 2nd International Conference on Emerging Technology Trends in Electronics, Communication and Networking, vol. 1, IEEE, 2014. </unstructured_citation></citation><citation key="ref11"><doi>10.1007/s11277-021-09171-y</doi><unstructured_citation>S. Kumari, “Enhancing the quantum communication channel using a novel quantum binary salt blowfish strategy,” Wireless Personal Communications, vol. 123, no. 2, pp. 1085– 1102, 2021. DOI: 10 . 1007 / s11277 - 021 - 09171-y. </unstructured_citation></citation><citation key="ref12"><doi>10.1016/j.micpro.2020.103369</doi><unstructured_citation>M. Laban and M. Drutarovsky, “Leakage free helper data storage in microcontroller based PUF implementation,” Microprocessors and Microsystems, vol. 87, no. 1, p. 103 369, 2021. DOI: 10.1016/j.micpro.2020.103369. </unstructured_citation></citation><citation key="ref13"><doi>10.14569/ijacsa.2022.0130355</doi><unstructured_citation>S. KOTEL and F. SBIAA, “A data security algorithm for the cloud computing based on elliptic curve functions and sha3 signature,” 2022. </unstructured_citation></citation><citation key="ref14"><doi>10.14569/ijacsa.2018.090520</doi><unstructured_citation>A. Rahman, I. Ullah, M. Naeem, et al., “A lightweight multi-message and multi-receiver heterogeneous hybrid signcryption scheme based on hyper elliptic curve,” International Journal of Advanced Computer Science and Applications, vol. 9, no. 5, pp. 160–167, 2018. </unstructured_citation></citation><citation key="ref15"><doi>10.1109/icm50269.2020.9331821</doi><unstructured_citation>R. Roman, R. Arjona, J. Arcenegui, and I. Baturone, “Hardware security for eXtended merkle signature scheme using SRAM-based PUFs and TRNGs,” in 2020 32nd International Conference on Microelectronics (ICM), IEEE, 2020. DOI: 10 . 1109 / icm50269 . 2020 . 9331821. </unstructured_citation></citation><citation key="ref16"><doi>10.14569/ijacsa.2022.0130487</doi><unstructured_citation>F. Syifaul, P. Aris, A. Trio, and M. Tengku, “Rtl design and testing methodology for uhf rfid passive tag baseband-processor enabling internet-of-things (iot) technology,” Tech. Rep. effortless, 2022. </unstructured_citation></citation><citation key="ref17"><doi>10.14569/ijacsa.2022.0130221</doi><unstructured_citation>H. Montiel, F. Martínez, and E. Jacinto, “Implementation of password hashing on embedded systems with cryptographic acceleration unit,” (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 13, no. 2, pp. 171–175, 2022, ISSN: 2156- 5570. DOI: 10 . 14569 / IJACSA . 2022 . 0130221. </unstructured_citation></citation><citation key="ref18"><doi>10.1109/sahcn.2019.8824792</doi><unstructured_citation>M. Mohammadinodoushan, D. Hely, B. Cambou, D. Booher, and C. Philabaum, “Implementation of password management system using ternary addressable puf generator,” IEEE, 2019. </unstructured_citation></citation><citation key="ref19"><doi>10.1109/access.2021.3053307</doi><unstructured_citation>M. Mohammadinodoushan, B. Cambou, C. R. Philabaum, and N. Duan, “Resilient password manager using physical unclonable functions,” IEEE Access, vol. 9, pp. 17 060–17 070, 2021. DOI: 10.1109/access.2021.3053307. </unstructured_citation></citation><citation key="ref20"><doi>10.1007/s41635-019-00080-y</doi><unstructured_citation>I. Karageorgos, M. Isgenc, S. Pagliarini, and L. Pileggi, “Chip-to-chip authentication method based on SRAM PUF and public key cryptography,” Journal of Hardware and Systems Security, vol. 3, no. 4, pp. 382–396, 2019. DOI: 10.1007/s41635-019-00080-y. </unstructured_citation></citation><citation key="ref21"><doi>10.1109/ccnc46108.2020.9045502</doi><unstructured_citation>P. Urien, “Innovative atmega8 microcontroler static authentication based on sram puf,” in 2020 IEEE 17th Annual Consumer Communications Networking Conference (CCNC), IEEE, 2020. </unstructured_citation></citation><citation key="ref22"><doi>10.1109/tifs.2019.2955788</doi><unstructured_citation>W. Xiong, A. Schaller, S. Katzenbeisser, and J. Szefer, “Software protection using dynamic PUFs,” IEEE Transactions on Information Forensics and Security, vol. 15, no. 1, pp. 2053–2068, 2020. DOI: 10.1109/tifs. 2019.2955788. </unstructured_citation></citation><citation key="ref23"><doi>10.1109/iscas51556.2021.9401404</doi><unstructured_citation>Y.-S. Won and S. Bhasin, “A systematic sidechannel evaluation of black box AES in secure MCU: Architecture recovery and retrieval of PUF based secret key,” in 2021 IEEE International Symposium on Circuits and Systems (ISCAS), 2021. DOI: 10.1109/iscas51556. 2021.9401404. </unstructured_citation></citation><citation key="ref24"><doi>10.1109/slip.2019.8771329</doi><unstructured_citation>Y. Weize and C. Jia, “Puf-aes-puf: A novel puf architecture against non-invasive attacks,” aXiv, 2018. </unstructured_citation></citation><citation key="ref25"><unstructured_citation>N. Semiconductors, “Kinetis kl82 microcontroller datasheet,” 2016. </unstructured_citation></citation><citation key="ref26"><doi>10.1109/jproc.2014.2320516</doi><unstructured_citation>C. Herder, M.-D. Yu, F. Koushanfar, and S. Devadas, “Physical unclonable and functions and applications: A and tutorial,” 8, vol. 102, IEEE, 2014. </unstructured_citation></citation><citation key="ref27"><unstructured_citation>N. Mouha, Review of the advanced encryption standard. 2021. DOI: 10 . 6028 / nist . ir . 8319.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>