0% found this document useful (0 votes)
26 views5 pages

Final Paper PUF 2 Repaireddocx-2024-11!04!15-20

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views5 pages

Final Paper PUF 2 Repaireddocx-2024-11!04!15-20

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

“DESIGN AND IMPLEMENTATION OF A RING OSCILLATOR-BASED PUF

FOR

ENHANCED IOT SECURITY”


Tejaswini Surwade, Mrunal Hampi and Varsha Bendre1
1
Department of Electronics and Telecommunication Engineering, Pimpri Chinchwad College of Engineering, Pune, India

Abstract Maintaining Op- erational Integrity, Ensuring Safety, Safeguarding


The increasing craze of the Internet of Things (IoT) has emphasized Intellectual Prop-
the critical need for Strong security mechanisms to protect sensitive
data and ensure the integrity of IoT devices. Physically Unclonable
Functions (PUFs) have emerged as a promising solution to improve
hardware secu- rity by manipulating intrinsic manufacturing
dissimilarities to generate unique and unpredictable responses to the
respective input challenges. This paper presents the design and
implementation of a PUF based on ring oscillators (ROs) customized
for IoT security applications. The pro- posed PUF architecture follows
four main steps. In the first stage, a Ring Oscillator is designed, which
consists of an odd number of not gates ar- ranged in a loop. In the
Second stage, an Array of identical ring oscil- lators is implemented.
The third stage consists of two 8:1 MUXs that are used to dynamically
select two-ring oscillator outputs based on the chal- lenge inputs. In the
last or fourth stage, the output of MUXs is fed into a comparator. Early
results demonstrate the successful operation of the ring oscillators and
MUX selection stages. However, the comparator output is pending due
to the need for further optimization of oscillator delays to ensure
distinct frequency variations. The last stage aims to ex- ploit these
frequency differences to produce a reliable and secure PUF output.
This PUF design provides a robust solution for secure key gener- ation
and authentication in IoT devices, leveraging natural manufactur- ing
variability to enhance security. Future work will focus on refining the
delay characteristics of the ring oscillators and validating the PUF’s
per- formance under various environmental conditions, aiming to
strengthen the security of IoT systems.

1. INTRODUCTION

The ever-increasing demand for Mobile, Embedded devices,


and the Internet of Things (IoT) has underscored the need for
robust security mechanisms to provide security to sensitive data
and main- tain the integrity of IOT devices. The security involved
Data Privacy and Protection, Preventing Unauthorized Access,
1
erty, Maintaining Consumer Trust, and Preventing Economic
Loss. Along with all the issues one of the big issues that must be
encoun- tered is Electronic counterfeiting and reverse engineering
which are significant concerns in the electronic industry, where
counterfeiting involves the unauthorized reproduction or
substitution of genuine electronic components with fake or
inferior ones and reverse engi- neering involve disassembling and
analyzing components and sys- tems to understand the design and
functionality of the product. Par- ticularly in regions like China
where these practices are prevalent which can pose serious
challenges to the electronic industry like significant intellectual
property(IP) losses, a market flooded with chips, cloned products
and undercut legal products. So to mitigate the risk associated
with these illicit practices there is a need to have robust
mechanisms. Physically Unclonable Functions(PUFs) offer a
robust solution to combat counterfeiting and ensure the integrity
of the hardware devices. Physically Unclonable Functions are the
unique, Inherent characteristics of the semiconductor devices that
can be used to generate unique identifiers. PUFs are embedded
into the hardware devices during the manufacturing process. Each
PUF is unique due to the inherent variations in the
semiconductor’s man- ufacturing process. PUF operation is based
on a challenge response mechanism, where is challenge is sent to
the PUF and it generates a unique response based on its physical
characteristics. PUF makes use of manufacturing process
variations in a die to generate exclu- sive signatures out of a chip.
This enables chip authentication and cryptographic key
generation. PUF properties are bound to the un- derlying
hardware. It can be easily evaluated by authorized parties within
the device only. The responses are not easily predictable by an
adversary. It is tamper-evident and has a resistance to physi- cal
attacks[1]. Different types of PUF designs have been proposed as
lightweight hardware-based security solutions for IoT applica-
tions, detection of physical attacks, i.e. physical tampering and
re-

