Deep PUF: A Highly Reliable DRAM PUF-Based Authentication for IoT Networks Using Deep Convolutional Neural Networks

被引:24
|
作者
Najafi, Fatemeh [1 ]
Kaveh, Masoud [2 ]
Martin, Diego [1 ]
Reza Mosavi, Mohammad [2 ]
机构
[1] Univ Politecn Madrid, ETSI Telecomunicac, Av Complutense 30, Madrid 28040, Spain
[2] Iran Univ Sci & Technol, Dept Elect Engn, Tehran 1311416846, Iran
关键词
DRAM latency-based PUF; IoT; authentication; convolutional neural network; LIGHTWEIGHT AUTHENTICATION; UNCLONABLE FUNCTIONS; SECURITY; INTERNET; ROBUST;
D O I
10.3390/s21062009
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Traditional authentication techniques, such as cryptographic solutions, are vulnerable to various attacks occurring on session keys and data. Physical unclonable functions (PUFs) such as dynamic random access memory (DRAM)-based PUFs are introduced as promising security blocks to enable cryptography and authentication services. However, PUFs are often sensitive to internal and external noises, which cause reliability issues. The requirement of additional robustness and reliability leads to the involvement of error-reduction methods such as error correction codes (ECCs) and pre-selection schemes that cause considerable extra overheads. In this paper, we propose deep PUF: a deep convolutional neural network (CNN)-based scheme using the latency-based DRAM PUFs without the need for any additional error correction technique. The proposed framework provides a higher number of challenge-response pairs (CRPs) by eliminating the pre-selection and filtering mechanisms. The entire complexity of device identification is moved to the server side that enables the authentication of resource-constrained nodes. The experimental results from a 1Gb DDR3 show that the responses under varying conditions can be classified with at least a 94.9% accuracy rate by using CNN. After applying the proposed authentication steps to the classification results, we show that the probability of identification error can be drastically reduced, which leads to a highly reliable authentication.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 50 条
  • [1] PUF-based Lightweight Authentication for Binarized Neural Networks
    Rajendran, Gokulnath
    Deb, Suman
    Chattopadhyay, Anupam
    2024 IEEE THE 20TH ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS, APCCAS 2024, 2024, : 447 - 451
  • [2] DRAM-Based Authentication Using Deep Convolutional Neural Networks
    Yue, Michael
    Karimian, Nima
    Yan, Wei
    Anagnostopoulos, Nikolaos Athanasios
    Tehranipoor, Fatemeh
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2021, 10 (04) : 8 - 17
  • [3] The Improvement of PUF-Based Authentication in IoT Systems
    Nurkifli, E. Haodudin
    Hwang, Tzonelih
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2023, 14 (05) : 918 - 927
  • [4] PUF-based Authentication Scheme for IoT Devices
    Yoon, Seungyong
    Kim, Byoungkoo
    Kang, Yousung
    Choi, Dooho
    11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 1792 - 1794
  • [5] Lightweight PUF-Based Authentication Protocol for IoT Devices
    Yilmaz, Yildiran
    Gunn, Steve R.
    Halak, Basel
    2018 IEEE 3RD INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2018, : 38 - 43
  • [6] Multiple PUF-based lightweight authentication method in the IoT
    Yoon, Seungyong
    Kim, Byoungkoo
    Kang, Yousung
    12TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2021): BEYOND THE PANDEMIC ERA WITH ICT CONVERGENCE INNOVATION, 2021, : 1198 - 1200
  • [7] A PUF-based anonymous authentication protocol for wireless medical sensor networks
    Shao, Xiaowei
    Guo, Yajun
    Guo, Yimin
    WIRELESS NETWORKS, 2022, 28 (8) : 3753 - 3770
  • [8] PUF-based IoT Device Authentication Scheme on IoT Open Platform
    Kim, Byoungkoo
    Yoon, Seungyong
    Kang, Yousung
    12TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2021): BEYOND THE PANDEMIC ERA WITH ICT CONVERGENCE INNOVATION, 2021, : 1873 - 1875
  • [9] A PUF-based anonymous authentication protocol for wireless medical sensor networks
    Xiaowei Shao
    Yajun Guo
    Yimin Guo
    Wireless Networks, 2022, 28 : 3753 - 3770
  • [10] Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT
    Lounis, Karim
    Zulkernine, Mohammad
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (02):