Skip to main content

2024 | OriginalPaper | Buchkapitel

VXorPUF: A Vedic Principles - Based Hybrid XOR Arbiter PUF for Robust Security in IoMT

verfasst von : Md Ishtyaq Mahmud, Pintu Kumar Sadhu, Venkata P. Yanambaka, Ahmed Abdelgawad

Erschienen in: Internet of Things. Advances in Information and Communication Technology

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Medical Things (IoMT) is playing a pivotal role in the healthcare sector by allowing faster and more informed hospital care, personalized treatment, and medical solutions. Several authentication systems are used to safeguard the data and authenticate the devices, but some of them are inefficient and some of them have some limitations. A very effective and trustworthy solution for resource-constrained medical devices is provided by Physical Unclonable Functions (PUF) - based identity and authentication systems. This paper proposes VXorPUF, a Vedic Principles - Based Hybrid XOR Arbiter PUF. Modeling attacks were performed on the proposed architecture and an accuracy of 49.80% was achieved. Uniqueness, Reliability and Randomness were the figures of merit used to evaluate PUF. A further study was evaluated the uniformity of (m,n,p)-OAN-XOR-PUF, and a result of 43.75% was found, which is close to the ideal value of arbitrary PUF response.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ali, R., Zhang, D., Cai, H., Zhao, W., Wang, Y.: A machine learning attack-resilient strong PUF leveraging the process variation of MRAM. In: Express Briefs, IEEE Transactions on Circuits and Systems II (2022) Ali, R., Zhang, D., Cai, H., Zhao, W., Wang, Y.: A machine learning attack-resilient strong PUF leveraging the process variation of MRAM. In: Express Briefs, IEEE Transactions on Circuits and Systems II (2022)
2.
Zurück zum Zitat Almogren, A., Mohiuddin, I., Din, I.U., Almajed, H., Guizani, N.: Ftm-iomt: fuzzy-based trust management for preventing sybil attacks in internet of medical things. Proc. IEEE Internet Things J. 8(6), 4485–4497 (2020)CrossRef Almogren, A., Mohiuddin, I., Din, I.U., Almajed, H., Guizani, N.: Ftm-iomt: fuzzy-based trust management for preventing sybil attacks in internet of medical things. Proc. IEEE Internet Things J. 8(6), 4485–4497 (2020)CrossRef
3.
Zurück zum Zitat Canaday, D., Barbosa, W.A., Pomerance, A.: A novel attack on machine-learning resistant physical unclonable functions. In: 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 25–28. IEEE (2022) Canaday, D., Barbosa, W.A., Pomerance, A.: A novel attack on machine-learning resistant physical unclonable functions. In: 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 25–28. IEEE (2022)
4.
Zurück zum Zitat Gao, Y., Al-Sarawi, S.F., Abbott, D., Sadeghi, A.R., Ranasinghe, D.C.: Modeling attack resilient reconfigurable latent obfuscation technique for PUF based lightweight authentication. arXiv preprint arXiv:1706.06232 (2017) Gao, Y., Al-Sarawi, S.F., Abbott, D., Sadeghi, A.R., Ranasinghe, D.C.: Modeling attack resilient reconfigurable latent obfuscation technique for PUF based lightweight authentication. arXiv preprint arXiv:​1706.​06232 (2017)
5.
Zurück zum Zitat Gassend, B., Lim, D., Clarke, D., Van Dijk, M., Devadas, S.: Identification and authentication of integrated circuits. Concurr. Comput. Pract. Exp. 16(11), 1077–1098 (2004)CrossRef Gassend, B., Lim, D., Clarke, D., Van Dijk, M., Devadas, S.: Identification and authentication of integrated circuits. Concurr. Comput. Pract. Exp. 16(11), 1077–1098 (2004)CrossRef
6.
Zurück zum Zitat Hatzivasilis, G., Soultatos, O., Ioannidis, S., Verikoukis, C., Demetriou, G., Tsatsoulis, C.: Review of security and privacy for the Internet of Medical Things (IoMT). In: Proceedings of 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 457–464. IEEE (2019) Hatzivasilis, G., Soultatos, O., Ioannidis, S., Verikoukis, C., Demetriou, G., Tsatsoulis, C.: Review of security and privacy for the Internet of Medical Things (IoMT). In: Proceedings of 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 457–464. IEEE (2019)
7.
