期刊文献+
共找到24篇文章
< 1 2 >
每页显示 20 50 100
Scalable plasmonic physical unclonable functions empowered by a multi-dimensional expanding strategy
1
作者 Juntao Duan Guoqun Li +7 位作者 Yizhe Xiong Xiangnan Zhu Yan Chen c Wei Liu Xiaochuan Xu Perry Ping Shum Qi Hao Jiawei Wang 《Advanced Photonics Nexus》 2025年第1期20-29,共10页
Confronting the escalating global challenge of counterfeit products,developing advanced anticounterfeiting materials and structures with physical unclonable functions(PUFs)has become imperative.All-optical PUFs,distin... Confronting the escalating global challenge of counterfeit products,developing advanced anticounterfeiting materials and structures with physical unclonable functions(PUFs)has become imperative.All-optical PUFs,distinguished by their high output complexity and expansive response space,offer a promising alternative to conventional electronic counterparts.For practical authentications,the expansion of optical PUF keys usually involves intricate spatial or spectral shaping of excitation light using bulky external apparatus,which largely hinders the applications of optical PUFs.Here,we report a plasmonic PUF system based on heterogeneous nanostructures.The template-assisted shadow deposition technique was employed to adjust the morphological diversity of densely packed metal nanoparticles in individual PUFs.Transmission images were processed via a hash algorithm,and the generated PUF keys with a scalable capacity from 2875 to 243401 exhibit excellent uniqueness,randomness,and reproducibility.Furthermore,the wavelength and the polarization state of the excitation light are harnessed as two distinct expanding strategies,offering the potential for multiscenario applications via a single PUF.Overall,our reported plasmonic PUFs operated with the multidimensional expanding strategy are envisaged to serve as easy-to-integrate,easy-to-use systems and promise efficacy across a broad spectrum of applications,from anticounterfeiting to data encryption and authentication. 展开更多
关键词 physical unclonable function plasmonic array template-assisted deposition scalable capacity multidimensional expanding.
在线阅读 下载PDF
Experimental Realization of Physical Unclonable Function Chip Utilizing Spintronic Memories
2
作者 Xiuye Zhang Chuanpeng Jiang +11 位作者 Jialiang Yin Daoqian Zhu Shiqi Wang Sai Li Zhongxiang Zhang Ao Du Wenlong Cai Hongxi Liu Kewen Shi Kaihua Cao Zhaohao Wang Weisheng Zhao 《Engineering》 2025年第6期141-148,共8页
In recent years,physical unclonable function(PUF)has emerged as a lightweight solution in the Internet of Things security.However,conventional PUFs based on complementary metal oxide semiconductor(CMOS)present challen... In recent years,physical unclonable function(PUF)has emerged as a lightweight solution in the Internet of Things security.However,conventional PUFs based on complementary metal oxide semiconductor(CMOS)present challenges such as insufficient randomness,significant power and area overhead,and vulnerability to environmental factors,leading to reduced reliability.In this study,we realize a strong,highly reliable and reconfigurable PUF with resistance against machine-learning attacks in a 1 kb spinorbit torque magnetic random access memory fabricated using a 180 nm CMOS process.This strong PUF achieves a challenge-response pair capacity of 10^(9) through a computing-in-memory approach.The results demonstrate that the proposed PUF exhibits near-ideal performance metrics:50.07% uniformity,50% diffuseness,49.89% uniqueness,and a bit error rate of 0%,even in a 375 K environment.The reconfigurability of PUF is demonstrated by a reconfigurable Hamming distance of 49.31% and a correlation coefficient of less than 0.2,making it difficult to extract output keys through side-channel analysis.Furthermore,resistance to machine-learning modeling attacks is confirmed by achieving an ideal accuracy prediction of approximately 50% in the test set. 展开更多
关键词 Physical unclonable function Spin-orbit torque magnetic random access memory Computing-in-memory RECONFIGURABILITY Machine-learning attack
在线阅读 下载PDF
Security Enhancement of Arbiter-Based Physical Unclonable Function on FPGA 被引量:1
3
作者 WANG Jun LIU Shubo +1 位作者 XIONG Xingxing LIANG Cai 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第2期127-133,共7页
In order to reduce physical unclonable fixnction (PUF) response instability and imbalance caused by the metastability and the bias of arbiter, this paper uses an improved balanced D flip-plop (DFF) based on the un... In order to reduce physical unclonable fixnction (PUF) response instability and imbalance caused by the metastability and the bias of arbiter, this paper uses an improved balanced D flip-plop (DFF) based on the unbalanced DFF to reduce the bias in response output and enhances the security of PUF by adopting two balanced DFFs in series. The experimental results show that two cascaded balanced DFFs improve the stability of the DFF, and the output of two balanced DFFs is more reliable. The entropy of output is fixed at 98.7%. 展开更多
关键词 physical unclonable function METASTABILITY balanced D flip-flop field programmable gate arrays (FPGA) security
原文传递
Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things 被引量:1
4
作者 Ahmad O.Aseeri Sajjad Hussain Chauhdary +2 位作者 Mohammed Saeed Alkatheiri Mohammed A.Alqarni Yu Zhuang 《Computers, Materials & Continua》 SCIE EI 2023年第4期1901-1918,共18页
IoT devices rely on authentication mechanisms to render secure message exchange.During data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted... IoT devices rely on authentication mechanisms to render secure message exchange.During data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT devices.The application of physical unclonable functions(PUFs)ensures secure data transmission among the internet of things(IoT)devices in a simplified network with an efficient time-stamped agreement.This paper proposes a secure,lightweight,cost-efficient reinforcement machine learning framework(SLCR-MLF)to achieve decentralization and security,thus enabling scalability,data integrity,and optimized processing time in IoT devices.PUF has been integrated into SLCR-MLF to improve the security of the cluster head node in the IoT platform during transmission by providing the authentication service for device-to-device communication.An IoT network gathers information of interest from multiple cluster members selected by the proposed framework.In addition,the software-defined secured(SDS)technique is integrated with SLCR-MLF to improve data integrity and optimize processing time in the IoT platform.Simulation analysis shows that the proposed framework outperforms conventional methods regarding the network’s lifetime,energy,secured data retrieval rate,and performance ratio.By enabling the proposed framework,number of residual nodes is reduced to 16%,energy consumption is reduced by up to 50%,almost 30%improvement in data retrieval rate,and network lifetime is improved by up to 1000 msec. 展开更多
关键词 Cyber-physical systems security data aggregation Internet of Things physical unclonable function swarm intelligences
在线阅读 下载PDF
Lightweight Authentication Protocol Based on Physical Unclonable Function
5
作者 Hanguang Luo Tao Zou +3 位作者 Chunming Wu Dan Li Shunbin Li Chu Chu 《Computers, Materials & Continua》 SCIE EI 2022年第9期5031-5040,共10页
In the emerging Industrial Internet of Things(IIoT),authentication problems have become an urgent issue for massive resource-constrained devices because traditional costly security mechanisms are not suitable for them... In the emerging Industrial Internet of Things(IIoT),authentication problems have become an urgent issue for massive resource-constrained devices because traditional costly security mechanisms are not suitable for them.The security protocol designed for resource-constrained systems should not only be secure but also efficient in terms of usage of energy,storage,and processing.Although recently many lightweight schemes have been proposed,to the best of our knowledge,they are unable to address the problem of privacy preservation with the resistance of Denial of Service(DoS)attacks in a practical way.In this paper,we propose a lightweight authentication protocol based on the Physically Unclonable Function(PUF)to overcome the limitations of existing schemes.The protocol provides an ingenious authentication and synchronization mechanism to solve the contradictions amount forward secrecy,DoS attacks,and resource-constrained.The performance analysis and comparison show that the proposed scheme can better improve the authentication security and efficiency for resource-constrained systems in IIoT. 展开更多
关键词 LIGHTWEIGHT AUTHENTICATION physically unclonable functions
在线阅读 下载PDF
Electrostatic Self-Assembly of Ag-NPs Mediated by Eu^(3+)Complexes for Physically Unclonable Function Labels
6
作者 Yao Kou Yanan Guo +5 位作者 Lijuan Liang Xue Li Yifan Wang Pingru Su Chun-Hua Yan Yu Tang 《Aggregate》 2025年第3期248-261,共14页
Physically unclonable functions(PUFs)are essential for anticounterfeiting.Creating high-stability,multimode,and secure labels remains challenging.Herein,we present a novel self-assembly method for modulating the optic... Physically unclonable functions(PUFs)are essential for anticounterfeiting.Creating high-stability,multimode,and secure labels remains challenging.Herein,we present a novel self-assembly method for modulating the optical signals of rare-earth(RE)complexes via interactions with Ag nanoparticles(Ag-NPs).Initially,we engineered a positively charged Eu^(3+)complex([EuL3]^(3+)),which promotes the self-assembly of negatively charged Ag-NPs to form Eu/Ag-NPs composites.The assembly of Ag-NPs induces a surface plasmon effect that boosts the luminescent quantum yield and Raman signal intensities,and modifies the luminescence lifetime of the[EuL3]^(3+).Crucially,these micron-scale Eu/Ag-NPs can be applied to substrates,facilitating high-resolution signal acquisition and diverse information encoding within limited space.Validation experiments reveal that PUF labels crafted using Eu/Ag-NPs exhibit inherent randomness and uniqueness,along with stable and repeatable signal output.The strategic self-assembly of Ag-NPs,mediated by[EuL3]^(3+),along with the effective modulation of material properties,paves the way for advancing high-resolution,high-information-density solutions in anticounterfeiting technologies. 展开更多
关键词 Ag nanoparticles anticounterfeiting assembly physical unclonable functions rare-earth complexes
在线阅读 下载PDF
Dual-color center diamond for concealable physically unclonable functions
7
作者 Fuhang Jiao Junlu Sun +8 位作者 Chaonan Lin Ying Xiao Zhenfeng Zhang Yuan Deng Haizhong Guo Shunfang Li Lijun Wang Chong-Xin Shan Lin Dong 《Nano Research》 2025年第11期1091-1101,共11页
Physical unclonable functions(PUFs)offer a promising defensive measure against the escalating challenges posed by the increasingly rampant counterfeit products.Conventional PUF materials with a singular physical prope... Physical unclonable functions(PUFs)offer a promising defensive measure against the escalating challenges posed by the increasingly rampant counterfeit products.Conventional PUF materials with a singular physical property encounter limitations in encoding flexibility and capacity.Here,we propose a dual-color center diamond-based PUF(D-PUF)ink that exploits four diverse optical characteristics of dual-color center in diamond to design a concealable multi-level cryptographic authentication protocol.Through simple writing,stamping,or spraying,intricate covert random patterns can be directly generated on the objects,which are imperceptible under visible light.When challenged by a 532 nm laser,the D-PUF exhibits four distinct optical responses,including Raman,zero phonon line(ZPL)of germanium vacancies(GeV),ZPL of silicon vacancies(SiV),and the intensity ratios of these ZPLs.These responses were harvested simultaneously to construct the four-level separate encodable matrices.Furthermore,M-ary encoding algorithms were implemented to encrypt PUFs with flexibility.The resulting multi-level PUF system attains notable uniqueness,repeatability,extensive encoding capacity(>1048164/(100 pixels)2),and ultra-high information entropy(6 bits/pixel).This study inspires designing new generations of multi-level PUFs with enhanced coding flexibility and holds significant promise for applications in print security. 展开更多
关键词 physical unclonable function dual-color center diamond silicon vacancy germanium vacancy anti-counterfeit
原文传递
A lightweight dual authentication scheme for V2V communication in 6G-based vanets
8
作者 Xia Feng Yaru Wang +1 位作者 Kaiping Cui Liangmin Wang 《Digital Communications and Networks》 2025年第4期1224-1235,共12页
The advancement of 6G wireless communication technology has facilitated the integration of Vehicular Ad-hoc Networks(VANETs).However,the messages transmitted over the public channel in the open and dynamic VANETs are ... The advancement of 6G wireless communication technology has facilitated the integration of Vehicular Ad-hoc Networks(VANETs).However,the messages transmitted over the public channel in the open and dynamic VANETs are vulnerable to malicious attacks.Although numerous researchers have proposed authentication schemes to enhance the security of Vehicle-to-Vehicle(V2V)communication,most existing methodologies face two significant challenges:(1)the majority of the schemes are not lightweight enough to support realtime message interaction among vehicles;(2)the sensitive information like identity and position is at risk of being compromised.To tackle these issues,we propose a lightweight dual authentication protocol for V2V communication based on Physical Unclonable Function(PUF).The proposed scheme accomplishes dual authentication between vehicles by the combination of Zero-Knowledge Proof(ZKP)and MASK function.The security analysis proves that our scheme provides both anonymous authentication and information unlinkability.Additionally,the performance analysis demonstrates that the computation overhead of our scheme is approximately reduced 23.4% compared to the state-of-the-art schemes.The practical simulation conducted in a 6G network environment demonstrates the feasibility of 6G-based VANETs and their potential for future advancements. 展开更多
关键词 Vehicular ad-hoc network Identity authentication Physical unclonable function MASK function Zero-knowledge proof 6G wireless communication technology
在线阅读 下载PDF
Techniques for Design and Implementation of an FPGA-Specific Physical Unclonable Function 被引量:8
9
作者 Ji-Liang Zhang Qiang Wu +5 位作者 Yi-Peng Ding Yong-Qiang Lv Qiang Zhou Zhi-Hua Xia Xing-Ming Sun Xing-Wei Wang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2016年第1期124-136,共13页
