2016
DOI: 10.1109/tmscs.2016.2553027
|View full text |Cite
|
Sign up to set email alerts
|

A Lockdown Technique to Prevent Machine Learning on PUFs for Lightweight Authentication

Abstract: Abstract. We present a lightweight PUF-based authentication approach that is practical in settings where a server authenticates a device, and for use cases where the number of authentications is limited over a device's lifetime. Our scheme uses a server-managed challenge/response pair (CRP) lockdown protocol: unlike prior approaches, an adaptive chosenchallenge adversary with machine learning capabilities cannot obtain new CRPs without the server's implicit permission. The adversary is faced with the problem o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
154
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 175 publications
(154 citation statements)
references
References 35 publications
(118 reference statements)
0
154
0
Order By: Relevance
“…The main problems were vulnerability for DoS attacks, replay attacks, impersonation attacks, and synchronization problems. In the lightweight category of proposals are the Slender PUF, [14] noise bifurcation [15] and PUF lockdown protocol [16] retained, while in the non-lightweight category only Reference protocol II-A [13] and the protocol proposed by Sadegi et al [17]. The main difference between these protocols [13][14][15][16][17] and our PUF based protocol is that these protocols take noisiness of the PUF into account, while our protocol considers the usage of a strong and controlled PUF.…”
Section: Key Agreement From Iot Device To Servermentioning
confidence: 99%
See 1 more Smart Citation
“…The main problems were vulnerability for DoS attacks, replay attacks, impersonation attacks, and synchronization problems. In the lightweight category of proposals are the Slender PUF, [14] noise bifurcation [15] and PUF lockdown protocol [16] retained, while in the non-lightweight category only Reference protocol II-A [13] and the protocol proposed by Sadegi et al [17]. The main difference between these protocols [13][14][15][16][17] and our PUF based protocol is that these protocols take noisiness of the PUF into account, while our protocol considers the usage of a strong and controlled PUF.…”
Section: Key Agreement From Iot Device To Servermentioning
confidence: 99%
“…[14,15] also take countermeasures to offer resistance against machine learning attacks, although they cannot be completely excluded [13]. The proposed protocol in [16] prevents an attacker from querying a token for CRPs that have not yet been disclosed during a prior protocol run. The main weakness of [17] is that it does not scale well, as the server needs to exhaustively evaluate a pseudo random function for each registered token.…”
Section: Key Agreement From Iot Device To Servermentioning
confidence: 99%
“…In an authentication scenario, the availability of the adaptive chosen challenges and repeated measurements can be limited by a proposed server managed CRP lockdown protocol [95]. While the lockdown protocol is primarily designed to prevent repeated measurements in the case of ML attacks with noise-side channel information [10], it is effective against the photonic SCA as well.…”
Section: Countermeasuresmentioning
confidence: 99%
“…Mukhopadhyay [14] temporarily fused the access point to CRPs to increase the complexity to build ML model but the PUFs are still not directly secured against ML-MA. Another defense mechanism related to access control is developed by Yu et al [71]. The authentication using PUFs was performed by employing lockdown which requires server's permission to obtain new CRPs.…”
Section: Comparison Analysis Of Defense Mechanisms Against Attacksmentioning
confidence: 99%