A PUF-based hardware mutual authentication protocol

被引:34
作者
Barbareschi, Mario [1 ]
De Benedictis, Alessandra [1 ]
Mazzocca, Nicola [1 ]
机构
[1] Univ Naples Federico II, Dept Elect Engn & Informat Technol, Naples, Italy
关键词
PUF; Mutual authentication; FPGA; Hardware security; PHYSICAL UNCLONABLE FUNCTIONS; DESIGN; SECURE; KEYS; ROBUST;
D O I
10.1016/j.jpdc.2018.04.007
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Physically Unclonable Functions (PUFs) represent a promising security primitive due to their unclonability, uniqueness and tamper-evident properties, and have been recently exploited for device identification and authentication, and for secret key generation and storage purposes. In this paper, we present PHEMAP (Physical Hardware-Enabled Mutual Authentication Protocol), that allows to achieve mutual authentication in a one-to-many communication scenario, where multiple devices are connected to a sink node. The protocol exploits the recursive invocation of the PUF embedded on the devices to generate sequences (chains) of values that are used to achieve synchronization among communicating parties. We demonstrate that, under reasonable assumptions, PHEMAP is secure and robust against man in-the-middle attacks and other common physical attacks. We discuss PHEMAP performance in several operation conditions, by measuring the efficiency of the protocol when varying some of the underlying parameters. Finally, we present an implementation of PHEMAP on devices hosting an FPGA belonging to the Xilinx Zynq-7000 family and embedding an Anderson PUF architecture, and show that the computation and hardware overhead introduced by the protocol makes it feasible for commercial mid-range devices. (C) 2018 Elsevier Inc. All rights reserved.
引用
收藏
页码:107 / 120
页数:14
相关论文
共 46 条
[31]   Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions [J].
Maes, Roel ;
Verbauwhede, Ingrid .
TOWARDS HARDWARE-INTRINSIC SECURITY: FOUNDATIONS AND PRACTICE, 2010, :3-37
[32]   A Robust Physical Unclonable Function With Enhanced Challenge-Response Set [J].
Maiti, Abhranil ;
Kim, Inyoung ;
Schaumont, Patrick .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) :333-345
[33]  
Mansfield K. C., COMPUTER NETWORKING
[34]   Physical one-way functions [J].
Pappu, R ;
Recht, R ;
Taylor, J ;
Gershenfeld, N .
SCIENCE, 2002, 297 (5589) :2026-2030
[35]   Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching [J].
Rostami, Masoud ;
Majzoobi, Mehrdad ;
Koushanfar, Farinaz ;
Wallach, Dan S. ;
Devadas, Srinivas .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2014, 2 (01) :37-49
[36]   PUF Modeling Attacks on Simulated and Silicon Data [J].
Ruehrmair, Ulrich ;
Soelter, Jan ;
Sehnke, Frank ;
Xu, Xiaolin ;
Mahmoud, Ahmed ;
Stoyanova, Vera ;
Dror, Gideon ;
Schmidhuber, Juergen ;
Burleson, Wayne ;
Devadas, Srinivas .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (11) :1876-1891
[37]  
Sanders L., 2013, SECURE BOOT ZYNQ 700
[38]   Physical unclonable functions for device authentication and secret key generation [J].
Suh, G. Edward ;
Devadas, Srinivas .
2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, :9-+
[39]   A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation [J].
Tiri, K ;
Verbauwhede, I .
DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, VOLS 1 AND 2, PROCEEDINGS, 2004, :246-251
[40]  
Van der Leest Vincent., 2010, P 5 ACM WORKSHOP SCA, P53, DOI DOI 10.1145/1867635.1867644