Designing Short-Stage CDC-XPUFs: Balancing Reliability, Cost, and
Security in IoT Devices
- URL: http://arxiv.org/abs/2409.17902v1
- Date: Thu, 26 Sep 2024 14:50:20 GMT
- Title: Designing Short-Stage CDC-XPUFs: Balancing Reliability, Cost, and
Security in IoT Devices
- Authors: Gaoxiang Li, Yu Zhuang
- Abstract summary: Physically Unclonable Functions (PUFs) generate unique cryptographic keys from inherent hardware variations.
Traditional PUFs like Arbiter PUFs (APUFs) and XOR Arbiter PUFs (XOR-PUFs) are susceptible to machine learning (ML) and reliability-based attacks.
We propose an optimized CDC-XPUF design that incorporates a pre-selection strategy to enhance reliability and introduces a novel lightweight architecture.
- Score: 2.28438857884398
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The rapid expansion of Internet of Things (IoT) devices demands robust and
resource-efficient security solutions. Physically Unclonable Functions (PUFs),
which generate unique cryptographic keys from inherent hardware variations,
offer a promising approach. However, traditional PUFs like Arbiter PUFs (APUFs)
and XOR Arbiter PUFs (XOR-PUFs) are susceptible to machine learning (ML) and
reliability-based attacks. In this study, we investigate
Component-Differentially Challenged XOR-PUFs (CDC-XPUFs), a less explored
variant, to address these vulnerabilities. We propose an optimized CDC-XPUF
design that incorporates a pre-selection strategy to enhance reliability and
introduces a novel lightweight architecture to reduce hardware overhead.
Rigorous testing demonstrates that our design significantly lowers resource
consumption, maintains strong resistance to ML attacks, and improves
reliability, effectively mitigating reliability-based attacks. These results
highlight the potential of CDC-XPUFs as a secure and efficient candidate for
widespread deployment in resource-constrained IoT systems.
Related papers
- LPUF-AuthNet: A Lightweight PUF-Based IoT Authentication via Tandem Neural Networks and Split Learning [2.37507453143459]
Internet of things (IoT) is projected to connect over 75 billion devices globally by 2025.
Traditional cryptographic methods often struggle with the constraints of IoT devices.
This paper considers physical unclonable functions (PUFs) as robust security solutions.
Our proposed solution introduces a lightweight PUF mechanism, called LPUF-AuthNet, combining tandem neural networks (TNN) with a split learning (SL) paradigm.
arXiv Detail & Related papers (2024-10-16T03:25:04Z) - The Impact of SBOM Generators on Vulnerability Assessment in Python: A Comparison and a Novel Approach [56.4040698609393]
Software Bill of Materials (SBOM) has been promoted as a tool to increase transparency and verifiability in software composition.
Current SBOM generation tools often suffer from inaccuracies in identifying components and dependencies.
We propose PIP-sbom, a novel pip-inspired solution that addresses their shortcomings.
arXiv Detail & Related papers (2024-09-10T10:12:37Z) - A novel reliability attack of Physical Unclonable Functions [1.9336815376402723]
Physical Unclonable Functions (PUFs) are emerging as promising security primitives for IoT devices.
Despite their strengths, PUFs are vulnerable to machine learning (ML) attacks, including conventional and reliability-based attacks.
arXiv Detail & Related papers (2024-05-21T18:34:14Z) - RigorLLM: Resilient Guardrails for Large Language Models against Undesired Content [62.685566387625975]
Current mitigation strategies, while effective, are not resilient under adversarial attacks.
This paper introduces Resilient Guardrails for Large Language Models (RigorLLM), a novel framework designed to efficiently moderate harmful and unsafe inputs.
arXiv Detail & Related papers (2024-03-19T07:25:02Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Secure Deep Reinforcement Learning for Dynamic Resource Allocation in
Wireless MEC Networks [46.689212344009015]
This paper proposes a blockchain-secured deep reinforcement learning (BC-DRL) optimization framework for data management and resource allocation in mobile edge computing networks.
We design a low-latency reputation-based proof-of-stake (RPoS) consensus protocol to select highly reliable blockchain-enabled BSs.
We provide extensive simulation results and analysis to validate that our BC-DRL framework achieves higher security, reliability, and resource utilization efficiency than benchmark blockchain consensus protocols and MEC resource allocation algorithms.
arXiv Detail & Related papers (2023-12-13T09:39:32Z) - Lightweight Strategy for XOR PUFs as Security Primitives for
Resource-constrained IoT device [0.0]
XOR Arbiter PUF (XOR-PUF) is one of the most studied PUFs.
Recent attack studies reveal that even XOR-PUFs with large XOR sizes are still not safe against machine learning attacks.
We present a strategy that combines the choice of XOR Arbiter PUF (XOR-PUF) architecture parameters with the way XOR-PUFs are used.
arXiv Detail & Related papers (2022-10-04T17:12:36Z) - PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid
Intra-Group-based Authentication with DRAM-PUFs Using Machine Learning [10.445311342905118]
We propose a classification system using Machine Learning (ML) to accurately identify the origin of noisy memory derived (DRAM) PUF responses.
We achieve up to 98% classification accuracy using a modified deep convolutional neural network (CNN) for feature extraction.
arXiv Detail & Related papers (2022-07-11T08:13:08Z) - A New Security Boundary of Component Differentially Challenged XOR PUFs
Against Machine Learning Modeling Attacks [0.0]
The XOR Arbiter PUF (XOR PUF or XPUF) is an intensively studied PUF invented to improve the security of the Arbiter PUF.
Recently, highly powerful machine learning attack methods were discovered and were able to easily break large-sized XPUFs.
In this paper, the two current most powerful two machine learning methods for attacking XPUFs are adapted by fine-tuning the parameters of the two methods for CDC-XPUFs.
arXiv Detail & Related papers (2022-06-02T21:51:39Z) - RoFL: Attestable Robustness for Secure Federated Learning [59.63865074749391]
Federated Learning allows a large number of clients to train a joint model without the need to share their private data.
To ensure the confidentiality of the client updates, Federated Learning systems employ secure aggregation.
We present RoFL, a secure Federated Learning system that improves robustness against malicious clients.
arXiv Detail & Related papers (2021-07-07T15:42:49Z) - Federated Learning with Unreliable Clients: Performance Analysis and
Mechanism Design [76.29738151117583]
Federated Learning (FL) has become a promising tool for training effective machine learning models among distributed clients.
However, low quality models could be uploaded to the aggregator server by unreliable clients, leading to a degradation or even a collapse of training.
We model these unreliable behaviors of clients and propose a defensive mechanism to mitigate such a security risk.
arXiv Detail & Related papers (2021-05-10T08:02:27Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.