Abstract
The Internet of Medical Things (IoMT) is playing a pivotal role in the healthcare sector by allowing faster and more informed hospital care, personalized treatment, and medical solutions. Several authentication systems are used to safeguard the data and authenticate the devices, but some of them are inefficient and some of them have some limitations. A very effective and trustworthy solution for resource-constrained medical devices is provided by Physical Unclonable Functions (PUF) - based identity and authentication systems. This paper proposes VXorPUF, a Vedic Principles - Based Hybrid XOR Arbiter PUF. Modeling attacks were performed on the proposed architecture and an accuracy of 49.80% was achieved. Uniqueness, Reliability and Randomness were the figures of merit used to evaluate PUF. A further study was evaluated the uniformity of (m,n,p)-OAN-XOR-PUF, and a result of 43.75% was found, which is close to the ideal value of arbitrary PUF response.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ali, R., Zhang, D., Cai, H., Zhao, W., Wang, Y.: A machine learning attack-resilient strong PUF leveraging the process variation of MRAM. In: Express Briefs, IEEE Transactions on Circuits and Systems II (2022)
Almogren, A., Mohiuddin, I., Din, I.U., Almajed, H., Guizani, N.: Ftm-iomt: fuzzy-based trust management for preventing sybil attacks in internet of medical things. Proc. IEEE Internet Things J. 8(6), 4485–4497 (2020)
Canaday, D., Barbosa, W.A., Pomerance, A.: A novel attack on machine-learning resistant physical unclonable functions. In: 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 25–28. IEEE (2022)
Gao, Y., Al-Sarawi, S.F., Abbott, D., Sadeghi, A.R., Ranasinghe, D.C.: Modeling attack resilient reconfigurable latent obfuscation technique for PUF based lightweight authentication. arXiv preprint arXiv:1706.06232 (2017)
Gassend, B., Lim, D., Clarke, D., Van Dijk, M., Devadas, S.: Identification and authentication of integrated circuits. Concurr. Comput. Pract. Exp. 16(11), 1077–1098 (2004)
Hatzivasilis, G., Soultatos, O., Ioannidis, S., Verikoukis, C., Demetriou, G., Tsatsoulis, C.: Review of security and privacy for the Internet of Medical Things (IoMT). In: Proceedings of 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 457–464. IEEE (2019)
Hazari, N.A., Oun, A., Niamat, M.: Analysis and machine learning vulnerability assessment of XOR-inverter based ring oscillator PUF design. In: 2019 IEEE 62nd International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 590–593 (2019). https://doi.org/10.1109/MWSCAS.2019.8885037
Hodgkiss, J., Djahel, S.: Securing fuzzy vault enabled authentication in body area networks-based smart healthcare. IEEE Consum. Electron. Magaz. 11(1), 6–16 (2022). https://doi.org/10.1109/MCE.2020.2991387
Karmakar, K.K., Varadharajan, V., Tupakula, U., Nepal, S., Thapa, C.: Towards a security enhanced virtualised network infrastructure for Internet of Medical Things (IoMT). In: Proceedings of 2020 6th IEEE Conference on Network Softwarization (NetSoft), pp. 257–261. IEEE (2020)
Khalafalla, M., Gebotys, C.: PUFs deep attacks: enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs. In: Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 204–209 (2019). https://doi.org/10.23919/DATE.2019.8714862
King, J., Awad, A.I.: A distributed security mechanism for resource-constrained IOT devices. Informatica 40(1) (2016)
Koutras, D., Stergiopoulos, G., Dasaklis, T., Kotzanikolaou, P., Glynos, D., Douligeris, C.: Security in iomt communications: a survey. Sensors 20(17), 4828 (2020)
