PUF-Based Authentication Protocols - Revisited

被引:0
|
作者
Busch, Heike [1 ]
Katzenbeisser, Stefan [1 ]
Baecher, Paul [1 ]
机构
[1] Tech Univ Darmstadt, Darmstadt, Germany
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Physical Unclonable Functions (PUF) are physical objects that are unique and unclonable. PUT's were used in the past to construct authentication protocols secure against physical attackers. However, in this paper we show that known constructions are not fully secure if attackers have raw access to the PUP for a short period of time. We therefore propose a new, stronger. and more realistic attacker model. Subsequently, we suggest two constructions of authentication protocols, which are secure against physical attackers in the new model and which only need symmetric primitives.
引用
收藏
页码:296 / 308
页数:13
相关论文
共 50 条
  • [1] PUF-Based Authentication
    Che, Wenjie
    Saqib, Fareena
    Plusquellic, Jim
    [J]. 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2015, : 337 - 344
  • [2] Designing secure PUF-based authentication protocols for constrained environments
    Lee, Sang-Woong
    Safkhani, Masoumeh
    Quynh Le
    Ahmed, Omed Hassan
    Hosseinzadeh, Mehdi
    Rahmani, Amir Masoud
    Bagheri, Nasour
    [J]. SCIENTIFIC REPORTS, 2023, 13 (01):
  • [3] Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT
    Lounis, Karim
    Zulkernine, Mohammad
    [J]. DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (02):
  • [4] Designing secure PUF-based authentication protocols for constrained environments
    Sang-Woong Lee
    Masoumeh Safkhani
    Quynh Le
    Omed Hassan Ahmed
    Mehdi Hosseinzadeh
    Amir Masoud Rahmani
    Nasour Bagheri
    [J]. Scientific Reports, 13 (1)
  • [5] Systematic Cryptanalysis of PUF-Based Authentication Protocols for IoT, A Case Study
    Modarres, Amir Masoud Aminian
    Sarbishaei, Ghazaleh
    [J]. IEEE Networking Letters, 2023, 5 (04): : 304 - 308
  • [6] Secure PUF-Based Authentication Systems
    Tun, Naing Win
    Mambo, Masahiro
    [J]. SENSORS, 2024, 24 (16)
  • [7] WIP: Performance Metrics of PUF-based Authentication Protocols for Smart Grid: A Review
    Griffiths, Taylah
    Ahmed, Mohiuddin
    Yan, Shihao
    [J]. PROCEEDINGS 2024 IEEE 25TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, WOWMOM 2024, 2024, : 1 - 4
  • [8] Automated Analysis of PUF-based Protocols
    Focardi, Riccardo
    Luccio, Flaminia L.
    [J]. 2020 IEEE 33RD COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2020), 2020, : 304 - 317
  • [9] Optimal Tradeoff of Secure PUF-based Authentication
    Kittichokechai, Kittipong
    Caire, Giuseppe
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 83 - 88
  • [10] Compact and low-power ASIP design for lightweight PUF-based authentication protocols
    Aysu, Aydin
    Gulcan, Ege
    Moriyama, Daisuke
    Schaumont, Patrick
    [J]. IET INFORMATION SECURITY, 2016, 10 (05) : 232 - 244