Journal articles on the topic 'PUF Physically imcloneable function'

To see the other types of publications on this topic, follow the link: PUF Physically imcloneable function.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 35 journal articles for your research on the topic 'PUF Physically imcloneable function.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Chattopadhyay, Saranyu, Pranesh Santikellur, Rajat Subhra Chakraborty, Jimson Mathew, and Marco Ottavi. "A Conditionally Chaotic Physically Unclonable Function Design Framework with High Reliability." ACM Transactions on Design Automation of Electronic Systems 26, no. 6 (November 30, 2021): 1–24. http://dx.doi.org/10.1145/3460004.

Full text
Abstract:
Physically Unclonable Function (PUF) circuits are promising low-overhead hardware security primitives, but are often gravely susceptible to machine learning–based modeling attacks. Recently, chaotic PUF circuits have been proposed that show greater robustness to modeling attacks. However, they often suffer from unacceptable overhead, and their analog components are susceptible to low reliability. In this article, we propose the concept of a conditionally chaotic PUF that enhances the reliability of the analog components of a chaotic PUF circuit to a level at par with their digital counterparts. A conditionally chaotic PUF has two modes of operation: bistable and chaotic , and switching between these two modes is conveniently achieved by setting a mode-control bit (at a secret position) in an applied input challenge. We exemplify our PUF design framework for two different PUF variants—the CMOS Arbiter PUF and a previously proposed hybrid CMOS-memristor PUF, combined with a hardware realization of the Lorenz system as the chaotic component. Through detailed circuit simulation and modeling attack experiments, we demonstrate that the proposed PUF circuits are highly robust to modeling and cryptanalytic attacks, without degrading the reliability of the original PUF that was combined with the chaotic circuit, and incurs acceptable hardware footprint.
APA, Harvard, Vancouver, ISO, and other styles
2

Komano, Yuichi, Kazuo Ohta, Kazuo Sakiyama, Mitsugu Iwamoto, and Ingrid Verbauwhede. "Single-Round Pattern Matching Key Generation Using Physically Unclonable Function." Security and Communication Networks 2019 (January 1, 2019): 1–13. http://dx.doi.org/10.1155/2019/1719585.

Full text
Abstract:
Paral and Devadas introduced a simple key generation scheme with a physically unclonable function (PUF) that requires no error correction, e.g., by using a fuzzy extractor. Their scheme, called a pattern matching key generation (PMKG) scheme, is based on pattern matching between auxiliary data, assigned at the enrollment in advance, and a substring of PUF output, to reconstruct a key. The PMKG scheme repeats a round operation, including the pattern matching, to derive a key with high entropy. Later, to enhance the efficiency and security, a circular PMKG (C-PMKG) scheme was proposed. However, multiple round operations in these schemes make them impractical. In this paper, we propose a single-round circular PMKG (SC-PMKG) scheme. Unlike the previous schemes, our scheme invokes the PUF only once. Hence, there is no fear of information leakage by invoking the PUF with the (partially) same input multiple times in different rounds, and, therefore, the security consideration can be simplified. Moreover, we introduce another hash function to generate a check string which ensures the correctness of the key reconstruction. The string enables us not only to defeat manipulation attacks but also to prove the security theoretically. In addition to its simple construction, the SC-PMKG scheme can use a weak PUF like the SRAM-PUF as a building block if our system is properly implemented so that the PUF is directly inaccessible from the outside, and, therefore, it is suitable for tiny devices in the IoT systems. We discuss its security and show its feasibility by simulations and experiments.
APA, Harvard, Vancouver, ISO, and other styles
3

Lee, Sangjae, Mi-Kyung Oh, Yousung Kang, and Dooho Choi. "Design of Resistor-Capacitor Physically Unclonable Function for Resource-Constrained IoT Devices." Sensors 20, no. 2 (January 10, 2020): 404. http://dx.doi.org/10.3390/s20020404.

Full text
Abstract:
Keeping IoT devices secure has been a major challenge recently. One of the possible solutions to secure IoT devices is to use a physically unclonable function (PUF). A PUF is a security primitive that can generate device-specific cryptographic information by extracting the features of hardware uncertainty. Because PUF instances are very difficult to replicate even by the manufacturer, the generated bit sequence can be used as cryptographic keys or as a unique identifier for the device. Regarding the implementation of PUF, the majority of PUFs introduced over the past decade are in the form of active components and have been implemented as separate chips or embedded as a part of a chip, making it difficult to use them in low-cost IoT devices due to cost and design flexibility. One approach to easily adopt PUFs in resource-constrained IoT devices is to use passive components such as resistors and capacitors (RC) that can be configured at low cost. The main feature of this RC-based PUF is that it extracts the small difference caused by charging and discharging of RC circuits and uses it as a response. In this paper, we extend the previous research and show the possibility to secure IoT devices by using the RC-based PUF.
APA, Harvard, Vancouver, ISO, and other styles
4

Lapidas, V., A. Zhizhchenko, E. Pustovalov, D. Storozhenko, and A. Kuchmizhak. "Direct laser printing of high-resolution physically unclonable function anti-counterfeit labels." Applied Physics Letters 120, no. 26 (June 27, 2022): 261104. http://dx.doi.org/10.1063/5.0091213.

Full text
Abstract:
Security labels combining facile structural color readout and physically unclonable one-way function (PUF) approach provide promising strategy for fighting against forgery of marketable products. Here, we justify direct femtosecond-laser printing, a simple and scalable technology, for fabrication of high-resolution (12 500 dots per inch) and durable PUF labels with a substantially large encoding capacity of 10895 and a simple spectroscopy-free optical signal readout. The proposed tags are comprised of laser-printed plasmonic nanostructures exhibiting unique light scattering behavior and unclonable 3D geometry. Uncontrollable stochastic variation of the nanostructure geometry in the process of their spot-by-spot printing results in random and broadband variation of the scattering color of each laser printed “pixel,” making laser-printed patterns unique and suitable for PUF labeling.
APA, Harvard, Vancouver, ISO, and other styles
5

Kuribara, Kazunori, Yuichi Watanabe, Atsushi Takei, Sei Uemura, and Manabu Yoshida. "Robustness of organic physically unclonable function with buskeeper circuit for flexible security devices." Japanese Journal of Applied Physics 61, SE (April 7, 2022): SE1016. http://dx.doi.org/10.35848/1347-4065/ac4c6a.

