A Privacy-Preserving Protocol Level Approach to Prevent Machine Learning Modelling Attacks on PUFs in the Presence of Semi-Honest Verifiers

被引:0
|
作者
Millwood, Owen [1 ]
Fei, Hongming [2 ]
Gope, Prosanta [1 ]
Narli, Oguz [3 ]
Pehlivanoglu, Meltem Kurt [3 ]
Kavun, Elif Bilge [4 ]
Sikdar, Biplab [2 ]
机构
[1] Univ Sheffield, Dept Comp Sci, Sheffield, S Yorkshire, England
[2] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore, Singapore
[3] Kocaeli Univ, Dept Comp Engn, Kocaeli, Turkiye
[4] Univ Passau, Secure Intelligent Syst Res Grp, Passau, Germany
基金
新加坡国家研究基金会;
关键词
Authentication Protocol; PUF; ML-MA; Privacy; DRAM-PUF; LIGHTWEIGHT; SECURITY;
D O I
10.1109/HOST55118.2023.10133804
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the ubiquitous and distributed nature of the Internet-of-Things (IoT), various qualities of traditional communication methods for end devices and their verifiers prove insufficient in solving the challenges this new paradigm faces. Many new hardware and software technologies are proposed in an attempt to provide IoT systems with desired security properties while meeting performance requirements. Physically Unclonable Functions (PUFs) are one such technology receiving particular interest from the wider research community by promising to provide low-cost and highly secure key data to enable lightweight authentication protocols for devices operating over publicly accessible networks. PUFs have been the target of Machine Learning Modelling Attacks (ML-MA), which aim to clone the intrinsic behaviour of the PUF to undermine their security. While many PUF-based schemes have been proposed to defend against adversaries who are guaranteed to be dishonest, an area which has not seen significant consideration is one where a normal communication participant cannot always be assumed to act honestly. To the best of our knowledge, this work is the first to consider the concept of 'semi-honest verifier' for PUF-based authentication, taking initial steps to shed light on this prominent issue in IoT by proposing a privacy-preserving mutual authentication protocol which considers security against ML-MA in the presence of such verifiers. Furthermore, this work describes hardware-level considerations for PUF obfuscation by utilising a combination of strong PUF, configurable One-Way Function (OWF) and secure DRAM-PUF and is, therefore, one of the first to integrate PUF obfuscation comprehensively at the protocol level.
引用
收藏
页码:326 / 336
页数:11
相关论文
共 21 条
  • [1] Privacy-preserving graph algorithms in the semi-honest model
    Brickell, J
    Shmatikov, V
    [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 236 - 252
  • [2] Privacy-Preserving Distributed Statistical Computation to a Semi-Honest Multi-Cloud
    Calvino, Aida
    Ricci, Sara
    Domingo-Ferrer, Josep
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 506 - 514
  • [3] An Efficient Privacy-Preserving Randomization-Based Approach for Classification Upon Encrypted Data in Outsourced Semi-Honest Environment
    Gaikwad, Vijayendra Sanjay
    Walse, Kishor H.
    Junaid, Mohammad Atique Mohammad
    [J]. International Journal of Advanced Computer Science and Applications, 2024, 15 (11) : 908 - 920
  • [4] A secure distributed machine learning protocol against static semi-honest adversaries
    Sun, Maohua
    Yang, Ruidi
    Hu, Lei
    [J]. Applied Soft Computing, 2021, 102
  • [5] A secure distributed machine learning protocol against static semi-honest adversaries
    Sun, Maohua
    Yang, Ruidi
    Hu, Lei
    [J]. APPLIED SOFT COMPUTING, 2021, 102
  • [6] Privacy-friendly machine learning - Part 2: Privacy attacks and privacy-preserving machine learning
    Stock J.
    Petersen T.
    Behrendt C.-A.
    Federrath H.
    Kreutzburg T.
    [J]. Informatik Spektrum, 2022, 45 (3) : 137 - 145
  • [7] An efficient approach for privacy preserving distributed clustering in semi-honest model using elliptic curve cryptography
    Department of Computer Engineering, S. V. National Institute of Technology, Ichhchhanath, Surat, Gujarat, India
    不详
    [J]. Int. J. Netw. Secur., 3 (328-339): : 328 - 339
  • [8] An Application-Level Approach for Privacy-preserving Virtual Machine Checkpointing
    Hu, Yaohui
    Li, Tianlin
    Yang, Ping
    Gopalan, Kartik
    [J]. 2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 59 - 66
  • [9] A privacy-preserving approach for detecting smishing attacks using federated deep learning
    Mohamed Abdelkarim Remmide
    Fatima Boumahdi
    Bousmaha Ilhem
    Narhimene Boustia
    [J]. International Journal of Information Technology, 2025, 17 (1) : 547 - 553
  • [10] A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication
    Hong, Yang
    Wang, Lisong
    Meng, Weizhi
    Cao, Jian
    Ge, Chunpeng
    Zhang, Qin
    Zhang, Rui
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2022, 2022, 13787 : 374 - 386