Privacy-Preserving Authentication Protocols for IoT Devices Using the SiRF PUF

被引:4
|
作者
Plusquellic, Jim [1 ]
Tsiropoulou, Eirini Eleni [1 ]
Minwalla, Cyrus [2 ]
机构
[1] Univ New Mexico, Dept Elect & Comp Engn, Albuquerque, NM 87131 USA
[2] Bank Canada, Ottawa, ON K1A 0G9, Canada
关键词
Physical unclonable function; PUF-based authentication;
D O I
10.1109/TETC.2023.3296016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication between IoT devices is important for maintaining security, trust and data integrity in an edge device ecosystem. The low-power, reduced computing capacity of the IoT device makes public-private, certificate-based forms of authentication impractical, while other lighter-weight, symmetric cryptography-based approaches, such as message authentication codes, are easy to spoof in unsupervised environments where adversaries have direct physical access to the device. Such environments are better served by security primitives rooted in the hardware with capabilities exceeding those available in cryptography-only frameworks. A key foundational hardware security primitive is the physical unclonable function or PUF. PUFs are well known for removing the need to store secrets in secure non-volatile memories, and for providing very large sets of authentication credentials. In this article, we describe two PUF-based mutual authentication protocols rooted in the entropy provided by a strong PUF. The security properties of the authentication protocols, called COBRA and PARCE, are evaluated in hardware experiments on SoC-based FPGAs, and under extended industrial-standard operating conditions. A codesign-based system architecture is presented in which the SiRF PUF and core authentication functions are implemented in the programmable logic as a secure enclave, while network and database operations are implemented in software on an embedded microprocessor.
引用
收藏
页码:918 / 933
页数:16
相关论文
共 50 条
  • [31] Privacy-preserving continuous authentication using behavioral biometrics
    Baig, Ahmed Fraz
    Eskeland, Sigurd
    Yang, Bian
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (06) : 1833 - 1847
  • [32] Efficient Privacy-Preserving Authentication using Blockchain for VANET
    Pariyarath, Akhil
    Tomar, Shubham
    Tripathi, Meenakshi
    2023 15TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS, COMSNETS, 2023,
  • [33] Privacy-preserving authentication and authorization in networks using blockchain
    Sanap, Asha
    Malwade, Sulakshana Sagar
    Bhosale, Rohini
    Karandikar, Aarti
    Bakare, Anuradha A.
    Langote, Vaishali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 903 - 914
  • [34] Blockchain-based conditional privacy-preserving authentication scheme using PUF for vehicular ad hoc networks
    Xiong, Ling
    Li, Qiang
    Tang, LeLe
    Li, Fagen
    Yang, Xingchun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 136
  • [35] Tree-based HB protocols for privacy-preserving authentication of RFID tags
    Halevi, Tzipora
    Saxena, Nitesh
    Halevi, Shai
    JOURNAL OF COMPUTER SECURITY, 2011, 19 (02) : 343 - 363
  • [36] Lightweight asymmetric privacy-preserving authentication protocols secure against active attack
    Cui, Yang
    Kobara, Kazukuni
    Matsuura, Kanta
    Imai, Hideki
    FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 223 - +
  • [37] SEPSI: A Secure and Efficient Privacy-Preserving Set Intersection with Identity Authentication in IoT
    Liu, Bai
    Zhang, Xiangyi
    Shi, Runhua
    Zhang, Mingwu
    Zhang, Guoxing
    MATHEMATICS, 2022, 10 (12)
  • [38] Lightweight authentication protocol for connected medical IoT through privacy-preserving access
    Tanveer, Muhammad
    Chelloug, Samia Allaoua
    Alabdulhafith, Maali
    Abd El-Latif, Ahmed A.
    EGYPTIAN INFORMATICS JOURNAL, 2024, 26
  • [39] Privacy-Preserving Authentication Scheme With Revocability for Multi-WSN in Industrial IoT
    Xiong, Ling
    Peng, Tu
    Li, Fagen
    Zeng, Shengke
    Wu, Hanzhou
    IEEE SYSTEMS JOURNAL, 2023, 17 (01): : 38 - 49
  • [40] Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications
    Lin, Xi-Jun
    Sun, Lin
    Qu, Haipeng
    COMPUTERS & SECURITY, 2015, 48 : 142 - 149