Full text
Abstract:
Abstract Flexible devices have been studied to realize IoT or novel wearable devices. The data that flexible devices deal with can include personal information when application areas further expand. A security system for flexible devices becomes more important in this case. In this study, we investigate the thermal stability of an organic flexible security system. The security system utilizes fabrication variation of a chip, and it is called a physically unclonable function (PUF). As a result, the bit error rate of the organic PUF is 1.8% and the index of ID uniqueness (i.e., randomness) has an almost theoretical value of 0.48. The generated ID remains even after annealing at 100 °C for 97 h by using CYTOP encapsulation. X-ray diffraction measurement implies that degradation of PUF characteristics partially derives from structure changes of the organic n-type semiconductor thin film after annealing.
APA, Harvard, Vancouver, ISO, and other styles
6

Okura, Shunsuke, Masanori Aoki, Tatsuya Oyama, Masayoshi Shirahata, Takeshi Fujino, Kenichiro Ishikawa, and Isao Takayanagi. "Area-Efficient Post-Processing Circuits for Physically Unclonable Function with 2-Mpixel CMOS Image Sensor." Sensors 21, no. 18 (September 10, 2021): 6079. http://dx.doi.org/10.3390/s21186079.

Full text
Abstract:
In order to realize image information security starting from the data source, challenge–response (CR) device authentication, based on a Physically Unclonable Function (PUF) with a 2 Mpixel CMOS image sensor (CIS), is studied, in which variation of the transistor in the pixel array is utilized. As each CR pair can be used only once to make the CIS PUF resistant to the modeling attack, CR authentication with CIS can be carried out 4050 times, with basic post-processing to generate the PUF ID. If a larger number of authentications is required, advanced post-processing using Lehmer encoding can be utilized to carry out authentication 14,858 times. According to the PUF performance evaluation, the authentication error rate is less than 0.001 ppm. Furthermore, the area overhead of the CIS chip for the basic and advanced post-processing is only 1% and 2%, respectively, based on a Verilog HDL model circuit design.
APA, Harvard, Vancouver, ISO, and other styles
7

Watanabe, Yuichi, Kouji Suemori, Kazunori Kuribara, Nobuko Fukuda, Ken-ichi Nomura, and Sei Uemura. "Development of a simple contact-type printable physically unclonable function device using percolation conduction of rod-like conductive fillers." Japanese Journal of Applied Physics 61, SE (March 24, 2022): SE1005. http://dx.doi.org/10.35848/1347-4065/ac506b.

Full text
Abstract:
Abstract We suggested a printable physically unclonable function (PUF) with a simple circuit structure, to provide a low-cost PUF for improvement in the security level of electronic devices. An element of our contact-type printable PUF was constructed of a conductive filler layer and a pair of electrodes formed by printing. The contact-type printable PUF was based on an open- or short-circuit information of elements induced by a percolation conduction phenomenon of the conductive filler layer. An average conduction probability of the elements could be controlled by adjusting the manufacturing conditions, but an actual appearance pattern of the conduction elements became completely random by the influence of the uncontrollable printing variations. We fabricated a thousand elements for each printing condition to evaluate the PUF performance statistically and obtained a random conduction pattern with a conduction probability of 48.3%. Therefore, our contact-type printable PUF had enough potential to be used as a PUF security system.
APA, Harvard, Vancouver, ISO, and other styles
8

Abdolinezhad, Saeed, Lukas Zimmermann, and Axel Sikora. "A Novel Key Generation Method for Group-Based Physically Unclonable Function Designs." Electronics 10, no. 21 (October 24, 2021): 2597. http://dx.doi.org/10.3390/electronics10212597.

Full text
Abstract:
In recent years, physically unclonable functions (PUFs) have gained significant attraction in IoT security applications, such as cryptographic key generation and entity authentication. PUFs extract the uncontrollable production characteristics of different devices to generate unique fingerprints for security applications. When generating PUF-based secret keys, the reliability and entropy of the keys are vital factors. This study proposes a novel method for generating PUF-based keys from a set of measurements. Firstly, it formulates the group-based key generation problem as an optimization problem and solves it using integer linear programming (ILP), which guarantees finding the optimum solution. Then, a novel scheme for the extraction of keys from groups is proposed, which we call positioning syndrome coding (PSC). The use of ILP as well as the introduction of PSC facilitates the generation of high-entropy keys with low error correction costs. These new methods have been tested by applying them on the output of a capacitor network PUF. The results confirm the application of ILP and PSC in generating high-quality keys.
APA, Harvard, Vancouver, ISO, and other styles
9

Huang, Zhao, Liang Li, Yin Chen, Zeyu Li, Quan Wang, and Xiaohong Jiang. "RPPUF: An Ultra-Lightweight Reconfigurable Pico-Physically Unclonable Function for Resource-Constrained IoT Devices." Electronics 10, no. 23 (December 5, 2021): 3039. http://dx.doi.org/10.3390/electronics10233039.

