Netinfo Security ›› 2025, Vol. 25 ›› Issue (11): 1732-1744.doi: 10.3969/j.issn.1671-1122.2025.11.007

Previous Articles     Next Articles

Hardware Authentication Mechanism for Consortium Blockchain Based on Differentiated Physical Unclonable Function Models

SHEN Haoting1,2(), PENG Zhigang1, LIU Yuxuan1, WANG Yafei1   

  1. 1. College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China
    2. Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Hangzhou 310051, China
  • Received:2025-07-28 Online:2025-11-10 Published:2025-12-02

Abstract:

In decentralized systems involving hardware data acquisition, hardware-level device authentication, trusted computing and data traceability with multi-party verification are critical to ensuring end-to-end data security. As a secure and cost-effective hardware security primitive, physical unclonable function (PUF) has been adopted for device authentication and data verification. However, traditional PUF verification schemes are prone to leakage in multi-node environments, leading to authentication failure. To address this risk, a novel scheme that distributed differentiated and re-configurable PUF models to verification nodes for device authentication was proposed in this work. Taking hardware supply chain as the representative scenario, dedicated hardware module design, authentication protocols, and smart contract implementation were performed. Experimental results on the Hyperledger Fabric demonstrate that our approach maintaines system authentication efficiency while significantly enhancing robustness against verification data leakage. Furthermore, it effectively mitigates machine learning-based modeling attacks targeting PUF.

Key words: consortium blockchain, physical unclonable function, device authentication, modeling attack

CLC Number: