Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
97 tokens/sec
GPT-4o
53 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
5 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

PUFchain: Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE) (1909.06496v1)

Published 14 Sep 2019 in cs.CR and cs.DC

Abstract: This article presents the first-ever blockchain which can simultaneously handle device and data security, which is important for the emerging Internet-of-Everything (IoE). This article presents a unique concept of blockchain that integrates hardware security primitives called Physical Unclonable Functions (PUFs) to solve scalability, latency, and energy requirement challenges and is called PUFchain. Data management and security (and privacy) of data, devices, and individuals, are some of the issues in the IoE architectures that need to be resolved. Integrating the blockchain into the IoE environment can help solve these issues and helps in the aspects of data storage and security. This article introduces a new blockchain architecture called PUFchain and introduces a new consensus algorithm called "Proof of PUF-Enabled Authentication" (PoP) for deployment in PUFchain. The proposed PoP is the PUF integration into our previously proposed Proof-of-Authentication (PoAh) consensus algorithm and can be called "Hardware-Assisted Proof-of-Authentication (HA-PoAh)". However, PUF integration is possible in the existing and new consensus algorithms. PoP utilizes PUFs which are responsible for generating a unique key that cannot be cloned and hence provide the highest level of security. A PUF uses the nanoelectronic manufacturing variations that are introduced during the fabrication of an integrated circuit to generate the keys. Hence, once generated from a PUF module, the keys cannot be cloned or generated from any other module. PUFchain uses a PUF and Hashing module which performs the necessary cryptographic functions. Hence the mining process is offloaded to the hardware module which reduces the processing times. PoP is approximately 1,000X faster than the well-established Proof-of-Work (PoW) and 5X faster than Proof-of-Authentication (PoAh).

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (4)
  1. Saraju P. Mohanty (36 papers)
  2. Venkata P. Yanambaka (4 papers)
  3. Elias Kougianos (17 papers)
  4. Deepak Puthal (9 papers)
Citations (83)

Summary

We haven't generated a summary for this paper yet.