Redirigiendo al acceso original de articulo en 15 segundos...
Inicio  /  Information  /  Vol: 9 Par: 9 (2018)  /  Artículo
ARTÍCULO
TITULO

Reliable Delay Based Algorithm to Boost PUF Security Against Modeling Attacks

Fathi Amsaad    
Mohammed Niamat    
Amer Dawoud and Selcuk Kose    

Resumen

Silicon Physical Unclonable Functions (sPUFs) are one of the security primitives and state-of-the-art topics in hardware-oriented security and trust research. This paper presents an efficient and dynamic ring oscillator PUFs (d-ROPUFs) technique to improve sPUFs security against modeling attacks. In addition to enhancing the Entropy of weak ROPUF design, experimental results show that the proposed d-ROPUF technique allows the generation of larger and updated challenge-response pairs (CRP space) compared with simple ROPUF. Additionally, an innovative hardware-oriented security algorithm, namely, the Optimal Time Delay Algorithm (OTDA), is proposed. It is demonstrated that the OTDA algorithm significantly improves PUF reliability under varying operating conditions. Further, it is shown that the OTDA further efficiently enhances the d-ROPUF capability to generate a considerably large set of reliable secret keys to protect the PUF structure from new cyber-attacks, including machine learning and modeling attacks.

Palabras claves

 Artículos similares

       
 
Falah Y. H. Ahmed, Amal Abulgasim Masli, Bashar Khassawneh, Jabar H. Yousif and Dilovan Asaad Zebari    
Long-Term Evolution (LTE) technology is utilized efficiently for wireless broadband communication for mobile devices. It provides flexible bandwidth and frequency with high speed and peak data rates. Optimizing resource allocation is vital for improving ... ver más
Revista: Computers

 
Yang Bai, Xiaocui Li, Xinfan Wu and Zhangbing Zhou    
With the booming proliferation of user requests in the Internet of Things (IoT) network, Edge Computing (EC) is emerging as a promising paradigm for the provision of flexible and reliable services. Considering the resource constraints of IoT devices, for... ver más
Revista: Applied Sciences

 
Kochupillai Selvaraj Arikumar, Sahaya Beni Prathiba, Shakila Basheer, Rajalakshmi Shenbaga Moorthy, Ankur Dumka and Mamoon Rashid    
Vehicle-to-everything (V2X) in networks is a communication technology that allows vehicles to communicate with their surroundings. Traffic congestion and unawareness of the travel of emergency vehicles (EVs) lead to delays in reaching the destination of ... ver más
Revista: Applied Sciences

 
Nils Morozs, Benjamin Sherlock, Benjamin T. Henson, Jeffrey A. Neasham, Paul D. Mitchell and Yuriy Zakharov    
Underwater acoustic (UWA) network protocol design is a challenging task due to several factors, such as slow propagation of acoustic waves, low frequency bandwidth and high bit error and frame error rates often encountered in real UWA environments. In th... ver más

 
Liang Li, Yiping Li, Yuexing Zhang, Gaopeng Xu, Junbao Zeng and Xisheng Feng    
Effective communication between multiple autonomous underwater vehicles (AUVs) is necessary for formation control. As the most reliable underwater communication method, acoustic communication still has many constraints compared with radio communication, ... ver más