Content area
Edge computing (EC) faces unique security threats due to its distributed architecture, resource-constrained devices, and diverse applications, making it vulnerable to data breaches, malware infiltration, and device compromise. The mitigation strategies against EC data security threats include encryption, secure authentication, regular updates, tamper-resistant hardware, and lightweight security protocols. Physical Unclonable Functions (PUFs) are digital fingerprints for device authentication that enhance interconnected devices’ security due to their cryptographic characteristics. PUFs produce output responses against challenge inputs based on the physical structure and intrinsic manufacturing variations of an integrated circuit (IC). These challenge-response pairs (CRPs) enable secure and reliable device authentication. Our work implements the Arbiter PUF (APUF) on Altera Cyclone IV FPGAs installed on the ALINX AX4010 board. The proposed APUF has achieved performance metrics of 49.28% uniqueness, 38.6% uniformity, and 89.19% reliability. The robustness of the proposed APUF against machine learning (ML)-based modeling attacks is tested using supervised Support Vector Machines (SVMs), logistic regression (LR), and an ensemble of gradient boosting (GB) models. These ML models were trained over more than 19K CRPs, achieving prediction accuracies of 61.1%, 63.5%, and 63%, respectively, thus cementing the resiliency of the device against modeling attacks. However, the proposed APUF exhibited its vulnerability to Multi-Layer Perceptron (MLP) and random forest (RF) modeling attacks, with 95.4% and 95.9% prediction accuracies, gaining successful authentication. APUFs are well-suited for device authentication due to their lightweight design and can produce a vast number of challenge-response pairs (CRPs), even in environments with limited resources. Our findings confirm that our approach effectively resists widely recognized attack methods to model PUFs.
Details
Multilayers;
Communication;
Cementing;
Modelling;
Multilayer perceptrons;
Real time;
Edge computing;
Data processing;
Privacy;
Machine learning;
Access control;
Internet of Things;
Field programmable gate arrays;
Business metrics;
Accuracy;
Data integrity;
Performance measurement;
Artificial intelligence;
Integrated circuits;
Support vector machines;
Reliability;
Sensors;
Decision making;
Design;
Blockchain;
Integrated approach;
Cloud computing;
Authentication;
Data transmission;
Cybersecurity
; Islam, Md Rafiqul 2
; Habaebi Mohamed Hadi 2
; Zabidi Suriza Ahmad 2
; Bin Najeeb Athaur Rahman 2 ; Kabbani Adnan 3
1 Department of Electrical Engineering and Computer Science, College of Engineering, A’Sharqiyah University, Ibra 400, Oman; [email protected], Department of Electrical Computer Engineering, Kulliyyah of Engineering, International Islamic University, Kuala Lumpur 53100, Malaysia; [email protected] (M.R.I.); [email protected] (S.A.Z.); [email protected] (A.R.B.N.)
2 Department of Electrical Computer Engineering, Kulliyyah of Engineering, International Islamic University, Kuala Lumpur 53100, Malaysia; [email protected] (M.R.I.); [email protected] (S.A.Z.); [email protected] (A.R.B.N.)
3 Department of Electrical Engineering and Computer Science, College of Engineering, A’Sharqiyah University, Ibra 400, Oman; [email protected]