Explore chapters and articles related to this topic
Hardware-primitive-based blockchain for IoT in fog and edge computing
Published in Muhammad Maaz Rehan, Mubashir Husain Rehmani, Blockchain-enabled Fog and Edge Computing, 2020
Uzair Javaid, Muhammad Naveed Aman, Biplab Sikdar
A physical unclonable function (PUF) is a ‘hardware fingerprint’ that can provide semiconductor devices (such as microprocessors, integrated circuits [ICs], etc.) with unique identities. PUFs are used in place of secret keys or passwords that can be used to assign a hardware fingerprint to IoT devices [14]. They are characterised by and are based on the variations that naturally occur during the manufacturing process of semiconductor devices. This provides a way for differentiating between otherwise identical semiconductor devices. PUFs are generally used in cryptography and for applications with high-security requirements.
BIST for Online Evaluation of PUFs and TRNGs
Published in Mark Tehranipoor, Domenic Forte, Garrett S. Rose, Swarup Bhunia, Security Opportunities in Nano Devices and Emerging Technologies, 2017
Siam U Hussain, Mehrdad Majzoobi, Farinaz Koushanfar
The key idea behind physical unclonable function (PUF) is exploitation of inherent and naturally occurring physical disorder (fingerprint) of the device as its unique signature, for example, silicon manufacturing variations. A PUF is a function whose output (response) depends on both the applied input (challenge) and the unique physical properties of the hardware where it resides. The challenge and response together form one CRP.
A lightweight authentication scheme for telecare medical information system
Published in Connection Science, 2021
Lijun Xiao, Songyou Xie, Dezhi Han, Wei Liang, Jun Guo, Wen-Kuang Chou
With the increasing number of Intellectual Property (IP) cores being digitalised, it is highly required to have in place mechanisms to protect IP (Liang et al., 2020). Physical Unclonable Function (PUF) is a physical entity embodied in a physical structure, a hardware circuit that depends on chip characteristics and profound submicron variations during manufacturing to uniquely characterise each chip (Li et al., 2019; Liang et al., 2019). Because the hardware is easily affected by environmental noise during the manufacturing process, there are many microscopic differences between each hardware. These microscopic differences are difficult to control manually, and will affect the time delay of the signal transmission and vibration frequency in the hardware. PUF uses these microscopic differences in hardware to generate uncloned and unpredictable response information. The mapping function of PUF is similar to the hash function, which can generate unique unpredictable response information for any challenge information (Maurya & Bagchi, 2018). However, because PUF is less expensive to implement than hash functions, it is more suitable for implementation on lightweight devices. At present, PUF technology has been widely used in security fields such as identity authentication, IP circuit protection, key generation, copyright protection and hardware identification (Gao et al., 2017).
Comparative Analysis of Delay-Based and Memory-Based Physical Unclonable Functions
Published in IETE Technical Review, 2022
Priti S. Lokhande, Sangeeta Nakhate
As the Internet of Things (IoT) expands quickly, more and more embedded devices are linked to the internet, exposing them to vulnerabilities and increasing the likelihood of attacks. Embedded systems, however, have limited resources and operate in unprotected environments raising security concern . As a result, embedded devices can be attacked physically and logically through software. A physical attack targets the physical hardware and compromises security by taking advantage of how the system is implemented. Physical attacks are more powerful which can enable an attacker to skip authentication and recover the encryption key. There is a serious security concern when an attacker can simply read out the cryptographic keys stored in memory. Physical Unclonable Function (PUF), a novel cryptographic primitive that circumvents the key storage issue, was developed to address this issue. Instead of keeping keys in memory, it can be generated via physical one-way functions with the aid of PUF [4]. The physically unclonable function, or PUF, can be best described as “an expression of an intrinsic and unclonable instance-specific feature of a physical object” and it bears a striking resemblance to biometric characteristics of people, such as fingerprints. PUF exploits the manufacturing variation resulting from the IC fabrication process to uniquely represent the fingerprint of a device or to generate the device-specific cryptographic key. To be more precise, PUFs exhibit properties that cannot be obtained through cryptographic reductions and instead demand a physical foundation, the most notable of which is physical unclonability. Therefore, it may be inferred from physical logic that it would be exceedingly difficult or impossible to create a physical clone of a PUF.
A review of memristor: material and structure design, device performance, applications and prospects
Published in Science and Technology of Advanced Materials, 2023
Yongyue Xiao, Bei Jiang, Zihao Zhang, Shanwu Ke, Yaoyao Jin, Xin Wen, Cong Ye
With the advent of the era of big data, the security of personal information and hardware is becoming more and more important. The physical unclonable function (PUF) is a promising security primitive that uses the random variations inherent in electronic hardware to generate digital keys [206]. As demonstrated in Figure 10(f), Gao et al. certified a hideable PUF at the chip level by integrating an array of memristors [203]. The switching characteristics of HfOx-based memristors were used to efficiently implement PUF hiding/recovery via SET/RESET operations. A PUF recovery with zero-bit error rate and significant attack resistance was achieved. This hideable feature, coupled with the inherent noise in the memristor array, allowed the PUF to effectively resist both invasive and noninvasive attacks which were the main threats to modern hardware security. As illustrated in Figure 10(g), an attacker executes an attack in a simulated manner by analyzing the correlation between valid PUF data and conductance distribution in secure mode. In contrast, the conductance obtained from the secure mode via microprobes was disordered and had a correlation coefficient of less than 0.4 over 250 cycles. Multilayer fully connected perceptron could be used to perform such attacks on the concealable PUFs, as shown in Figure 10(h), where the trained neural network predicted the accuracy of 70% from the recovered PUF data, which is insufficient for breaking the PUF [203]. Yang et al. demonstrated the subthreshold slope variation of a transistor could be used as the entropy source of a PUF to generate a physical key [207]. By combining this subthreshold slope PUF with a memristor-based XOR logic function, an in situ encryption/decryption scheme in a compact 1T1 R structure was proposed. Experiments demonstrated that the subthreshold slope PUF had good reproducibility, uniqueness and uniformity. Encryption and decryption of three 16-bit binary sequences were successfully implemented in a 1T1 R device using a PUF key of subthreshold slope [207].