A PUF-Based Modeling-Attack Resilient Authentication Protocol for IoT Devices

Date

2021-07-19

Department

Program

Citation of Original Publication

Ebrahimabadi, Mohammad; Younis, Mohamed; Karimi, Naghmeh; A PUF-Based Modeling-Attack Resilient Authentication Protocol for IoT Devices; IEEE Internet of Things Journal ( Early Access ), pages 1-1, 19 July, 2021; https://doi.org/10.1109/JIOT.2021.3098496

Rights

This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
© 2021 IEEE.  Personal use of this material is permitted.  Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Subjects

Abstract

Physical Unclonable Functions (PUFs) offer a promising solution for authentication of IoT devices as they provide unique fingerprints for the underlying devices through their challenge-response pairs. However, PUFs have been shown to be vulnerable to modeling attacks. In this paper, we propose a novel protocol to thwart such vulnerability by limiting the adversary’s ability to intercept the whole challenge bits exchanged with IoT nodes. We split the challenge bits over multiple messages and engage one or multiple helper nodes in the dissemination process. We further study the implications of various parts of the challenge patterns on the modeling attack and propose extensions of our protocol that exploit bits scrambling and padding to ameliorate the attack resiliency. The experimental results extracted from a 16-bit and a 64-bit arbiter-PUF implemented on FPGA demonstrate the effectiveness of the proposed methods in boosting the robustness of IoT authentication.