Intrusion Detection and Obfuscation Mechanism for PUF-Based Authentication

被引:0
|
作者
Wang, Sying-Jyan [1 ]
Li, Katherine Shu-Min [2 ]
Lin, Chen-Yeh [3 ]
Chong, Song-Kong [3 ]
机构
[1] Natl Chung Hsing Univ, Dept Comp Sci & Engn, Taichung, Taiwan
[2] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung, Taiwan
[3] Inst Informat Ind, Cybersecur Technol Inst, Taipei, Taiwan
关键词
physical unclonable function; intrusion detection; modeling attack; machine learning; UNCLONABLE FUNCTIONS; ATTACK;
D O I
10.1109/ATS56056.2022.00028
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Physical Unclonable Functions (PUF) provide a lightweight secure primitive. However, it is well known that PUFs are vulnerable to machine learning based modeling attacks (MA). A lot of efforts have been devoted to develop MAresistant PUFs, while MA techniques are also evolving. In this paper, we propose to protect PUF-based authentication systems by providing an intrusion detection mechanism. By replacing some responses with the check information only known to the server and the PUF, any attacks will trigger alerts to the server. The proposed method provides an active protection mechanism so that the verifier can initiate an intrusion detection process to determine whether the prover is an attacker in disguise. In this way, the proposed method can provide an early alert so as to achieve another layer of protection. Experimental results show that the proposed mechanism can effectively provide alerts after PUFs being attacks.
引用
收藏
页码:90 / 95
页数:6
相关论文
共 50 条
  • [1] PUF-Based Authentication
    Che, Wenjie
    Saqib, Fareena
    Plusquellic, Jim
    [J]. 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2015, : 337 - 344
  • [2] Hardware Obfuscation using PUF-based Logic
    Wendt, James B.
    Potkonjak, Miodrag
    [J]. 2014 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2014, : 270 - 277
  • [3] Secure PUF-Based Authentication Systems
    Tun, Naing Win
    Mambo, Masahiro
    [J]. SENSORS, 2024, 24 (16)
  • [4] An Attack Resilient PUF-based Authentication Mechanism for Distributed Systems
    Ebrahimabadi, Mohammad
    Younis, Mohamed
    Lalouani, Wassila
    Karimi, Naghmeh
    [J]. 2022 35TH INTERNATIONAL CONFERENCE ON VLSI DESIGN (VLSID 2022) HELD CONCURRENTLY WITH 2022 21ST INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (ES 2022), 2022, : 108 - 113
  • [5] PUF-Based Authentication Protocols - Revisited
    Busch, Heike
    Katzenbeisser, Stefan
    Baecher, Paul
    [J]. INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 296 - 308
  • [6] Optimal Tradeoff of Secure PUF-based Authentication
    Kittichokechai, Kittipong
    Caire, Giuseppe
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 83 - 88
  • [7] PUF-based Authentication Scheme for IoT Devices
    Yoon, Seungyong
    Kim, Byoungkoo
    Kang, Yousung
    Choi, Dooho
    [J]. 11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 1792 - 1794
  • [8] The Improvement of PUF-Based Authentication in IoT Systems
    Nurkifli, E. Haodudin
    Hwang, Tzonelih
    [J]. JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2023, 14 (05) : 918 - 927
  • [9] Lightweight PUF-based Continuous Authentication Protocol
    Goutsos, Konstantinos
    Bystrov, Alex
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2019, : 229 - 234
  • [10] A PUF-based hardware mutual authentication protocol
    Barbareschi, Mario
    De Benedictis, Alessandra
    Mazzocca, Nicola
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 119 : 107 - 120