Full text
Abstract:
With the advancement of the Internet of Things (IoTs) technology, security issues have received an increasing amount of attention. Since IoT devices are typically resource-limited, conventional security solutions, such as classical cryptography, are no longer applicable. A physically unclonable function (PUF) is a hardware-based, low-cost alternative solution to provide security for IoT devices. It utilizes the inherent nature of hardware to generate a random and unpredictable fingerprint to uniquely identify an IoT device. However, despite existing PUFs having exhibited a good performance, they are not suitable for effective application on resource-constrained IoT devices due to the limited number of challenge-response pairs (CRPs) generated per unit area and the large hardware resources overhead. To solve these problems, this article presents an ultra-lightweight reconfigurable PUF solution, which is named RPPUF. Our method is built on pico-PUF (PPUF). By incorporating configurable logics, one single RPPUF can be instantiated into multiple samples through configurable information K. We implement and verify our design on the Xilinx Spartan-6 field programmable gate array (FPGA) microboards. The experimental results demonstrate that, compared to previous work, our method increases the uniqueness, reliability and uniformity by up to 4.13%, 16.98% and 10.5%, respectively, while dramatically reducing the hardware resource overhead by 98.16% when a 128-bit PUF response is generated. Moreover, the bit per cost (BPC) metric of our proposed RPPUF increased by up to 28.5 and 53.37 times than that of PPUF and the improved butterfly PUF, respectively. This confirms that the proposed RPPUF is ultra-lightweight with a good performance, making it more appropriate and efficient to apply in FPGA-based IoT devices with constrained resources.
APA, Harvard, Vancouver, ISO, and other styles
10

Khan, Mohammad Nasim Imtiaz, Chak Yuen Cheng, Sung Hao Lin, Abdullah Ash-Saki, and Swaroop Ghosh. "A Morphable Physically Unclonable Function and True Random Number Generator Using a Commercial Magnetic Memory." Journal of Low Power Electronics and Applications 11, no. 1 (January 14, 2021): 5. http://dx.doi.org/10.3390/jlpea11010005.

Full text
Abstract:
We use commercial magnetic memory to realize morphable security primitives, a Physically Unclonable Function (PUF) and a True Random Number Generator (TRNG). The PUF realized by manipulating the write time and the TRNG is realized by tweaking the number of write pulses. Our analysis indicates that more than 75% bits in the PUF are unusable without any correction due to their inability to exhibit any randomness. We exploit temporal randomness of working columns to fix the unusable columns and write latency to fix the unusable rows during the enrollment. The intra-HD, inter-HD, energy, bandwidth and area of the proposed PUF are found to be 0, 46.25%, 0.14 pJ/bit, 0.34 Gbit/s and 0.385 μm2/bit (including peripherals) respectively. The proposed TRNG provides all possible outcomes with a standard deviation of 0.0062, correlation coefficient of 0.05 and an entropy of 0.95. The energy, bandwidth and area of the proposed TRNG is found to be 0.41 pJ/bit, 0.12 Gbit/s and 0.769 μm2/bit (including peripherals). The performance of the proposed TRNG has also been tested with NIST test suite. The proposed designs are compared with other magnetic PUFs and TRNGs from other literature.
APA, Harvard, Vancouver, ISO, and other styles
11

Della Sala, Riccardo, Davide Bellizia, Francesco Centurelli, and Giuseppe Scotti. "A Monostable Physically Unclonable Function Based on Improved RCCMs with 0–1.56% Native Bit Instability at 0.6–1.2 V and 0–75 °C." Electronics 12, no. 3 (February 2, 2023): 755. http://dx.doi.org/10.3390/electronics12030755.

Full text
Abstract:
In this work, a Physically Unclonable Function (PUF) based on an improved regulated cascode current mirror (IRCCM) is presented. The proposed IRCCM improves the loop-gain of the gain-boosting branch over the conventional RCCM PUF, thereby increasing the output resistance and amplifying the mismatches due to random variations. The introduction of an explicit reference current in the biasing branch of the IRCCM results in lower native unstable bits, good robustness against environmental variations and very stable power consumption. The proposed PUF has been validated through measurement results on a test-chip implemented in a 130 nm CMOS process. The PUF performance was measured for supply voltages between 0.6 and 1.2V, and temperatures ranging from 0 °C to 75 °C. A comparison against similar designs from the literature has shown that the proposed PUF exhibits state of the art performance with improved reliability under supply voltage variations.
APA, Harvard, Vancouver, ISO, and other styles
12

Asghari, Meysam, Marino Guzman, and Nima Maghari. "Cross-Coupled Impedance-Based Physically Unclonable Function (PUF) With 1.06% Native Instability." IEEE Solid-State Circuits Letters 3 (2020): 282–85. http://dx.doi.org/10.1109/lssc.2020.3012546.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Bin Tarik, Farhan, Azadeh Famili, Yingjie Lao, and Judson D. Ryckman. "Robust optical physical unclonable function using disordered photonic integrated circuits." Nanophotonics 9, no. 9 (July 3, 2020): 2817–28. http://dx.doi.org/10.1515/nanoph-2020-0049.

Full text
Abstract:
AbstractPhysical unclonable function (PUF) has emerged as a promising and important security primitive for use in modern systems and devices, due to their increasingly embedded, distributed, unsupervised, and physically exposed nature. However, optical PUFs based on speckle patterns, chaos, or ‘strong’ disorder are so far notoriously sensitive to probing and/or environmental variations. Here we report an optical PUF designed for robustness against fluctuations in optical angular/spatial alignment, polarization, and temperature. This is achieved using an integrated quasicrystal interferometer (QCI) which sensitively probes disorder while: (1) ensuring all modes are engineered to exhibit approximately the same confinement factor in the predominant thermo-optic medium (e. g. silicon), and (2) constraining the transverse spatial-mode and polarization degrees of freedom. This demonstration unveils a new means for amplifying and harnessing the effects of ‘weak’ disorder in photonics and is an important and enabling step toward new generations of optics-enabled hardware and information security devices.
APA, Harvard, Vancouver, ISO, and other styles
14

Lin, Yu-Hsuan, Dai-Ying Lee, Ming-Hsiu Lee, Po-Hao Tseng, Wei-Chen Chen, Kuang-Yeu Hsieh, Keh-Chung Wang, and Chih-Yuan Lu. "A novel 1T2R self-reference physically unclonable function suitable for advanced logic nodes for high security level applications." Japanese Journal of Applied Physics 61, SC (February 7, 2022): SC1003. http://dx.doi.org/10.35848/1347-4065/ac3a8d.

