Authentication against Man-in-the-Middle Attack with a Time-variant Reconfigurable Dual-LFSR-based Arbiter PUF

07/21/2020
by   Yao Wang, et al.
0

With the expansion of the Internet of Things industry, the information security of Internet of Things devices attracts much attention. Traditional encryption algorithms require sensitive information such as keys to be stored in memory, and also need the support of operating system, which is obviously unacceptable for resource-constrained Internet of Things terminals. Physical not cloning function by extracting the chip is inevitable in the process of manufacturing process deviation, the introduction of the corresponding function relationship between incentive and response, not to need the storage user sensitive information, and only when electricity will respond, in power response immediately disappear, this can save a lot of resources of equipment and the power consumption. However, PUF is vulnerable to modeling attacks, and the traditional methods such as the challenge obfuscation method are time-invariant, which is equivalent to adding a fixed function to the front stage of a traditional APUF circuit. Therefore, it can be potentially modelling attacked with sufficient CRPs. In order to further enhance APUF circuit resistance to modelling attack, this paper proposes a dual-LFSR-based APUF circuit with time-variant challenge obfuscation. Besides, traditional authentication scheme generally adopts the one-time key scheme to enhance resistance to man-in-the-middle attack. The two-time authentication scheme proposed in this paper can improve the ability of RFID system to resist man-in-the-middle attack without sacrificing CRPs.

READ FULL TEXT
research
06/14/2018

Towards Implementation of Robust and Low-Cost Security Primitives for Resource-Constrained IoT Devices

In recent years, due to the trend in globalization, system integrators h...
research
10/07/2022

Physics inspired compact modelling of BiFeO_3 based memristors for hardware security applications

With the advent of the Internet of Things, nanoelectronic devices or mem...
research
01/31/2020

Photonic Pseudo-Random Number Generator for Internet-of-Things Authentication using a Waveguide based Physical Unclonable Function

In this paper we experimentally evaluate a physical unclonable function ...
research
07/29/2018

TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs

A physical unclonable function (PUF) generates hardware intrinsic volati...
research
05/26/2023

Attacks on Continuous Chaos Communication and Remedies for Resource Limited Devices

The Global Wearable market is anticipated to rise at a considerable rate...
research
09/26/2022

Trends, Opportunities, and Challenges in Using Restricted Device Authentication in Fog Computing

The few resources available on devices restricted in Internet of Things ...
research
12/05/2017

Memory-based Combination PUFs for Device Authentication in Embedded Systems

Embedded systems play a crucial role in fueling the growth of the Intern...

Please sign up or login with your details

Forgot password? Click here to reset