Kumar, P., Gupta, G.P., Tripathi, R.: An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks. Comput. Commun. 166, 110–124 (2021)
Kwarteng, E., Cebe, M.: A survey on security issues in modern implantable devices: solutions and future issues. Smart Health 100295 (2022)
Lim, D., Lee, J., Gassend, B., Suh, G., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Trans. Very Large Scale Integrat. Syst. 13(10), 1200–1205 (2005). https://doi.org/10.1109/TVLSI.2005.859470
Mahmud, M.I., Abdelgawad, A., Yanambaka, V.P.: A deep analysis of hybrid-multikey-PUF. arXiv preprint arXiv:2304.04381 (2023)
Mahmud, M.I., Abdelgawad, A., Yanambaka, V.P., Yelamarthi, K.: Packet drop and RSSI evaluation for LoRa: an indoor application perspective. In: Proceedings of IEEE 7th World Forum on Internet of Things (WF-IoT), pp. 913–914 (2021). https://doi.org/10.1109/WF-IoT51360.2021.9595288
Mahmud, M., Sadhu, P., Yanambaka, V., Abdelgawad, A.: Vxorpuf: a vedic principles - based hybrid XOR arbiter PUF for robust security in IoMT. Preprints.org (2023030499) (2023)
Maiti, A., McDougall, L., Schaumont, P.: The impact of aging on an FPQA-based physical unclonable function. In: 2011 21st International Conference on Field Programmable Logic and Applications, pp. 151–156. IEEE (2011)
Nandy, S., Adhikari, M., Khan, M.A., Menon, V.G., Verma, S.: An intrusion detection mechanism for secured IoMT framework based on swarm-neural network. IEEE J. Biomed. Health Inform. 26(5), 1969–1976 (2021)
Papaioannou, M., et al.: A survey on security threats and countermeasures in internet of medical things (IoMT). Trans. Emerg. Telecommun. Technol. 33(6), e4049 (2022)
Rahman, M., Jahankhani, H.: Security vulnerabilities in existing security mechanisms for IoMT and potential solutions for mitigating cyber-attacks. In: Jahankhani, H., Kendzierskyj, S., Akhgar, B. (eds.) Information Security Technologies for Controlling Pandemics. ASTSA, pp. 307–334. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-72120-6_12
Razdan, S., Sharma, S.: Internet of medical things (IoMT): overview, emerging technologies, and case studies. In: IETE Technical Review, pp. 1–14 (2021)
Rührmair, U., Sehnke, F., Sölter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 237–249 (2010)
Sadhu, P., Yanambaka, V.P., Abdelgawad, A., Yelamarthi, K.: NAHAP: PUF-based three factor authentication system for internet of medical things. IEEE Consum. Electron. Magaz. 1 (2022). https://doi.org/10.1109/MCE.2022.3176420
Santikellur, P., Bhattacharyay, A., Chakraborty, R.S.: Deep learning based model building attacks on arbiter PUF compositions. Cryptology ePrint Archive (2019)
Satamraju, K.P., Balakrishnan, M.: A secured healthcare model for sensor data sharing with integrated emotional intelligence. IEEE Sens. J. 22(16), 16306–16313 (2022). https://doi.org/10.1109/JSEN.2022.3189268
Shoaran, M., Haghi, B.A., Taghavi, M., Farivar, M., Emami-Neyestanak, A.: Energy-efficient classification for resource-constrained biomedical applications. IEEE J. Emerg. Select. Top. Circuits Syst. 8(4), 693–707 (2018)
Siddiqi, M.A., Tsintzira, A.A., Digkas, G., Siavvas, M.G., Strydis, C.: Adding security to implantable medical devices: can we afford it? In: Proceedings of EWSN, pp. 67–78 (2021)
Suragani, R., Nazarenko, E., Anagnostopoulos, N.A., Mexis, N., Kavun, E.B.: Identification and classification of corrupted PUF responses via machine learning. In: 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 137–140. IEEE (2022)
Vaiyapuri, T., Binbusayyis, A., Varadarajan, V.: Security, privacy and trust in IoMT enabled smart healthcare system: a systematic review of current and future trends. Int. J. Adv. Comput. Sci. Appl. 12(2), 731–737 (2021)