Full text
Abstract:
Abstract A self-reference resistive random-access memory (ReRAM)-based one-transistor, two-ReRAM (1T2R) physically unclonable function (PUF) is proposed to provide a hardware security feature for electrical products in the IoT/5G era. There are four advantages from the proposed structure: (1) a small cell size; (2) intrinsic randomness; (3) no programming circuit; and (4) no data retention concerns. The conduction mechanism, temperature dependency, and read fluctuation of the pristine ReRAM device are studied. An information–address separation scheme is proposed which not only reduces the impact of the read noise and the temperature effect, but also improves system integrity against hardware attacks. The proposed 1T2R PUF unit also has great potential for use as a random seed for linear-feedback shift registers in pseudo random number generators with high unpredictability, good randomness, and a high data rate.
APA, Harvard, Vancouver, ISO, and other styles
15

Perumalla, Anvesh, and John M. Emmert. "Memometer: Memory PUF-based Hardware Metering Methodology for FPGAs." EDFA Technical Articles 24, no. 4 (November 1, 2022): 12–21. http://dx.doi.org/10.31399/asm.edfa.2022-4.p012.

Full text
Abstract:
Abstract This article describes a hardware metering fingerprint technique, called the memometer, that addresses supply chain integrity issues with field-programmable gate arrays (FPGAs). The memometer is a physically unclonable function (PUF) based on cross-coupled lookup tables that overcomes manufacturing memory power-on preset. The fingerprints are not only unique, but also reliable with average hamming distances close to the ideal values of 50% (interchip) and 0% (intrachip). Instead of having one fingerprint per device, the memometer makes provision for hundreds with the potential for more.
APA, Harvard, Vancouver, ISO, and other styles
16

Sun, Da-Zhi, and Yangguang Tian. "Security of a PUF Mutual Authentication and Session Key Establishment Protocol for IoT Devices." Mathematics 10, no. 22 (November 17, 2022): 4310. http://dx.doi.org/10.3390/math10224310.

Full text
Abstract:
Recently, Zerrouki et al. proposed a Physically Unclonable Function (PUF) mutual authentication and session key establishment protocol for IoT (Internet of Things) devices. Zerrouki et al.’s PUF protocol is interesting because it does not require the storage of any sensitive information on the local memory of the IoT device, which avoids many potential attacks, especially side-channel attacks. Therefore, we carefully investigate the security of Zerrouki et al.’s PUF protocol under the leakage assumption of the session key. Our findings are in the following. First, Zerrouki et al.’s PUF protocol fails to provide known-key security. That is, the adversary can impersonate not only the server to cheat the IoT device but also the IoT device to cheat the server when the adversary corrupts a session key between the server and the IoT device. Second, Zerrouki et al.’s PUF protocol suffers from the key-compromise impersonation attack. It means that the adversary can impersonate the IoT device to cheat the server if the adversary discloses the server’s secret key. Third, Zerrouki et al.’s PUF protocol does not support backward secrecy for the session key. That is, the adversary is always able to derive the session key from the previous session key. We also suggest the root cause of these security flaws in Zerrouki et al.’s PUF protocol. As a case study, our cryptanalysis results would promote a security model for more robust and efficient PUF authentication and session key establishment protocol. Moreover, our idea of the key compromise can be used to evaluate other novel PUF protocol designs.
APA, Harvard, Vancouver, ISO, and other styles
17

Boikov, Konstantin A. "Radiosensor identification and authentication of radio-electronic devices." T-Comm 16, no. 5 (2022): 15–20. http://dx.doi.org/10.36724/2072-8735-2022-16-5-15-20.

Full text
Abstract:
The presented work is devoted to the study of a new physically unclonable function (PUF) associated with the intrinsic electromagnetic radiation of a radio electronic device. This PUF arises as a result of the technological spread of the parameters of electronic components. The relevance of this study is explained by the fact that modern methods of protecting radio-electronic products from illegal cloning have a number of serious drawbacks associated with increased power consumption, the use of processor time, and the need for galvanic access to the object of study. Partially, these problems are eliminated by PUF, which allow authentication of a radio-electronic device. However, this kind of protection also has serious vulnerabilities in the case of illegal overproduction of products in excess of the ordered quantity. In addition, the PUF does not allow for the identification of radio-electronic products. The purpose of this work is to increase the protection of radio electronic devices from illegal cloning, by studying a new PUF. The work uses experimental research methods to record the electrical component of the electromagnetic field emitted by the product - the signal radio profile (SRP). Correlation analysis methods for product authentication, Pearson's statistical agreement method for identification. SRPs registered from specially designed experimental samples are presented, a correlation analysis of SRP data is carried out. To decompose and extract the parameters of the SRP, its time-frequency spectrum was constructed. A correspondence table was compiled and an analysis of Pearson's agreement was carried out. The results obtained showed the possibility of using the SRP as a new physically unclonable function that allows the identification of radio electronic devices with a probability specified by the researcher, which determines the novelty of the work. It has been established that with Pearson's coefficient of agreement between the parameters of the studied SRP and the benchmark of more than 0.95, a radio-electronic device can be reliably identified. The practical significance of the work lies in the possibility of using the SRP to identify a group of devices and radio-technical protection of a radio-electronic product from fakes and illegal copies.
APA, Harvard, Vancouver, ISO, and other styles
18

Kim, Bruce, and Sang-Bock Cho. "A Secure Tunable LNA Design for Internet of Things." International Symposium on Microelectronics 2017, no. 1 (October 1, 2017): 000705–8. http://dx.doi.org/10.4071/isom-2017-thp22_138.

