Countermeasure of Lightweight Physical Unclonable Function Against Side-Channel Attack
Title | Countermeasure of Lightweight Physical Unclonable Function Against Side-Channel Attack |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Nozaki, Yusuke, Yoshikawa, Masaya |
Conference Name | 2019 Cybersecurity and Cyberforensics Conference (CCC) |
ISBN Number | 978-1-7281-2600-5 |
Keywords | authentication, countermeasure method, cryptography, external Internet, field programmable gate arrays, hardware security, Human Behavior, human factors, Industrial Internet of Things, Integrated circuit modeling, Internet, Internet of Things, lightweight physical unclonable function, lightweight PUF, message authentication, Metrics, modeling attack, physical unclonable function, power aware computing, power consumption, Power demand, Power measurement, pubcrawl, Scalability, security of IoT, Side-channel attack, side-channel information, Tamper resistance, Training data |
Abstract | In industrial internet of things, various devices are connected to external internet. For the connected devices, the authentication is very important in the viewpoint of security; therefore, physical unclonable functions (PUFs) have attracted attention as authentication techniques. On the other hand, the risk of modeling attacks on PUFs, which clone the function of PUFs mathematically, is pointed out. Therefore, a resistant-PUF such as a lightweight PUF has been proposed. However, new analytical methods (side-channel attacks: SCAs), which use side-channel information such as power or electromagnetic waves, have been proposed. The countermeasure method has also been proposed; however, an evaluation using actual devices has not been studied. Since PUFs use small production variations, the implementation evaluation is very important. Therefore, this study proposes a SCA countermeasure of the lightweight PUF. The proposed method is based on the previous studies, and maintains power consumption consistency during the generation of response. In experiments using a field programmable gate array, the measured power consumption was constant regardless of output values of the PUF could be confirmed. Then, experimental results showed that the predicted rate of the response was about 50 %, and the proposed method had a tamper resistance against SCAs. |
URL | https://ieeexplore.ieee.org/document/8854557 |
DOI | 10.1109/CCC.2019.00-13 |
Citation Key | nozaki_countermeasure_2019 |
- message authentication
- Training data
- Tamper resistance
- side-channel information
- Side-channel attack
- security of IoT
- Scalability
- pubcrawl
- Power measurement
- Power demand
- power consumption
- power aware computing
- Physical Unclonable Function
- modeling attack
- Metrics
- authentication
- lightweight PUF
- lightweight physical unclonable function
- Internet of Things
- internet
- Integrated circuit modeling
- Industrial Internet of Things
- Human Factors
- Human behavior
- Hardware Security
- field programmable gate arrays
- external Internet
- Cryptography
- countermeasure method