Machine Learning based IoT Edge Node Security Attack and Countermeasures

09/17/2019
by   Vishalini R. Laguduva, et al.
0

Advances in technology have enabled tremendous progress in the development of a highly connected ecosystem of ubiquitous computing devices collectively called the Internet of Things (IoT). Ensuring the security of IoT devices is a high priority due to the sensitive nature of the collected data. Physically Unclonable Functions (PUFs) have emerged as critical hardware primitive for ensuring the security of IoT nodes. Malicious modeling of PUF architectures has proven to be difficult due to the inherently stochastic nature of PUF architectures. Extant approaches to malicious PUF modeling assume that a priori knowledge and physical access to the PUF architecture is available for malicious attack on the IoT node. However, many IoT networks make the underlying assumption that the PUF architecture is sufficiently tamper-proof, both physically and mathematically. In this work, we show that knowledge of the underlying PUF structure is not necessary to clone a PUF. We present a novel non-invasive, architecture independent, machine learning attack for strong PUF designs with a cloning accuracy of 93.5 an alternative, two-stage brute force attack model. We also propose a machine-learning based countermeasure, discriminator, which can distinguish cloned PUF devices and authentic PUFs with an average accuracy of 96.01 proposed discriminator can be used for rapidly authenticating millions of IoT nodes remotely from the cloud server.

READ FULL TEXT

page 2

page 7

research
06/25/2020

Adversarial Machine Learning based Partial-model Attack in IoT

As Internet of Things (IoT) has emerged as the next logical stage of the...
research
12/08/2018

IoT Lotto: Utilizing IoT Devices in Brute-Force Attacks

The number of IoT devices in use is increasing rapidly and so is the num...
research
06/30/2021

A Context-Aware Information-Based Clone Node Attack Detection Scheme in Internet of Things

The rapidly expanding nature of the Internet of Things (IoT) networks is...
research
03/30/2018

HCAP: A History-Based Capability System for IoT Devices

Permissions are highly sensitive in Internet-of-Things (IoT) application...
research
03/24/2021

A Challenge Obfuscating Interface for Arbiter PUF Variants against Machine Learning Attacks

Security is of critical importance for the Internet of Things (IoT). Man...
research
06/07/2022

A Secure and Trusted Mechanism for Industrial IoT Network using Blockchain

Industrial Internet-of-Things (IIoT) is a powerful IoT application which...
research
11/21/2020

A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem

Internet of Things (IoT) provides the possibility for milliards of devic...

Please sign up or login with your details

Forgot password? Click here to reset