Security is of critical importance for the Internet of Things (IoT). Many IoT devices are resource-constrained, calling for lightweight security protocols. Physical unclonable functions (PUFs) leverage integrated circuits' variations to produce responses unique for individual devices, and hence are not reproducible even by the manufacturers. Implementable with simplistic circuits of thousands of transistors and operable with low energy, Physical unclonable functions are promising candidates as security primitives for resource-constrained IoT devices. Arbiter PUFs (APUFs) are a group of delay-based PUFs which are highly lightweight in resource requirements but suffer from high susceptibility to machine learning attacks. To defend APUF variants against machine learning attacks, we introduce challenge input interface, which incurs low resource overhead. With the interface, experimental attack study shows that all tested PUFs have substantially improved their resistance against machine learning attacks, rendering interfaced APUF variants promising candidates for security critical applications.
翻译:安全对于物的互联网(IoT)至关重要。许多IoT装置受到资源限制,需要轻量级安全协议。物理上无法调试的功能(PUFs)利用集成电路的变异来为个别装置提供独特的反应,因此即使制造商也无法复制。可以用数千个晶体管的简单电路执行,并且低能可操作,物理上无法调试的功能作为资源受限制的IoT装置的安全原始物,很有前途。仲裁者PUFs(APUFs)是一组基于延迟的PUFs,在资源需求方面非常轻,但极易受到机器学习攻击的影响。为了保护APUF的变异体不受机器学习攻击,我们引入挑战输入接口,这种接口导致低资源管理。实验性攻击研究表明,所有经过测试的PUFs都大大提高了对机器学习攻击的抵抗力,使相互连接的APUF变体对安全关键应用的候选物。