论文标题
基于统计分析的特征选择增强了RF-PUF,在未修饰的商品发射器上具有> 99.8%的精度
Statistical Analysis Based Feature Selection Enhanced RF-PUF with >99.8% Accuracy on Unmodified Commodity Transmitters for IoT Physical Security
论文作者
论文摘要
由于部署环境的多样性和移动性质,智能商品设备容易受到各种攻击的影响,这些攻击可以授予在大型连接的网络中未经授权访问Rogue设备的访问。传统的基于数字签名的身份验证方法容易受到关键恢复攻击,CSRF等的攻击。为了规避这一点,RF-PUF被提议是一种有希望的替代方案,它利用设备固有的非理想性作为物理特征。 RF-PUF提供了一种强大的身份验证方法,由于缺乏秘密密钥要求,该方法对钥匙黑客方法有弹性,并且不需要在发射机端上的任何其他电路,从而消除了额外的功率,区域和计算负担。在这项工作中,我们第一次分析了RF-PUF对商品设备的有效性,该设备购买了现成的商品设备,而没有进行任何修改。从30个XBEE S2C模块收集数据,并作为公共数据集发布。通过统计属性分析对一项新功能进行了设计。有了一个新的功能集,已显示仅使用〜1.8 ms的测试数据即可达到95%的精度,具有更多数据和更高模型容量的网络,无需任何辅助数字序言即可达到> 99.8%的精度。已经详细探讨了设计空间,并确定了无线通道的效果。将某些流行的ML算法的性能与NN方法进行了比较。已经对各种PUF特性进行了彻底的研究,并且已经计算了内部和puf间距离。通过对41238000情况的广泛测试,发现我们数据的RF-PUF的检测概率为0.9987,这是第一次实验性地将RF-PUF作为强大的身份验证方法。最后,已经讨论了潜在的攻击模型和RF-PUF对它们的鲁棒性。
Due to the diverse and mobile nature of the deployment environment, smart commodity devices are vulnerable to various attacks which can grant unauthorized access to a rogue device in a large, connected network. Traditional digital signature-based authentication methods are vulnerable to key recovery attacks, CSRF, etc. To circumvent this, RF-PUF had been proposed as a promising alternative that utilizes the inherent nonidealities of the devices as physical signatures. RF-PUF offers a robust authentication method that is resilient to key-hacking methods due to the absence of secret key requirements and does not require any additional circuitry on the transmitter end, eliminating additional power, area, and computational burden. In this work, for the first time, we analyze the effectiveness of RF-PUF on commodity devices, purchased off-the-shelf, without any modifications whatsoever. Data were collected from 30 Xbee S2C modules and released as a public dataset. A new feature has been engineered through statistical property analysis. With a new and robust feature set, it has been shown that 95% accuracy can be achieved using only ~1.8 ms of test data, reaching >99.8% accuracy with more data and a network of higher model capacity, without any assisting digital preamble. The design space has been explored in detail and the effect of the wireless channel has been determined. The performance of some popular ML algorithms has been compared with the NN approach. A thorough investigation on various PUF properties has been done and both intra and inter-PUF distances have been calculated. With extensive testing of 41238000 cases, the detection probability for RF-PUF for our data is found to be 0.9987, which, for the first time, experimentally establishes RF-PUF as a strong authentication method. Finally, the potential attack models and the robustness of RF-PUF against them have been discussed.