Hardware-Level Side-Channel Attack Mitigation for PUF-Based Authentication in Smart Cities

Authors

  • Wafaa Mohammed Breesam Department of Pharmacy, Babylon Technical Institute, Awsat Technical University, Babylon, Iraq
  • Wafaa Mohammed Ridha Department of Computer Networks and Software, Technical Institute of Babylon, Al-Furat Al-Awsat Technical University, Babylon, Iraq
  • Hayder Ali Hameed General Directorate of Education Basrah, Basrah, Iraq
  • Mahmood A. Al-Shareeda Department of Electronic Technologies, Basra Technical Institute, Southern Technical University, Basrah, Iraq | College of Engineering, Al-Ayen University, Thi-Qar, Iraq
  • Mohammed Amin Almaiah King Abdullah II IT School, Department of Computer Science, The University of Jordan, Amman, Jordan
  • Rami Shehab Postgraduate Studies and Scientific Research, King Faisal University, Al-Ahsa, Saudi Arabia
Volume: 15 | Issue: 5 | Pages: 26656-26664 | October 2025 | https://doi.org/10.48084/etasr.12233

Abstract

Smart city infrastructure requires robust authentication mechanisms, yet existing lightweight techniques lack sufficient resistance to Side-Channel Attacks (SCAs) and biometric noise. This work presents a new authentication protocol that integrates a dual-Physically Unclonable Function (PUF) architecture with biometric binding, fuzzy extractors, response masking, and challenge randomization to strengthen immunity against SCA. Formal security analysis under the Real-Or-Random (ROR) model guarantees session-key secrecy, whereas informal analysis demonstrates resilience against impersonation, replay attacks, and physical-layer information leakage. Simulation results indicate that the recovery rate of the SCA key drops significantly from 84.2% to 6.7%. The protocol provides mutual authentication with an overhead of 2.1 kbit and a latency of 150 ms when supporting 1,000 devices, making it suitable for resource-limited settings. This paper presents a lightweight, secure, and scalable authentication scheme tailored for smart city applications.

Keywords:

Side-Channel Attack (SCA), authentication protocol, smart cities, Physically Unclonable Function (PUF), lightweight cryptography, secure key agreement, fuzzy extractor

Downloads

Download data is not yet available.

References

S. Pandya et al., "Federated learning for smart cities: A comprehensive survey," Sustainable Energy Technologies and Assessments, vol. 55, Feb. 2023, Art. no. 102987.

A. Khang, S. K. Gupta, S. Rani, and D. A. Karras, Smart Cities: IoT Technologies, Big Data Solutions, Cloud Platforms, and Cybersecurity Techniques, 1st ed. Boca Raton, FL, USA: CRC Press, 2023.

M. A. Al-Shareeda, M. Anbar, S. Manickam, and I. H. Hasbullah, "Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks," IEEE Access, vol. 9, pp. 113226–113238, 2021.

M. A. Al-Shareeda et al., "Provably Secure with Efficient Data Sharing Scheme for Fifth-Generation (5G)-Enabled Vehicular Networks without Road-Side Unit (RSU)," Sustainability, vol. 14, no. 16, pp. 1–19, Aug. 2022.

F. A. Almalki et al., "Green IoT for Eco-Friendly and Sustainable Smart Cities: Future Directions and Opportunities," Mobile Networks and Applications, vol. 28, no. 1, pp. 178–202, Feb. 2023.

P. Mall, R. Amin, A. K. Das, M. T. Leung, and K.-K. R. Choo, "PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey," IEEE Internet of Things Journal, vol. 9, no. 11, pp. 8205–8228, June 2022.

M. A. Al-Shareeda, M. Anbar, S. Manickam, and I. H. Hasbullah, "Password-Guessing Attack-Aware Authentication Scheme Based on Chinese Remainder Theorem for 5G-Enabled Vehicular Networks," Applied Sciences, vol. 12, no. 3, Feb. 2022, Art. no. 1383.

B. A. Mohammed, M. A. Al-Shareeda, S. Manickam, Z. G. Al-Mekhlafi, A. M. Alayba, and A. A. Sallam, "ANAA-Fog: A Novel Anonymous Authentication Scheme for 5G-Enabled Vehicular Fog Computing," Mathematics, vol. 11, no. 6, Mar. 2023, Art. no. 1446.

