An Attack Resilient PUF-based Authentication Mechanism for Distributed Systems

被引:0
|
作者
Ebrahimabadi, Mohammad [1 ]
Younis, Mohamed [1 ]
Lalouani, Wassila [1 ]
Karimi, Naghmeh [1 ]
机构
[1] Univ Maryland Baltimore Cty, CSEE Dept, Baltimore, MD 21250 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/VLSID2022.2022.00032
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In most PUF-based authentication schemes, a central server is usually engaged to verify the response of the device's PUF to challenge bit-streams. However, the server availability may be intermittent in practice. To tackle such an issue, this paper proposes a new protocol for supporting distributed authentication while avoiding vulnerability to information leakage where CRPs could be retrieved from hacked devices and collectively used to model the PUF. The main idea is to provision for scrambling the challenge bit-stream in a way that is dependent on the verifier. The scrambling pattern varies per authentication round for each device and independently across devices. In essence, the scrambling function becomes node- and packet-specific and the response received by two verifiers of one device for the same challenge bit-stream could vary. Thus, neither the scrambling function can be reverted, nor the PUF can be modeled even by a collusive set of malicious nodes. The validation results using data of an FPGA-based implementation demonstrate the effectiveness of our approach in thwarting PUF modeling attacks by collusive actors. We also discuss the approach resiliency against impersonation, Sybil, and reverse engineering attacks.
引用
收藏
页码:108 / 113
页数:6
相关论文
共 50 条
  • [1] A PUF-Based Modeling-Attack Resilient Authentication Protocol for IoT Devices
    Ebrahimabadi, Mohammad
    Younis, Mohamed
    Karimi, Naghmeh
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05): : 3684 - 3703
  • [2] Secure PUF-Based Authentication Systems
    Tun, Naing Win
    Mambo, Masahiro
    [J]. SENSORS, 2024, 24 (16)
  • [3] PUF-Based Authentication
    Che, Wenjie
    Saqib, Fareena
    Plusquellic, Jim
    [J]. 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2015, : 337 - 344
  • [4] The Improvement of PUF-Based Authentication in IoT Systems
    Nurkifli, E. Haodudin
    Hwang, Tzonelih
    [J]. JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2023, 14 (05) : 918 - 927
  • [5] Intrusion Detection and Obfuscation Mechanism for PUF-Based Authentication
    Wang, Sying-Jyan
    Li, Katherine Shu-Min
    Lin, Chen-Yeh
    Chong, Song-Kong
    [J]. 2022 IEEE 31ST ASIAN TEST SYMPOSIUM (ATS 2022), 2022, : 90 - 95
  • [6] A Distributed Lightweight PUF-Based Mutual Authentication Protocol for IoV
    Alkanhal, Mona
    Alali, Abdulaziz
    Younis, Mohamed
    [J]. IOT, 2024, 5 (01): : 1 - 19
  • [7] A PUF-based Lightweight and Secure Mutual Authentication Mechanism for Remote Keyless Entry Systems
    Parameswarath, Rohini Poolat
    Sikdar, Biplab
    [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 1776 - 1781
  • [8] A Distributed PUF-Based Mutual Authentication System with Self-Correction
    Ghafi, Behnaz Kavoosi
    Maybodi, Babak Mazloom-Nezhad
    [J]. 2020 28TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2020, : 1067 - 1071
  • [9] PUF-Based Authentication Protocols - Revisited
    Busch, Heike
    Katzenbeisser, Stefan
    Baecher, Paul
    [J]. INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 296 - 308
  • [10] Optimal Tradeoff of Secure PUF-based Authentication
    Kittichokechai, Kittipong
    Caire, Giuseppe
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 83 - 88