PUF-RLA: A PUF-based Reliable and Lightweight Authentication Protocol employing Binary String Shuffling

07/19/2020
by   Mahmood Azhar Qureshi, et al.
0

Physically unclonable functions (PUFs) can be employed for device identification, authentication, secret key storage, and other security tasks. However, PUFs are susceptible to modeling attacks if a number of PUFs' challenge-response pairs (CRPs) are exposed to the adversary. Furthermore, many of the embedded devices requiring authentication have stringent resource constraints and thus require a lightweight authentication mechanism. We propose PUF-RLA, a PUF-based lightweight, highly reliable authentication scheme employing binary string shuffling. The proposed scheme enhances the reliability of PUF as well as alleviates the resource constraints by employing error correction in the server instead of the device without compromising the security. The proposed PUF-RLA is robust against brute force, replay, and modeling attacks. In PUF-RLA, we introduce an inexpensive yet secure stream authentication scheme inside the device which authenticates the server before the underlying PUF can be invoked. This prevents an adversary from brute forcing the device's PUF to acquire CRPs essentially locking out the device from unauthorized model generation. Additionally, we also introduce a lightweight CRP obfuscation mechanism involving XOR and shuffle operations. Results and security analysis verify that the PUF-RLA is secure against brute force, replay, and modeling attacks, and provides  99 In addition, PUF-RLA provides a reduction of 63 (LUTs) and register count, respectively, in FPGA compared to a recently proposed approach while providing additional authentication advantages.

READ FULL TEXT

page 1

page 5

research
07/20/2018

Machine Learning Attack and Defense on Voltage Over-scaling-based Lightweight Authentication

It is a challenging task to deploy lightweight security protocols in res...
research
06/14/2022

An Attack Resilient PUF-based Authentication Mechanism for Distributed Systems

In most PUF-based authentication schemes, a central server is usually en...
research
07/11/2022

PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Intra-Group-based Authentication with DRAM-PUFs Using Machine Learning

As the demand for highly secure and dependable lightweight systems incre...
research
05/12/2023

A Lightweight Authentication Protocol against Modeling Attacks based on a Novel LFSR-APUF

Simple authentication protocols based on conventional physical unclonabl...
research
07/29/2018

TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs

A physical unclonable function (PUF) generates hardware intrinsic volati...
research
09/21/2020

Adversary Models for Mobile Device Authentication

Mobile device authentication has been a highly active research topic for...
research
03/27/2018

POKs Based Low Energy Authentication Scheme for Implantable Medical Devices

Implantable medical devices (IMDs), including pacemakers, implanted card...

Please sign up or login with your details

Forgot password? Click here to reset