2
verse engineering, and hardware Trojan attacks [2].In the context Saeed Aghapour et al., [4] the enhancement of security and per-
of PUFs, they are generally classified into two main categories:
strong PUFs and weak PUFs[3], While those PUFs with a limited
num- ber of Challenge-Response Pairs(CRPs) are categorized as
weak PUFs, like RO-PUFs. Furthermore, RO-PUF has
demonstrated ex- ceptional suitability for implementation in both
FPGAs and ASICs. This is due to the RO PUF’s ability to offer a
simple fabrication process and exceptional security advantages.
However, Weak PUFs offer better stability and unique response
characteristics compared to the existing strong PUF design.

2. LITERATURE REVIEW:
N. Sivasankari et al.,[1] proposed a hybrid ring oscillator struc-
ture for enhancing uniqueness and reliability. The experiments
were conducted on Xilinx FPGAs with a certain challenging set
and
Produce unique responses only for the concerned chip. In the
ex- perimental analysis, the proposed design increases the circuit
com- plexity, but the power consumption seems to be the same as
the traditional designs.
Husam Kareem et al.,[2] introduce a configurable inversion unit
designed to construct a lightweight, robust architecture configurable
(RAC) RO-PUF. The proposed unit comprises an XOR gate, an
XNOR gate, and a multiplexer. The RACRO-PUF significantly
in- creases the size of generated output bits while efficiently
utilizing minimal hardware resources. The performance of the
RACRO-PUF stands out in evaluations, recording a uniqueness of
49.78 %, uni- formity of 49.42 %, reliability of 97.72 %, and
impressive random- ness of 98.34 %.
Alireza Shamsoshoara et al.,[3] categorized PUFs based on
their applications as 1) low-cost authentication and 2) secure key
gener- ation are two main applications for PUFs. Based on these,
“Strong PUF” and “Weak PUF” are delineated. In most scenarios,
strong PUFs are utilized for authentication, and weak PUFs are
employed for key storage. PUFs can be shaped as a black-box
challenge- response system. It means that, similar to a function,
there is an input for the PUF which is called challenge c and based
on the function f(c), response r will be calculated. In this black
box, f() explains the relationship between challenge and response.
The do- main of f() and the number of challenges each PUF can
process are the leading differences between strong and weak
PUFs.
3
formance of Crystals-cyber algorithm, by including PUFs, and
ran- dom number generators. PUFs generate the response by
collecting the variations due to manufacturing defects, this
creates a device- specific response. The true Random Number
generator generates noise from physical proceeds, like thermal
noise. Both PUFs and TRNGs are integrated to derive a
cryptographic key, to ensure ran- domness and security.

Mona Alkanhal et al.,[5] Circuits have some imperfections dur-


ing manufacturing these are used as an advantage in PUF which
makes a unique fingerprint of each device. In this paper arbiter
PUF is used to consider variation in propagation delay. Since ev-
ery device cannot have the same propagation delay, the value of
the challenge will be different for each device. The system: Con-
sists of roadside unit and vehicles. In the MIMO technology, the
challenge bit is divided into segments, this segmentation is based
on the number of antennas and node IDs. Each vehicle consists of
multiple antennas, the roadside unit deactivates one of the
antennae and activates others according to the pattern.

Sungjin Yu et al.,[6] V to G is a system where the EVs


commu- nicate with the power grid to return the electricity to the
grid or to reduce the charging rates. In the initial phase, a private
master key is selected by the Utility Service Provider, and a secure
hash function is chosen. The next phase is user registration: The
user creates their biometric data and password The hash values of
the biometric data and password are created. The user sends the
registration request to USP. This information is encrypted. The
USP(utility service provider) generates unique credentials.
During the charging pro- cess, UPS generates secure parameters
for charging stations. PUFs are used to generate unique session
keys.

Elena R. Henderson et al.,[7], have designed a Photonic Physi-


cally Unclonable Function having

4
Edit this article on Typeset

www.typeset.io Looking for a Discount?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy