4.6 Article

PUF-Based Anonymous Authentication Scheme for Hardware Devices and IPs in Edge Computing Environment

Journal

IEEE ACCESS
Volume 7, Issue -, Pages 124785-124796

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2019.2925106

Keywords

Edge computing; field programmable gate array (FPGA); IP cores; PUF authentication model; anonymous authentication

Funding

  1. National Natural Science Foundation of China [61572186, 61572188]
  2. Hunan Provincial Science AMP
  3. Technology Project Foundation [2018TP1018]
  4. Start-Up Funds of Hunan Normal University [531120-3812]
  5. Scientific Research Program of New Century Excellent Talents in Fujian Province University, China
  6. Industrial Robot Application of Fujian University Engineering Research Center, China
  7. Minjiang University, China [MJUKF-IRA201802]
  8. Fujian Provincial Natural Science Foundation of China [2018J01570]

Ask authors/readers for more resources

With rapid advances in edge computing and the Internet of Things, the security of low-layer hardware devices attract more and more attention. As an ideal hardware solution, field programmable gate array (FPGA) becomes a mainstream technology to design a complex system. The designed modules are named as intellectual property (IP) cores. In this paper, we consider both misappropriation of hardware devices and software IPs in edge computing and propose a PUF-based IP copyright anonymous authentication scheme. The scheme utilizes the double physical unclonable function (PUF) authentication model. Both the parties generate the challenge jointly in authentication to avoid replay attack and modeling attack on PUF circuit. The complexity of authentication is greatly reduced. Besides, the server of FPGA vendor is unnecessary to store all the challenge response pairs (CRPs) of each PUF-based chip due to the use of the double PUF authentication model. It saves the system resource and achieves better security. To protect software IP, IP core vendor inserts copyright information and anonymous buyer identity information into the design before trading. The anonymity of the buyer ensures the benefits of the buyer. With the participation of trustable device vendor, infringement behavior can be traced according to extracted fingerprints. The experiments show that the resource overhead of the proposed scheme is reduced by 61.96% and 31.61% by comparing with 2-1 DAPUF and built-in self-adjustable PUF. Besides, PUF stability is 99.54%. It demonstrates the good performance of the proposed scheme.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available