Secure PUF-based Authentication and Key Exchange Protocol using Machine Learning

被引:4
|
作者
Ali-Pour, Amir [1 ,2 ]
Afghah, Fatemeh [1 ]
Hely, David [3 ]
Beroulle, Vincent [2 ]
Di Natale, Giorgio [4 ]
机构
[1] Clemson Univ, Elect & Comptuer Engn Dept, Clemson, SC 29634 USA
[2] Univ Grenoble Alpes, Grenoble INP, LCIS, F-26000 Grenoble, France
[3] Univ Grenoble Alpes, CEA, LETI, F-38000 Grenoble, France
[4] Univ Grenoble Alpes, CNRS, Grenoble INP, TIMA, F-38000 Grenoble, France
基金
美国国家科学基金会;
关键词
Physically Unclonable Function; Encryption Key; Repetition Code; Error Correction Codes;
D O I
10.1109/ISVLSI54635.2022.00086
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Error Correction Codes and Fuzzy Extractors (FE) using publicly available helper data are used to increase the reliability of the secret value generated from noisy sources such as Physically Unclonable Functions (PUFs). Publicly available helper data is, in turn, vulnerable against Helper Data manipulation attacks due to its correlation with the secret value. Instead of using helper data for FE-based error correction, we propose a locally recoverable repetition coding mechanism. Our proposed mechanism is based on sharing only the user's generated challenge values, which is inherently secure against machine learning and PUF cloning attacks. We evaluate the reliability of our method using simulated challenge response pairs (CRP)s captured from various XOR Arbiter PUF structures at different levels of noise embedded in the PUF CRP characteristic. We show for instance that in a scenario of using PUF with 10% error-rate, our method can successfully recover the encryption key with close to zero failure-rate with a repetition code length of 10 or higher.
引用
收藏
页码:386 / 389
页数:4
相关论文
共 50 条
  • [31] A Lightweight PUF-based Secure Group Key Agreement Protocol for Wireless Sensor Networks
    Zheng, Yue
    Liu, Wenye
    Chang, Chip-Hong
    2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS, 2023,
  • [32] Testing PUF-Based Secure Key Storage Circuits
    Cortez, Mafalda
    Roelofs, Gijs
    Hamdioui, Said
    di Natale, Giorgio
    2014 DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION (DATE), 2014,
  • [33] DC-PUF: Machine learning-resistant PUF-based authentication protocol using dependency chain for resource-constraint IoT devices
    Sajadi, Abolfazl
    Shabani, Ahmad
    Alizadeh, Bijan
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2023, 217
  • [34] A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
    Chen, Liquan
    Wang, Jinlong
    Yin, Bangwei
    Yu, Kunliang
    Han, Jinguang
    CHINA COMMUNICATIONS, 2023, 20 (05) : 198 - 216
  • [35] Challenging the security of "A PUF-based hardware mutual authentication protocol"
    Adeli, Morteza
    Bagheri, Nasour
    Martin, Honorio
    Peris-Lopez, Pedro
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2022, 169 : 199 - 210
  • [36] A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
    Liquan Chen
    Jinlong Wang
    Bangwei Yin
    Kunliang Yu
    Jinguang Han
    ChinaCommunications, 2023, 20 (05) : 198 - 216
  • [37] PUF-Based Key Generation Scheme for Secure Group Communication Using MEMS
    Mehdi, Mubarak
    Ajani, Muhammad Taha
    Tahir, Hasan
    Tahir, Shahzaib
    Alizai, Zahoor
    Khan, Fawad
    Riaz, Qaiser
    Hussain, Mehdi
    ELECTRONICS, 2021, 10 (14)
  • [38] PDAKE Provably Secure PUF-Based Device Authenticated Key Exchange in Cloud Setting
    Byun, Jin Wook
    IEEE ACCESS, 2019, 7 : 181165 - 181177
  • [39] A PUF-based lightweight identity authentication protocol for Internet of Vehicles
    Men, Honglei
    Cao, Li
    Zheng, Guoli
    Chen, Liang
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 123
  • [40] PUF-Based Secure Checker Protocol for Networked RFID Systems
    Ray, Biplob
    Chowdhury, Morshed
    Abawajy, Jemal
    2014 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS), 2014, : 78 - 83