PUF Authentication Scheme Enhanced by Multi-path Fading Channel Attributes
With the booming growth of the Internet of Things (IoT), resource-constrained devices play an essential role in our daily lives. Ensuring the secure access of resource-constrained devices is of paramount importance. Physical unclonable function (PUF) authentication has been proposed as a promising s...
Saved in:
Published in | 2021 IEEE/CIC International Conference on Communications in China (ICCC) pp. 35 - 40 |
---|---|
Main Authors | , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
28.07.2021
|
Subjects | |
Online Access | Get full text |
DOI | 10.1109/ICCC52777.2021.9580259 |
Cover
Abstract | With the booming growth of the Internet of Things (IoT), resource-constrained devices play an essential role in our daily lives. Ensuring the secure access of resource-constrained devices is of paramount importance. Physical unclonable function (PUF) authentication has been proposed as a promising solution for preventing unauthorized access of resource-constrained devices due to its low complexity. However, the mapping relationship between the challenge and response pairs (CRPs), which is fundamental to the PUF authentication, can be easily predicted by modeling attacks based on machine learning (MAML). An adversary can use the predicted CRPs to perform spoofing attacks, severely deteriorating the efficiency of networks. To solve the problem, we propose a channel and PUF fusion authentication (CPFA) scheme to defend against MAML. Specifically, the multi-path fading attributes (MFA) are introduced as a random factor to randomize the fixed CRPs with almost negligible extra cost. Because MFA are spatio-temporal uniqueness, it is difficult for attackers to predict and masquerade as legitimate devices. Based on the channel reciprocity of the legitimate transceiver, the randomized CRPs can be easily recovered to authenticate the legitimate devices. Simulations have confirmed that our proposed scheme outperforms other benchmark solutions to resist MAML with higher accuracy and lower computation time. |
---|---|
AbstractList | With the booming growth of the Internet of Things (IoT), resource-constrained devices play an essential role in our daily lives. Ensuring the secure access of resource-constrained devices is of paramount importance. Physical unclonable function (PUF) authentication has been proposed as a promising solution for preventing unauthorized access of resource-constrained devices due to its low complexity. However, the mapping relationship between the challenge and response pairs (CRPs), which is fundamental to the PUF authentication, can be easily predicted by modeling attacks based on machine learning (MAML). An adversary can use the predicted CRPs to perform spoofing attacks, severely deteriorating the efficiency of networks. To solve the problem, we propose a channel and PUF fusion authentication (CPFA) scheme to defend against MAML. Specifically, the multi-path fading attributes (MFA) are introduced as a random factor to randomize the fixed CRPs with almost negligible extra cost. Because MFA are spatio-temporal uniqueness, it is difficult for attackers to predict and masquerade as legitimate devices. Based on the channel reciprocity of the legitimate transceiver, the randomized CRPs can be easily recovered to authenticate the legitimate devices. Simulations have confirmed that our proposed scheme outperforms other benchmark solutions to resist MAML with higher accuracy and lower computation time. |
Author | Li, Na Wang, Shiji Tao, Xiaofeng Lu, Hua Xia, Shida |