Wang, S.J., Chen, Y.S., Li, K.S.M.: Modeling attack resistant PUFs based on adversarial attack against machine learning. IEEE J. Emerg. Select. Top. Circuits Syst. 11(2), 306–318 (2021). https://doi.org/10.1109/JETCAS.2021.3062413
Wang, S.J., Chen, Y.S., Li, K.S.M.: Modeling attack resistant PUFs based on adversarial attack against machine learning. IEEE J. Emerg. Select. Top. Circuits Syst. 11(2), 306–318 (2021)
Wang, Y., Xi, X., Orshansky, M.: Lattice PUF: a strong physical unclonable function provably secure against machine learning attacks. In: 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 273–283. IEEE (2020)
Wazid, M., Das, A.K., Rodrigues, J.J., Shetty, S., Park, Y.: IoMT malware detection approaches: analysis and research challenges. IEEE Access 7, 182459–182476 (2019)
Wisiol, N., Thapaliya, B., Mursi, K.T., Seifert, J.P., Zhuang, Y.: Neural network modeling attacks on arbiter-PUF-based designs. IEEE Trans. Inf. Forens. Secur. 17, 2719–2731 (2022)
Yanambaka, V.P., Mohanty, S.P., Kougianos, E., Baniya, B.K., Rout, B.: Veda-PUF: a PUF based on vedic principles for robust lightweight security for IoT. In: IEEE International Symposium on Smart Electronic Systems (iSES), pp. 400–405 (2021). https://doi.org/10.1109/iSES52644.2021.00097
Yanambaka, V.P., Mohanty, S.P., Kougianos, E., Puthal, D.: PMsec: physical unclonable function-based robust and lightweight authentication in the internet of medical things. Proc. IEEE Trans. Consum. Electron, 65(3), 388–397 (2019). https://doi.org/10.1109/TCE.2019.2926192
Yao, J., et al.: Design and evaluate recomposited or-and-XOR-PUF. IEEE Trans. Emerg. Top. Comput. (2022)
Yoon, S., Kim, B., Kang, Y.: Multiple PUF-based lightweight authentication method in the IoT. In: International Conference on Information and Communication Technology Convergence (ICTC), pp. 1198–1200 (2021). https://doi.org/10.1109/ICTC52510.2021.9620972
Zalivaka, S.S., Ivaniuk, A.A., Chang, C.H.: Reliable and modeling attack resistant authentication of arbiter PUF in FPGA implementation with trinary quadruple response. IEEE Trans. Inf. Forens. Secur. 14(4), 1109–1123 (2018)
Zerrouki, F., Ouchani, S., Bouarfa, H.: A survey on silicon PUFs. J. Syst. Architect. 127, 102514 (2022)
Zhang, J., et al.: A 4t/cell amplifier-chain-based XOR PUF with strong machine learning attack resilience. IEEE Trans. Circuits Syst. I Regul. Pap. 69(1), 366–377 (2021)
Zhuang, H., Xi, X., Sun, N., Orshansky, M.: A strong subthreshold current array PUF resilient to machine learning attacks. IEEE Trans. Circuits Syst. I Regul. Pap. 67(1), 135–144 (2019)
Acknowledgments
A version of the current paper is published in [18].
The authors would like to thank Mr. Dendukuri Swaminatha Sarma for his support during the research on Vedas.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 IFIP International Federation for Information Processing
About this paper
Cite this paper
Mahmud, M.I., Sadhu, P.K., Yanambaka, V.P., Abdelgawad, A. (2024). VXorPUF: A Vedic Principles - Based Hybrid XOR Arbiter PUF for Robust Security in IoMT. In: Puthal, D., Mohanty, S., Choi, BY. (eds) Internet of Things. Advances in Information and Communication Technology. IFIPIoT 2023. IFIP Advances in Information and Communication Technology, vol 684. Springer, Cham. https://doi.org/10.1007/978-3-031-45882-8_17
Download citation
DOI: https://doi.org/10.1007/978-3-031-45882-8_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-45881-1
Online ISBN: 978-3-031-45882-8
eBook Packages: Computer ScienceComputer Science (R0)