Abstract
Because the development of the Internet of Things (IoT) requires technology that transfers information between objects without human intervention, the core of IoT security will be secure authentication between devices or between devices and servers. Software-based authentication may be a security vulnerability in IoT, but hardware-based security technology can provide a strong security environment. Physical unclonable functions (PUFs) are hardware security element suitable for lightweight applications. PUFs can generate challenge–response pairs(CRPs) that cannot be controlled or predicted by utilizing inherent physical variations that occur in the manufacturing process. In particular, the pulsewidth-based memristive PUF (pm-PUF) improves security performance by applying different write pulse widths and bank structures. Bloom filters (BFs) are probabilistic data structures that answer membership queries using small memories. Bloom filters can improve search performance and reduce memory usage and are used in areas such as networking, security, big data, and IoT. In this paper, we propose a structure that applies Bloom filters based on the pm-PUF to reduce PUF data transmission errors. The proposed structure uses two different Bloom filter types that store different information and that are located in front of and behind the pm-PUF, reducing unnecessary access by removing challenges from attacker access. Simulation results show that the proposed structure decreases the data transmission error rate and reuse rate as the Bloom filter size increases; the simulation results also show that the proposed structure improves pm-PUF security with a very small Bloom filter memory.
Highlights
The advent of the Internet of Things (IoT) has led to a web of connections that provides network infrastructure and shares a massive amount of private information among smart devices [1].The requirements for trustworthy communication have been one of the biggest concerns [2].In recent years, it has been demonstrated that hardware-based security systems are more secure than software-based security systems due to innate architectural risks in software [3]
Two different types of Bloom filters are used, the PUF database Bloom filter (PDBF) and challenge–response pair Bloom filter (CRPBF), that store information about the challenge and response of the authentication server; the structure detects arbitrary challenge attacks and reduces error rates originating from the instability of the Physical unclonable functions (PUFs)
At the front of the configuration, the PDBF identifies whether an input challenge is valid by satisfying two conditions before applying it to pulsewidth-based memristive PUF (pm-PUF) directly; one condition is that the challenge is to be included in the challenge–response pairs (CRPs) table shared by the authentication server, and the other condition is that it should not have been previously used for authentication
Summary
Device: PD-CRP (PUF Database and Challenge–Response Pair) Bloom Filter on Memristor-Based PUF. Jungwon Lee 1 , Seoyeon Choi 1,2 , Dayoung Kim 1,2 , Yunyoung Choi 1 and Wookyung Sun 3, *. Smart Factory Multidisciplinary Program, Ewha Womans University, Seoul 03760, Korea. Received: 24 August 2020; Accepted: 21 September 2020; Published: 24 September 2020
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.