Yavuz, S., et al. (2024). Vulnerabilities and challenges in the development of PUF-based authentication protocols on FPGAs: A brief review.
Title
Yavuz, S., Daniel, K., & Naroska, E. (2024). Vulnerabilities and challenges in the development of PUF-based authentication protocols on FPGAs: A brief review.
Abstract
The security of IoT (Internet of Things) devices and the protection of sensitive information processed by these devices such as personal data, sensor values, process-related information is an important and difficult challenge. A major task in IoT communication is secure identification of devices. Unfortunately, traditional cryptographic methods are often not suitable for IoT devices due to their limited hardware resources. However, typical methods are computationally intensive, require a large amount of memory, and have a high-power consumption. On the other hand, Physical Unclonable Functions (PUFs) are low-cost and lightweight hardware-based primitives that can be used as a security component to protect data against third parties and thus increase security of a device. In this paper, the challenges and vulnerabilities in the development of PUF-based authentication protocols are presented. To this end, a security analysis of different approaches known from literature are discussed. Furthermore, possible attack vectors and prevention techniques are also considered.