TY - JOUR
T1 - A taxonomy of PUF Schemes with a novel Arbiter-based PUF resisting machine learning attacks
AU - El-Hajj, Mohammed
AU - Fadlallah, Ahmad
AU - Chamoun, Maroun
AU - Serhrouchni, Ahmed
N1 - Publisher Copyright:
© 2021 Elsevier B.V.
PY - 2021/4/29
Y1 - 2021/4/29
N2 - As the Intenert of Things (IoT) continues to evolve in our daily personal lives and in future industrial systems (industry 4.0), one of the most significant issues is security. IoT systems must overcome a number of challenges, including deficiency of resources, low power consumption, and the need to protect devices against cyber-attacks. Regrettably, issues about energy use and the lack of computing resources limit the cryptographic methods that can be implemented on these devices. Moreover, the conventional use of non-volatile memory for storing secret keys are vulnerable to a number of attacks like reverse-engineering, cold-boot, side channel, device tampering, etc. Physical Unclonable Functions (PUFs) are one of the categories for enhancing physical device security and solving issues involving with the use of traditional cryptographic algorithms. PUFs are associated as lightweight one-way functions used to extract a unique identity for each end-device, based on physical factors introduced during manufacturing which are unforeseeable and unclonable. PUFs are promising hardware security primitive and have seen a lot of attention in the past few years. In this paper, we provide a survey of a large range of PUF schemes proposed in the literature. Our comparison analysis of the surveyed schemes ends with a number of observations. Then we propose a new scheme of Arbiter PUF to create an identity for each IoT device. The proposed scheme is resistant to Machine Learning (ML) attacks. It is proven to avoid the shortcoming of several previously proposed related PUF-based authentication protocols.
AB - As the Intenert of Things (IoT) continues to evolve in our daily personal lives and in future industrial systems (industry 4.0), one of the most significant issues is security. IoT systems must overcome a number of challenges, including deficiency of resources, low power consumption, and the need to protect devices against cyber-attacks. Regrettably, issues about energy use and the lack of computing resources limit the cryptographic methods that can be implemented on these devices. Moreover, the conventional use of non-volatile memory for storing secret keys are vulnerable to a number of attacks like reverse-engineering, cold-boot, side channel, device tampering, etc. Physical Unclonable Functions (PUFs) are one of the categories for enhancing physical device security and solving issues involving with the use of traditional cryptographic algorithms. PUFs are associated as lightweight one-way functions used to extract a unique identity for each end-device, based on physical factors introduced during manufacturing which are unforeseeable and unclonable. PUFs are promising hardware security primitive and have seen a lot of attention in the past few years. In this paper, we provide a survey of a large range of PUF schemes proposed in the literature. Our comparison analysis of the surveyed schemes ends with a number of observations. Then we propose a new scheme of Arbiter PUF to create an identity for each IoT device. The proposed scheme is resistant to Machine Learning (ML) attacks. It is proven to avoid the shortcoming of several previously proposed related PUF-based authentication protocols.
KW - Arbiter
KW - Authentication
KW - Internet of Things (IoT)
KW - Machine Learning (ML)
KW - PUF
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=85105351765&partnerID=8YFLogxK
U2 - 10.1016/j.comnet.2021.108133
DO - 10.1016/j.comnet.2021.108133
M3 - Review article
AN - SCOPUS:85105351765
VL - 194
JO - Computer networks
JF - Computer networks
SN - 1389-1286
M1 - 108133
ER -