An Attack Resilient PUF-based Authentication Mechanism for Distributed Systems

2022 35th International Conference on VLSI Design and 2022 21st International Conference on Embedded Systems (VLSID)(2022)

引用 1|浏览9
暂无评分
摘要
In most PUF-based authentication schemes, a central server is usually engaged to verify the response of the device’s PUF to challenge bit-streams. However, the server availability may be intermittent in practice. To tackle such an issue, this paper proposes a new protocol for supporting distributed authentication while avoiding vulnerability to information leakage where CRPs could be retrieved from hacked devices and collectively used to model the PUF. The main idea is to provision for scrambling the challenge bit-stream in a way that is dependent on the verifier. The scrambling pattern varies per authentication round for each device and independently across devices. In essence, the scrambling function becomes node- and packetspecific and the response received by two verifiers of one device for the same challenge bit-stream could vary. Thus, neither the scrambling function can be reverted, nor the PUF can be modeled even by a collusive set of malicious nodes. The validation results using data of an FPGA-based implementation demonstrate the effectiveness of our approach in thwarting PUF modeling attacks by collusive actors. We also discuss the approach resiliency against impersonation, Sybil, and reverse engineering attacks.
更多
查看译文
关键词
attack resilient PUF-based authentication mechanism,distributed systems,PUF-based authentication schemes,central server,bit-streams,server availability,distributed authentication,hacked devices,authentication round,scrambling function,FPGA-based implementation,scrambling pattern
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要