4.8 Article

A PUF-Based Modeling-Attack Resilient Authentication Protocol for IoT Devices

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 9, Issue 5, Pages 3684-3703

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3098496

Keywords

Authentication; Protocols; Internet of Things; Cryptography; Physical unclonable function; Hardware; Computational modeling; Authentication; Internet of Things (IoT); physical unclonable function (PUF); machine learning (ML)

Ask authors/readers for more resources

This article proposes a novel protocol to enhance the robustness of IoT authentication by limiting the adversary's ability to intercept the challenge bits exchanged with IoT nodes.
Physical unclonable functions (PUFs) offer a promising solution for the authentication of Internet of Things (IoT) devices as they provide unique fingerprints for the underlying devices through their challenge-response pairs. However, PUFs have been shown to be vulnerable to modeling attacks. In this article, we propose a novel protocol to thwart such vulnerability by limiting the adversary's ability to intercept the whole challenge bits exchanged with IoT nodes. We split the challenge bits over multiple messages and engage one or multiple helper nodes in the dissemination process. We further study the implications of various parts of the challenge patterns on the modeling attack and propose extensions of our protocol that exploit bits scrambling and padding to ameliorate the attack resiliency. The experimental results extracted from a 16-bit and a 64-bit arbiter-PUF implemented on FPGA demonstrate the effectiveness of the proposed methods in boosting the robustness of IoT authentication.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available