Privacy-Preserving Authentication Protocols for IoT Devices Using the SiRF PUF

被引:4
|
作者
Plusquellic, Jim [1 ]
Tsiropoulou, Eirini Eleni [1 ]
Minwalla, Cyrus [2 ]
机构
[1] Univ New Mexico, Dept Elect & Comp Engn, Albuquerque, NM 87131 USA
[2] Bank Canada, Ottawa, ON K1A 0G9, Canada
关键词
Physical unclonable function; PUF-based authentication;
D O I
10.1109/TETC.2023.3296016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication between IoT devices is important for maintaining security, trust and data integrity in an edge device ecosystem. The low-power, reduced computing capacity of the IoT device makes public-private, certificate-based forms of authentication impractical, while other lighter-weight, symmetric cryptography-based approaches, such as message authentication codes, are easy to spoof in unsupervised environments where adversaries have direct physical access to the device. Such environments are better served by security primitives rooted in the hardware with capabilities exceeding those available in cryptography-only frameworks. A key foundational hardware security primitive is the physical unclonable function or PUF. PUFs are well known for removing the need to store secrets in secure non-volatile memories, and for providing very large sets of authentication credentials. In this article, we describe two PUF-based mutual authentication protocols rooted in the entropy provided by a strong PUF. The security properties of the authentication protocols, called COBRA and PARCE, are evaluated in hardware experiments on SoC-based FPGAs, and under extended industrial-standard operating conditions. A codesign-based system architecture is presented in which the SiRF PUF and core authentication functions are implemented in the programmable logic as a secure enclave, while network and database operations are implemented in software on an embedded microprocessor.
引用
收藏
页码:918 / 933
页数:16
相关论文
共 50 条
  • [41] Efficient privacy-preserving implicit authentication
    Blanco-Justicia, Alberto
    Domingo-Ferrer, Josep
    COMPUTER COMMUNICATIONS, 2018, 125 : 13 - 23
  • [42] Opposing Data Exploitation: Behaviour Biometrics for Privacy-Preserving Authentication in IoT Environments
    Krasovec, Andraz
    Baldini, Gianmarco
    Pejovic, Veljko
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [43] Privacy-preserving authentication of trees and graphs
    Kundu, Ashish
    Bertino, Elisa
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (06) : 467 - 494
  • [44] Robust Privacy-Preserving Fingerprint Authentication
    Zhang, Ye
    Koushanfar, Farinaz
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 1 - 6
  • [45] Practical Privacy-Preserving Authentication for SSH
    Roy, Lawrence
    Lyakhov, Stanislav
    Jang, Yeongjin
    Rosulek, Mike
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3345 - 3362
  • [46] Privacy-preserving authentication of trees and graphs
    Ashish Kundu
    Elisa Bertino
    International Journal of Information Security, 2013, 12 : 467 - 494
  • [47] Edge computing assisted privacy-preserving data computation for IoT devices
    Sun, Gaofei
    Xing, Xiaoshuang
    Qian, Zhenjiang
    Li, Wei
    COMPUTER COMMUNICATIONS, 2021, 166 : 208 - 215
  • [48] A privacy-preserving multifactor authentication system
    Acar, Abbas
    Liu, Wenyi
    Beyah, Raheem
    Akkaya, Kemal
    Uluagac, Arif Selcuk
    SECURITY AND PRIVACY, 2019, 2 (05):
  • [49] Privacy-Preserving Blockchain-Based Federated Learning for IoT Devices
    Zhao, Yang
    Zhao, Jun
    Jiang, Linshan
    Tan, Rui
    Niyato, Dusit
    Li, Zengxiang
    Lyu, Lingjuan
    Liu, Yingbo
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (03) : 1817 - 1829
  • [50] Privacy-Preserving Neural Architecture Search Across Federated IoT Devices
    Zhang, Chunhui
    Yuan, Xiaoming
    Zhang, Qianyun
    Zhu, Guangxu
    Cheng, Lei
    Zhang, Ning
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 1434 - 1438