Visible to the public Countermeasure of Lightweight Physical Unclonable Function Against Side-Channel Attack

TitleCountermeasure of Lightweight Physical Unclonable Function Against Side-Channel Attack
Publication TypeConference Paper
Year of Publication2019
AuthorsNozaki, Yusuke, Yoshikawa, Masaya
Conference Name2019 Cybersecurity and Cyberforensics Conference (CCC)
ISBN Number978-1-7281-2600-5
Keywordsauthentication, countermeasure method, cryptography, external Internet, field programmable gate arrays, hardware security, Human Behavior, human factors, Industrial Internet of Things, Integrated circuit modeling, Internet, Internet of Things, lightweight physical unclonable function, lightweight PUF, message authentication, Metrics, modeling attack, physical unclonable function, power aware computing, power consumption, Power demand, Power measurement, pubcrawl, Scalability, security of IoT, Side-channel attack, side-channel information, Tamper resistance, Training data
Abstract

In industrial internet of things, various devices are connected to external internet. For the connected devices, the authentication is very important in the viewpoint of security; therefore, physical unclonable functions (PUFs) have attracted attention as authentication techniques. On the other hand, the risk of modeling attacks on PUFs, which clone the function of PUFs mathematically, is pointed out. Therefore, a resistant-PUF such as a lightweight PUF has been proposed. However, new analytical methods (side-channel attacks: SCAs), which use side-channel information such as power or electromagnetic waves, have been proposed. The countermeasure method has also been proposed; however, an evaluation using actual devices has not been studied. Since PUFs use small production variations, the implementation evaluation is very important. Therefore, this study proposes a SCA countermeasure of the lightweight PUF. The proposed method is based on the previous studies, and maintains power consumption consistency during the generation of response. In experiments using a field programmable gate array, the measured power consumption was constant regardless of output values of the PUF could be confirmed. Then, experimental results showed that the predicted rate of the response was about 50 %, and the proposed method had a tamper resistance against SCAs.

URLhttps://ieeexplore.ieee.org/document/8854557
DOI10.1109/CCC.2019.00-13
Citation Keynozaki_countermeasure_2019