- About INSTET project
- Technical challenge and innovation approach
- Project structure
- 2019 Nov 30: INSTET project was presented in IoT Security Foundations Conference. Presentation Title: How to transform a tiny medical device into a secure one in easy steps by Vincent van der Leest. Presentation here
- 2019 Nov 15: Our paper “Long-Term continuous Assessment of SRAM PUF ad Source of Random Numbers” is accepted for presentation in Date Conference 2020 in Grenoble, France.
- 2018 Mar 26: Intrinsic ID Awarded EU Grant under Horizon 2020/SME Instrument Phase 2 Program for INSTET Project
About INSTET project
Grant Agreement ID: 811509.
Program: H2020-EU.3. – PRIORITY ‘Societal challenges; H2020-EU.2.3. – INDUSTRIAL LEADERSHIP – Innovation In SMEs;H2020-EU.2.1. – INDUSTRIAL LEADERSHIP – Leadership in enabling and industrial technologies.
Topic: EIC-SMEInst-2018-2020 – SME instrument.
Period: 1 June 2018 – 31 May 2020.
Description: Intrinsic ID is working on INSTET – a fully-fledged security solution on top of PUF that will protect low-end chips that are omnipresent in IoT devices everywhere by making them physically & cryptographically secure and very resilient to advanced attacks. INSTET will work as a Root of Trust—a set of core software components that are always trusted by the chip, and provide a trust foundation for the IoT device & distributed IoT systems.
Website links: INSTET EC website
Participants: Intrinsic ID B.V.
Intrinsic ID’s development and deployment of unique microchip fingerprint technology for new markets, supported by INSTET, is summarized in the video below
Technical challenge and innovation approach
INSTET Challenge – IoT as the Internet of Trouble
Botnets (networks of computers infected and repurposed for malicious activities) have existed for at least a decade. As early as 2000, hackers were breaking into computers all over the Internet and controlling them at large. Among other things, hackers used the combined computing power of these botnets to launch distributed denial-of-service (DDoS) attacks, which flood websiteswith traffic to take them down. But today the problem is getting worse, because of the abundance of cheap webcams, digital video recorders, baby monitors, smart thermostats, air quality sensors, and other gadgets in the Internet of Things (IoT). The arrival of IoT means that computers are now baked into everything from road signs & MRI scanners to prosthetics & insulin pumps. Because these devices typically have little or no security, hackers can take them over with little effort. And that makes it easier than ever to build huge botnets that can do much more damage than taking down one website at a time.
INSTET Innovation – the only solution to secure the chips that are already deployed in the field
INSTET is a novel solution to protect from attacks low-end IoT chips manufactured in high volumes. It is based on our patented technology called physical unclonable function (PUF), which a) makes microchips uniquely identifiable & b) enables reliable generation of random numbers, which allows us to generate secure cryptographic keys. Our PUF is already successfully used by major global semiconductor vendors. INSTET expands these features further into a fully-fledged Root of Trust – a set of core software components that convert almost any low-end IoT chip into a physically & cryptographically secure module which can be trusted by other devices in an IoT network. INSTET is the only solution that can add a security layer to cost- & size-constrained chips without any hardware design changes.
During our SME Instrument Phase 1 we calculated 25-30% cost savings on implementing security for a typical IoT device. Uniquely, INSTET can be applied not only to newly designed chips, but to the existing ones, drastically increasing the security of individual IoT devices & IoT systems that are currently deployed in the field.
The project is divided in seven main work packages:
- WP1 – Security services definition and platform selection
- WP2 – Components development for IoT
- WP3 – Security architecture & backend development
- WP4 – Integration, tests & trials
- WP5 – Business development
- WP6 – Communication & Dissemination
- WP7 – Project Management
|WP No||Del Rel. No||Title||Dissemination Level||Status|
|WP1||D1.1||Security services definition & IoT node selection for wearables report||CO||Submitted (31 Jan 2019)|
|WP1||D1.2||Security services definition & IoT node selection for medical report||CO||Submitted (31 Jan 2019)|
|WP1||D1.3||Security services definition & IoT node selection for critical infrastructure report||CO||Submitted (31 Jan 2019)|
|WP1||D1.4||Report on security backend/cloud platforms selection||CO||Submitted (31 Jan 2019)|
|WP2||D2.1||Report on methodology for customized design and fast integration||CO||Submitted (31 Aug 2018)|
|WP3||D3.1||Report on security architecture for wearables||CO||Submitted (29 Nov 2019)|
|WP3||D3.2||Report on security architecture for medical||CO||Submitted (29 Nov 2019)|
|WP3||D3.3||Report on security architecture for critical infrastructure||CO||Submitted (29 Nov 2019)|
|WP3||D3.4||Report on backend/cloud security design||CO||Submitted (29 Nov 2019)|
|WP5||D5.1||Prospect list for each of the verticals||CO||Submitted (31 Jul 2019)|
|WP6||D6.1||Additional Promotional Material||CO||Submitted (31 May 2019)|
|WP7||D7.1||Project quality handbook||CO||Submitted (31 Jul 2018)|