2022
DOI: 10.1109/access.2022.3228635
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Efficient XOR Arbiter PUF on FPGA With Enhanced Uniqueness and Security

Abstract: Physically unclonable functions (PUFs) are recently utilized as a promising security solution for authentication and identification of internet of things (IoT) devices. In this article, we present an efficient implementation of XOR Arbiter PUF (XOR APUF) on field-programmable gate arrays (FPGAs). In our work, we incorporated concept of discrete programmable delays logic (PDL) configurations, the obfuscated challenges and temporal majority voting (TMV) before the XOR operation concurrently to enhance uniqueness… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 56 publications
0
1
0
Order By: Relevance
“…PUF is a hardware security primitive that uses device inherent manufacturing imperfections and generates a unique cryptographic identity. Each electronic device has a unique topology due to the manufacturing variations during the fabrication of an Integrated Circuit (IC), which is the building block of a consumer electronic system [33]. As each device has a distinct topology, unique keys can be derived based on its device property variations, such as frequency, delay, or the startup phase of a volatile memory cell.…”
Section: Puf For Sbd Of H-cpsmentioning
confidence: 99%
“…PUF is a hardware security primitive that uses device inherent manufacturing imperfections and generates a unique cryptographic identity. Each electronic device has a unique topology due to the manufacturing variations during the fabrication of an Integrated Circuit (IC), which is the building block of a consumer electronic system [33]. As each device has a distinct topology, unique keys can be derived based on its device property variations, such as frequency, delay, or the startup phase of a volatile memory cell.…”
Section: Puf For Sbd Of H-cpsmentioning
confidence: 99%
“…An adversary can emulate the PUF by constructing a mathematical model with a few CRPs. Various ML modelling attacks, such as covariance matrix adaptation evolution strategies (CMA-ES), logistic regression (LR), Support Vector Machine (SVM), and Artificial Neural Network (ANN) [183] and some other attack models were employed in investigations to identify the issues towards robustness. This ML attack's advantage stems from employing a divide-and-conquer strategy [182].…”
Section: B Physical Unclonable Functions(pufs)mentioning
confidence: 99%
“…By XORing their output into a single answer bit, the XOR arbiter PUF [9] combines many rows of the fundamental arbiter PUFs, as seen in Figure 8. This increases the circuit's defense against modeling attacks [49,50]. The more rows there are, though, the more faults this method adds into the PUF answer.…”
Section: Xor Arbiter Pufmentioning
confidence: 99%