Full text
Abstract:
Abstract This paper describes the design of through-silicon via (TSV)-based inductors for a secure tunable low-noise amplifier (LNA) in Internet of Things (IoT) devices. To improve cybersecurity infrastructure, we designed a tunable LNA with hardware security. Our secure design for tunable LNA uses a ring oscillator-based physically unclonable function (PUF) circuit. For the 3D inductors, we use ferromagnetic materials to achieve high inductance with a good quality factor.
APA, Harvard, Vancouver, ISO, and other styles
19

Lalouani, Wassila, Mohamed Younis, Mohammad Ebrahimabadi, and Naghmeh Karimi. "Countering Modeling Attacks in PUF-based IoT Security Solutions." ACM Journal on Emerging Technologies in Computing Systems 18, no. 3 (July 31, 2022): 1–28. http://dx.doi.org/10.1145/3491221.

Full text
Abstract:
Hardware fingerprinting has emerged as a viable option for safeguarding IoT devices from cyberattacks. Such a fingerprint is used to not only authenticate the interconnected devices but also to derive cryptographic keys for ensuring data integrity and confidentiality. A Physically Unclonable Function (PUF) is deemed as an effective fingerprinting mechanism for resource-constrained IoT devices since it is simple to implement and imposes little overhead. A PUF design is realized based on the unintentional variations of microelectronics manufacturing processes. When queried with input bits (challenge), a PUF outputs a response that depends on such variations and this uniquely identifies the device. However, machine learning techniques constitute a threat where intercepted challenge-response pairs (CRPs) could be used to model the PUF and predict its output. This paper proposes an adversarial machine learning based methodology to counter such a threat. An effective label flipping approach is proposed where the attacker's model is poisoned by providing wrong CRPs. We employ an adaptive poisoning strategy that factors in potentially leaked information, i.e., the intercepted CRPs, and introduces randomness in the poisoning pattern to prevent exclusion of these wrong CRPs as outliers. The server and client use a lightweight procedure to coordinate and predict poisoned CRP exchanges. Specifically, we employ the same pseudo random number generator at communicating parties to ensure synchronization and consensus between them, and to vary the poisoning pattern over time. Our approach has been validated using datasets generated via a PUF implementation on an FPGA. The results have confirmed the effectiveness of our approach in defeating prominent PUF modeling attack techniques in the literature.
APA, Harvard, Vancouver, ISO, and other styles
20

Mahalat, Mahabub Hasan, Dipankar Karmakar, Anindan Mondal, and Bibhash Sen. "PUF based Secure and Lightweight Authentication and Key-Sharing Scheme for Wireless Sensor Network." ACM Journal on Emerging Technologies in Computing Systems 18, no. 1 (January 31, 2022): 1–23. http://dx.doi.org/10.1145/3466682.

Full text
Abstract:
The deployment of wireless sensor networks (WSN) in an untended environment and the openness of the wireless channel bring various security threats to WSN. The resource limitations of the sensor nodes make the conventional security systems less attractive for WSN. Moreover, conventional cryptography alone cannot ensure the desired security against the physical attacks on sensor nodes. Physically unclonable function (PUF) is an emerging hardware security primitive that provides low-cost hardware security exploiting the unique inherent randomness of a device. In this article, we have proposed an authentication and key sharing scheme for the WSN integrating Pedersen’s verifiable secret sharing (Pedersen’s VSS) and Shamir’s secret sharing (Shamir’s SS) scheme with PUF which ensure the desired security with low overhead. The security analysis depicts the resilience of the proposed scheme against different active, passive and physical attacks. Also, the performance analysis shows that the proposed scheme possesses low computation, communication and storage overhead. The scheme only needs to store a polynomial number of PUF challenge-response pairs to the user node. The sink or senor nodes do not require storing any secret key. Finally, the comparison with the previous protocols establishes the dominance of the proposed scheme to use in WSN.
APA, Harvard, Vancouver, ISO, and other styles
21

Arcenegui, Javier, Rosario Arjona, Roberto Román, and Iluminada Baturone. "Secure Combination of IoT and Blockchain by Physically Binding IoT Devices to Smart Non-Fungible Tokens Using PUFs." Sensors 21, no. 9 (April 30, 2021): 3119. http://dx.doi.org/10.3390/s21093119.

Full text
Abstract:
Non-fungible tokens (NFTs) are widely used in blockchain to represent unique and non-interchangeable assets. Current NFTs allow representing assets by a unique identifier, as a possession of an owner. The novelty introduced in this paper is the proposal of smart NFTs to represent IoT devices, which are physical smart assets. Hence, they are also identified as the utility of a user, they have a blockchain account (BCA) address to participate actively in the blockchain transactions, they can establish secure communication channels with owners and users, and they operate dynamically with several modes associated with their token states. A smart NFT is physically bound to its IoT device thanks to the use of a physical unclonable function (PUF) that allows recovering its private key and, then, its BCA address. The link between tokens and devices is difficult to break and can be traced during their lifetime, because devices execute a secure boot and carry out mutual authentication processes with new owners and users that could add new software. Hence, devices prove their trusted hardware and software. A whole demonstration of the proposal developed with ESP32-based IoT devices and Ethereum blockchain is presented, using the SRAM of the ESP32 microcontroller as the PUF.
APA, Harvard, Vancouver, ISO, and other styles
22

Loong Teo, Julius Han, Noor Alia Nor Hashim, Azrul Ghazali, and Fazrena Azlee Hamid. "Ring oscillator physically unclonable function using sequential ring oscillator pairs for more challenge-response-pairs." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 3 (March 1, 2019): 892. http://dx.doi.org/10.11591/ijeecs.v13.i3.pp892-901.

