DC-PUF: Machine learning-resistant PUF-based authentication protocol using dependency chain for resource-constraint IoT devices

被引:7
|
作者
Sajadi, Abolfazl [1 ]
Shabani, Ahmad [1 ]
Alizadeh, Bijan [1 ,2 ]
机构
[1] Univ Tehran, Coll Engn, Sch Elect & Comp Engn, Design Verificat & Debugging Embedded Syst DVDES L, Tehran 1439957131, Iran
[2] Inst Res Fundamental Sci IPM, Sch Comp Sci, Tehran 1953833511, Iran
关键词
Hardware security; PUF; IoT; Authentication; Modeling attack; Machine learning; HARDWARE TROJAN DETECTION;
D O I
10.1016/j.jnca.2023.103693
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Physical Unclonable Function (PUF) is a hardware block which exploits the inherent process variations introduced during manufacturing to assign a unique fingerprint for each physical entity. This feature enables a low-cost authentication mechanism for connected devices, which is easy to evaluate but hard to predict. In this paper, we develop a low-cost PUF-based authentication mechanism called DC-PUF for resource-constrained IoT devices which can resist against machine-learning attacks. A new strategy known as the dependency chain (DC) is employed by which the response in each clock is dependent not only on the current challenge but also on the previous responses. This mechanism which takes advantage of both randomization and dependency chain hardens the ability to clone or predict the PUF instance by obfuscating the correlation between challengeresponse pairs. Moreover, we propose a CNN-based attack scenario by which the existing PUF structures cannot resist while yielding more than 95% of prediction accuracy. The experimental results signify that unlike the existing PUFs, more than 58% of prediction accuracy cannot be reached when a sophisticated CNN-based attack is conducted to the DC-PUF, even with a large data-set. Also, the False-Negative rate is about 1%, in average, for three-bit mismatches in the receiving response in the presence of channel variations, whereas the False-Positive rate remains zero. Moreover, the proposed DC-PUF incurs lower hardware complexity and reasonable reliability and randomness compared to the existing PUF structures.
引用
收藏
页数:15
相关论文
共 12 条
  • [1] Lightweight PUF-Based Authentication Protocol for IoT Devices
    Yilmaz, Yildiran
    Gunn, Steve R.
    Halak, Basel
    2018 IEEE 3RD INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2018, : 38 - 43
  • [2] On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices
    Sun, Da-Zhi
    Gao, Yi-Na
    Tian, Yangguang
    SENSORS, 2023, 23 (14)
  • [3] Novel Machine Learning-Resistant RO-Based PUF Optimized for IoT Device Authentication
    Aparicio-Tellez, Raul
    Garcia-Bosque, Miguel
    Diez-Senorans, Guillermo
    Celma, Santiago
    IEEE ACCESS, 2025, 13 : 46147 - 46160
  • [4] PUF-based mutual authentication and session key establishment protocol for IoT devices
    Zerrouki F.
    Ouchani S.
    Bouarfa H.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (09) : 12575 - 12593
  • [5] Secure PUF-based Authentication and Key Exchange Protocol using Machine Learning
    Ali-Pour, Amir
    Afghah, Fatemeh
    Hely, David
    Beroulle, Vincent
    Di Natale, Giorgio
    2022 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2022), 2022, : 386 - 389
  • [6] A PUF-Based Modeling-Attack Resilient Authentication Protocol for IoT Devices
    Ebrahimabadi, Mohammad
    Younis, Mohamed
    Karimi, Naghmeh
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) : 3684 - 3703
  • [7] PUF-based Lightweight Mutual Authentication Protocol for Internet of Things (IoT) Devices
    Raj, Kamal
    Bodapati, Srinivasu
    Chattopadhyay, Anupam
    2024 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS 2024, 2024,
  • [8] A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices
    Idriss, Tarek A.
    Idriss, Haytham A.
    Bayoumi, Magdy A.
    IEEE ACCESS, 2021, 9 : 80546 - 80558
  • [9] PEASE: A PUF-Based Efficient Authentication and Session Establishment Protocol for Machine-to-Machine Communication in Industrial IoT
    Gong, Xiang
    Feng, Tao
    Albettar, Maher
    ELECTRONICS, 2022, 11 (23)
  • [10] PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices
    Lee, JoonYoung
    Oh, JiHyeon
    Kwon, DeokKyu
    Kim, MyeongHyun
    Yu, SungJin
    Jho, Nam-Su
    Park, Youngho
    SENSORS, 2022, 22 (18)