A Dynamically Configurable PUF and Dynamic Matching Authentication Protocol

نویسندگان

چکیده

A physical unclonable function (PUF) is a hardware security primitive, which can be used secure various hardware-based applications. As type of PUFs, strong PUFs have large number challenge-response pairs (CRPs), for authentication. At present, most PUF structures follow one-to-one input/output relationship, i.e. linear function. such, designs are vulnerable to machine learning (ML) based modeling attacks. To address the issue, dynamically configurable structure proposed in this paper. mathematical model dynamic presented and design against effective ML attacks, such as deep neural network (DNN), logistic regression (LR) reliability-based covariance matrix adaptation evolution strategies (CMA-ES). Experimental results on field programmable gate arrays (FPGAs) show that has achived good uniqueness reliability. It also shown resistance CMA-ES attack. Due nature structure, an authentication protocol designed generate recognizable bits string. The shows classical attacks including new variant CMA-ES.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

PUF-HB: A Tamper-Resilient HB Based Authentication Protocol

We propose a light-weight protocol for authentication of low-power devices. Our construc-tion PUF-HB merges the positive qualities of two families of authentication functions. PUFrepresents physically unclonable functions and fulfills the purpose of providing low-cost tamper-resilient challenge-response authentication. On the other hand, the Hopper Blum (HB) functionprovides...

متن کامل

Concealing Ketje: A Lightweight PUF-Based Privacy Preserving Authentication Protocol

We enroll more and more personal pervasive devices because these simplify our everyday lives. In order to verify the identity of these devices we use authentication protocols. Although simple authentication often suffices, users would like to remain anonymous during these authentications. Many privacy-preserving authentication protocols have been proposed that claim security and privacy. Howeve...

متن کامل

PUMAP: A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol

Radio Frequency Identification (RFID) is a technology used for automatic identification of objects, people, and virtually anything one can think of. Applications of RFID technology are expanding and its usage is being adopted worldwide. As such, major efforts have been made to secure the communications in RFID systems and to protect them from various attacks. This paper surveys RFID systems, ci...

متن کامل

Security Analysis of a PUF based RFID Authentication Protocol

In this paper we consider the security of a PUF based RFID Authentication protocol which has been recently proposed by Bassil et al. [2]. The designers have claimed that their protocol offers immunity against a broad range of attacks while it provides excellent performance. However, we prove in contrary to its designers claim, this protocol does not provide any security. We present an efficient...

متن کامل

A replication protocol to support dynamically configurable groups of servers

The paper addresses the problem of dynamic configuration management of highly available services. In particular, we are concerned with services that are provided by a group of actively replicated servers and are used by a large, rapidly changing set of clients. In this system model, we propose a Replication Management Protocol to facilitate the dynamic configuration management of the server gro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Emerging Topics in Computing

سال: 2021

ISSN: ['2168-6750', '2376-4562']

DOI: https://doi.org/10.1109/tetc.2021.3072421