Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing
Seema G. Aarella (),
Venkata P. Yanambaka,
Saraju P. Mohanty and
Elias Kougianos
Additional contact information
Seema G. Aarella: Department of Computer Science, Austin College, Sherman, TX 75090, USA
Venkata P. Yanambaka: School of Sciences, Texas Woman’s University, Denton, TX 76204, USA
Saraju P. Mohanty: Department of Computer Science and Engineering, University of North Texas, Denton, TX 76203, USA
Elias Kougianos: Department of Electrical Engineering, University of North Texas, Denton, TX 76203, USA
Future Internet, 2025, vol. 17, issue 7, 1-29
Abstract:
This research introduces Fortified-Edge 2.0, a novel authentication framework that addresses critical security and privacy challenges in Physically Unclonable Function (PUF)-based systems for collaborative edge computing (CEC). Unlike conventional methods that transmit full binary Challenge–Response Pairs (CRPs) and risk exposing sensitive data, Fortified-Edge 2.0 employs a machine-learning-driven feature-abstraction technique to extract and utilize only essential characteristics of CRPs, obfuscating the raw binary sequences. These feature vectors are then processed using lightweight cryptographic primitives, including ECDSA, to enable secure authentication without exposing the original CRP. This eliminates the need to transmit sensitive binary data, reducing the attack surface and bandwidth usage. The proposed method demonstrates strong resilience against modeling attacks, replay attacks, and side-channel threats while maintaining the inherent efficiency and low power requirements of PUFs. By integrating PUF unpredictability with ML adaptability, this research delivers a scalable, secure, and resource-efficient solution for next-generation authentication in edge environments.
Keywords: physical unclonable function; security-by-design; hardware-assisted security; edge computing; secure authentication; cybersecurity; machine learning; cryptography; authentication protocol; error detection; error correction (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/1999-5903/17/7/272/pdf (application/pdf)
https://www.mdpi.com/1999-5903/17/7/272/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:17:y:2025:i:7:p:272-:d:1683650
Access Statistics for this article
Future Internet is currently edited by Ms. Grace You
More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().