PUF-RAKE: A PUF-Based Robust and Lightweight Authentication and Key Establishment Protocol

被引:62
作者
Qureshi, Mahmood Azhar [1 ]
Munir, Arslan [1 ]
机构
[1] Kansas State Univ, Dept Comp Sci, Intelligent Syst Comp Architecture Analyt & Secur, Manhattan, KS 66506 USA
关键词
Authentication; Protocols; Servers; Hardware; Reliability; Integrated circuit modeling; Noise measurement; key establishment; PUFs; security; reliability; lightweight; bit shuffling; ARBITER PUF;
D O I
10.1109/TDSC.2021.3059454
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Physically unclonable functions (PUFs) bind a device's identity to its physical hardware and thus, can be employed for device identification, authentication and cryptographic key generation. However, PUFs are susceptible to modeling attacks if a number of PUFs' challenge-response pairs (CRPs) are exposed to the adversary. Furthermore, many of the embedded devices requiring authentication and inter-device communication in a real-time environment/system have stringent resource and low latency requirements, and thus require a lightweight authentication and key establishment mechanism to quickly realize an authenticated and secure connection. We propose PUF-RAKE, a PUF-based lightweight, highly reliable authentication and key establishment scheme. The proposed scheme enhances the reliability of PUF as well as alleviates the resource constraints by employing error correction in the server instead of the device as well as removing cryptographic hashing required by earlier PUF-based protocols. The proposed PUF-RAKE is robust against masquerade, brute force, replay, and modeling attacks. In PUF-RAKE, we introduce an inexpensive yet secure stream authentication scheme inside the device which authenticates the server before the underlying PUF can be invoked. This prevents an adversary from brute forcing the device's PUF to acquire CRPs essentially locking out the device from unauthorized model generation. Additionally, we also introduce a lightweight CRP obfuscation mechanism involving XOR and shuffle operations. The security of PUF-RAKE has been formally verified. A prototype of the protocol has been implemented on two Xilinx Zynq 7000 system-on-chips with one present on Xilinx zc706 evaluation board and the other present on the Avnet Zedboard. Observations, security analysis and results verify that the PUF-RAKE is secure against a probabilistic polynomial time adversary under both the unauthenticated link and authenticated link adversarial models while providing similar to 99% reliable authentication. In addition, PUF-RAKE provides a reduction of 60 and 72 percent for look-up tables (LUTs) and register count, respectively, in the programmable logic (PL) part of the Zynq 7000 as compared to a recently proposed approach while providing additional advantages.
引用
收藏
页码:2457 / 2475
页数:19
相关论文
共 38 条
[1]  
Alkatheiri MS, 2017, 2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, P181, DOI 10.1109/DESEC.2017.8073845
[2]  
Awano H, 2019, IEEE INT SYMP CIRC S
[3]   End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol [J].
Aysu, Aydin ;
Gulcan, Ege ;
Moriyama, Daisuke ;
Schaumont, Patrick ;
Yung, Moti .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 :556-576
[4]   On the Pitfalls of Using Arbiter-PUFs as Building Blocks [J].
Becker, Georg T. .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (08) :1295-1307
[5]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[6]   Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database [J].
Chatterjee, Urbi ;
Govindan, Vidya ;
Sadhukhan, Rajat ;
Mukhopadhyay, Debdeep ;
Chakraborty, Rajat Subhra ;
Mahata, Debashis ;
Prabhu, Mukesh M. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (03) :424-437
[7]   Secure lightweight entity authentication with strong PUFs: Mission impossible? [J].
Delvaux, Jeroen ;
Gu, Dawu ;
Schellekens, Dries ;
Verbauwhede, Ingrid .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8731 :451-475
[8]   PUF-FSM: A Controlled Strong PUF [J].
Gao, Yansong ;
Ma, Hua ;
Al-Sarawi, Said F. ;
Abbott, Derek ;
Ranasinghe, Damith C. .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (05) :1104-1108
[9]   Controlled Physical Random Functions [J].
Gassend, B ;
Clarke, D ;
van Dijk, M ;
Devadas, S .
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, :149-160
[10]   Controlled physical random functions and applications [J].
Gassend, Blaise ;
Van Dijk, Marten ;
Clarke, Dwaine ;
Torlak, Emina ;
Devadas, Srinivas ;
Tuyls, Pim .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 10 (04)