Approach & Technical Challenges how we want to do it

Within RESCURE, we aligned our project approach on the following three pillars:

1) Security solutions for lower cost IoT remote devices:
RESCURE will ensure that lower cost individual chips are not vulnerable to attacks and as a result, make IoT devices and communications between them secure. The partners will use Intrinsic-ID’s patented SRAM-PUF technology. Expertise from the RESCURE partners on PUFs and signal processing will be combined to create secure low-cost implementations of PUF technology.

2) Security scalability in large Critical Infrastructures deployment:
The large number of devices within the CIs put additional constraints on the way device keys are generated, stored, managed and provisioned. The current techniques always demand a difficult trade-off between the level of security and the size, complexity and cost of the security measures. For a successful IoT security implementation in CIs, such a trade-off is not workable and is causing many IoT devices to have no protection. The SRAM PUF root key extraction and derivation method has several advantages compared to current key storage models. It offers flexibility as the key generation and programming step can be executed at any stage in the supply chain. On top of key management and security schemes will be evaluated with respect to feasibility on lower cost devices, and their scalability.

3) Demonstrator:
The third challenge of the project is realizing a demonstrator, focussing on use cases like preventive maintenance, or smart-grids. The demonstrator should include use-case specific software, IoT security protocols for communication with the back-end, and low-complexity PUF implementations.