Abstract

Security component in IoT system are very crucial because the devices within the IoT system are exposed to numerous malicious attacks. Typical security components in IoT system performs authentication, authorization, message and content integrity check. Regarding authentication, it is normally performed using classical authentication scheme using crypto module. However, the utilization of the crypto module in IoT authentication is not feasible because of the distributed nature of the IoT system which complicates the message cipher and decipher process. Thus, the Physical Unclonable Function (PUF) is suggested to replace crypto module for IoT authentication because it only utilizes responses from set of challenges instead of cryptographic keys to authenticate devices. PUF can generate large number of challenge-response pairs (CRPs) which is good for authentication because the unpredictability is high. However, with the emergence of machine learning modeling, the CRPs now can be predicted through machine learning algorithms. Various defense mechanisms were proposed to counter machine learning modeling attacks (ML-MA). Although they were experimentally proven to be able to increase resiliency against ML-MA, they caused the generated responses to be instable and incurred high area overhead. Thus, there is a need to design the best defense mechanism which is not only resistant to ML-MA but also produces reliable responses and reduces area overhead. This paper presents an analysis on defense mechanisms against ML-MA on strong PUFs for IoT authentication.

Highlights

  • In todays‘ industrial and civil applications, there are vast number of devices that are connected in a network known as Internet of Things (IoT) [1]

  • This paper presents a comparison analysis on various defense mechanisms against machine learning modeling attacks (ML-MA) on variants of strong Physical Unclonable Function (PUF)

  • Because of this authentication scheme makes use of large challenge-response pairs (CRPs) within short authentication period, the interface between verifier and device must be unrestrictedly open to allow the verification to complete faster. This makes the embedded PUFs in devices are subjected to ML-MA because the volume of CRPs can be learnt by the third party to eventually discard the unclonability property and model the strong PUFs [5]

Read more

Summary

INTRODUCTION

In todays‘ industrial and civil applications, there are vast number of devices that are connected in a network known as Internet of Things (IoT) [1] Many issues such as connectivity, power consumption and security have been arisen due to the implementation of IoT. The device is expected to use the issued cryptography key to authenticate itself [2] This method requires message ciphering, each IoT device must comprises of at least a cryptography module, to accomplish security primitives requested by the verifier [3]. As for weak PUFs, they are suitable for key generation in cryptographic-based authentication scheme Both strong and weak PUFs are exposed to various kinds of attacks such as machine learning modeling attacks (ML-MA), side channel analysis (SCA), fault injection and physical tampering.

BACKGROUND
PUFS: VARIANTS AND ATTACKS
Variants of PUFs
Attacks on PUFs
IOT AUTHENTICATION-STRONG OR WEAK PUFS
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.