Privacy-Preserving Authentication Protocols for IoT Devices Using the SiRF PUF

被引:4
|
作者
Plusquellic, Jim [1 ]
Tsiropoulou, Eirini Eleni [1 ]
Minwalla, Cyrus [2 ]
机构
[1] Univ New Mexico, Dept Elect & Comp Engn, Albuquerque, NM 87131 USA
[2] Bank Canada, Ottawa, ON K1A 0G9, Canada
关键词
Physical unclonable function; PUF-based authentication;
D O I
10.1109/TETC.2023.3296016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication between IoT devices is important for maintaining security, trust and data integrity in an edge device ecosystem. The low-power, reduced computing capacity of the IoT device makes public-private, certificate-based forms of authentication impractical, while other lighter-weight, symmetric cryptography-based approaches, such as message authentication codes, are easy to spoof in unsupervised environments where adversaries have direct physical access to the device. Such environments are better served by security primitives rooted in the hardware with capabilities exceeding those available in cryptography-only frameworks. A key foundational hardware security primitive is the physical unclonable function or PUF. PUFs are well known for removing the need to store secrets in secure non-volatile memories, and for providing very large sets of authentication credentials. In this article, we describe two PUF-based mutual authentication protocols rooted in the entropy provided by a strong PUF. The security properties of the authentication protocols, called COBRA and PARCE, are evaluated in hardware experiments on SoC-based FPGAs, and under extended industrial-standard operating conditions. A codesign-based system architecture is presented in which the SiRF PUF and core authentication functions are implemented in the programmable logic as a secure enclave, while network and database operations are implemented in software on an embedded microprocessor.
引用
收藏
页码:918 / 933
页数:16
相关论文
共 50 条
  • [1] Privacy-Preserving Authentication Based on PUF for VANETs
    Li, Lihui
    Deng, Hanwen
    Zhai, Zhongyi
    Peng, Sheng-Lung
    FUTURE INTERNET, 2024, 16 (09)
  • [2] Privacy-Preserving Authentication Protocols in Vanet
    Nath H.J.
    Choudhury H.
    SN Computer Science, 4 (5)
  • [3] Privacy-Preserving Authentication Systems Using Smart Devices
    Malina, Lukas
    Hajny, Jan
    Martinasek, Zdenek
    2016 39TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2016, : 11 - 14
  • [4] Privacy-Preserving Authorized RFID Authentication Protocols
    Li, Nan
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Varadharajan, Vijay
    RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, RFIDSEC 2014, 2014, 8651 : 108 - 122
  • [5] Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices
    Gope, Prosanta
    Sikdar, Biplab
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01): : 580 - 589
  • [6] A review of privacy-preserving biometric identification and authentication protocols
    Zeng, Li
    Shen, Peisong
    Zhu, Xiaojie
    Tian, Xue
    Chen, Chi
    COMPUTERS & SECURITY, 2025, 150
  • [7] Privacy-preserving authentication protocols with efficient verification in VANETs
    Zhang, Jianhong
    Xu, Yuwei
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 3676 - 3692
  • [8] Improved Privacy-preserving Authorized Out Authentication Protocols
    Zheng, Jinbin
    Zhang, Fangguo
    SENSORS AND MATERIALS, 2019, 31 (03) : 969 - 979
  • [9] A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity
    Wang, Zhiwei
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 : 342 - 348
  • [10] Privacy-Preserving ECG based Active Authentication (PPEA2) for IoT Devices
    Bhutra, Ghanshyam
    Rasheed, Amar
    Mahapatra, Rabi
    2018 IEEE 37TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2018,