A Strong PUF-Based Security Protocol to Protect AI Model Parameters Against Privacy Information Leakage

IF 8.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS IEEE Internet of Things Journal Pub Date : 2025-02-21 DOI:10.1109/JIOT.2025.3544555
Ziyu Zhou;Gang Li;Yuejun Zhang;Ziyang Zheng;Tengfei Yuan;Pengjun Wang
{"title":"A Strong PUF-Based Security Protocol to Protect AI Model Parameters Against Privacy Information Leakage","authors":"Ziyu Zhou;Gang Li;Yuejun Zhang;Ziyang Zheng;Tengfei Yuan;Pengjun Wang","doi":"10.1109/JIOT.2025.3544555","DOIUrl":null,"url":null,"abstract":"In the era of intelligent computing, with the aid of Internet of Things (IoT) technology, artificial intelligence (AI) chips can be embedded at the terminal, object, edge, and cloud levels, ultimately achieving the vision where there is computation, there is AI intelligence. This not only enhances the efficiency of production and daily life but also exponentially increases the risk of privacy information leakage within AI models. This article leverages the characteristics of strong physical unclonable functions (PUFs), in which the inherent feature information is hidden in physical variations and difficult to steal, to design a security protocol based on strong PUFs that provides effective protection for AI model parameters in the IoT environment. The protocol treats AI model parameters as responses and selects challenges capable of generating these responses. Since the responses generated by the challenges can be considered as randomly generated, transmitting the challenges does not disclose the response information, thus avoiding the risk of parameter hacking. Additionally, the protocol utilizes machine-learning modeling techniques and lightweight encryption technologies to reduce the storage costs for identity information and the computational overhead of encryption operations. Through a security analysis of the protocol, it demonstrates that even under ideal attack conditions, the proposed protocol can resist various attacks. By using formal verification with the ProVerif tool, it confirms the security of the protocol flow and the effective protection of private information.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 12","pages":"20815-20827"},"PeriodicalIF":8.9000,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10899833/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

In the era of intelligent computing, with the aid of Internet of Things (IoT) technology, artificial intelligence (AI) chips can be embedded at the terminal, object, edge, and cloud levels, ultimately achieving the vision where there is computation, there is AI intelligence. This not only enhances the efficiency of production and daily life but also exponentially increases the risk of privacy information leakage within AI models. This article leverages the characteristics of strong physical unclonable functions (PUFs), in which the inherent feature information is hidden in physical variations and difficult to steal, to design a security protocol based on strong PUFs that provides effective protection for AI model parameters in the IoT environment. The protocol treats AI model parameters as responses and selects challenges capable of generating these responses. Since the responses generated by the challenges can be considered as randomly generated, transmitting the challenges does not disclose the response information, thus avoiding the risk of parameter hacking. Additionally, the protocol utilizes machine-learning modeling techniques and lightweight encryption technologies to reduce the storage costs for identity information and the computational overhead of encryption operations. Through a security analysis of the protocol, it demonstrates that even under ideal attack conditions, the proposed protocol can resist various attacks. By using formal verification with the ProVerif tool, it confirms the security of the protocol flow and the effective protection of private information.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于PUF的强安全协议防止AI模型参数隐私信息泄露
在智能计算时代,借助物联网(IoT)技术,人工智能(AI)芯片可以嵌入终端、对象、边缘、云等层面,最终实现有计算就有AI智能的愿景。这不仅提高了生产和日常生活的效率,也成倍增加了人工智能模型内部隐私信息泄露的风险。本文利用强物理不可克隆函数(puf)固有特征信息隐藏在物理变化中、难以窃取的特点,设计了一种基于强物理不可克隆函数的安全协议,为物联网环境下的AI模型参数提供有效保护。该协议将AI模型参数视为响应,并选择能够生成这些响应的挑战。由于挑战产生的响应可以认为是随机产生的,因此发送挑战不会泄露响应信息,从而避免了参数被黑客攻击的风险。此外,该协议利用机器学习建模技术和轻量级加密技术来降低身份信息的存储成本和加密操作的计算开销。通过对协议的安全性分析表明,即使在理想的攻击条件下,所提出的协议也能抵抗各种攻击。通过ProVerif工具的形式化验证,确认了协议流程的安全性和对私有信息的有效保护。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Internet of Things Journal
IEEE Internet of Things Journal Computer Science-Information Systems
CiteScore
17.60
自引率
13.20%
发文量
1982
期刊介绍: The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.
期刊最新文献
Concurrent mmWave Communication and Orientation Tracking With Anisotropic Metasurfaces C-AoEI-Aware Cross-Layer Optimization in Satellite IoT Systems: Balancing Data Freshness and Transmission Efficiency LCE-PPDA: Lightweight Certificateless and Escrow-Free Privacy-Preserving Data Aggregation for UAV-Assisted IoT-Enabled Smart Grids CP-RAG: Mitigating Distracting Content in Retrieval-Augmented Generation for Industrial Knowledge Question Answering Personalized Hierarchical Federated Learning Framework for the Internet of Vehicles Based on Split Meta-Learning
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1