IIUM Repository

Integrating physical unclonable functions with machine learning for the authentication of edge devices in IoT networks

Sheikh, Abdul Manan and Islam, Md. Rafiqul and Habaebi, Mohamed Hadi and Zabidi, Suriza Ahmad and Najeeb, Athaur Rahman and Kabbani, Adnan (2025) Integrating physical unclonable functions with machine learning for the authentication of edge devices in IoT networks. Future Internet, 17 (7). pp. 1-35. ISSN 1999-5903

[img] PDF
Restricted to Registered users only

Download (8MB)

Abstract

Edge computing (EC) faces unique security threats due to its distributed architecture, resource-constrained devices, and diverse applications, making it vulnerable to data breaches, malware infiltration, and device compromise. The mitigation strategies against EC data security threats include encryption, secure authentication, regular updates, tamperresistant hardware, and lightweight security protocols. Physical Unclonable Functions (PUFs) are digital fingerprints for device authentication that enhance interconnected devices’ security due to their cryptographic characteristics. PUFs produce output responses against challenge inputs based on the physical structure and intrinsic manufacturing variations of an integrated circuit (IC). These challenge-response pairs (CRPs) enable secure and reliable device authentication. Our work implements the Arbiter PUF (APUF) on Altera Cyclone IV FPGAs installed on the ALINX AX4010 board. The proposed APUF has achieved performance metrics of 49.28% uniqueness, 38.6% uniformity, and 89.19% reliability. The robustness of the proposed APUF against machine learning (ML)-based modeling attacks is tested using supervised Support Vector Machines (SVMs), logistic regression (LR), and an ensemble of gradient boosting (GB) models. These ML models were trained over more than 19K CRPs, achieving prediction accuracies of 61.1%, 63.5%, and 63%, respectively, thus cementing the resiliency of the device against modeling attacks. However, the proposed APUF exhibited its vulnerability to Multi-Layer Perceptron (MLP) and random forest (RF) modeling attacks, with 95.4% and 95.9% prediction accuracies, gaining successful authentication. APUFs are well-suited for device authentication due to their lightweight design and can produce a vast number of challenge-response pairs (CRPs), even in environments with limited resources. Our findings confirm that our approach effectively resists widely recognized attack methods to model PUFs.

Item Type: Article (Journal)
Uncontrolled Keywords: Edge computing; physical unclonable functions; challenge-response pairs; machine learning; support vector machine; logistic regression; multi-layer perceptron
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Engineering > Department of Electrical and Computer Engineering
Depositing User: Dr. Mohamed Hadi Habaebi
Date Deposited: 23 Jun 2025 09:19
Last Modified: 23 Jun 2025 09:24
URI: http://irep.iium.edu.my/id/eprint/121642

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year