A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices

PUFs, or physical unclonable functions, are hardware security primitives that can offer lightweight security solutions for constrained devices through challenge-response authentication protocols. However, the lightweight PUF-based security solutions that have been presented often lack security featu...

Full description

Bibliographic Details
Main Authors: Tarek A. Idriss, Haytham A. Idriss, Magdy A. Bayoumi
Format: Article
Language:English
Published: IEEE 2021-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9444356/
_version_ 1819099323092172800
author Tarek A. Idriss
Haytham A. Idriss
Magdy A. Bayoumi
author_facet Tarek A. Idriss
Haytham A. Idriss
Magdy A. Bayoumi
author_sort Tarek A. Idriss
collection DOAJ
description PUFs, or physical unclonable functions, are hardware security primitives that can offer lightweight security solutions for constrained devices through challenge-response authentication protocols. However, the lightweight PUF-based security solutions that have been presented often lack security features such as mutual authentication or message encryption, which could be vital for many applications. Other protocols suffer from vulnerabilities to denial of service attacks that make them impractical to use. This work introduces a lightweight PUF-based protocol that uses secret pattern recognition to offer mutual authentication and authenticated secret message exchange for constrained devices on the Internet of Things. The protocol utilizes several techniques to introduce nonlinearity, and it can employ any strong PUF circuit for which a soft model can be generated. The authentication process requires simple bitwise operations along with a PUF circuit and a true random number generator (TRNG). By avoiding the use of any cryptographic or hash functions, the protocol’s lightweight nature is preserved. The security of the proposed protocol against modeling attacks is tested to showcase its resilience. Similar PUF-based protocols are investigated and found to lack some essential security features.
first_indexed 2024-12-22T00:45:03Z
format Article
id doaj.art-b95f085b3cf848c6bc981b0011409c3c
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-22T00:45:03Z
publishDate 2021-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-b95f085b3cf848c6bc981b0011409c3c2022-12-21T18:44:34ZengIEEEIEEE Access2169-35362021-01-019805468055810.1109/ACCESS.2021.30849039444356A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT DevicesTarek A. Idriss0https://orcid.org/0000-0003-4446-9444Haytham A. Idriss1https://orcid.org/0000-0002-2904-9137Magdy A. Bayoumi2https://orcid.org/0000-0002-0630-5273Department of Computer Science, Western Washington University, Bellingham, WA, USACenter for Advanced Computer Studies, University of Louisiana at Lafayette, Lafayette, LA, USACenter for Advanced Computer Studies, University of Louisiana at Lafayette, Lafayette, LA, USAPUFs, or physical unclonable functions, are hardware security primitives that can offer lightweight security solutions for constrained devices through challenge-response authentication protocols. However, the lightweight PUF-based security solutions that have been presented often lack security features such as mutual authentication or message encryption, which could be vital for many applications. Other protocols suffer from vulnerabilities to denial of service attacks that make them impractical to use. This work introduces a lightweight PUF-based protocol that uses secret pattern recognition to offer mutual authentication and authenticated secret message exchange for constrained devices on the Internet of Things. The protocol utilizes several techniques to introduce nonlinearity, and it can employ any strong PUF circuit for which a soft model can be generated. The authentication process requires simple bitwise operations along with a PUF circuit and a true random number generator (TRNG). By avoiding the use of any cryptographic or hash functions, the protocol’s lightweight nature is preserved. The security of the proposed protocol against modeling attacks is tested to showcase its resilience. Similar PUF-based protocols are investigated and found to lack some essential security features.https://ieeexplore.ieee.org/document/9444356/Authenticationhardware securityIoT securitylightweight securityphysical unclonable functions
spellingShingle Tarek A. Idriss
Haytham A. Idriss
Magdy A. Bayoumi
A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices
IEEE Access
Authentication
hardware security
IoT security
lightweight security
physical unclonable functions
title A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices
title_full A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices
title_fullStr A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices
title_full_unstemmed A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices
title_short A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices
title_sort lightweight puf based authentication protocol using secret pattern recognition for constrained iot devices
topic Authentication
hardware security
IoT security
lightweight security
physical unclonable functions
url https://ieeexplore.ieee.org/document/9444356/
work_keys_str_mv AT tarekaidriss alightweightpufbasedauthenticationprotocolusingsecretpatternrecognitionforconstrainediotdevices
AT haythamaidriss alightweightpufbasedauthenticationprotocolusingsecretpatternrecognitionforconstrainediotdevices
AT magdyabayoumi alightweightpufbasedauthenticationprotocolusingsecretpatternrecognitionforconstrainediotdevices
AT tarekaidriss lightweightpufbasedauthenticationprotocolusingsecretpatternrecognitionforconstrainediotdevices
AT haythamaidriss lightweightpufbasedauthenticationprotocolusingsecretpatternrecognitionforconstrainediotdevices
AT magdyabayoumi lightweightpufbasedauthenticationprotocolusingsecretpatternrecognitionforconstrainediotdevices