Cargando…

Security Analysis of Machine Learning-Based PUF Enrollment Protocols: A Review

The demand for Internet of Things services is increasing exponentially, and consequently a large number of devices are being deployed. To efficiently authenticate these objects, the use of physical unclonable functions (PUFs) has been introduced as a promising solution for the resource-constrained n...

Descripción completa

Detalles Bibliográficos
Autores principales: Khalfaoui, Sameh, Leneutre, Jean, Villard, Arthur, Gazeau, Ivan, Ma, Jingxuan, Urien, Pascal
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8705400/
https://www.ncbi.nlm.nih.gov/pubmed/34960505
http://dx.doi.org/10.3390/s21248415
_version_ 1784621936901357568
author Khalfaoui, Sameh
Leneutre, Jean
Villard, Arthur
Gazeau, Ivan
Ma, Jingxuan
Urien, Pascal
author_facet Khalfaoui, Sameh
Leneutre, Jean
Villard, Arthur
Gazeau, Ivan
Ma, Jingxuan
Urien, Pascal
author_sort Khalfaoui, Sameh
collection PubMed
description The demand for Internet of Things services is increasing exponentially, and consequently a large number of devices are being deployed. To efficiently authenticate these objects, the use of physical unclonable functions (PUFs) has been introduced as a promising solution for the resource-constrained nature of these devices. The use of machine learning PUF models has been recently proposed to authenticate the IoT objects while reducing the storage space requirement for each device. Nonetheless, the use of a mathematically clonable PUFs requires careful design of the enrollment process. Furthermore, the secrecy of the machine learning models used for PUFs and the scenario of leakage of sensitive information to an adversary due to an insider threat within the organization have not been discussed. In this paper, we review the state-of-the-art model-based PUF enrollment protocols. We identity two architectures of enrollment protocols based on the participating entities and the building blocks that are relevant to the security of the authentication procedure. In addition, we discuss their respective weaknesses with respect to insider and outsider threats. Our work serves as a comprehensive overview of the ML PUF-based methods and provides design guidelines for future enrollment protocol designers.
format Online
Article
Text
id pubmed-8705400
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-87054002021-12-25 Security Analysis of Machine Learning-Based PUF Enrollment Protocols: A Review Khalfaoui, Sameh Leneutre, Jean Villard, Arthur Gazeau, Ivan Ma, Jingxuan Urien, Pascal Sensors (Basel) Review The demand for Internet of Things services is increasing exponentially, and consequently a large number of devices are being deployed. To efficiently authenticate these objects, the use of physical unclonable functions (PUFs) has been introduced as a promising solution for the resource-constrained nature of these devices. The use of machine learning PUF models has been recently proposed to authenticate the IoT objects while reducing the storage space requirement for each device. Nonetheless, the use of a mathematically clonable PUFs requires careful design of the enrollment process. Furthermore, the secrecy of the machine learning models used for PUFs and the scenario of leakage of sensitive information to an adversary due to an insider threat within the organization have not been discussed. In this paper, we review the state-of-the-art model-based PUF enrollment protocols. We identity two architectures of enrollment protocols based on the participating entities and the building blocks that are relevant to the security of the authentication procedure. In addition, we discuss their respective weaknesses with respect to insider and outsider threats. Our work serves as a comprehensive overview of the ML PUF-based methods and provides design guidelines for future enrollment protocol designers. MDPI 2021-12-16 /pmc/articles/PMC8705400/ /pubmed/34960505 http://dx.doi.org/10.3390/s21248415 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Khalfaoui, Sameh
Leneutre, Jean
Villard, Arthur
Gazeau, Ivan
Ma, Jingxuan
Urien, Pascal
Security Analysis of Machine Learning-Based PUF Enrollment Protocols: A Review
title Security Analysis of Machine Learning-Based PUF Enrollment Protocols: A Review
title_full Security Analysis of Machine Learning-Based PUF Enrollment Protocols: A Review
title_fullStr Security Analysis of Machine Learning-Based PUF Enrollment Protocols: A Review
title_full_unstemmed Security Analysis of Machine Learning-Based PUF Enrollment Protocols: A Review
title_short Security Analysis of Machine Learning-Based PUF Enrollment Protocols: A Review
title_sort security analysis of machine learning-based puf enrollment protocols: a review
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8705400/
https://www.ncbi.nlm.nih.gov/pubmed/34960505
http://dx.doi.org/10.3390/s21248415
work_keys_str_mv AT khalfaouisameh securityanalysisofmachinelearningbasedpufenrollmentprotocolsareview
AT leneutrejean securityanalysisofmachinelearningbasedpufenrollmentprotocolsareview
AT villardarthur securityanalysisofmachinelearningbasedpufenrollmentprotocolsareview
AT gazeauivan securityanalysisofmachinelearningbasedpufenrollmentprotocolsareview
AT majingxuan securityanalysisofmachinelearningbasedpufenrollmentprotocolsareview
AT urienpascal securityanalysisofmachinelearningbasedpufenrollmentprotocolsareview