Skip to main content

VXorPUF: A Vedic Principles - Based Hybrid XOR Arbiter PUF for Robust Security in IoMT

  • Conference paper
  • First Online:
Internet of Things. Advances in Information and Communication Technology (IFIPIoT 2023)

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 684))

Included in the following conference series:

  • 372 Accesses

Abstract

The Internet of Medical Things (IoMT) is playing a pivotal role in the healthcare sector by allowing faster and more informed hospital care, personalized treatment, and medical solutions. Several authentication systems are used to safeguard the data and authenticate the devices, but some of them are inefficient and some of them have some limitations. A very effective and trustworthy solution for resource-constrained medical devices is provided by Physical Unclonable Functions (PUF) - based identity and authentication systems. This paper proposes VXorPUF, a Vedic Principles - Based Hybrid XOR Arbiter PUF. Modeling attacks were performed on the proposed architecture and an accuracy of 49.80% was achieved. Uniqueness, Reliability and Randomness were the figures of merit used to evaluate PUF. A further study was evaluated the uniformity of (m,n,p)-OAN-XOR-PUF, and a result of 43.75% was found, which is close to the ideal value of arbitrary PUF response.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ali, R., Zhang, D., Cai, H., Zhao, W., Wang, Y.: A machine learning attack-resilient strong PUF leveraging the process variation of MRAM. In: Express Briefs, IEEE Transactions on Circuits and Systems II (2022)

    Google Scholar 

  2. Almogren, A., Mohiuddin, I., Din, I.U., Almajed, H., Guizani, N.: Ftm-iomt: fuzzy-based trust management for preventing sybil attacks in internet of medical things. Proc. IEEE Internet Things J. 8(6), 4485–4497 (2020)

    Article  Google Scholar 

  3. Canaday, D., Barbosa, W.A., Pomerance, A.: A novel attack on machine-learning resistant physical unclonable functions. In: 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 25–28. IEEE (2022)

    Google Scholar 

  4. Gao, Y., Al-Sarawi, S.F., Abbott, D., Sadeghi, A.R., Ranasinghe, D.C.: Modeling attack resilient reconfigurable latent obfuscation technique for PUF based lightweight authentication. arXiv preprint arXiv:1706.06232 (2017)

  5. Gassend, B., Lim, D., Clarke, D., Van Dijk, M., Devadas, S.: Identification and authentication of integrated circuits. Concurr. Comput. Pract. Exp. 16(11), 1077–1098 (2004)

    Article  Google Scholar 

  6. Hatzivasilis, G., Soultatos, O., Ioannidis, S., Verikoukis, C., Demetriou, G., Tsatsoulis, C.: Review of security and privacy for the Internet of Medical Things (IoMT). In: Proceedings of 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 457–464. IEEE (2019)

    Google Scholar 

  7. Hazari, N.A., Oun, A., Niamat, M.: Analysis and machine learning vulnerability assessment of XOR-inverter based ring oscillator PUF design. In: 2019 IEEE 62nd International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 590–593 (2019). https://doi.org/10.1109/MWSCAS.2019.8885037

  8. Hodgkiss, J., Djahel, S.: Securing fuzzy vault enabled authentication in body area networks-based smart healthcare. IEEE Consum. Electron. Magaz. 11(1), 6–16 (2022). https://doi.org/10.1109/MCE.2020.2991387

    Article  Google Scholar 

  9. Karmakar, K.K., Varadharajan, V., Tupakula, U., Nepal, S., Thapa, C.: Towards a security enhanced virtualised network infrastructure for Internet of Medical Things (IoMT). In: Proceedings of 2020 6th IEEE Conference on Network Softwarization (NetSoft), pp. 257–261. IEEE (2020)

    Google Scholar 

  10. Khalafalla, M., Gebotys, C.: PUFs deep attacks: enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs. In: Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 204–209 (2019). https://doi.org/10.23919/DATE.2019.8714862

  11. King, J., Awad, A.I.: A distributed security mechanism for resource-constrained IOT devices. Informatica 40(1) (2016)

    Google Scholar 

  12. Koutras, D., Stergiopoulos, G., Dasaklis, T., Kotzanikolaou, P., Glynos, D., Douligeris, C.: Security in iomt communications: a survey. Sensors 20(17), 4828 (2020)

    Article  Google Scholar 

  13. Kumar, P., Gupta, G.P., Tripathi, R.: An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks. Comput. Commun. 166, 110–124 (2021)

