UDhashing : physical unclonable function-based user-device hash for endpoint authentication

With IT consumerization, access control to remote system by endpoint user and endpoint device is mandatory for security and privacy protection. Existing systems bind an end-user with his/her registered devices but authenticate only the user and device independently. This work presents a novel UDhash...

Full description

Saved in:
Bibliographic Details
Main Authors: Zheng, Yue, Cao, Yuan, Chang, Chip-Hong
Other Authors: School of Electrical and Electronic Engineering
Format: Article
Language:English
Published: 2021
Subjects:
Online Access:https://hdl.handle.net/10356/145813
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-145813
record_format dspace
spelling sg-ntu-dr.10356-1458132021-01-08T08:38:55Z UDhashing : physical unclonable function-based user-device hash for endpoint authentication Zheng, Yue Cao, Yuan Chang, Chip-Hong School of Electrical and Electronic Engineering Centre for Integrated Circuits and Systems Engineering::Electrical and electronic engineering::Integrated circuits Authentication Cancelable Biometrics With IT consumerization, access control to remote system by endpoint user and endpoint device is mandatory for security and privacy protection. Existing systems bind an end-user with his/her registered devices but authenticate only the user and device independently. This work presents a novel UDhashing scheme, which is capable of providing a bipartite authentication of both end-user and end-device as a whole, and mutual authentication between the endpoint and the verifier. Non-contact facial biometric is extracted as user identity and physical unclonable function (PUF) is embedded into the device to generate a device “fingerprint”. UDhashing serves as an intermediary to unify the macroscopic human biometric and microscopic silicon entropy source into a single identity. The scheme is demonstrated using measured silicon data of a diode-clamped inverter based strong PUF fabricated in 40nm 1.1V CMOS technology, and the ORL and Ext. Yale B face databases. The experimental results show that the proposed system has good authentication performance with excellent discriminability for different (challenge, user, device) tuples. Besides, the proposed system is analyzed to be resilient to several known attacks. Its reliability and authentication performance can be easily enhanced by low-cost error-correction technique without compromising security. Ministry of Education (MOE) Accepted version This project was supported by the Singapore Ministry of Education MOE Tier 1 grant No. 2018-T1-001-131, RG87/18 (S), and the National Natural Science Foundation of China (61601168). 2021-01-08T08:38:55Z 2021-01-08T08:38:55Z 2019 Journal Article Zheng, Y., Cao, Y., & Chang, C.-H. (2019). UDhashing : physical unclonable function-based user-device hash for endpoint authentication. IEEE Transactions on Industrial Electronics, 66(12), 9559-9570. doi:10.1109/TIE.2019.2893831 1557-9948 https://hdl.handle.net/10356/145813 10.1109/TIE.2019.2893831 12 66 9559 9570 en 2018-T1-001-131, RG87/18 (S) IEEE Transactions on Industrial Electronics © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/TIE.2019.2893831 application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Electrical and electronic engineering::Integrated circuits
Authentication
Cancelable Biometrics
spellingShingle Engineering::Electrical and electronic engineering::Integrated circuits
Authentication
Cancelable Biometrics
Zheng, Yue
Cao, Yuan
Chang, Chip-Hong
UDhashing : physical unclonable function-based user-device hash for endpoint authentication
description With IT consumerization, access control to remote system by endpoint user and endpoint device is mandatory for security and privacy protection. Existing systems bind an end-user with his/her registered devices but authenticate only the user and device independently. This work presents a novel UDhashing scheme, which is capable of providing a bipartite authentication of both end-user and end-device as a whole, and mutual authentication between the endpoint and the verifier. Non-contact facial biometric is extracted as user identity and physical unclonable function (PUF) is embedded into the device to generate a device “fingerprint”. UDhashing serves as an intermediary to unify the macroscopic human biometric and microscopic silicon entropy source into a single identity. The scheme is demonstrated using measured silicon data of a diode-clamped inverter based strong PUF fabricated in 40nm 1.1V CMOS technology, and the ORL and Ext. Yale B face databases. The experimental results show that the proposed system has good authentication performance with excellent discriminability for different (challenge, user, device) tuples. Besides, the proposed system is analyzed to be resilient to several known attacks. Its reliability and authentication performance can be easily enhanced by low-cost error-correction technique without compromising security.
author2 School of Electrical and Electronic Engineering
author_facet School of Electrical and Electronic Engineering
Zheng, Yue
Cao, Yuan
Chang, Chip-Hong
format Article
author Zheng, Yue
Cao, Yuan
Chang, Chip-Hong
author_sort Zheng, Yue
title UDhashing : physical unclonable function-based user-device hash for endpoint authentication
title_short UDhashing : physical unclonable function-based user-device hash for endpoint authentication
title_full UDhashing : physical unclonable function-based user-device hash for endpoint authentication
title_fullStr UDhashing : physical unclonable function-based user-device hash for endpoint authentication
title_full_unstemmed UDhashing : physical unclonable function-based user-device hash for endpoint authentication
title_sort udhashing : physical unclonable function-based user-device hash for endpoint authentication
publishDate 2021
url https://hdl.handle.net/10356/145813
_version_ 1690658348359221248