2020
DOI: 10.3390/mi11050502
|View full text |Cite
|
Sign up to set email alerts
|

STT-DPSA: Digital PUF-Based Secure Authentication Using STT-MRAM for the Internet of Things

Abstract: Physical unclonable function (PUF), a hardware-efficient approach, has drawn a lot of attention in the security research community for exploiting the inevitable manufacturing variability of integrated circuits (IC) as the unique fingerprint of each IC. However, analog PUF is not robust and resistant to environmental conditions. In this paper, we propose a digital PUF-based secure authentication model using the emergent spin-transfer torque magnetic random-access memory (STT-MRAM) PUF (called STT-DPSA for short… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 33 publications
0
4
0
Order By: Relevance
“…Apart from the smart system design and development, the requirements for information security and privacy are high, including anticounterfeiting and system reliability, in order to prevent the collapse of IoT systems and eliminate the system vulnerability. Thus, building an effective authentication protocol for IoT terminal identity information has become the key issue of current research (Trnka et al, 2018;Liang et al, 2019;Chien et al, 2020;Shuai et al, 2021). With the increasing number of terminals, wireless communication networks are facing great pressure on system security and privacy.…”
Section: Figure 1 Relationship Between Product Identification Verification and Authenticationmentioning
confidence: 99%
“…Apart from the smart system design and development, the requirements for information security and privacy are high, including anticounterfeiting and system reliability, in order to prevent the collapse of IoT systems and eliminate the system vulnerability. Thus, building an effective authentication protocol for IoT terminal identity information has become the key issue of current research (Trnka et al, 2018;Liang et al, 2019;Chien et al, 2020;Shuai et al, 2021). With the increasing number of terminals, wireless communication networks are facing great pressure on system security and privacy.…”
Section: Figure 1 Relationship Between Product Identification Verification and Authenticationmentioning
confidence: 99%
“…• Silicon: These rely on the uncontrollable differences in manufacturing between devices and do not require extra components outside of an FPGA. This category can further be broken up into delay-based PUFs, such as Arbiter PUFs [19,20] and RO PUFs [21][22][23][24], and memory-based PUFs, which utilize the entropy from volatile memory cells [25,26]. • Non-silicon: These PUFs are constructed using peripherals besides FPGA silicon for sources of entropy.…”
Section: Physically Unclonable Functionsmentioning
confidence: 99%
“…For example, the advanced encryption standard (AES) is not appropriate for resource-constrained applications, because of its deficiency in area and energy/power [19]. Subsequently, the physically unclonable function (PUF) circuit is developed as capable hardware security technique for low-overhead security applications, since the working principle of PUF is mainly based on the variation effects of nano-scale device-level process [20]. Moreover, the data is protected using the data flipping in Bose-Chaudhuri-Hocquenghem codes [21].…”
Section: Introductionmentioning
confidence: 99%