Mastersthesis,

PUF-Based Device-to-Device Authentication in IoT without Trusted Intermediaries

.
University of Würzburg, (February 2024)

Abstract

The Internet of Things (IoT) signifies a revolutionary shift wherein everyday objects are embedded with sensors, software, and connectivity capabilities, allowing them to communicate and exchange data with other devices and systems across the Internet. As these devices continuously collect and exchange data, and act upon the information received, the authentication of devices within our networks becomes crucial to prevent malicious actors from breaching the network. While sophisticated hardware security architectures like Intel SGX or Trusted Platform Modules are available for more powerful devices like laptops or smartphones, their cost often makes them impractical for the typically budgetsensitive IoT device manufacturers. As a result, IoT devices frequently rely on storing confidential information in non-volatile memory, which, as studies have shown, can be vulnerable to physical attacks thereby compromising device security. Physical Unclonable Functions (PUFs) present a cost-effective solution by generating a unique response, or ”hardware fingerprint,” to a given stimulus (challenge) based on the natural variations in electronic hardware components during manufacturing. This fingerprint, generated on demand and not stored on the device, remains secure against adversaries attempting to access non-volatile memory. Although previous research has demonstrated the utility of PUFs for device authentication, these methods often depend on a trusted verifier storing significant amounts of confidential data, a requirement that limits the ability of low-end IoT devices to act as verifiers and raises the risk of impersonation attacks if the verifier is compromised. In this thesis, we introduce and examine three distinct PUF-based authentication schemes. Each scheme is designed to facilitate secure authentication between two parties that do not trust each other. A key feature of these approaches is their reliance solely on public information, eliminating the need for verifiers to store any sensitive data. This crucial aspect not only removes the storage burden from the verifier but also prevents a potentially malicious verifier from impersonating the provers. The methods developed are (1) ZK-PUF, a system that enables PUF-based authentication using zero-knowledge proofs, (2) PAVOC, which guarantees secure authentication using one-way hash chains, and (3) PAWOS, which uses the concept of cryptographic one-time signatures for authentication. Each strategy is based on different design principles that meet different security and operational requirements. They have been tested on IoT development boards with limited resources and have proven their efficiency even with limited computing power while protecting against non-volatile memory attacks and network-level adversaries.

Tags

Users

  • @sssgroup

Comments and Reviews

OSZAR »