Physical Unclonable Function Based Hardware Security for Resource Constraint IoT Devices

Muhammed Kawser Ahmed, Venkata P. Yanambaka, Ahmed Abdelgawad, Kumar Yelamarthi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

The competitive market of Internet of things(IoT) technology pushes the manufacturing companies to limit the resource of IoT devices for low-cost production and open the doors for cyber-attacks and malicious practices which is dangerous for IoT security. Physical Unclonable Function (PUF) based security keys can be used in this instance which exploit the manufacturing variation to generate a unique, volatile and ubiquitous key. In this paper instead of using memory-based PUF, like SRAM or DRAM, a delay-based PUF (Ring Oscillator) was used to increase the security of IoT security. This paper presents an implementation of the physical unclonable function on the Field Programming Gate Array (FPGA) platform. The generated responses from the PUF instance implementation shows 100% reliability and 48.18% uniqueness which are very close to the ideal value and more suitable for securing resource constraint IoT devices. The time needed to generate one single instance key was measured to be 44 msec which plays vital role in some IoT applications.

Original languageEnglish
Title of host publicationIEEE World Forum on Internet of Things, WF-IoT 2020 - Symposium Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728155036
DOIs
StatePublished - Jun 2020
Event6th IEEE World Forum on Internet of Things, WF-IoT 2020 - New Orleans, United States
Duration: Jun 2 2020Jun 16 2020

Publication series

NameIEEE World Forum on Internet of Things, WF-IoT 2020 - Symposium Proceedings

Conference

Conference6th IEEE World Forum on Internet of Things, WF-IoT 2020
Country/TerritoryUnited States
CityNew Orleans
Period06/2/2006/16/20

Fingerprint

Dive into the research topics of 'Physical Unclonable Function Based Hardware Security for Resource Constraint IoT Devices'. Together they form a unique fingerprint.

Cite this