    Article  Google Scholar 

  14. Kwarteng, E., Cebe, M.: A survey on security issues in modern implantable devices: solutions and future issues. Smart Health 100295 (2022)

    Google Scholar 

  15. Lim, D., Lee, J., Gassend, B., Suh, G., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Trans. Very Large Scale Integrat. Syst. 13(10), 1200–1205 (2005). https://doi.org/10.1109/TVLSI.2005.859470

  16. Mahmud, M.I., Abdelgawad, A., Yanambaka, V.P.: A deep analysis of hybrid-multikey-PUF. arXiv preprint arXiv:2304.04381 (2023)

  17. Mahmud, M.I., Abdelgawad, A., Yanambaka, V.P., Yelamarthi, K.: Packet drop and RSSI evaluation for LoRa: an indoor application perspective. In: Proceedings of IEEE 7th World Forum on Internet of Things (WF-IoT), pp. 913–914 (2021). https://doi.org/10.1109/WF-IoT51360.2021.9595288

  18. Mahmud, M., Sadhu, P., Yanambaka, V., Abdelgawad, A.: Vxorpuf: a vedic principles - based hybrid XOR arbiter PUF for robust security in IoMT. Preprints.org (2023030499) (2023)

    Google Scholar 

  19. Maiti, A., McDougall, L., Schaumont, P.: The impact of aging on an FPQA-based physical unclonable function. In: 2011 21st International Conference on Field Programmable Logic and Applications, pp. 151–156. IEEE (2011)

    Google Scholar 

  20. Nandy, S., Adhikari, M., Khan, M.A., Menon, V.G., Verma, S.: An intrusion detection mechanism for secured IoMT framework based on swarm-neural network. IEEE J. Biomed. Health Inform. 26(5), 1969–1976 (2021)

    Article  Google Scholar 

  21. Papaioannou, M., et al.: A survey on security threats and countermeasures in internet of medical things (IoMT). Trans. Emerg. Telecommun. Technol. 33(6), e4049 (2022)

    Google Scholar 

  22. Rahman, M., Jahankhani, H.: Security vulnerabilities in existing security mechanisms for IoMT and potential solutions for mitigating cyber-attacks. In: Jahankhani, H., Kendzierskyj, S., Akhgar, B. (eds.) Information Security Technologies for Controlling Pandemics. ASTSA, pp. 307–334. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-72120-6_12

  23. Razdan, S., Sharma, S.: Internet of medical things (IoMT): overview, emerging technologies, and case studies. In: IETE Technical Review, pp. 1–14 (2021)

    Google Scholar 

  24. Rührmair, U., Sehnke, F., Sölter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 237–249 (2010)

    Google Scholar 

  25. Sadhu, P., Yanambaka, V.P., Abdelgawad, A., Yelamarthi, K.: NAHAP: PUF-based three factor authentication system for internet of medical things. IEEE Consum. Electron. Magaz. 1 (2022). https://doi.org/10.1109/MCE.2022.3176420

  26. Santikellur, P., Bhattacharyay, A., Chakraborty, R.S.: Deep learning based model building attacks on arbiter PUF compositions. Cryptology ePrint Archive (2019)

    Google Scholar 

  27. Satamraju, K.P., Balakrishnan, M.: A secured healthcare model for sensor data sharing with integrated emotional intelligence. IEEE Sens. J. 22(16), 16306–16313 (2022). https://doi.org/10.1109/JSEN.2022.3189268

    Article  Google Scholar 

  28. Shoaran, M., Haghi, B.A., Taghavi, M., Farivar, M., Emami-Neyestanak, A.: Energy-efficient classification for resource-constrained biomedical applications. IEEE J. Emerg. Select. Top. Circuits Syst. 8(4), 693–707 (2018)

    Article  Google Scholar 

  29. Siddiqi, M.A., Tsintzira, A.A., Digkas, G., Siavvas, M.G., Strydis, C.: Adding security to implantable medical devices: can we afford it? In: Proceedings of EWSN, pp. 67–78 (2021)

    Google Scholar 

  30. Suragani, R., Nazarenko, E., Anagnostopoulos, N.A., Mexis, N., Kavun, E.B.: Identification and classification of corrupted PUF responses via machine learning. In: 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 137–140. IEEE (2022)

    Google Scholar 

  31. Vaiyapuri, T., Binbusayyis, A., Varadarajan, V.: Security, privacy and trust in IoMT enabled smart healthcare system: a systematic review of current and future trends. Int. J. Adv. Comput. Sci. Appl. 12(2), 731–737 (2021)

