Fortifying Strong PUFs: A Modeling Attack-Resilient Approach Using Weak PUF for IoT Device Security

被引:2
作者
Alahmadi, Sara [1 ]
Khalil, Kasem [2 ]
Idriss, Haytham [3 ]
Bayoumi, Magdy [4 ]
机构
[1] Univ Louisiana Lafayette, Ctr Adv Comp Studies, Lafayette, LA 70504 USA
[2] Univ Mississippi, Dept Elect & Comp Engn, University, MS USA
[3] Purdue Univ Ft Wayne, Comp Sci Dept, Ft Wayne, IN USA
[4] Univ Louisiana Lafayette, Dept Elect & Comp Engn, Lafayette, LA USA
来源
2024 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS 2024 | 2024年
关键词
Physically Unclonable Function; Modeling Attack; Hardware Security; Authentication; IoT; AUTHENTICATION;
D O I
10.1109/ISCAS58744.2024.10558469
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Strong Physical Unclonable Functions (PUFs) have gained traction as lightweight authentication solutions for IoT devices. However, their vulnerability to machine learning attacks poses a security risk. Various strategies have been introduced in the literature to enhance its resilience against modeling attacks, introducing additional complexity and making them unsuitable for resource-constrained devices. In contrast, weak PUFs exhibit inherent resistance to modeling attacks, but they suffer from a restricted number of Challenge-Response Pairs (CRPs), thus unsuitable for authentication. This paper proposes a PUF design that incorporates weak PUFs to obscure the responses of Strong PUFs, effectively safeguarding them from modeling attacks. Our design shows resilience against a modeling attack, revealing a maximum accuracy of 57% despite using 107 CRPs. The proposed method is implemented on the Artix-7 FPGA with Verilog HDL. The results demonstrate that the proposed method has a small footprint in terms of resource utilization. This innovative approach offers a lightweight solution for IoT device authentication, combining the strengths of strong and weak PUFs while mitigating the vulnerabilities associated with modeling attacks.
引用
收藏
页数:5
相关论文
共 24 条
[1]   Landscape of IoT security [J].
Aidoo, Andy ;
Schiller, Eryk ;
Fuhrer, Jara ;
Stahl, Jonathan ;
Ziorjen, Michael ;
Stiller, Burkhard .
COMPUTER SCIENCE REVIEW, 2022, 44
[2]  
Akter S., 2023, IEEE ACCESS
[3]   Hardware Security in the Internet of Things: A Survey [J].
Akter, Sonia ;
Khalil, Kasem ;
Bayoumi, Magdy .
2023 IEEE 36TH INTERNATIONAL SYSTEM-ON-CHIP CONFERENCE, SOCC, 2023, :114-119
[4]   Security Scalability of Arbiter PUF Designs [J].
Alahmadi, Sara ;
Idriss, Haytham ;
Rojas, Pablo ;
Bayoumi, Magdy .
2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS, 2023,
[5]  
Dey B, 2019, MIDWEST SYMP CIRCUIT, P211, DOI [10.1109/MWSCAS.2019.8885015, 10.1109/mwscas.2019.8885015]
[6]   Identification and authentication of integrated circuits [J].
Gassend, B ;
Lim, D ;
Clarke, D ;
van Dijk, M ;
Devadas, S .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2004, 16 (11) :1077-1098
[7]  
Gassend B., 2002, Proceedings of the 9th ACM Conference on Computer and Communications Security, P148, DOI [10.1145/586110.586132, DOI 10.1145/586131.586132, DOI 10.1145/586110.586132]
[8]   Shadow PUFs: Generating Temporal PUFs with Properties Isomorphic to Delay-Based APUFs [J].
Idriss, Haytham ;
Rojas, Pablo ;
Alahmadi, Sara ;
Idriss, Tarek ;
Carlson, Albert ;
Bayoumi, Magdy .
2022 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS 22), 2022, :175-179
[9]   A Review of Security Standards and Frameworks for IoT-Based Smart Environments [J].
Karie, Nickson M. ;
Sahri, Nor Masri ;
Yang, Wencheng ;
Valli, Craig ;
Kebande, Victor R. .
IEEE ACCESS, 2021, 9 :121975-121995
[10]  
Khalil K., 2020, 2020 IEEE 6 WORLD, P1, DOI DOI 10.1109/wf-iot48130.2020.9221153