Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Secure PUF-Based Authentication Systems

View through CrossRef
The Internet of Things faces significant security challenges, particularly in device authentication. Traditional methods of PUF-based authentication protocols do not fully address IoT’s unique security needs and resource constraints. Existing solutions like Identity-Based Encryption with Physically Unclonable Functions enhance security but still struggle with protecting data during transmission. We show a new protocol that leverages PUFs for device authentication by utilizing Paillier homomorphic encryption or the plaintext equality test to enhance security. Our approach involves encrypting both the challenge–response pairs (CRPs) using Paillier homomorphic encryption scheme or ElGamal encryption for plaintext equality testing scheme. The verifier does not need access to the plaintext CRPs to ensure that sensitive data remain encrypted at all times and our approach reduces the computational load on IoT devices. The encryption ensures that neither the challenge nor the response can be deciphered by potential adversaries who obtain them during the transmission. The homomorphic property of the Paillier scheme or plaintext equality testing scheme allows a verifier to verify device authenticity without decrypting the CRPs, preserving privacy and reducing the computational load on IoT devices. Such an approach to encrypting both elements of the CRP provides resistance against CRP disclosure, machine learning attacks, and impersonation attacks. We validate the scheme through security analysis against various attacks and evaluate its performance by analyzing the computational overhead and the communication overhead. Comparison of average computational and communication time demonstrates Paillier scheme achieves approximately 99% reduction while the plaintext equality test achieves approximately 94% reduction between them.
Title: Secure PUF-Based Authentication Systems
Description:
The Internet of Things faces significant security challenges, particularly in device authentication.
Traditional methods of PUF-based authentication protocols do not fully address IoT’s unique security needs and resource constraints.
Existing solutions like Identity-Based Encryption with Physically Unclonable Functions enhance security but still struggle with protecting data during transmission.
We show a new protocol that leverages PUFs for device authentication by utilizing Paillier homomorphic encryption or the plaintext equality test to enhance security.
Our approach involves encrypting both the challenge–response pairs (CRPs) using Paillier homomorphic encryption scheme or ElGamal encryption for plaintext equality testing scheme.
The verifier does not need access to the plaintext CRPs to ensure that sensitive data remain encrypted at all times and our approach reduces the computational load on IoT devices.
The encryption ensures that neither the challenge nor the response can be deciphered by potential adversaries who obtain them during the transmission.
The homomorphic property of the Paillier scheme or plaintext equality testing scheme allows a verifier to verify device authenticity without decrypting the CRPs, preserving privacy and reducing the computational load on IoT devices.
Such an approach to encrypting both elements of the CRP provides resistance against CRP disclosure, machine learning attacks, and impersonation attacks.
We validate the scheme through security analysis against various attacks and evaluate its performance by analyzing the computational overhead and the communication overhead.
Comparison of average computational and communication time demonstrates Paillier scheme achieves approximately 99% reduction while the plaintext equality test achieves approximately 94% reduction between them.

Related Results

An Efficient Post-Processing Method for SSL-PUF in MEC Security Authentication
An Efficient Post-Processing Method for SSL-PUF in MEC Security Authentication
Computation offloading is a key technology in mobile edge computing (MEC) that addresses the performance and energy constraints faced by mobile devices when handling computationall...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Design of a Unified XOR Ring Oscillator PUF-TRNG Circuit in 45nm CMOS Technology
Design of a Unified XOR Ring Oscillator PUF-TRNG Circuit in 45nm CMOS Technology
<p>In previous papers various True Random Number Generators (TRNG) and Physically Unclonable Function (PUF) are discussed individually but only a few of them include unified ...
Design of a Unified XOR Ring Oscillator PUF-TRNG Circuit in 45nm CMOS Technology
Design of a Unified XOR Ring Oscillator PUF-TRNG Circuit in 45nm CMOS Technology
<p>In previous papers various True Random Number Generators (TRNG) and Physically Unclonable Function (PUF) are discussed individually but only a few of them include unified ...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
A TRNG Implemented Using a Soft-Data Based Sponge Function within a Unified Strong PUF Architecture
A TRNG Implemented Using a Soft-Data Based Sponge Function within a Unified Strong PUF Architecture
Hardware security primitives including True Random Number Generators (TRNG) and Physical Unclonable Functions (PUFs) are central components to establishing a root of trust in micro...
Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key
Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key
The security of Quantum Secure Direct Communication (QSDC) and its authentication procedure based on multiple stages is analyzed. The security analysis shows that the process of au...

Back to Top