9.
Zurück zum Zitat Karmakar, K.K., Varadharajan, V., Tupakula, U., Nepal, S., Thapa, C.: Towards a security enhanced virtualised network infrastructure for Internet of Medical Things (IoMT). In: Proceedings of 2020 6th IEEE Conference on Network Softwarization (NetSoft), pp. 257–261. IEEE (2020) Karmakar, K.K., Varadharajan, V., Tupakula, U., Nepal, S., Thapa, C.: Towards a security enhanced virtualised network infrastructure for Internet of Medical Things (IoMT). In: Proceedings of 2020 6th IEEE Conference on Network Softwarization (NetSoft), pp. 257–261. IEEE (2020)
10.
Zurück zum Zitat Khalafalla, M., Gebotys, C.: PUFs deep attacks: enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs. In: Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 204–209 (2019). https://doi.org/10.23919/DATE.2019.8714862 Khalafalla, M., Gebotys, C.: PUFs deep attacks: enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs. In: Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 204–209 (2019). https://​doi.​org/​10.​23919/​DATE.​2019.​8714862
11.
Zurück zum Zitat King, J., Awad, A.I.: A distributed security mechanism for resource-constrained IOT devices. Informatica 40(1) (2016) King, J., Awad, A.I.: A distributed security mechanism for resource-constrained IOT devices. Informatica 40(1) (2016)
12.
Zurück zum Zitat Koutras, D., Stergiopoulos, G., Dasaklis, T., Kotzanikolaou, P., Glynos, D., Douligeris, C.: Security in iomt communications: a survey. Sensors 20(17), 4828 (2020)CrossRef Koutras, D., Stergiopoulos, G., Dasaklis, T., Kotzanikolaou, P., Glynos, D., Douligeris, C.: Security in iomt communications: a survey. Sensors 20(17), 4828 (2020)CrossRef
13.
Zurück zum Zitat Kumar, P., Gupta, G.P., Tripathi, R.: An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks. Comput. Commun. 166, 110–124 (2021)CrossRef Kumar, P., Gupta, G.P., Tripathi, R.: An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks. Comput. Commun. 166, 110–124 (2021)CrossRef
14.
Zurück zum Zitat Kwarteng, E., Cebe, M.: A survey on security issues in modern implantable devices: solutions and future issues. Smart Health 100295 (2022) Kwarteng, E., Cebe, M.: A survey on security issues in modern implantable devices: solutions and future issues. Smart Health 100295 (2022)
16.
18.
Zurück zum Zitat Mahmud, M., Sadhu, P., Yanambaka, V., Abdelgawad, A.: Vxorpuf: a vedic principles - based hybrid XOR arbiter PUF for robust security in IoMT. Preprints.org (2023030499) (2023) Mahmud, M., Sadhu, P., Yanambaka, V., Abdelgawad, A.: Vxorpuf: a vedic principles - based hybrid XOR arbiter PUF for robust security in IoMT. Preprints.org (2023030499) (2023)
19.
Zurück zum Zitat Maiti, A., McDougall, L., Schaumont, P.: The impact of aging on an FPQA-based physical unclonable function. In: 2011 21st International Conference on Field Programmable Logic and Applications, pp. 151–156. IEEE (2011) Maiti, A., McDougall, L., Schaumont, P.: The impact of aging on an FPQA-based physical unclonable function. In: 2011 21st International Conference on Field Programmable Logic and Applications, pp. 151–156. IEEE (2011)
20.
Zurück zum Zitat Nandy, S., Adhikari, M., Khan, M.A., Menon, V.G., Verma, S.: An intrusion detection mechanism for secured IoMT framework based on swarm-neural network. IEEE J. Biomed. Health Inform. 26(5), 1969–1976 (2021)CrossRef Nandy, S., Adhikari, M., Khan, M.A., Menon, V.G., Verma, S.: An intrusion detection mechanism for secured IoMT framework based on swarm-neural network. IEEE J. Biomed. Health Inform. 26(5), 1969–1976 (2021)CrossRef
21.
Zurück zum Zitat Papaioannou, M., et al.: A survey on security threats and countermeasures in internet of medical things (IoMT). Trans. Emerg. Telecommun. Technol. 33(6), e4049 (2022) Papaioannou, M., et al.: A survey on security threats and countermeasures in internet of medical things (IoMT). Trans. Emerg. Telecommun. Technol. 33(6), e4049 (2022)
22.