Full text
Abstract:
<span>The ring oscillator physically unclonable function (ROPUF) is one of the several types of PUF that has great potential to be used for security purposes. An alternative ROPUF design is proposed with two major differences. Firstly, the memristor is included in the ring oscillators as it is claimed to produce a more random oscillation frequency. Other reasons are its memory-like properties and variable memristance, relative compatibility with CMOS, and small size. Secondly, a different method of generating the response is implemented whereby a sequence of selection of ring oscillator pairs are used to generate a multiple bit response, rather than using only one ring oscillator pair to generate a single bit response. This method significantly expands the set of challenge-response pairs. The proposed memristor-based ROPUF shows 48.57%, 51.43%, and 51.43% for uniqueness, uniformity, and bit-aliasing, respectively. Also, modelling by support vector machine (SVM) on the proposed memristor-based ROPUF only shows 61.95% accuracy, thereby indicating strong resistance against SVM.</span>
APA, Harvard, Vancouver, ISO, and other styles
23

HIROMOTO, Masayuki, Motoki YOSHINAGA, and Takashi SATO. "MRO-PUF: Physically Unclonable Function with Enhanced Resistance against Machine Learning Attacks Utilizing Instantaneous Output of Ring Oscillator." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E101.A, no. 7 (July 1, 2018): 1035–44. http://dx.doi.org/10.1587/transfun.e101.a.1035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Afghah, Fatemeh, Bertrand Cambou, Masih Abedini, and Sherali Zeadally. "A ReRAM Physically Unclonable Function (ReRAM PUF)-Based Approach to Enhance Authentication Security in Software Defined Wireless Networks." International Journal of Wireless Information Networks 25, no. 2 (January 22, 2018): 117–29. http://dx.doi.org/10.1007/s10776-018-0391-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Kumar, Vikas, Rahul Kumar, Srinivas Jangirala, Saru Kumari, Sachin Kumar, and Chien-Ming Chen. "An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing." Security and Communication Networks 2022 (July 30, 2022): 1–18. http://dx.doi.org/10.1155/2022/8998339.

Full text
Abstract:
RFID (radio frequency identification) is an Internet of Things (IoT) enabling technology. All physical devices can be connected to the Internet of Things thanks to RFID. When RFID is extensively utilized and fast increasing, security and privacy concerns are unavoidable. Interception, manipulation, and replay of the wireless broadcast channel between the tag and the reader are all possible security threats. Unverified tags or readers provide untrustworthy messages. IoT requires a safe and consistent RFID authentication system. PUFs are also physical one-way functions made up of the unique nanoscopic structure of physical things and their reactivity to random occurrences. PUF includes an unclonable feature that takes advantage of physical characteristics to boost security and resistance to physical attacks. We analyze the security of the RSEAP2 authentication protocol that has been recently proposed by Safkhani et al., a hash-based protocol, and elliptic curve cryptosystem-based protocol. Our security analysis clearly shows important security pitfalls in RSEAP2 such as mutual authentication, session key agreement, and denial-of-service attack. In our proposed work, we improved their scheme and enhanced their version using physically unclonable function (PUF), which are used by the proposed protocol in tags. This research proposes a cloud-based RFID authentication technique that is both efficient and trustworthy. To decrease the RFID tag’s overhead, the suggested authentication approach not only resists the aforementioned typical assaults and preserves the tag’s privacy, but also incorporates the cloud server into the RFID system. According to simulation results, our approach is efficient. Moreover, according to our security study, our protocol can withstand a variety of attacks, including tracking, replay, and desynchronization assaults. Our scheme withstands all the 18 security features and further consumes the computation cost as 14.7088 ms which is comparable with the other schemes. Similarly, our scheme consumes the communication cost as 672 bits during the sending mode and 512 bits during the receiving mode. Overall, the performance of our proposed method is equivalent to that of related schemes and provides additional security features than existing protocols. Mutual authentication, session key generation, and ephemeral session security are all achieved. Using the real-or-random concept, we formalize the security of the proposed protocol.
APA, Harvard, Vancouver, ISO, and other styles
26

Mahalat, Mahabub Hasan, Suraj Mandal, Anindan Mondal, Bibhash Sen, and Rajat Subhra Chakraborty. "Implementation, Characterization and Application of Path Changing Switch based Arbiter PUF on FPGA as a lightweight Security Primitive for IoT." ACM Transactions on Design Automation of Electronic Systems 27, no. 3 (May 31, 2022): 1–26. http://dx.doi.org/10.1145/3491212.

Full text
Abstract:
Secure authentication of any Internet-of-Things (IoT) device becomes the utmost necessity due to the lack of specifically designed IoT standards and intrinsic vulnerabilities with limited resources and heterogeneous technologies. Despite the suitability of arbiter physically unclonable function (APUF) among other PUF variants for the IoT applications, implementing it on field-programmable gate arrays (FPGAs) is challenging. This work presents the complete characterization of the path changing switch (PCS) 1 based APUF on two different families of FPGA, like Spartan-3E (90 nm CMOS) and Artix-7 (28 nm CMOS). A comprehensive study of the existing tuning concept for programmable delay logic (PDL) based APUF implemented on FPGA is presented, leading to establishment of its practical infeasibility. We investigate the entropy, randomness properties of the PCS based APUF suitable for practical applications, and the effect of temperature variation signifying the adequate tolerance against environmental variation. The XOR composition of PCS based APUF is introduced to boost performance and security. The robustness of the PCS based APUF against machine learning based modeling attack is evaluated, showing similar characteristics as the conventional APUF. Experimental results validate the efficacy of PCS based APUF with a little hardware footprint removing the paucity of lightweight security primitive for IoT.
APA, Harvard, Vancouver, ISO, and other styles
27

Al-Aqrabi, Hussain, Anju P. Johnson, Richard Hill, Phil Lane, and Tariq Alsboui. "Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT." Sensors 20, no. 7 (March 31, 2020): 1963. http://dx.doi.org/10.3390/s20071963.