D. Chen, P. Wawrzynski, and Z. Lv, "Cyber security in smart cities: A review of deep learning-based applications and case studies," Sustainable Cities and Society, vol. 66, Mar. 2021, Art. no. 102655.

N. M. Alzahrani and F. A. Alfouzan, "Augmented Reality (AR) and Cyber-Security for Smart Cities—A Systematic Literature Review," Sensors, vol. 22, no. 7, Apr. 2022, Art. no. 2792.

B. N. Bukke, K. Manjunathachari, and S. Sabbavarapu, "Implementation of a Finite Impulse Response Filter using PUFs to Avoid Trojans," Engineering, Technology & Applied Science Research, vol. 13, no. 6, pp. 12151–12157, Dec. 2023.

M. H. Panahi Rizi and S. A. Hosseini Seno, "A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city," Internet of Things, vol. 20, Nov. 2022, Art. no. 100584.

A. K. M. B. Haque, B. Bhushan, and G. Dhiman, "Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends," Expert Systems, vol. 39, no. 5, June 2022, Art. no. e12753.

E. Ismagilova, L. Hughes, N. P. Rana, and Y. K. Dwivedi, "Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework," Information Systems Frontiers, vol. 24, no. 2, pp. 393–414, Apr. 2022.

S. Sharma and N. Mishra, "Horizoning recent trends in the security of smart cities: Exploratory analysis using latent semantic analysis," Journal of Intelligent & Fuzzy Systems, vol. 46, no. 1, pp. 579–596, Jan. 2024.

S. Otoom, "Risk auditing for Digital Twins in cyber physical systems: A systematic review," Journal of Cyber Security and Risk Auditing, vol. 2025, no. 1, pp. 22–35, Jan. 2025.

A. AlShuaibi, M. W. Arshad, and M. Maayah, "A Hybrid Genetic Algorithm and Hidden Markov Model-Based Hashing Technique for Robust Data Security," Journal of Cyber Security and Risk Auditing, vol. 2025, no. 3, pp. 42–56, May 2025.

A. Al-Meer and S. Al-Kuwari, "Physical Unclonable Functions (PUF) for IoT Devices," ACM Computing Surveys, vol. 55, no. 14s, July 2023, Art. no. 314.

A. Yadav, S. Kumar, and J. Singh, "A Review of Physical Unclonable Functions (PUFs) and Its Applications in IoT Environment," in Ambient Communications and Computer Systems: Proceedings of RACCCS 2021, Ajmer, India, 2022, pp. 1–13.

D. P. Podugu, A. K. Kumari, and S. Sabbavarapu, "Intellectual Property Design with PUF-based Hardware Security," Engineering, Technology & Applied Science Research, vol. 14, no. 4, pp. 15559–15563, Aug. 2024.

A. Davarasan, J. Samual, K. Palansundram, and A. Ali, "A Comprehensive Review of Machine Learning Approaches for Android Malware Detection," Journal of Cyber Security and Risk Auditing, vol. 2024, no. 1, pp. 38–60, Dec. 2024.

R. Djehaiche, S. Aidel, A. Sawalmeh, N. Saeed, and A. H. Alenezi, "Adaptive Control of IoT/M2M Devices in Smart Buildings Using Heterogeneous Wireless Networks," IEEE Sensors Journal, vol. 23, no. 7, pp. 7836–7849, Apr. 2023.

A. Aldossary, T. Algirim, I. Almubarak, and K. Almuhish, "Cyber Security in Data Breaches," Journal of Cyber Security and Risk Auditing, vol. 2024, no. 1, pp. 14–22, Dec. 2024.

S. Biswas, R. S. Goswami, and K. H. K. Reddy, "Advancing quantum steganography: a secure IoT communication with reversible decoding and customized encryption technique for smart cities," Cluster Computing, vol. 27, no. 7, pp. 9395–9414, Oct. 2024.