Author_xml | – sequence: 1 givenname: Shiji surname: Wang fullname: Wang, Shiji email: wangshiji@bupt.edu.cn organization: Beijing University of Posts and Telecommunications,National Engineering Lab for Mobile Network Technologies,Beijing,China,100876 – sequence: 2 givenname: Na surname: Li fullname: Li, Na email: Lina_Lena@bupt.edu.cn organization: Beijing University of Posts and Telecommunications,National Engineering Lab for Mobile Network Technologies,Beijing,China,100876 – sequence: 3 givenname: Shida surname: Xia fullname: Xia, Shida email: xsd_2016@bupt.edu.cn organization: Beijing University of Posts and Telecommunications,National Engineering Lab for Mobile Network Technologies,Beijing,China,100876 – sequence: 4 givenname: Xiaofeng surname: Tao fullname: Tao, Xiaofeng email: taoxf@bupt.edu.cn organization: Beijing University of Posts and Telecommunications,National Engineering Lab for Mobile Network Technologies,Beijing,China,100876 – sequence: 5 givenname: Hua surname: Lu fullname: Lu, Hua email: luhua@gdcni.cn organization: Guangdong Communications & Networks Institute,Guangdong,China,510700 |
BookMark | eNotj91KwzAYQCPohZs-gSB5gdYvf01yWcKqGxMF3fVI06820GWjSy_29gru6lwcOHAW5DYdExLyzKBkDOzL2jmnuNa65MBZaZUBruwNWbCqUlIKo9Q92XzuGlrPecCUY_A5HhP9CgMekK7S4FPAjrYX-j6PORYnnwfa-C6mH-r-ZMKR1jlPsZ0znh_IXe_HMz5euSS7ZvXt3ortx-va1dsiMiFyYUFqY5TsgrcseOhASVYJYEJaLhSgYZWXvYYuQM-Z0kEZr4EjoO1124olefrvRkTcn6Z48NNlf90Tv9FnSPg |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICCC52777.2021.9580259 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 1665443855 9781665443852 |
EndPage | 40 |
ExternalDocumentID | 9580259 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i133t-90478854dca91ca0d054163013492350e816a4f70dc0f2157c58a702e0e9f7bb3 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:38:11 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i133t-90478854dca91ca0d054163013492350e816a4f70dc0f2157c58a702e0e9f7bb3 |
PageCount | 6 |
ParticipantIDs | ieee_primary_9580259 |
PublicationCentury | 2000 |
PublicationDate | 2021-July-28 |
PublicationDateYYYYMMDD | 2021-07-28 |
PublicationDate_xml | – month: 07 year: 2021 text: 2021-July-28 day: 28 |
PublicationDecade | 2020 |
PublicationTitle | 2021 IEEE/CIC International Conference on Communications in China (ICCC) |
PublicationTitleAbbrev | ICCC |
PublicationYear | 2021 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.774908 |
Snippet | With the booming growth of the Internet of Things (IoT), resource-constrained devices play an essential role in our daily lives. Ensuring the secure access of... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 35 |
SubjectTerms | Authentication Computational modeling Fading channels modeling attack multi-path fading attributes physical layer security Physical unclonable function Protocols PUF authentication Resists Transceivers |
Title | PUF Authentication Scheme Enhanced by Multi-path Fading Channel Attributes |
URI | https://ieeexplore.ieee.org/document/9580259 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH5sO3lS2cTf5ODRdOnWLMlRysocTAY62G0k6SuK2ol2B_3rTdI6UTx4K6HQ8L7C9_Lyvu8BXEhlsJBaUckTpIk3wVTcSqqF9SmEESx4d85uRpNFMl3yZQsut1oYRAzNZxj5x3CXn6_txpfK-opLR9GqDW33m9VarUb0GzPVv07TlA-EEO7UN4ij5uUfU1MCaWS7MPv6XN0r8hhtKhPZj19OjP_dzx70vuV5ZL4lnn1oYdmF6XyREV_w8u0_dR2O3DpEnpGMy_twz0_MOwmCW-rnEJMstM8Try8o8YlcVfXwK3zrwSIb36UT2gxKoA_uiFlR5S12XLBzq1VsNctdHubyLBasB4ecoYxHOikEyy0rHMcLy6V2KCBDVQhjhgfQKdclHgLRzEqVJ4ZzbhLBCqVyRI4OtREOUdgj6Po4rF5qL4xVE4Ljv5dPYMdj4WuhA3kKnep1g2eOxCtzHtD7BHa5nJY |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED2VMsAEqEV844GRpE4b1_aIokZtaatKtFK3KnYuAgEpgnSAX4_thCIQA5sVWXJ0b3jn8713AFdCKsxEIj3BQvRCa4IpmRZewrVNIRSnzrtzPOn25-FwwRY1uN5oYRDRNZ-hb5fuLT9d6bUtlbUkE4ai5RZsG94PWanWqmS_AZWtQRRFrM05N_e-duBX23_MTXG0Ee_B-OvAslvk0V8Xytcfv7wY__tH-9D8FuiR6YZ6DqCGeQOG03lMbMnLNgCVlThyZzB5RtLL791LP1HvxEluPTuJmMSugZ5YhUGOT-SmKMdf4VsT5nFvFvW9alSC92AumYUnrcmOCXeqExnohKYmEzOZFnXmgx1GUQTdJMw4TTXNDMtzzURicECKMuNKdQ6hnq9yPAKSUC1kGirGmAo5zaRMERka3LrYQa6PoWHjsHwp3TCWVQhO_v58CTv92Xi0HA0mt6ewa3GxldG2OIN68brGc0PphbpwSH4C2vqf4w |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2021+IEEE%2FCIC+International+Conference+on+Communications+in+China+%28ICCC%29&rft.atitle=PUF+Authentication+Scheme+Enhanced+by+Multi-path+Fading+Channel+Attributes&rft.au=Wang%2C+Shiji&rft.au=Li%2C+Na&rft.au=Xia%2C+Shida&rft.au=Tao%2C+Xiaofeng&rft.date=2021-07-28&rft.pub=IEEE&rft.spage=35&rft.epage=40&rft_id=info:doi/10.1109%2FICCC52777.2021.9580259&rft.externalDocID=9580259 |