Abstract
A new generation of technology is harder and costlier to deliver because of the physical design limitations of the silicon chip. The minute chip alone is not only compromising the requirements of the user but also creates challenges with respect to security. Architecture for two-factor authentication is designed with low-power, area and with less- human intervention. The proposed model consists of hybrid physical unclonable functions (PUFs) and finite state machine (FSM), which is used to secure the chip and intellectual property (IP) respectively. The PUFs are most often used in recent security applications such as IP protection, IC metering, hardware signature, and obfuscation. This application needs a complex algorithm with a database which consumes more cost and time. In this paper, we have proposed an authentication model consisting of strong and weak PUF with an FSM which can be used for IoT applications. The main focus of this proposal is to authenticate hardware and software IP in circuits. The Experimental evaluation illustrates that the area and power consumed are 5% and 9%, respectively, for authenticating 26 IPs with no false acceptance ratio (FAR) and 1% false rejection ratio (FRR).
Similar content being viewed by others
References
Wang D, et al. (2015) Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans Dependable Secure Comput 12.4:428–442
Baklouti M, et al. (2015) FPGA-based many-core system-on-chip design. Microprocess Microsyst 39.4:302–312
Trimberger SM, Moore JJ (2014) FPGA security: motivations, features, and applications. Proc of the IEEE 102.8:1248–1265
Yan W, Tehranipoor F, Chandy JA (2015) A novel way to authenticate untrusted integrated circuits. In: Proc of the IEEE/ACM International conference on computer-aided design. IEEE Press, pp 132–138
Zaker S (2016) Mehrdad secure and lightweight hardware authentication using isolated physical unclonable function
Aysu A, Schaumont P (2015) Hardware/software co-design of physical unclonable function based authentications on FPGAs. Microprocess Microsyst 39.7:589–597
Kokila J, Ramasubramanian N, Indrajeet S (2016) A survey of hardware and software co-design issues for system on chip design. In: Proc. advanced computing and communication technologies. Springer, Singapore, pp 41–49
Herder C, et al. (2014) Physical unclonable functions and applications: a tutorial. Proc of the IEEE 102.8:1126–1141
Zhang J, et al. (2015) A PUF-FSM binding scheme for FPGA IP protection and pay-per-device licensing. IEEE Trans Inf Forensics Secur 10.6:1137–1150
Frikken KB, Blanton M, Atallah MJ (2009) Robust authentication using physically unclonable functions. In: Proc. international conference on information security. Springer, Berlin
Edward Suh G, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. In: Proc. of the 44th annual design automation conference. ACM
Shahrak MZ, et al. (2016) Two-way real time multimedia stream authentication using physical unclonable functions. In: IEEE 18th International workshop on multimedia signal processing (MMSP). IEEE
Johnson AP, Chakraborty RS, Mukhopadhyay D (2015) A PUF-enabled secure architecture for FPGA-based IoT applications. IEEE Transactions on Multi-Scale Computing Systems 1.2:110–122
Aysu A, Schaumont P (2013) PASC: physically authenticated stable-clocked soc platform on low-cost FPGAs. In: 2013 International conference on proceedings reconfigurable computing and FPGAs (ReConFig). IEEE
Lao Y, et al. (2017) Reliable PUF-based local authentication with self-correction. IEEE Trans Comput Aided Des Integr Circuits Syst 36.2:201–213
Kokila J, Chellam MB, Das AM, Ramasubramanian N (2017) Light weight two-factor authentication using hybrid PUF and FSM for SOC FPGA. In: Proc. International conference on next generation computing technologies. Springer, Singapore, pp 381–395
Zhang J, et al. (2013) Design and implementation of a delay-based PUF for FPGA IP protection. In: 2013 International conference on computer-aided design and computer graphics (CAD/graphics). IEEE
Narasimhan S, Chakraborty RS, Chakraborty S (2012) Hardware IP protection during evaluation using embedded sequential trojan. IEEE Des Test Comput 29.3:70–79
Yan W, Tehranipoor F, Chandy JA (2017) PUF-based fuzzy authentication without error correcting codes. IEEE Trans Comput Aided Des Integr Circuits Syst 36.9:1445–1457
Kumar SS, et al. (2014) The butterfly PUF protecting IP on every FPGA. In: IEEE International workshop on proceedings hardware-oriented security and trust, 2008. HOST 2008. IEEE
Sutar S, Raha A, Raghunathan V (2016) D-puf: an intrinsically reconfigurable dram puf for device authentication in embedded systems. In: 2016 International conference on proceedings compliers, architectures, and sythesis of embedded systems (CASES). IEEE
Zalivaka SS, Ivaniuk AA, Chang C-H (2019) Reliable and modeling attack resistant authentication of arbiter PUF in FPGA implementation with trinary quadruple response. IEEE Trans Inf Forensics Secur 14.4:1109–1123
Maiti A, Gunreddy V, Schaumont P (2013) A systematic method to evaluate and compare the performance of physical unclonable functions. Embedded systems design with FPGAs. Springer, New York, 2013. 245–267
Cherkaoui A, Bossuet L, Marchand C (2016) Design, evaluation, and optimization of physical unclonable functions based on transient effect ring oscillators. IEEE Trans Inf Forensics Secur 11.6:1291–1305
Sehwag V, Saha T (2016) TV-PUF: a fast lightweight analog physical unclonable function. In: 2016 IEEE International symposium on proceedings nanoelectronic and information systems (iNIS). IEEE
Koeberl P, et al. (2012) A practical device authentication scheme using SRAM PUFs. J Cryptogr Eng 2.4:255–269
Halunen K, Häikiö J, Vallivaara V (2017) Evaluation of user authentication methods in the gadget-free world. Pervasive Mob Comput 40:220–241
Bacha A, Teodorescu R (2015) Authenticache: harnessing cache ECC for system authentication. In: 2015 48th annual IEEE/ACM international symposium on proceedings microarchitecture (MICRO). IEEE
Abdulwahid AA, et al. (2016) Continuous and transparent multimodal authentication: reviewing the state of the art. Clust Comput 19.1:455–474
Lal NA, Prasad S, Farik M (2015) A review of authentication methods. Int J Sci Technol Res 4.8:246–249
Cao Y, et al. (2015) A low-power hybrid RO PUF with improved thermal stability for lightweight applications. IEEE Trans Comput Aided Des Integr Circuits Syst 34.7:1143–1147
Khoshroo S (2013) Design and evaluation of FPGA-based hybrid physically unclonable functions
Chatterjee B, et al. (2019) RF-PUF: enhancing IoT security through authentication of wireless nodes using in-situ machine learning. IEEE Internet Things J 6.1:388–398
Ray S, et al. (2018) System-on-chip platform security assurance: architecture and validation. Proc of the IEEE 106.1:21–37
Author information
Authors and Affiliations
Corresponding author
Additional information
Responsible Editor: O. Sinanoglu
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
J. Kokila, N. Ramasubramanian Enhanced Authentication Using Hybrid PUF with FSM for Protecting IPs of SoC FPGAs. J Electron Test 35, 543–558 (2019). https://doi.org/10.1007/s10836-019-05808-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10836-019-05808-w