Secure PUF-based Authentication and Key Exchange Protocol using Machine Learning

被引:1
|
作者
Ali-Pour, Amir [1 ,2 ]
Afghah, Fatemeh [1 ]
Hely, David [3 ]
Beroulle, Vincent [2 ]
Di Natale, Giorgio [4 ]
机构
[1] Clemson Univ, Elect & Comptuer Engn Dept, Clemson, SC 29634 USA
[2] Univ Grenoble Alpes, Grenoble INP, LCIS, F-26000 Grenoble, France
[3] Univ Grenoble Alpes, CEA, LETI, F-38000 Grenoble, France
[4] Univ Grenoble Alpes, CNRS, Grenoble INP, TIMA, F-38000 Grenoble, France
基金
美国国家科学基金会;
关键词
Physically Unclonable Function; Encryption Key; Repetition Code; Error Correction Codes;
D O I
10.1109/ISVLSI54635.2022.00086
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Error Correction Codes and Fuzzy Extractors (FE) using publicly available helper data are used to increase the reliability of the secret value generated from noisy sources such as Physically Unclonable Functions (PUFs). Publicly available helper data is, in turn, vulnerable against Helper Data manipulation attacks due to its correlation with the secret value. Instead of using helper data for FE-based error correction, we propose a locally recoverable repetition coding mechanism. Our proposed mechanism is based on sharing only the user's generated challenge values, which is inherently secure against machine learning and PUF cloning attacks. We evaluate the reliability of our method using simulated challenge response pairs (CRP)s captured from various XOR Arbiter PUF structures at different levels of noise embedded in the PUF CRP characteristic. We show for instance that in a scenario of using PUF with 10% error-rate, our method can successfully recover the encryption key with close to zero failure-rate with a repetition code length of 10 or higher.
引用
收藏
页码:386 / 389
页数:4
相关论文
共 50 条
  • [1] PLAKE: PUF-Based Secure Lightweight Authentication and Key Exchange Protocol for IoT
    Roy, Sourav
    Das, Dipnarayan
    Mondal, Anindan
    Mahalat, Mahabub Hasan
    Sen, Bibhash
    Sikdar, Biplab
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (10) : 8547 - 8559
  • [2] On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices
    Sun, Da-Zhi
    Gao, Yi-Na
    Tian, Yangguang
    SENSORS, 2023, 23 (14)
  • [3] A New Secure Scan Design with PUF-based Key for Authentication
    Wang, Qidong
    Cui, Aijiao
    Qu, Gang
    Li, Huawei
    2020 IEEE 38TH VLSI TEST SYMPOSIUM (VTS 2020), 2020,
  • [4] A Provably Secure and Practical PUF-Based End-to-End Mutual Authentication and Key Exchange Protocol for IoT
    Li, Sensen
    Zhang, Tikui
    Yu, Bin
    He, Kuan
    IEEE SENSORS JOURNAL, 2021, 21 (04) : 5487 - 5501
  • [5] Secure PUF-Based Authentication Systems
    Tun, Naing Win
    Mambo, Masahiro
    SENSORS, 2024, 24 (16)
  • [6] Optimal Tradeoff of Secure PUF-based Authentication
    Kittichokechai, Kittipong
    Caire, Giuseppe
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 83 - 88
  • [7] PUF-Based Mutual Authentication and Key Exchange Protocol for Peer-to-Peer IoT Applications
    Zheng, Yue
    Liu, Wenye
    Gu, Chongyan
    Chang, Chip-Hong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 3299 - 3316
  • [8] PUF-RAKE: A PUF-Based Robust and Lightweight Authentication and Key Establishment Protocol
    Qureshi, Mahmood Azhar
    Munir, Arslan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2457 - 2475
  • [9] A PUF-Based Indirect Authentication and Key Establishment Protocol for Wearable Devices
    Sathi, Vipin N.
    Rohner, Christian
    Voigt, Thiemo
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 615 - 621
  • [10] Practical and Efficient PUF-Based Protocol for Authentication and Key Agreement in IoT
    Manivannan, Sivappriya
    Chakraborty, Rajat Subhra
    Chakrabarti, Indrajit
    Rangasamy, Jothi
    IEEE EMBEDDED SYSTEMS LETTERS, 2024, 16 (02) : 118 - 121