2018
DOI: 10.3390/s18020322
|View full text |Cite
|
Sign up to set email alerts
|

A Compact and Low Power RO PUF with High Resilience to the EM Side-Channel Attack and the SVM Modelling Attack of Wireless Sensor Networks

Abstract: Authentication is a crucial security service for the wireless sensor networks (WSNs) in versatile domains. The deployment of WSN devices in the untrusted open environment and the resource-constrained nature make the on-chip authentication an open challenge. The strong physical unclonable function (PUF) came in handy as light-weight authentication security primitive. In this paper, we present the first ring oscillator (RO) based strong physical unclonable function (PUF) with high resilience to both the electrom… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 20 publications
0
12
0
Order By: Relevance
“…Therefore, there is a research on the physical unclonable function (PUF) as a light-weight authentication security primitive. For example, side-channel resistant PUF was intensively studied in [28].…”
Section: Side Channel Analysis and Related Workmentioning
confidence: 99%
“…Therefore, there is a research on the physical unclonable function (PUF) as a light-weight authentication security primitive. For example, side-channel resistant PUF was intensively studied in [28].…”
Section: Side Channel Analysis and Related Workmentioning
confidence: 99%
“…Another proposed strategy is to obscure or mask the challenge to the PUF, for example by using a rotating shift register tied to a second, obscured, clock as in [23]. These methods are of particular interest as they use only standard components and thus are implementable on FPGA.…”
Section: B Building ML Resistant Pufsmentioning
confidence: 99%
“…High uniqueness is also desirable as low uniqueness will make it easier for the mask to be modeled. In order to be preferable to other methods of input masking such as shown by Cao et al [23] the masking PUFs must use a minimum amount of resources and ideally require no post processing.…”
Section: B a Mathematical Model Of Cro Pufsmentioning
confidence: 99%
“…There are various works related with PUFs, including delay-based PUF [1, [6][7][8][9], and memory-based PUF [10,11] over the past decade. Please refer to [6] for a comprehensive overview on PUFs.…”
Section: Introductionmentioning
confidence: 99%