2022
DOI: 10.1109/jiot.2021.3098496
|View full text |Cite
|
Sign up to set email alerts
|

A PUF-Based Modeling-Attack Resilient Authentication Protocol for IoT Devices

Abstract: Physical Unclonable Functions (PUFs) offer a promising solution for authentication of IoT devices as they provide unique fingerprints for the underlying devices through their challenge-response pairs. However, PUFs have been shown to be vulnerable to modeling attacks. In this paper, we propose a novel protocol to thwart such vulnerability by limiting the adversary's ability to intercept the whole challenge bits exchanged with IoT nodes. We split the challenge bits over multiple messages and engage one or multi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 44 publications
(12 citation statements)
references
References 75 publications
0
12
0
Order By: Relevance
“…Looking from the LSB to the MSB, the first bit that fails the tests in the Dataset90nm is the 11 th MSB (equivalently the 8 th LSB). Since the percentage of passed tests by this bit is relatively low, the value of 𝑁 𝑟𝑒𝑓 is selected as ⌊ 𝑁 𝑡𝑜𝑝 2 8−3 ⁄ ⌋, that is, 𝑁 𝑟𝑒𝑓 = 8027 = ⌊ 256866 2 5 ⌋, which reduces the resolution of the counters from 18 to 13 bits and increases the throughput of the multibit-RO-PU-TRNG in 2 5 . Looking from the LSB to the MSB, the first bit that fails the tests in the Dataset28nm is the 14 th MSB (equivalently the 9 th LSB).…”
Section: A Results On Calibration and Trng Responsesmentioning
confidence: 99%
See 1 more Smart Citation
“…Looking from the LSB to the MSB, the first bit that fails the tests in the Dataset90nm is the 11 th MSB (equivalently the 8 th LSB). Since the percentage of passed tests by this bit is relatively low, the value of 𝑁 𝑟𝑒𝑓 is selected as ⌊ 𝑁 𝑡𝑜𝑝 2 8−3 ⁄ ⌋, that is, 𝑁 𝑟𝑒𝑓 = 8027 = ⌊ 256866 2 5 ⌋, which reduces the resolution of the counters from 18 to 13 bits and increases the throughput of the multibit-RO-PU-TRNG in 2 5 . Looking from the LSB to the MSB, the first bit that fails the tests in the Dataset28nm is the 14 th MSB (equivalently the 9 th LSB).…”
Section: A Results On Calibration and Trng Responsesmentioning
confidence: 99%
“…Among the electronic PUFs studied in greater depth, those that predominate in IoT devices are delay-based PUFs and memory-based PUFs. The first ones, such as arbiters and PUFs based on ring oscillators (RO PUFs), are more popular in IoT devices with FPGAs [5]. The second ones, such as PUFs based on static random access memories (SRAM PUFs), are more suitable for IoT devices with microcontrollers whose embedded memories are not initialized [6]- [7].…”
Section: Introductionmentioning
confidence: 99%
“…However, some disadvantages, mainly including high computational and hardware overhead or inability to resist some Neural Networks, are discovered thereafter. Recently, a new novel scheme is proposed by the authors in [44]. Their opinion of protecting CRP is to split challenge message into several partitions, which can prevent the whole challenge message from being intercepted by the attacker.…”
Section: Discussion and Limitationsmentioning
confidence: 99%
“…An arbiter-PUF consists of a pair of delay chains; when queried with a challenge bit-stream, it generates one response bit [21]. PUFs operate based on variations in the microelectronics manufacturing process; in the case of Arbiter-PUF these variations introduce a race between two identical paths (top and bottom paths shown in Fig.…”
Section: System Model and Preliminaries A Arbiter-puf Architecturementioning
confidence: 99%