A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices
PUFs, or physical unclonable functions, are hardware security primitives that can offer lightweight security solutions for constrained devices through challenge-response authentication protocols. However, the lightweight PUF-based security solutions that have been presented often lack security featu...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2021-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9444356/ |
_version_ | 1819099323092172800 |
---|---|
author | Tarek A. Idriss Haytham A. Idriss Magdy A. Bayoumi |
author_facet | Tarek A. Idriss Haytham A. Idriss Magdy A. Bayoumi |
author_sort | Tarek A. Idriss |
collection | DOAJ |
description | PUFs, or physical unclonable functions, are hardware security primitives that can offer lightweight security solutions for constrained devices through challenge-response authentication protocols. However, the lightweight PUF-based security solutions that have been presented often lack security features such as mutual authentication or message encryption, which could be vital for many applications. Other protocols suffer from vulnerabilities to denial of service attacks that make them impractical to use. This work introduces a lightweight PUF-based protocol that uses secret pattern recognition to offer mutual authentication and authenticated secret message exchange for constrained devices on the Internet of Things. The protocol utilizes several techniques to introduce nonlinearity, and it can employ any strong PUF circuit for which a soft model can be generated. The authentication process requires simple bitwise operations along with a PUF circuit and a true random number generator (TRNG). By avoiding the use of any cryptographic or hash functions, the protocol’s lightweight nature is preserved. The security of the proposed protocol against modeling attacks is tested to showcase its resilience. Similar PUF-based protocols are investigated and found to lack some essential security features. |
first_indexed | 2024-12-22T00:45:03Z |
format | Article |
id | doaj.art-b95f085b3cf848c6bc981b0011409c3c |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-22T00:45:03Z |
publishDate | 2021-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-b95f085b3cf848c6bc981b0011409c3c2022-12-21T18:44:34ZengIEEEIEEE Access2169-35362021-01-019805468055810.1109/ACCESS.2021.30849039444356A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT DevicesTarek A. Idriss0https://orcid.org/0000-0003-4446-9444Haytham A. Idriss1https://orcid.org/0000-0002-2904-9137Magdy A. Bayoumi2https://orcid.org/0000-0002-0630-5273Department of Computer Science, Western Washington University, Bellingham, WA, USACenter for Advanced Computer Studies, University of Louisiana at Lafayette, Lafayette, LA, USACenter for Advanced Computer Studies, University of Louisiana at Lafayette, Lafayette, LA, USAPUFs, or physical unclonable functions, are hardware security primitives that can offer lightweight security solutions for constrained devices through challenge-response authentication protocols. However, the lightweight PUF-based security solutions that have been presented often lack security features such as mutual authentication or message encryption, which could be vital for many applications. Other protocols suffer from vulnerabilities to denial of service attacks that make them impractical to use. This work introduces a lightweight PUF-based protocol that uses secret pattern recognition to offer mutual authentication and authenticated secret message exchange for constrained devices on the Internet of Things. The protocol utilizes several techniques to introduce nonlinearity, and it can employ any strong PUF circuit for which a soft model can be generated. The authentication process requires simple bitwise operations along with a PUF circuit and a true random number generator (TRNG). By avoiding the use of any cryptographic or hash functions, the protocol’s lightweight nature is preserved. The security of the proposed protocol against modeling attacks is tested to showcase its resilience. Similar PUF-based protocols are investigated and found to lack some essential security features.https://ieeexplore.ieee.org/document/9444356/Authenticationhardware securityIoT securitylightweight securityphysical unclonable functions |
spellingShingle | Tarek A. Idriss Haytham A. Idriss Magdy A. Bayoumi A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices IEEE Access Authentication hardware security IoT security lightweight security physical unclonable functions |
title | A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices |
title_full | A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices |
title_fullStr | A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices |
title_full_unstemmed | A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices |
title_short | A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices |
title_sort | lightweight puf based authentication protocol using secret pattern recognition for constrained iot devices |
topic | Authentication hardware security IoT security lightweight security physical unclonable functions |
url | https://ieeexplore.ieee.org/document/9444356/ |
work_keys_str_mv | AT tarekaidriss alightweightpufbasedauthenticationprotocolusingsecretpatternrecognitionforconstrainediotdevices AT haythamaidriss alightweightpufbasedauthenticationprotocolusingsecretpatternrecognitionforconstrainediotdevices AT magdyabayoumi alightweightpufbasedauthenticationprotocolusingsecretpatternrecognitionforconstrainediotdevices AT tarekaidriss lightweightpufbasedauthenticationprotocolusingsecretpatternrecognitionforconstrainediotdevices AT haythamaidriss lightweightpufbasedauthenticationprotocolusingsecretpatternrecognitionforconstrainediotdevices AT magdyabayoumi lightweightpufbasedauthenticationprotocolusingsecretpatternrecognitionforconstrainediotdevices |