An Attack Resilient PUF-based Authentication Mechanism for Distributed Systems

06/14/2022
by   Mohammad Ebrahimabadi, et al.
0

In most PUF-based authentication schemes, a central server is usually engaged to verify the response of the device's PUF to challenge bit-streams. However, the server availability may be intermittent in practice. To tackle such an issue, this paper proposes a new protocol for supporting distributed authentication while avoiding vulnerability to information leakage where CRPs could be retrieved from hacked devices and collectively used to model the PUF. The main idea is to provision for scrambling the challenge bit-stream in a way that is dependent on the verifier. The scrambling pattern varies per authentication round for each device and independently across devices. In essence, the scrambling function becomes node- and packet-specific and the response received by two verifiers of one device for the same challenge bit-stream could vary. Thus, neither the scrambling function can be reverted, nor the PUF can be modeled even by a collusive set of malicious nodes. The validation results using data of an FPGA-based implementation demonstrate the effectiveness of our approach in thwarting PUF modeling attacks by collusive actors. We also discuss the approach resiliency against impersonation, Sybil, and reverse engineering attacks.

READ FULL TEXT
research
07/19/2020

PUF-RLA: A PUF-based Reliable and Lightweight Authentication Protocol employing Binary String Shuffling

Physically unclonable functions (PUFs) can be employed for device identi...
research
05/12/2023

A Lightweight Authentication Protocol against Modeling Attacks based on a Novel LFSR-APUF

Simple authentication protocols based on conventional physical unclonabl...
research
07/29/2018

TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs

A physical unclonable function (PUF) generates hardware intrinsic volati...
research
04/14/2021

Federated Learning-based Active Authentication on Mobile Devices

User active authentication on mobile devices aims to learn a model that ...
research
07/22/2020

Exploiting Behavioral Side-Channels in Observation Resilient Cognitive Authentication Schemes

Observation Resilient Authentication Schemes (ORAS) are a class of share...
research
03/27/2023

Collaborative Authentication for 6G Networks: An Edge Intelligence based Autonomous Approach

The conventional device authentication of wireless networks usually reli...

Please sign up or login with your details

Forgot password? Click here to reset