首页> 外文期刊>IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems >A Modeling Attack Resistant Deception Technique for Securing Lightweight-PUF-Based Authentication
【24h】

A Modeling Attack Resistant Deception Technique for Securing Lightweight-PUF-Based Authentication

机译:一种抗拒基于轻量级PUF的认证的抗性欺骗技术

获取原文
获取原文并翻译 | 示例

摘要

Silicon physical unclonable function (PUF) has emerged as a promising spoof-proof solution for low-cost device authentication. Due to practical constraints in preventing phishing through a public network or insecure communication channels, simple PUF-based authentication protocol with unrestricted queries and transparent responses is vulnerable to modeling and replay attacks. In this article, we present a modeling attack resistant PUF-based mutual authentication scheme to mitigate the practical limitations in applications where a resource-rich server authenticates a device with no strong restriction imposed on the type of PUF design or any additional protection on the binary channel used for the authentication. Our scheme uses an active deception protocol to prevent machine learning (ML) attacks on a device with a monolithic integration of a genuine strong PUF (SPUF), a fake PUF, a pseudorandom number generator (PRNG), a register, a binary counter, a comparator, and a simple controller. The hardware encapsulation makes the collection of challenge-response pairs (CRPs) easy for model building during enrollment but prohibitively time consuming upon device deployment through the same interface. A genuine server can perform a mutual authentication with the device using a combined fresh challenge contributed by both the server and the device. The message exchanged in clear cannot be manipulated by the adversary to derive unused authentic CRPs. The adversary will have to either wait for an impractically long time to collect enough real CRPs by directly querying the device or the ML model derived from the collected CRPs will be poisoned. The false PUF multiplexing is fortified against the prediction of waiting time by doubling the time penalty for every unsuccessful guess. Our implementation results on field-programmable gate array (FPGA) device and security analysis have corroborated the low hardware overheads and attack resistance of the proposed deception protocol.
机译:硅物理不可渗透功能(PUF)已成为低成本设备认证的有希望的防滑解决方案。由于通过公共网络防止网络钓鱼或不安全的通信通道,基于简单的PUF的身份验证协议,具有不受限制的查询和透明响应的简单的验证协议容易受到建模和重放攻击。在本文中,我们介绍了一种建模攻击基于PUF的相互认证方案,以减轻资源丰富的服务器对设备验证的应用程序中的实际限制,该设备对PUF设计类型或二进制上的任何额外保护产生了没有强制限制的设备用于身份验证的通道。我们的方案采用主动欺骗协议来防止机器学习(ML)对设备的单片集成的机器攻击,具有正版强度PUF(SPUF),假PUF,伪随机数发电机(PRNG),寄存器,二进制计数器,比较器和简单的控制器。硬件封装使挑战 - 响应对(CRPS)的集合容易在注册期间为模型构建而容易,但在通过相同的接口时持久地耗时。使用服务器和设备的组合新鲜挑战,真正的服务器可以使用设备进行相互认证。在清除中交换的消息不能被对手操纵,以导出未使用的真实CRP。对手将不得不等待不切实际的时间来通过直接查询设备或来自收集的CRP的ML模型来毒害,毒死。假PUF多路复用通过加倍每次不成功猜测的时间惩罚加倍等待时间来强化。我们的实现结果在现场可编程门阵列(FPGA)设备和安全性分析中已经证实了所提出的欺骗协议的低硬件开销和攻击阻力。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号