Full text
Abstract:
The introduction of 5G communication capabilities presents additional challenges for the development of products and services that can fully exploit the opportunities offered by high bandwidth, low latency networking. This is particularly relevant to an emerging interest in the Industrial Internet of Things (IIoT), which is a foundation stone of recent technological revolutions such as Digital Manufacturing. A crucial aspect of this is to securely authenticate complex transactions between IIoT devices, whilst marshalling adversarial requests for system authorisation, without the need for a centralised authentication mechanism which cannot scale to the size needed. In this article we combine Physically Unclonable Function (PUF) hardware (using Field Programmable Gate Arrays—FPGAs), together with a multi-layer approach to cloud computing from the National Institute of Standards and Technology (NIST). Through this, we demonstrate an approach to facilitate the development of improved multi-layer authentication mechanisms. We extend prior work to utilise hardware security primitives for adversarial trojan detection, which is inspired by a biological approach to parameter analysis. This approach is an effective demonstration of attack prevention, both from internal and external adversaries. The security is further hardened through observation of the device parameters of connected IIoT equipment. We demonstrate that the proposed architecture can service a significantly high load of device authentication requests using a multi-layer architecture in an arbitrarily acceptable time of less than 1 second.
APA, Harvard, Vancouver, ISO, and other styles
28

Gao, Bin, Bohan Lin, Yachuan Pang, Feng Xu, Yuyao Lu, Yen-Cheng Chiu, Zhengwu Liu, et al. "Concealable physically unclonable function chip with a memristor array." Science Advances 8, no. 24 (June 17, 2022). http://dx.doi.org/10.1126/sciadv.abn7753.

Full text
Abstract:
A physically unclonable function (PUF) is a creditable and lightweight solution to the mistrust in billions of Internet of Things devices. Because of this remarkable importance, PUF need to be immune to multifarious attack means. Making the PUF concealable is considered an effective countermeasure but it is not feasible for existing PUF designs. The bottleneck is finding a reproducible randomness source that supports repeatable concealment and accurate recovery of the PUF data. In this work, we experimentally demonstrate a concealable PUF at the chip level with an integrated memristor array and peripherals. The correlated filamentary switching characteristic of the hafnium oxide (HfO x )-based memristor is used to achieve PUF concealment/recovery with SET/RESET operations efficiently. PUF recovery with a zero-bit error rate and remarkable attack resistance are achieved simultaneously with negligible circuit overhead. This concealable PUF provides a promising opportunity to build memristive hardware systems with effective security in the near future.
APA, Harvard, Vancouver, ISO, and other styles
29

Chuang, Kai-Hsin, Robin Degraeve, Andrea Fantini, Guido Groeseneken, Dimitri Linten, and Ingrid Verbauwhede. "A Cautionary Note When Looking for a Truly Reconfigurable Resistive RAM PUF." IACR Transactions on Cryptographic Hardware and Embedded Systems, February 14, 2018, 98–117. http://dx.doi.org/10.46586/tches.v2018.i1.98-117.

Full text
Abstract:
The reconfigurable physically unclonable function (PUF) is an advanced security hardware primitive, suitable for applications requiring key renewal or similar refresh functions. The Oxygen vacancies-based resistive RAM (RRAM), has been claimed to be a physically reconfigurable PUF due to its intrinsic switching variability. This paper first analyzes and compares various previously published RRAM-based PUFs with a physics-based RRAM model. We next discuss their possible reconfigurability assuming an ideal configuration-to-configuration behavior. The RRAM-to-RRAM variability, which mainly originates from a variable number of unremovable vacancies inside the RRAM filament, however, has been observed to have significant impact on the reconfigurability. We show by quantitative analysis on the clear uniqueness degradation from the ideal situation in all the discussed implementations. Thus we conclude that true reconfigurability with RRAM PUFs might be unachievable due to this physical phenomena.
APA, Harvard, Vancouver, ISO, and other styles
30

Yang, Minye, Liang Zhu, Qi Zhong, Ramy El-Ganainy, and Pai-Yen Chen. "Spectral sensitivity near exceptional points as a resource for hardware encryption." Nature Communications 14, no. 1 (February 28, 2023). http://dx.doi.org/10.1038/s41467-023-36508-x.

Full text
Abstract:
AbstractThe spectral sensitivity near exceptional points (EPs) has been recently explored as an avenue for building sensors with enhanced sensitivity. However, to date, it is not clear whether this class of sensors does indeed outperform traditional sensors in terms of signal-to-noise ratio. In this work, we investigate the spectral sensitivity associated with EPs under a different lens and propose to utilize it as a resource for hardware security. In particular, we introduce a physically unclonable function (PUF) based on analogue electronic circuits that benefit from the drastic eigenvalues bifurcation near a divergent exceptional point to enhance the stochastic entropy caused by inherent parameter fluctuations in electronic components. This in turn results in a perfect entropy source for the generation of encryption keys encoded in analog electrical signals. This lightweight and robust analog-PUF structure may lead to a variety of unforeseen securities and anti-counterfeiting applications in radio-frequency fingerprinting and wireless communications.
APA, Harvard, Vancouver, ISO, and other styles
31

He, Yan, Dai Li, Zhanghao Yu, and Kaiyuan Yang. "ASCH-PUF: A “Zero” Bit Error Rate CMOS Physically Unclonable Function With Dual-Mode Low-Cost Stabilization." IEEE Journal of Solid-State Circuits, 2023, 1–11. http://dx.doi.org/10.1109/jssc.2022.3233373.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Jeong, Jae-Seung, Gyo Sub Lee, Tae-Eon Park, Ki-Young Lee, and Hyunsu Ju. "Bio-inspired electronic fingerprint PUF device with single-walled carbon nanotube network surface mediated by M13 bacteriophage template." Scientific Reports 12, no. 1 (November 22, 2022). http://dx.doi.org/10.1038/s41598-022-24658-9.

