Secure PUF-based Authentication and Key Exchange Protocol using Machine Learning

被引:4
|
作者
Ali-Pour, Amir [1 ,2 ]
Afghah, Fatemeh [1 ]
Hely, David [3 ]
Beroulle, Vincent [2 ]
Di Natale, Giorgio [4 ]
机构
[1] Clemson Univ, Elect & Comptuer Engn Dept, Clemson, SC 29634 USA
[2] Univ Grenoble Alpes, Grenoble INP, LCIS, F-26000 Grenoble, France
[3] Univ Grenoble Alpes, CEA, LETI, F-38000 Grenoble, France
[4] Univ Grenoble Alpes, CNRS, Grenoble INP, TIMA, F-38000 Grenoble, France
基金
美国国家科学基金会;
关键词
Physically Unclonable Function; Encryption Key; Repetition Code; Error Correction Codes;
D O I
10.1109/ISVLSI54635.2022.00086
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Error Correction Codes and Fuzzy Extractors (FE) using publicly available helper data are used to increase the reliability of the secret value generated from noisy sources such as Physically Unclonable Functions (PUFs). Publicly available helper data is, in turn, vulnerable against Helper Data manipulation attacks due to its correlation with the secret value. Instead of using helper data for FE-based error correction, we propose a locally recoverable repetition coding mechanism. Our proposed mechanism is based on sharing only the user's generated challenge values, which is inherently secure against machine learning and PUF cloning attacks. We evaluate the reliability of our method using simulated challenge response pairs (CRP)s captured from various XOR Arbiter PUF structures at different levels of noise embedded in the PUF CRP characteristic. We show for instance that in a scenario of using PUF with 10% error-rate, our method can successfully recover the encryption key with close to zero failure-rate with a repetition code length of 10 or higher.
引用
收藏
页码:386 / 389
页数:4
相关论文
共 50 条
  • [41] A Distributed Lightweight PUF-Based Mutual Authentication Protocol for IoV
    Alkanhal, Mona
    Alali, Abdulaziz
    Younis, Mohamed
    IOT, 2024, 5 (01): : 1 - 19
  • [42] Proving authentication property of PUF-based mutual authentication protocol based on logic of events
    Song, Jiawen
    Xiao, Meihua
    Zhang, Tong
    Zhou, Haoyang
    SOFT COMPUTING, 2022, 26 (02) : 841 - 852
  • [43] PUF-IPA: A PUF-based Identity Preserving Protocol for Internet of Things Authentication
    Qureshi, Mahmood Azhar
    Munir, Arslan
    2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [44] LPA: A Lightweight PUF-based Authentication Protocol for IoT System
    Rai, Vikash Kumar
    Tripathy, Somanath
    Mathew, Jimson
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1712 - 1717
  • [45] PUF-Based Mutual Multifactor Entity and Transaction Authentication for Secure Banking
    Resende, Amanda C. Davi
    Mochetti, Karina
    Aranha, Diego F.
    LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY AND PRIVACY, LIGHTSEC 2015, 2016, 9542 : 77 - 96
  • [46] Testing Methods for PUF-Based Secure Key Storage Circuits
    Cortez, Mafalda
    Roelofs, Gijs
    Hamdioui, Said
    Di Natale, Giorgio
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2014, 30 (05): : 581 - 594
  • [47] A Secure MQTT Framework from PUF-based Key Establishment
    Shin, SeongHan
    Kobara, Kazukuni
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 1296 - 1301
  • [48] P-MAP: PUF-based Mutual Authentication Protocol
    Mona, Alkanhal
    Younis, Mohamed
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 3424 - 3429
  • [49] Testing Methods for PUF-Based Secure Key Storage Circuits
    Mafalda Cortez
    Gijs Roelofs
    Said Hamdioui
    Giorgio Di Natale
    Journal of Electronic Testing, 2014, 30 : 581 - 594
  • [50] Proving authentication property of PUF-based mutual authentication protocol based on logic of events
    Jiawen Song
    Meihua Xiao
    Tong Zhang
    Haoyang Zhou
    Soft Computing, 2022, 26 : 841 - 852