TY - GEN
T1 - Physical Unclonable Function Based Hardware Security for Resource Constraint IoT Devices
AU - Ahmed, Muhammed Kawser
AU - Yanambaka, Venkata P.
AU - Abdelgawad, Ahmed
AU - Yelamarthi, Kumar
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/6
Y1 - 2020/6
N2 - The competitive market of Internet of things(IoT) technology pushes the manufacturing companies to limit the resource of IoT devices for low-cost production and open the doors for cyber-attacks and malicious practices which is dangerous for IoT security. Physical Unclonable Function (PUF) based security keys can be used in this instance which exploit the manufacturing variation to generate a unique, volatile and ubiquitous key. In this paper instead of using memory-based PUF, like SRAM or DRAM, a delay-based PUF (Ring Oscillator) was used to increase the security of IoT security. This paper presents an implementation of the physical unclonable function on the Field Programming Gate Array (FPGA) platform. The generated responses from the PUF instance implementation shows 100% reliability and 48.18% uniqueness which are very close to the ideal value and more suitable for securing resource constraint IoT devices. The time needed to generate one single instance key was measured to be 44 msec which plays vital role in some IoT applications.
AB - The competitive market of Internet of things(IoT) technology pushes the manufacturing companies to limit the resource of IoT devices for low-cost production and open the doors for cyber-attacks and malicious practices which is dangerous for IoT security. Physical Unclonable Function (PUF) based security keys can be used in this instance which exploit the manufacturing variation to generate a unique, volatile and ubiquitous key. In this paper instead of using memory-based PUF, like SRAM or DRAM, a delay-based PUF (Ring Oscillator) was used to increase the security of IoT security. This paper presents an implementation of the physical unclonable function on the Field Programming Gate Array (FPGA) platform. The generated responses from the PUF instance implementation shows 100% reliability and 48.18% uniqueness which are very close to the ideal value and more suitable for securing resource constraint IoT devices. The time needed to generate one single instance key was measured to be 44 msec which plays vital role in some IoT applications.
UR - http://www.scopus.com/inward/record.url?scp=85095612419&partnerID=8YFLogxK
U2 - 10.1109/WF-IoT48130.2020.9221357
DO - 10.1109/WF-IoT48130.2020.9221357
M3 - Conference contribution
AN - SCOPUS:85095612419
T3 - IEEE World Forum on Internet of Things, WF-IoT 2020 - Symposium Proceedings
BT - IEEE World Forum on Internet of Things, WF-IoT 2020 - Symposium Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 2 June 2020 through 16 June 2020
ER -