EconPapers    
Economics at your fingertips  
 

Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing

Seema G. Aarella (), Venkata P. Yanambaka, Saraju P. Mohanty and Elias Kougianos
Additional contact information
Seema G. Aarella: Department of Computer Science, Austin College, Sherman, TX 75090, USA
Venkata P. Yanambaka: School of Sciences, Texas Woman’s University, Denton, TX 76204, USA
Saraju P. Mohanty: Department of Computer Science and Engineering, University of North Texas, Denton, TX 76203, USA
Elias Kougianos: Department of Electrical Engineering, University of North Texas, Denton, TX 76203, USA

Future Internet, 2025, vol. 17, issue 7, 1-29

Abstract: This research introduces Fortified-Edge 2.0, a novel authentication framework that addresses critical security and privacy challenges in Physically Unclonable Function (PUF)-based systems for collaborative edge computing (CEC). Unlike conventional methods that transmit full binary Challenge–Response Pairs (CRPs) and risk exposing sensitive data, Fortified-Edge 2.0 employs a machine-learning-driven feature-abstraction technique to extract and utilize only essential characteristics of CRPs, obfuscating the raw binary sequences. These feature vectors are then processed using lightweight cryptographic primitives, including ECDSA, to enable secure authentication without exposing the original CRP. This eliminates the need to transmit sensitive binary data, reducing the attack surface and bandwidth usage. The proposed method demonstrates strong resilience against modeling attacks, replay attacks, and side-channel threats while maintaining the inherent efficiency and low power requirements of PUFs. By integrating PUF unpredictability with ML adaptability, this research delivers a scalable, secure, and resource-efficient solution for next-generation authentication in edge environments.

Keywords: physical unclonable function; security-by-design; hardware-assisted security; edge computing; secure authentication; cybersecurity; machine learning; cryptography; authentication protocol; error detection; error correction (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/1999-5903/17/7/272/pdf (application/pdf)
https://www.mdpi.com/1999-5903/17/7/272/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:17:y:2025:i:7:p:272-:d:1683650

Access Statistics for this article

Future Internet is currently edited by Ms. Grace You

More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-06-21
Handle: RePEc:gam:jftint:v:17:y:2025:i:7:p:272-:d:1683650