Zurück zum Zitat Rahman, M., Jahankhani, H.: Security vulnerabilities in existing security mechanisms for IoMT and potential solutions for mitigating cyber-attacks. In: Jahankhani, H., Kendzierskyj, S., Akhgar, B. (eds.) Information Security Technologies for Controlling Pandemics. ASTSA, pp. 307–334. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-72120-6_12 Rahman, M., Jahankhani, H.: Security vulnerabilities in existing security mechanisms for IoMT and potential solutions for mitigating cyber-attacks. In: Jahankhani, H., Kendzierskyj, S., Akhgar, B. (eds.) Information Security Technologies for Controlling Pandemics. ASTSA, pp. 307–334. Springer, Cham (2021). https://​doi.​org/​10.​1007/​978-3-030-72120-6_​12
23.
Zurück zum Zitat Razdan, S., Sharma, S.: Internet of medical things (IoMT): overview, emerging technologies, and case studies. In: IETE Technical Review, pp. 1–14 (2021) Razdan, S., Sharma, S.: Internet of medical things (IoMT): overview, emerging technologies, and case studies. In: IETE Technical Review, pp. 1–14 (2021)
24.
Zurück zum Zitat Rührmair, U., Sehnke, F., Sölter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 237–249 (2010) Rührmair, U., Sehnke, F., Sölter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 237–249 (2010)
26.
Zurück zum Zitat Santikellur, P., Bhattacharyay, A., Chakraborty, R.S.: Deep learning based model building attacks on arbiter PUF compositions. Cryptology ePrint Archive (2019) Santikellur, P., Bhattacharyay, A., Chakraborty, R.S.: Deep learning based model building attacks on arbiter PUF compositions. Cryptology ePrint Archive (2019)
28.
Zurück zum Zitat Shoaran, M., Haghi, B.A., Taghavi, M., Farivar, M., Emami-Neyestanak, A.: Energy-efficient classification for resource-constrained biomedical applications. IEEE J. Emerg. Select. Top. Circuits Syst. 8(4), 693–707 (2018)CrossRef Shoaran, M., Haghi, B.A., Taghavi, M., Farivar, M., Emami-Neyestanak, A.: Energy-efficient classification for resource-constrained biomedical applications. IEEE J. Emerg. Select. Top. Circuits Syst. 8(4), 693–707 (2018)CrossRef
29.
Zurück zum Zitat Siddiqi, M.A., Tsintzira, A.A., Digkas, G., Siavvas, M.G., Strydis, C.: Adding security to implantable medical devices: can we afford it? In: Proceedings of EWSN, pp. 67–78 (2021) Siddiqi, M.A., Tsintzira, A.A., Digkas, G., Siavvas, M.G., Strydis, C.: Adding security to implantable medical devices: can we afford it? In: Proceedings of EWSN, pp. 67–78 (2021)
30.
Zurück zum Zitat Suragani, R., Nazarenko, E., Anagnostopoulos, N.A., Mexis, N., Kavun, E.B.: Identification and classification of corrupted PUF responses via machine learning. In: 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 137–140. IEEE (2022) Suragani, R., Nazarenko, E., Anagnostopoulos, N.A., Mexis, N., Kavun, E.B.: Identification and classification of corrupted PUF responses via machine learning. In: 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 137–140. IEEE (2022)
31.
Zurück zum Zitat Vaiyapuri, T., Binbusayyis, A., Varadarajan, V.: Security, privacy and trust in IoMT enabled smart healthcare system: a systematic review of current and future trends. Int. J. Adv. Comput. Sci. Appl. 12(2), 731–737 (2021) Vaiyapuri, T., Binbusayyis, A., Varadarajan, V.: Security, privacy and trust in IoMT enabled smart healthcare system: a systematic review of current and future trends. Int. J. Adv. Comput. Sci. Appl. 12(2), 731–737 (2021)
33.
Zurück zum Zitat Wang, S.J., Chen, Y.S., Li, K.S.M.: Modeling attack resistant PUFs based on adversarial attack against machine learning. IEEE J. Emerg. Select. Top. Circuits Syst. 11(2), 306–318 (2021)CrossRef Wang, S.J., Chen, Y.S., Li, K.S.M.: Modeling attack resistant PUFs based on adversarial attack against machine learning. IEEE J. Emerg. Select. Top. Circuits Syst. 11(2), 306–318 (2021)CrossRef
34.
