首页> 外文会议>IEEE International Conference on Signal and Image Processing >A Modeling Attack Resistant Scheme Based on Fault Injection
【24h】

A Modeling Attack Resistant Scheme Based on Fault Injection

机译:基于故障注入的建模抗攻击方案

获取原文

摘要

Physical Unclonable Function (PUFs) as security primitive is an ideal solution to realize lightweight security authentication in the Internet of Things (IoTs) applications. Unfortunately, Strong PUFs such as Arbiter PUFs is subject to modeling attack, modeling attack can create the mathematical models of PUFs based on collected Challenge-Response Pairs (CRPs). In order to enhance the resistance of PUFs against modeling attack, a number of countermeasures have been proposed successively, however, they have limited resistance against modeling attack and is too costly for resource-constraint pervasive devices. In this paper, we propose a lightweight obfuscation techniques based on Fault Injection to resist modeling attack. In our scheme, the mapping of CRPs is broken by injecting random faults into the responses. Even if there is enough CRPs, modeling attack can't create accurate mathematical models, due to the mapping of CRPs is randomization. We implemented our obfuscation scheme based on an improved Arbiter PUFs, and evaluated the modeling attack resistance of basic Arbiter PUFs, improved Arbiter PUFs, and our obfuscation scheme. The experimental result indicates that the prediction accuracy of the improved Arbiter PUF is decreased from about 98% to about 86% and further reduced to about 65% by injecting 25% faults, which is based on the training set of 500,000 CRPs. Hence, the obfuscation techniques based on fault injection can provide an effective protection against modeling attack.
机译:物理不可克隆功能(PUF)作为安全原语是在物联网(IoT)应用程序中实现轻量级安全身份验证的理想解决方案。不幸的是,诸如仲裁器PUF之类的强大PUF容易受到建模攻击,建模攻击可以基于收集到的质询-响应对(CRP)创建PUF的数学模型。为了增强PUF对建模攻击的抵抗力,已经陆续提出了许多对策,但是,它们对建模攻击的抵抗力有限,并且对于资源受限的普及设备而言过于昂贵。在本文中,我们提出了一种基于故障注入的轻量级混淆技术,以抵抗建模攻击。在我们的方案中,通过将随机故障注入响应中来破坏CRP的映射。即使CRP足够,建模攻击也无法创建准确的数学模型,因为CRP的映射是随机的。我们基于改进的仲裁器PUF实施了混淆方案,并评估了基本仲裁器PUF,改进的仲裁器PUF的建模抗攻击性以及混淆方案。实验结果表明,基于500,000个CRP的训练集,改进的Arbiter PUF的预测精度从大约98%降低到大约86%,并通过注入25%的故障进一步降低到大约65%。因此,基于故障注入的混淆技术可以为模型攻击提供有效的保护。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号