Machine Learning Attacks and Countermeasures for PUF-Based IoT Edge Node Security

  • PDF / 1,555,878 Bytes
  • 13 Pages / 595.276 x 790.866 pts Page_size
  • 85 Downloads / 218 Views

DOWNLOAD

REPORT


ORIGINAL RESEARCH

Machine Learning Attacks and Countermeasures for PUF‑Based IoT Edge Node Security Vishalini R. Laguduva1 · Srinivas Katkoori1 · Robert Karam1 Received: 1 June 2020 / Accepted: 11 August 2020 © Springer Nature Singapore Pte Ltd 2020

Abstract The Internet of things (IoT) ecosystem has grown exponentially with the convergence of various technologies such as deep learning, sensor systems, and advances in computing platforms. With such a highly pervasive nature of “smart” devices, the nature of data being collected and processed can be increasingly private and require safeguards to ensure the data’s integrity and security. Physically unclonable functions (PUFs) have emerged as a lightweight, viable security protocol in the Internet of Things (IoT) framework. Malicious modeling of PUF architectures has proven to be difficult due to the inherently stochastic nature of PUF architectures. In this work, we show that knowledge of the underlying PUF structure is unnecessary to clone a PUF. We tackle the problem of cloning PUF-based edge nodes in different settings such as unencrypted, encrypted, and obfuscated challenges in an IoT framework. We present a novel non-invasive, architecture-independent, machine learning attack for robust PUF designs and can handle encryption and obfuscation-based security measures on the transmitted challenge response pairs (CRPs). We show that the proposed framework can successfully clone different PUF architectures, including those encrypted using two (2) different encryption protocols in DES and AES and with varying degrees of obfuscation. We also show that the proposed approach outperforms a two-stage brute force attack model. Finally, we offer a machine learning-based countermeasure, a discriminator, which can distinguish cloned PUF devices and authentic PUFs with an average accuracy of 96%. The proposed discriminator can be used for rapidly authenticating millions of IoT nodes remotely from the cloud server. Keywords  Machine learning · Internet of things · Physically unclonable functions · Edge node security

Introduction The Internet of things (IoT) ecosystem has grown exponentially with the convergence of various technologies such as deep learning, sensor systems, and advances in computing platforms. The advent of 5G technology and the promise of This article is part of the topical collection “Hardware-Assisted Security Solutions for Electronic Systems” guest edited by Himanshu Thapliyal, Saraju P. Mohanty, Wujie Wen and Yiran Chen. * Vishalini R. Laguduva [email protected] Srinivas Katkoori [email protected] Robert Karam [email protected] 1



CSE Department, University of South Florida, Tampa, FL 33620, USA

higher bandwidth is expected to increase the highly connected nature of today’s IoT ecosystem. The massive collection of ubiquitous and pervasive devices in the IoT ecosystem has been deployed across a variety of environments to collect and process massive amounts of data. Applications of IoT devices range from wearable computing devices, bioimplantable devices to m