N. Minhas, "Post-Quantum Authentication Scheme for IoT Security in Smart Cities." Preprints, July 30, 2024.

S. Ang, M. Ho, S. Huy, and M. Janarthanan, "Utilizing IDS and IPS to Improve Cybersecurity Monitoring Process," Journal of Cyber Security and Risk Auditing, vol. 2025, no. 3, pp. 77–88, July 2025.

M. A. Almedires, A. Elkhalil, and M. Amin, "Adversarial Attack Detection in Industrial Control Systems Using LSTM-Based Intrusion Detection and Black-Box Defense Strategies," Journal of Cyber Security and Risk Auditing, vol. 2025, no. 3, pp. 4–22, May 2025.

B. Almelehy, M. Ahmad, G. Nassreddine, M. Maayah, and A. Achanta, "Analytical Analysis of Cyber Threats and Defense Mechanisms for Web Application Security," Journal of Cyber Security and Risk Auditing, vol. 2025, no. 3, pp. 57–76, July 2025.

S. Singh, A. Pise, O. Alfarraj, A. Tolba, and B. Yoon, "A cryptographic approach to prevent network incursion for enhancement of QoS in sustainable smart city using MANET," Sustainable Cities and Society, vol. 79, Apr. 2022, Art. no. 103483.

S. A. M. Taqi and S. Jalili, "LSPA-SGs: A lightweight and secure protocol for authentication and key agreement based Elliptic Curve Cryptography in smart grids," Energy Reports, vol. 8, no. 9, pp. 153–164, Nov. 2022.

S. Gupta et al., "Secure and Lightweight Authentication Protocol for Privacy Preserving Communications in Smart City Applications," Sustainability, vol. 15, no. 6, Mar. 2023, Art. no. 5346.

A. Aldosary and M. Tanveer, "PAAF-SHS: PUF and authenticated encryption based authentication framework for the IoT-enabled smart healthcare system," Internet of Things, vol. 26, July 2024, Art. no. 101159.

N. Frederick and A. Ali, "Enhancing DDoS Attack Detection and Mitigation in SDN Using Advanced Machine Learning Techniques," Journal of Cyber Security and Risk Auditing, vol. 2024, no. 1, pp. 23–37, Dec. 2024.

B. Alouffi, M. Hasnain, A. Alharbi, W. Alosaimi, H. Alyami, and M. Ayaz, "A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies," IEEE Access, vol. 9, pp. 57792–57807, 2021.

D.-Z. Sun, Y.-N. Gao, and Y. Tian, "On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices," Sensors, vol. 23, no. 14, July 2023, Art. no. 6559.

J. Choi, S. Son, D. Kwon, and Y. Park, "A PUF-Based Secure Authentication and Key Agreement Scheme for the Internet of Drones," Sensors, vol. 25, no. 3, Feb. 2025, Art. no. 982.

V. O. Nyangaresi, A. A. AlRababah, G. K. Yenurkar, R. Chinthaginjala, and M. Yasir, "Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities," Engineering Reports, vol. 7, no. 1, Jan. 2025, Art. no. e13079.

Z. S. Alzaidi, A. A. Yassin, Z. A. Abduljabbar, and V. O. Nyangaresi, "A Fog Computing and Blockchain-based Anonymous Authentication Scheme to Enhance Security in VANET Environments," Engineering, Technology & Applied Science Research, vol. 15, no. 1, pp. 19143–19153, Feb. 2025.

N. Ammour, Y. Bazi, and N. Alajlan, "Multimodal Approach for Enhancing Biometric Authentication," Journal of Imaging, vol. 9, no. 9, Sept. 2023, Art. no. 168.

A. Tareef, K. Al-Tarawneh, and A. Sleit, "Block-based Watermarking for Robust Authentication and Integration of GIS Data," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16340–16345, Oct. 2024.

Downloads

How to Cite

[1]
W. M. Breesam, W. M. Ridha, H. A. Hameed, M. A. Al-Shareeda, M. A. Almaiah, and R. Shehab, “Hardware-Level Side-Channel Attack Mitigation for PUF-Based Authentication in Smart Cities”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 5, pp. 26656–26664, Oct. 2025.

Metrics

Abstract Views: 18
PDF Downloads: 3

Metrics Information