Deep PUF: A Highly Reliable DRAM PUF-Based Authentication for IoT Networks Using Deep Convolutional Neural Networks

被引:24
|
作者
Najafi, Fatemeh [1 ]
Kaveh, Masoud [2 ]
Martin, Diego [1 ]
Reza Mosavi, Mohammad [2 ]
机构
[1] Univ Politecn Madrid, ETSI Telecomunicac, Av Complutense 30, Madrid 28040, Spain
[2] Iran Univ Sci & Technol, Dept Elect Engn, Tehran 1311416846, Iran
关键词
DRAM latency-based PUF; IoT; authentication; convolutional neural network; LIGHTWEIGHT AUTHENTICATION; UNCLONABLE FUNCTIONS; SECURITY; INTERNET; ROBUST;
D O I
10.3390/s21062009
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Traditional authentication techniques, such as cryptographic solutions, are vulnerable to various attacks occurring on session keys and data. Physical unclonable functions (PUFs) such as dynamic random access memory (DRAM)-based PUFs are introduced as promising security blocks to enable cryptography and authentication services. However, PUFs are often sensitive to internal and external noises, which cause reliability issues. The requirement of additional robustness and reliability leads to the involvement of error-reduction methods such as error correction codes (ECCs) and pre-selection schemes that cause considerable extra overheads. In this paper, we propose deep PUF: a deep convolutional neural network (CNN)-based scheme using the latency-based DRAM PUFs without the need for any additional error correction technique. The proposed framework provides a higher number of challenge-response pairs (CRPs) by eliminating the pre-selection and filtering mechanisms. The entire complexity of device identification is moved to the server side that enables the authentication of resource-constrained nodes. The experimental results from a 1Gb DDR3 show that the responses under varying conditions can be classified with at least a 94.9% accuracy rate by using CNN. After applying the proposed authentication steps to the classification results, we show that the probability of identification error can be drastically reduced, which leads to a highly reliable authentication.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 50 条
  • [21] A New PUF-Based Protocol for Mutual Authentication and Key Agreement Between Three Layers of Entities in Cloud-Based IoMT Networks
    Modarres, Amir Masoud Aminian
    Anzabi-Nezhad, Nima S.
    Zare, Maryam
    IEEE ACCESS, 2024, 12 : 21807 - 21824
  • [22] PUF-based mutual authentication and session key establishment protocol for IoT devices
    Zerrouki F.
    Ouchani S.
    Bouarfa H.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (09) : 12575 - 12593
  • [23] PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices
    Lee, JoonYoung
    Oh, JiHyeon
    Kwon, DeokKyu
    Kim, MyeongHyun
    Yu, SungJin
    Jho, Nam-Su
    Park, Youngho
    SENSORS, 2022, 22 (18)
  • [24] DC-PUF: Machine learning-resistant PUF-based authentication protocol using dependency chain for resource-constraint IoT devices
    Sajadi, Abolfazl
    Shabani, Ahmad
    Alizadeh, Bijan
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2023, 217
  • [25] PUF-based Lightweight Mutual Authentication Protocol for Internet of Things (IoT) Devices
    Raj, Kamal
    Bodapati, Srinivasu
    Chattopadhyay, Anupam
    2024 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS 2024, 2024,
  • [26] PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey
    Mall, Priyanka
    Amin, Ruhul
    Das, Ashok Kumar
    Leung, Mark T.
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11): : 8205 - 8228
  • [27] Reliable PUF-based mutual authentication protocol for UAVs towards multi-domain environment
    Tian, Chuang
    Jiang, Qi
    Li, Teng
    Zhang, Junwei
    Xi, Ning
    Ma, Jianfeng
    COMPUTER NETWORKS, 2022, 218
  • [28] Securing the IoT-enabled smart healthcare system: A PUF-based resource-efficient authentication mechanism
    Alruwaili, Omar
    Tanveer, Muhammad
    Alotaibi, Faisal Mohammed
    Abdelfattah, Waleed
    Armghan, Ammar
    Alserhani, Faeiz M.
    HELIYON, 2024, 10 (18)
  • [29] A practical and flexible PUF-based end-to-end anonymous authentication protocol for IoT
    Li, Sensen
    Huang, Yicai
    Yu, Bin
    COMPUTER NETWORKS, 2024, 247
  • [30] PUF-Based Robust and Anonymous Authentication and Key Establishment Scheme for V2G Networks
    Yu, Sungjin
    Park, Kisung
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (09): : 15450 - 15464