Full text
Abstract:
AbstractHuman fingerprints are randomly created during fetal activity in the womb, resulting in unique and physically irreproducible fingerprint patterns that are applicable as a biological cryptographic primitive. Similarly, stochastically knitted single-walled carbon nanotube (SWNT) network surfaces exhibit inherently random and unique electrical characteristics that can be exploited as a physical unclonable function (PUF) in the authentication. In this study, filamentous M13 bacteriophages are used as a biological gluing template to create a random SWNT network surface with mechanical flexibility, with electrical properties determined by random variation during fabrication. The resistance profile between two adjacent electrodes was mapped for these M13-mediated SWNT network surfaces, with the results demonstrating a unique resistance profile for each M13-SWNT device, similar to that of human fingerprints. Randomness and uniqueness measures were evaluated as respectively 50.5% and 50% using generated challenge–response pairs. Min-entropy for unpredictability evaluation of the M13-SWNT based PUFs resulted in 0.98. Our results showed that M13-SWNT random network exhibits cryptographic characteristics when used in a bio-inspired PUF device.
APA, Harvard, Vancouver, ISO, and other styles
33

Sudha, M. N., M. Rajendiran, Mariusz Specht, Kasarla Satish Reddy, and S. Sugumaran. "A low-area design of two-factor authentication using DIES and SBI for IoT security." Journal of Supercomputing, September 3, 2021. http://dx.doi.org/10.1007/s11227-021-04022-w.

Full text
Abstract:
AbstractInternet of things (IoTs) is an integration of heterogeneous physical devices which are interconnected and communicated over the physical Internet. The design of secure, lightweight and an effective authentication protocol is required, because the information is transmitted among the remote user and numerous sensing devices over the IoT network. Recently, two-factor authentication (TFA) scheme is developed for providing the security among the IoT devices. But, the performances of the IoT network are affected due to the less memory storage and restricted resource of the IoT. In this paper, the integration of data inverting encoding scheme (DIES) and substitution-box-based inverter is proposed for providing the security using the random values of one-time alias identity, challenge, server nonce and device nonce. Here, the linearity of produced random values is decreased for each clock cycle based on the switching characteristics of the selection line in DIES. Moreover, the linear feedback shift register is used in the adaptive physically unclonable function (APUF) for generating the random response value. The APUF–DIES-IoT architecture is analyzed in terms of lookup table, flip flops, slices, frequency and delay. This APUF–DIES-IoT architecture is analyzed for different security and authentication performances. Two existing methods are considered to evaluate the APUF–DIES-IoT architecture such as TFA-PUF-IoT and TFA-APUF-IoT. The APUF–DIES-IoT architecture uses 36 flip flops at Virtex 6; it is less when compared to the TFA-PUF-IoT and TFA-APUF-IoT.
APA, Harvard, Vancouver, ISO, and other styles
34

Chaduvula, Siva Chaitanya, Adam Dachowicz, Mikhail J. Atallah, and Jitesh H. Panchal. "Security in Cyber-Enabled Design and Manufacturing: A Survey." Journal of Computing and Information Science in Engineering 18, no. 4 (July 5, 2018). http://dx.doi.org/10.1115/1.4040341.

Full text
Abstract:
Developments in digital technology and manufacturing processes have expanded the horizon of designer innovation in creating products. In addition to this, real-time collaborative platforms help designers shorten the product development cycle by enabling collaborations with domain experts from concept generation to product realization and after-market. These collaborations are extending beyond enterprise and national boundaries, contributing to a growing concern among designers regarding the security of their sensitive information such as intellectual property (IP) and trade secrets. The source of such sensitive information leaks could be external (e.g., hacker) or internal (e.g., disgruntled employee) to the collaboration. From a designer's perspective, this fear can inhibit participation in a collaboration even though it might result in better products or services. In this paper, we aim to contextualize this evolving security space by discussing various security practices in digital domains, such as encryption and secret sharing, as well as manufacturing domains, such as physically unclonable function (PUF) and physical part watermarking for anticounterfeiting and tamper evidence purposes. Further, we classify these practices with respect to their performance against different adversarial models for different stages in product development. Such a classification can help designers to make informed decisions regarding security practices during the product realization process.
APA, Harvard, Vancouver, ISO, and other styles
35

Hameleers, Lisanne, Leena Penttinen, Martina Ikonen, Léa Jaillot, Régis Fauré, Nicolas Terrapon, Peter J. Deuss, Nina Hakulinen, Emma R. Master, and Edita Jurak. "Polysaccharide utilization loci-driven enzyme discovery reveals BD-FAE: a bifunctional feruloyl and acetyl xylan esterase active on complex natural xylans." Biotechnology for Biofuels 14, no. 1 (May 31, 2021). http://dx.doi.org/10.1186/s13068-021-01976-0.

Full text
Abstract:
Abstract Background Nowadays there is a strong trend towards a circular economy using lignocellulosic biowaste for the production of biofuels and other bio-based products. The use of enzymes at several stages of the production process (e.g., saccharification) can offer a sustainable route due to avoidance of harsh chemicals and high temperatures. For novel enzyme discovery, physically linked gene clusters targeting carbohydrate degradation in bacteria, polysaccharide utilization loci (PULs), are recognized ‘treasure troves’ in the era of exponentially growing numbers of sequenced genomes. Results We determined the biochemical properties and structure of a protein of unknown function (PUF) encoded within PULs of metagenomes from beaver droppings and moose rumen enriched on poplar hydrolysate. The corresponding novel bifunctional carbohydrate esterase (CE), now named BD-FAE, displayed feruloyl esterase (FAE) and acetyl esterase activity on simple, synthetic substrates. Whereas acetyl xylan esterase (AcXE) activity was detected on acetylated glucuronoxylan from birchwood, only FAE activity was observed on acetylated and feruloylated xylooligosaccharides from corn fiber. The genomic contexts of 200 homologs of BD-FAE revealed that the 33 closest homologs appear in PULs likely involved in xylan breakdown, while the more distant homologs were found either in alginate-targeting PULs or else outside PUL contexts. Although the BD-FAE structure adopts a typical α/β-hydrolase fold with a catalytic triad (Ser-Asp-His), it is distinct from other biochemically characterized CEs. Conclusions The bifunctional CE, BD-FAE, represents a new candidate for biomass processing given its capacity to remove ferulic acid and acetic acid from natural corn and birchwood xylan substrates, respectively. Its detailed biochemical characterization and solved crystal structure add to the toolbox of enzymes for biomass valorization as well as structural information to inform the classification of new CEs.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography