Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching

Mehrdad Majzoobi, M. Rostami, F. Koushanfar, D. Wallach, S. Devadas
{"title":"Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching","authors":"Mehrdad Majzoobi, M. Rostami, F. Koushanfar, D. Wallach, S. Devadas","doi":"10.1109/SPW.2012.30","DOIUrl":null,"url":null,"abstract":"We introduce Slender PUF protocol, an efficient and secure method to authenticate the responses generated from a Strong Physical Unclonable Function (PUF). The new method is lightweight, and suitable for energy constrained platforms such as ultra-low power embedded systems for use in identification and authentication applications. The proposed protocol does not follow the classic paradigm of exposing the full PUF responses (or a transformation of the full string of responses) on the communication channel. Instead, random subsets of the responses are revealed and sent for authentication. The response patterns are used for authenticating the prover device with a very high probability. We perform a thorough analysis of the method's resiliency to various attacks which guides adjustment of our protocol parameters for an efficient and secure implementation. We demonstrate that Slender PUF protocol, if carefully designed, will be resilient against all known machine learning attacks. In addition, it has the great advantage of an inbuilt PUF error tolerance. Thus, Slender PUF protocol is lightweight and does not require costly additional error correction, fuzzy extractors, and hash modules suggested in most previously known PUF-based robust authentication techniques. The low overhead and practicality of the protocol are confirmed by a set of hardware implementation and evaluations.","PeriodicalId":201519,"journal":{"name":"2012 IEEE Symposium on Security and Privacy Workshops","volume":"102 4","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"188","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE Symposium on Security and Privacy Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SPW.2012.30","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 188

Abstract

We introduce Slender PUF protocol, an efficient and secure method to authenticate the responses generated from a Strong Physical Unclonable Function (PUF). The new method is lightweight, and suitable for energy constrained platforms such as ultra-low power embedded systems for use in identification and authentication applications. The proposed protocol does not follow the classic paradigm of exposing the full PUF responses (or a transformation of the full string of responses) on the communication channel. Instead, random subsets of the responses are revealed and sent for authentication. The response patterns are used for authenticating the prover device with a very high probability. We perform a thorough analysis of the method's resiliency to various attacks which guides adjustment of our protocol parameters for an efficient and secure implementation. We demonstrate that Slender PUF protocol, if carefully designed, will be resilient against all known machine learning attacks. In addition, it has the great advantage of an inbuilt PUF error tolerance. Thus, Slender PUF protocol is lightweight and does not require costly additional error correction, fuzzy extractors, and hash modules suggested in most previously known PUF-based robust authentication techniques. The low overhead and practicality of the protocol are confirmed by a set of hardware implementation and evaluations.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
细长PUF协议:一种轻量级、鲁棒和安全的子串匹配认证
本文介绍了细长PUF协议,一种高效、安全的方法来验证由强物理不可克隆函数(Strong Physical unclable Function, PUF)产生的响应。新方法重量轻,适用于能量受限的平台,如用于识别和认证应用的超低功耗嵌入式系统。提议的协议不遵循在通信通道上公开完整PUF响应(或完整响应字符串的转换)的经典范例。相反,将显示响应的随机子集并发送以进行身份验证。响应模式用于以非常高的概率验证证明方设备。我们对该方法对各种攻击的弹性进行了彻底的分析,从而指导我们调整协议参数以实现高效和安全的实现。我们证明,细长PUF协议,如果精心设计,将抵御所有已知的机器学习攻击。此外,它还具有内置PUF容错的巨大优势。因此,细长PUF协议是轻量级的,不需要昂贵的额外错误纠正、模糊提取器和哈希模块,这些都是大多数已知的基于PUF的健壮身份验证技术所建议的。通过一组硬件实现和评估,验证了该协议的低开销和实用性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks Using Consensus Clustering for Multi-view Anomaly Detection Side-Channel Analysis of Grøstl and Skein Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1