A Lightweight Authentication Protocol against Modeling Attacks based on a Novel LFSR-APUF

05/12/2023
by   Yao Wang, et al.
0

Simple authentication protocols based on conventional physical unclonable function (PUF) are vulnerable to modeling attacks and other security threats. This paper proposes an arbiter PUF based on a linear feedback shift register (LFSR-APUF). Different from the previously reported linear feedback shift register for challenge extension, the proposed scheme feeds the external random challenges into the LFSR module to obfuscate the linear mapping relationship between the challenge and response. It can prevent attackers from obtaining valid challenge-response pairs (CRPs), increasing its resistance to modeling attacks significantly. A 64-stage LFSR-APUF has been implemented on a field programmable gate array (FPGA) board. The experimental results reveal that the proposed design can effectively resist various modeling attacks such as logistic regression (LR), evolutionary strategy (ES), Artificial Neuro Network (ANN), and support vector machine (SVM) with a prediction rate of 51.79 slight effect on the randomness, reliability, and uniqueness. Further, a lightweight authentication protocol is established based on the proposed LFSR-APUF. The protocol incorporates a low-overhead, ultra-lightweight, novel private bit conversion Cover function that is uniquely bound to each device in the authentication network. A dynamic and timevariant obfuscation scheme in combination with the proposed LFSR-APUF is implemented in the protocol. The proposed authentication protocol not only resists spoofing attacks, physical attacks, and modeling attacks effectively, but also ensures the security of the entire authentication network by transferring important information in encrypted form from the server to the database even when the attacker completely controls the server.

READ FULL TEXT

page 1

page 14

research
07/20/2018

Machine Learning Attack and Defense on Voltage Over-scaling-based Lightweight Authentication

It is a challenging task to deploy lightweight security protocols in res...
research
07/19/2020

PUF-RLA: A PUF-based Reliable and Lightweight Authentication Protocol employing Binary String Shuffling

Physically unclonable functions (PUFs) can be employed for device identi...
research
06/14/2022

An Attack Resilient PUF-based Authentication Mechanism for Distributed Systems

In most PUF-based authentication schemes, a central server is usually en...
research
06/06/2018

DMOS-PUF: Dynamic Multi-key-selection Obfuscation for Strong PUFs against Machine Learning Attacks

Strong physical unclonable function (PUF) is a promising solution for de...
research
06/06/2018

CMOS: Dynamic Multi-key Obfuscation Structure for Strong PUFs

Strong physical unclonable function (PUF) is a promising solution for de...
research
06/07/2020

Novel Randomized Placement for FPGA Based Robust ROPUF with Improved Uniqueness

The physical unclonable functions (PUF) are used to provide software as ...
research
12/05/2017

Memory-based Combination PUFs for Device Authentication in Embedded Systems

Embedded systems play a crucial role in fueling the growth of the Intern...

Please sign up or login with your details

Forgot password? Click here to reset