Machine Learning Attack and Defense on Voltage Over-scaling-based Lightweight Authentication

07/20/2018
by   Jiliang Zhang, et al.
0

It is a challenging task to deploy lightweight security protocols in resource-constrained IoT applications. A hardware-oriented lightweight authentication protocol based on device signature generated during voltage over-scaling (VOS) was recently proposed to address this issue. VOS-based authentication employs the computation unit such as adders to generate the process variation dependent error which is combined with secret keys to create a two-factor authentication protocol. In this paper, machine learning (ML)-based modeling attacks to break such authentication is presented. We also propose a dynamic obfuscation mechanism based on keys (DOMK) for the VOS-based authentication to resist ML attacks. Experimental results show that ANN, RNN and CMA-ES can clone the challenge-response behavior of VOS-based authentication with up to 99.65 accuracy is less than 51.2 technique.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/19/2020

PUF-RLA: A PUF-based Reliable and Lightweight Authentication Protocol employing Binary String Shuffling

Physically unclonable functions (PUFs) can be employed for device identi...
research
05/12/2023

A Lightweight Authentication Protocol against Modeling Attacks based on a Novel LFSR-APUF

Simple authentication protocols based on conventional physical unclonabl...
research
09/23/2019

LEAP: A Lightweight Encryption and Authentication Protocol for In-Vehicle Communications

The Controller Area Network (CAN) is considered as the de-facto standard...
research
07/11/2022

PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Intra-Group-based Authentication with DRAM-PUFs Using Machine Learning

As the demand for highly secure and dependable lightweight systems incre...
research
06/06/2018

DMOS-PUF: Dynamic Multi-key-selection Obfuscation for Strong PUFs against Machine Learning Attacks

Strong physical unclonable function (PUF) is a promising solution for de...
research
11/22/2017

Cloud-Based Secure Authentication (CSA) Protocol Suite for Defense against DoS Attacks

Cloud-based services have become part of our day-to-day software solutio...
research
03/04/2023

Zero-Effort Two-Factor Authentication Using Wi-Fi Radio Wave Transmission and Machine Learning

The proliferation of sensitive information being stored online highlight...

Please sign up or login with your details

Forgot password? Click here to reset