    Google Scholar 

  32. Wang, S.J., Chen, Y.S., Li, K.S.M.: Modeling attack resistant PUFs based on adversarial attack against machine learning. IEEE J. Emerg. Select. Top. Circuits Syst. 11(2), 306–318 (2021). https://doi.org/10.1109/JETCAS.2021.3062413

    Article  Google Scholar 

  33. Wang, S.J., Chen, Y.S., Li, K.S.M.: Modeling attack resistant PUFs based on adversarial attack against machine learning. IEEE J. Emerg. Select. Top. Circuits Syst. 11(2), 306–318 (2021)

    Article  Google Scholar 

  34. Wang, Y., Xi, X., Orshansky, M.: Lattice PUF: a strong physical unclonable function provably secure against machine learning attacks. In: 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 273–283. IEEE (2020)

    Google Scholar 

  35. Wazid, M., Das, A.K., Rodrigues, J.J., Shetty, S., Park, Y.: IoMT malware detection approaches: analysis and research challenges. IEEE Access 7, 182459–182476 (2019)

    Article  Google Scholar 

  36. Wisiol, N., Thapaliya, B., Mursi, K.T., Seifert, J.P., Zhuang, Y.: Neural network modeling attacks on arbiter-PUF-based designs. IEEE Trans. Inf. Forens. Secur. 17, 2719–2731 (2022)

    Article  Google Scholar 

  37. Yanambaka, V.P., Mohanty, S.P., Kougianos, E., Baniya, B.K., Rout, B.: Veda-PUF: a PUF based on vedic principles for robust lightweight security for IoT. In: IEEE International Symposium on Smart Electronic Systems (iSES), pp. 400–405 (2021). https://doi.org/10.1109/iSES52644.2021.00097

  38. Yanambaka, V.P., Mohanty, S.P., Kougianos, E., Puthal, D.: PMsec: physical unclonable function-based robust and lightweight authentication in the internet of medical things. Proc. IEEE Trans. Consum. Electron, 65(3), 388–397 (2019). https://doi.org/10.1109/TCE.2019.2926192

    Article  Google Scholar 

  39. Yao, J., et al.: Design and evaluate recomposited or-and-XOR-PUF. IEEE Trans. Emerg. Top. Comput. (2022)

    Google Scholar 

  40. Yoon, S., Kim, B., Kang, Y.: Multiple PUF-based lightweight authentication method in the IoT. In: International Conference on Information and Communication Technology Convergence (ICTC), pp. 1198–1200 (2021). https://doi.org/10.1109/ICTC52510.2021.9620972

  41. Zalivaka, S.S., Ivaniuk, A.A., Chang, C.H.: Reliable and modeling attack resistant authentication of arbiter PUF in FPGA implementation with trinary quadruple response. IEEE Trans. Inf. Forens. Secur. 14(4), 1109–1123 (2018)

    Article  Google Scholar 

  42. Zerrouki, F., Ouchani, S., Bouarfa, H.: A survey on silicon PUFs. J. Syst. Architect. 127, 102514 (2022)

    Article  Google Scholar 

  43. Zhang, J., et al.: A 4t/cell amplifier-chain-based XOR PUF with strong machine learning attack resilience. IEEE Trans. Circuits Syst. I Regul. Pap. 69(1), 366–377 (2021)

    Google Scholar 

  44. Zhuang, H., Xi, X., Sun, N., Orshansky, M.: A strong subthreshold current array PUF resilient to machine learning attacks. IEEE Trans. Circuits Syst. I Regul. Pap. 67(1), 135–144 (2019)

    Article  Google Scholar 

Download references

Acknowledgments

A version of the current paper is published in [18].

The authors would like to thank Mr. Dendukuri Swaminatha Sarma for his support during the research on Vedas.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Venkata P. Yanambaka .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mahmud, M.I., Sadhu, P.K., Yanambaka, V.P., Abdelgawad, A. (2024). VXorPUF: A Vedic Principles - Based Hybrid XOR Arbiter PUF for Robust Security in IoMT. In: Puthal, D., Mohanty, S., Choi, BY. (eds) Internet of Things. Advances in Information and Communication Technology. IFIPIoT 2023. IFIP Advances in Information and Communication Technology, vol 684. Springer, Cham. https://doi.org/10.1007/978-3-031-45882-8_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-45882-8_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-45881-1

  • Online ISBN: 978-3-031-45882-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics