[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Enhanced Authentication Using Hybrid PUF with FSM for Protecting IPs of SoC FPGAs

  • Published:
Journal of Electronic Testing Aims and scope Submit manuscript

Abstract

A new generation of technology is harder and costlier to deliver because of the physical design limitations of the silicon chip. The minute chip alone is not only compromising the requirements of the user but also creates challenges with respect to security. Architecture for two-factor authentication is designed with low-power, area and with less- human intervention. The proposed model consists of hybrid physical unclonable functions (PUFs) and finite state machine (FSM), which is used to secure the chip and intellectual property (IP) respectively. The PUFs are most often used in recent security applications such as IP protection, IC metering, hardware signature, and obfuscation. This application needs a complex algorithm with a database which consumes more cost and time. In this paper, we have proposed an authentication model consisting of strong and weak PUF with an FSM which can be used for IoT applications. The main focus of this proposal is to authenticate hardware and software IP in circuits. The Experimental evaluation illustrates that the area and power consumed are 5% and 9%, respectively, for authenticating 26 IPs with no false acceptance ratio (FAR) and 1% false rejection ratio (FRR).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Wang D, et al. (2015) Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans Dependable Secure Comput 12.4:428–442

    Article  Google Scholar 

  2. Baklouti M, et al. (2015) FPGA-based many-core system-on-chip design. Microprocess Microsyst 39.4:302–312

    Article  Google Scholar 

  3. Trimberger SM, Moore JJ (2014) FPGA security: motivations, features, and applications. Proc of the IEEE 102.8:1248–1265

    Article  Google Scholar 

  4. Yan W, Tehranipoor F, Chandy JA (2015) A novel way to authenticate untrusted integrated circuits. In: Proc of the IEEE/ACM International conference on computer-aided design. IEEE Press, pp 132–138

  5. Zaker S (2016) Mehrdad secure and lightweight hardware authentication using isolated physical unclonable function

  6. Aysu A, Schaumont P (2015) Hardware/software co-design of physical unclonable function based authentications on FPGAs. Microprocess Microsyst 39.7:589–597

    Article  Google Scholar 

  7. Kokila J, Ramasubramanian N, Indrajeet S (2016) A survey of hardware and software co-design issues for system on chip design. In: Proc. advanced computing and communication technologies. Springer, Singapore, pp 41–49

  8. Herder C, et al. (2014) Physical unclonable functions and applications: a tutorial. Proc of the IEEE 102.8:1126–1141

    Article  Google Scholar 

  9. Zhang J, et al. (2015) A PUF-FSM binding scheme for FPGA IP protection and pay-per-device licensing. IEEE Trans Inf Forensics Secur 10.6:1137–1150

    Article  Google Scholar 

  10. Frikken KB, Blanton M, Atallah MJ (2009) Robust authentication using physically unclonable functions. In: Proc. international conference on information security. Springer, Berlin

  11. Edward Suh G, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. In: Proc. of the 44th annual design automation conference. ACM

  12. Shahrak MZ, et al. (2016) Two-way real time multimedia stream authentication using physical unclonable functions. In: IEEE 18th International workshop on multimedia signal processing (MMSP). IEEE

  13. Johnson AP, Chakraborty RS, Mukhopadhyay D (2015) A PUF-enabled secure architecture for FPGA-based IoT applications. IEEE Transactions on Multi-Scale Computing Systems 1.2:110–122

    Article  Google Scholar 

  14. Aysu A, Schaumont P (2013) PASC: physically authenticated stable-clocked soc platform on low-cost FPGAs. In: 2013 International conference on proceedings reconfigurable computing and FPGAs (ReConFig). IEEE

  15. Lao Y, et al. (2017) Reliable PUF-based local authentication with self-correction. IEEE Trans Comput Aided Des Integr Circuits Syst 36.2:201–213

    Article  Google Scholar 

  16. Kokila J, Chellam MB, Das AM, Ramasubramanian N (2017) Light weight two-factor authentication using hybrid PUF and FSM for SOC FPGA. In: Proc. International conference on next generation computing technologies. Springer, Singapore, pp 381–395

  17. Zhang J, et al. (2013) Design and implementation of a delay-based PUF for FPGA IP protection. In: 2013 International conference on computer-aided design and computer graphics (CAD/graphics). IEEE

  18. Narasimhan S, Chakraborty RS, Chakraborty S (2012) Hardware IP protection during evaluation using embedded sequential trojan. IEEE Des Test Comput 29.3:70–79

    Article  Google Scholar 

  19. Yan W, Tehranipoor F, Chandy JA (2017) PUF-based fuzzy authentication without error correcting codes. IEEE Trans Comput Aided Des Integr Circuits Syst 36.9:1445–1457

    Article  Google Scholar 

  20. Kumar SS, et al. (2014) The butterfly PUF protecting IP on every FPGA. In: IEEE International workshop on proceedings hardware-oriented security and trust, 2008. HOST 2008. IEEE

  21. Sutar S, Raha A, Raghunathan V (2016) D-puf: an intrinsically reconfigurable dram puf for device authentication in embedded systems. In: 2016 International conference on proceedings compliers, architectures, and sythesis of embedded systems (CASES). IEEE

  22. Zalivaka SS, Ivaniuk AA, Chang C-H (2019) Reliable and modeling attack resistant authentication of arbiter PUF in FPGA implementation with trinary quadruple response. IEEE Trans Inf Forensics Secur 14.4:1109–1123

    Article  Google Scholar 

  23. Maiti A, Gunreddy V, Schaumont P (2013) A systematic method to evaluate and compare the performance of physical unclonable functions. Embedded systems design with FPGAs. Springer, New York, 2013. 245–267

  24. Cherkaoui A, Bossuet L, Marchand C (2016) Design, evaluation, and optimization of physical unclonable functions based on transient effect ring oscillators. IEEE Trans Inf Forensics Secur 11.6:1291–1305

    Article  Google Scholar 

  25. Sehwag V, Saha T (2016) TV-PUF: a fast lightweight analog physical unclonable function. In: 2016 IEEE International symposium on proceedings nanoelectronic and information systems (iNIS). IEEE

  26. Koeberl P, et al. (2012) A practical device authentication scheme using SRAM PUFs. J Cryptogr Eng 2.4:255–269

    Article  Google Scholar 

  27. Halunen K, Häikiö J, Vallivaara V (2017) Evaluation of user authentication methods in the gadget-free world. Pervasive Mob Comput 40:220–241

    Article  Google Scholar 

  28. Bacha A, Teodorescu R (2015) Authenticache: harnessing cache ECC for system authentication. In: 2015 48th annual IEEE/ACM international symposium on proceedings microarchitecture (MICRO). IEEE

  29. Abdulwahid AA, et al. (2016) Continuous and transparent multimodal authentication: reviewing the state of the art. Clust Comput 19.1:455–474

    Article  Google Scholar 

  30. Lal NA, Prasad S, Farik M (2015) A review of authentication methods. Int J Sci Technol Res 4.8:246–249

    Google Scholar 

  31. Cao Y, et al. (2015) A low-power hybrid RO PUF with improved thermal stability for lightweight applications. IEEE Trans Comput Aided Des Integr Circuits Syst 34.7:1143–1147

    Google Scholar 

  32. Khoshroo S (2013) Design and evaluation of FPGA-based hybrid physically unclonable functions

  33. Chatterjee B, et al. (2019) RF-PUF: enhancing IoT security through authentication of wireless nodes using in-situ machine learning. IEEE Internet Things J 6.1:388–398

    Article  Google Scholar 

  34. Ray S, et al. (2018) System-on-chip platform security assurance: architecture and validation. Proc of the IEEE 106.1:21–37

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. Kokila.

Additional information

Responsible Editor: O. Sinanoglu

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

J. Kokila, N. Ramasubramanian Enhanced Authentication Using Hybrid PUF with FSM for Protecting IPs of SoC FPGAs. J Electron Test 35, 543–558 (2019). https://doi.org/10.1007/s10836-019-05808-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10836-019-05808-w

Keywords

Navigation