Zurück zum Zitat Wang, Y., Xi, X., Orshansky, M.: Lattice PUF: a strong physical unclonable function provably secure against machine learning attacks. In: 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 273–283. IEEE (2020) Wang, Y., Xi, X., Orshansky, M.: Lattice PUF: a strong physical unclonable function provably secure against machine learning attacks. In: 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 273–283. IEEE (2020)
35.
Zurück zum Zitat Wazid, M., Das, A.K., Rodrigues, J.J., Shetty, S., Park, Y.: IoMT malware detection approaches: analysis and research challenges. IEEE Access 7, 182459–182476 (2019)CrossRef Wazid, M., Das, A.K., Rodrigues, J.J., Shetty, S., Park, Y.: IoMT malware detection approaches: analysis and research challenges. IEEE Access 7, 182459–182476 (2019)CrossRef
36.
Zurück zum Zitat Wisiol, N., Thapaliya, B., Mursi, K.T., Seifert, J.P., Zhuang, Y.: Neural network modeling attacks on arbiter-PUF-based designs. IEEE Trans. Inf. Forens. Secur. 17, 2719–2731 (2022)CrossRef Wisiol, N., Thapaliya, B., Mursi, K.T., Seifert, J.P., Zhuang, Y.: Neural network modeling attacks on arbiter-PUF-based designs. IEEE Trans. Inf. Forens. Secur. 17, 2719–2731 (2022)CrossRef
37.
39.
Zurück zum Zitat Yao, J., et al.: Design and evaluate recomposited or-and-XOR-PUF. IEEE Trans. Emerg. Top. Comput. (2022) Yao, J., et al.: Design and evaluate recomposited or-and-XOR-PUF. IEEE Trans. Emerg. Top. Comput. (2022)
41.
Zurück zum Zitat Zalivaka, S.S., Ivaniuk, A.A., Chang, C.H.: Reliable and modeling attack resistant authentication of arbiter PUF in FPGA implementation with trinary quadruple response. IEEE Trans. Inf. Forens. Secur. 14(4), 1109–1123 (2018)CrossRef Zalivaka, S.S., Ivaniuk, A.A., Chang, C.H.: Reliable and modeling attack resistant authentication of arbiter PUF in FPGA implementation with trinary quadruple response. IEEE Trans. Inf. Forens. Secur. 14(4), 1109–1123 (2018)CrossRef
42.
Zurück zum Zitat Zerrouki, F., Ouchani, S., Bouarfa, H.: A survey on silicon PUFs. J. Syst. Architect. 127, 102514 (2022)CrossRef Zerrouki, F., Ouchani, S., Bouarfa, H.: A survey on silicon PUFs. J. Syst. Architect. 127, 102514 (2022)CrossRef
43.
Zurück zum Zitat Zhang, J., et al.: A 4t/cell amplifier-chain-based XOR PUF with strong machine learning attack resilience. IEEE Trans. Circuits Syst. I Regul. Pap. 69(1), 366–377 (2021) Zhang, J., et al.: A 4t/cell amplifier-chain-based XOR PUF with strong machine learning attack resilience. IEEE Trans. Circuits Syst. I Regul. Pap. 69(1), 366–377 (2021)
44.
Zurück zum Zitat Zhuang, H., Xi, X., Sun, N., Orshansky, M.: A strong subthreshold current array PUF resilient to machine learning attacks. IEEE Trans. Circuits Syst. I Regul. Pap. 67(1), 135–144 (2019)CrossRef Zhuang, H., Xi, X., Sun, N., Orshansky, M.: A strong subthreshold current array PUF resilient to machine learning attacks. IEEE Trans. Circuits Syst. I Regul. Pap. 67(1), 135–144 (2019)CrossRef
Metadaten
Titel
VXorPUF: A Vedic Principles - Based Hybrid XOR Arbiter PUF for Robust Security in IoMT
verfasst von
Md Ishtyaq Mahmud
Pintu Kumar Sadhu
Venkata P. Yanambaka
Ahmed Abdelgawad
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-45882-8_17