A PUF-Based Modeling-Attack Resilient Authentication Protocol for IoT Devices

被引:35
|
作者
Ebrahimabadi, Mohammad [1 ]
Younis, Mohamed [1 ]
Karimi, Naghmeh [1 ]
机构
[1] Univ Maryland Baltimore Cty, Dept Comp Sci & Elect Engn, Baltimore, MD 21250 USA
关键词
Authentication; Protocols; Internet of Things; Cryptography; Physical unclonable function; Hardware; Computational modeling; Internet of Things (IoT); physical unclonable function (PUF); machine learning (ML); PHYSICAL UNCLONABLE FUNCTIONS; LIGHTWEIGHT; FRAMEWORK; INTERNET; SCHEME;
D O I
10.1109/JIOT.2021.3098496
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Physical unclonable functions (PUFs) offer a promising solution for the authentication of Internet of Things (IoT) devices as they provide unique fingerprints for the underlying devices through their challenge-response pairs. However, PUFs have been shown to be vulnerable to modeling attacks. In this article, we propose a novel protocol to thwart such vulnerability by limiting the adversary's ability to intercept the whole challenge bits exchanged with IoT nodes. We split the challenge bits over multiple messages and engage one or multiple helper nodes in the dissemination process. We further study the implications of various parts of the challenge patterns on the modeling attack and propose extensions of our protocol that exploit bits scrambling and padding to ameliorate the attack resiliency. The experimental results extracted from a 16-bit and a 64-bit arbiter-PUF implemented on FPGA demonstrate the effectiveness of the proposed methods in boosting the robustness of IoT authentication.
引用
收藏
页码:3684 / 3703
页数:20
相关论文
共 50 条
  • [31] DC-PUF: Machine learning-resistant PUF-based authentication protocol using dependency chain for resource-constraint IoT devices
    Sajadi, Abolfazl
    Shabani, Ahmad
    Alizadeh, Bijan
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2023, 217
  • [32] Proving authentication property of PUF-based mutual authentication protocol based on logic of events
    Song, Jiawen
    Xiao, Meihua
    Zhang, Tong
    Zhou, Haoyang
    [J]. SOFT COMPUTING, 2022, 26 (02) : 841 - 852
  • [33] PhenoAuth: A Novel PUF-Phenotype-based Authentication Protocol for IoT Devices
    Fei, Hongming
    Millwood, Owen
    Gope, Prosanta
    Miskelly, Jack
    Sikdar, Biplab
    [J]. 2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2024, : 309 - 319
  • [34] A Distributed Lightweight PUF-Based Mutual Authentication Protocol for IoV
    Alkanhal, Mona
    Alali, Abdulaziz
    Younis, Mohamed
    [J]. IOT, 2024, 5 (01): : 1 - 19
  • [35] A PUF based Light Weight Protocol for Secure WiFi Authentication of IoT devices
    Mahalat, Mahabub Hasan
    Saha, Shreya
    Mondal, Anindan
    Sen, Bibhash
    [J]. PROCEEDINGS OF THE 2018 8TH INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING AND SYSTEM DESIGN (ISED 2018), 2018, : 183 - 187
  • [36] PUF-IPA: A PUF-based Identity Preserving Protocol for Internet of Things Authentication
    Qureshi, Mahmood Azhar
    Munir, Arslan
    [J]. 2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [37] P-MAP: PUF-based Mutual Authentication Protocol
    Mona, Alkanhal
    Younis, Mohamed
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 3424 - 3429
  • [38] Proving authentication property of PUF-based mutual authentication protocol based on logic of events
    Jiawen Song
    Meihua Xiao
    Tong Zhang
    Haoyang Zhou
    [J]. Soft Computing, 2022, 26 : 841 - 852
  • [39] Joint Heterogeneous PUF-Based Security-Enhanced IoT Authentication
    Yoon, Seungwook
    Han, Seungnam
    Hwang, Euiseok
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (20) : 18082 - 18096
  • [40] Systematic Cryptanalysis of PUF-Based Authentication Protocols for IoT, A Case Study
    Modarres, Amir Masoud Aminian
    Sarbishaei, Ghazaleh
    [J]. IEEE Networking Letters, 2023, 5 (04): : 304 - 308