Physical unclonable function (PUF) makes use of the uncontrollable process variations during the production of IC to generate a unique signature for each IC. It has a wide application in security such as FPGA intell... Physical unclonable function (PUF) makes use of the uncontrollable process variations during the production of IC to generate a unique signature for each IC. It has a wide application in security such as FPGA intellectual property (IP) protection, key generation and digital rights management. Ring oscillator (RO) PUF and Arbiter PUF are the most popular PUFs, but they are not specially designed for FPGA. RO PUF incurs high resource overhead while obtaining less challenge-response pairs, and requires "hard macros" to implement on FPGAs. The arbiter PUF brings low resource overhead, but its structure has big bias when it is mapped on FPGAs. Anderson PUF can address these weaknesses of current Arbiter and RO PUFs implemented on FPGAs. However, it cannot be directly implemented on the new generation 28 nm FPGAs. In order to address these problems, this paper designs and implements a delay-based PUF that uses two LUTs in an SLICEM to implement two 16-bit shift registers of the PUF, 2-to-1 multiplexers in the carry chain to implement the multiplexers of the PUF, and any one of the 8 flip-flops to latch 1-bit PUF signatures. The proposed delay-based PUF is completely realized on 28 nm commercial FPGAs, and the experimental results show its high uniqueness, reliability and reconfigurability. Moreover, we test the impact of aging on it, and the results show that the effect of aging on the proposed PUF is insignificant, with only 6% bit-flips. Finally, the prospects of the proposed PUF in the FPGA binding and volatile key generation are discussed. 展开更多
关键词 physical unclonable function (PUF) FPGA intellectual property protection fabrication variation hardware security
原文传递
Crypto primitive of MOCVD MoS_(2) transistors for highly secured physical unclonable functions 被引量:1
10
作者 Bangjie Shao Tsz Hin Choy +5 位作者 Feichi Zhou Jiewei Chen Cong Wang Yong Ju Park Jong-Hyun Ahn Yang Chai 《Nano Research》 SCIE EI CAS CSCD 2021年第6期1784-1788,共5页
Physically unclonable crypto primitives have potential applications for anti-counterfeiting,identification,and authentication,which are clone proof and resistant to variously physical attack.Conventional physical uncl... Physically unclonable crypto primitives have potential applications for anti-counterfeiting,identification,and authentication,which are clone proof and resistant to variously physical attack.Conventional physical unclonable function(PUF)based on Si complementary metal-oxide-semiconductor(CMOS)technologies greatly suffers from entropy loss and bit instability due to noise sensitivity.Here we grow atomically thick MoS2 thin film and fabricate field-effect transistors(FETs).The inherently physical randomness of MoS2 transistors from materials growth and device fabrication process makes it appropriate for the application of PUF device.We perform electrical characterizations of MoS2 FETs,collect the data from 448 devices,and generate PUF keys by splitting drain current at specific levels to evaluate the response performance.Proper selection of splitting threshold enables to generate binary,ternary,and double binary keys.The generated PUF keys exhibit good randomness and uniqueness,providing a possibility for harvesting highly secured PUF devices with two-dimensional materials. 展开更多
关键词 transition metal DICHALCOGENIDES two-dimensional materials physical unclonable function metal-organic chemical vapor deposition field-effect transistor
原文传递
A new physical unclonable function architecture
11
作者 白创 邹雪城 戴葵 《Journal of Semiconductors》 EI CAS CSCD 2015年第3期121-126,共6页
This paper describes a new silicon physical unclonable function (PUF) architecture that can be fabri- cated on a standard CMOS process. Our proposed architecture is built using process sensors, difference amplifier,... This paper describes a new silicon physical unclonable function (PUF) architecture that can be fabri- cated on a standard CMOS process. Our proposed architecture is built using process sensors, difference amplifier, comparator, voting mechanism and diffusion algorithm circuit. Multiple identical process sensors are fabricated on the same chip. Due to manufacturing process variations, each sensor produces slightly different physical charac- teristic values that can be compared in order to create a digital identification for the chip. The diffusion algorithm circuit ensures further that the PUF based on the proposed architecture is able to effectively identify a population of ICs. We also improve the stability of PUF design with respect to temporary environmental variations like temperature and supply voltage with the introduction of difference amplifier and voting mechanism. The PUF built on the proposed architecture is fabricated in 0.18 μm CMOS technology. Experimental results show that the PUF has a good output statistical characteristic of uniform distribution and a high stability of 98.1% with respect to temperature variation from -40 to 100 ℃, and supply voltage variation from 1.7 to 1.9 V. 展开更多
关键词 physical unclonable functions digital identification process sensors voting mechanism diffusion algorithm
原文传递
A Novel RRAM Based PUF for Anti-Machine Learning Attack and High Reliability 被引量:1
12
作者 DAI Lan YAN Qiangqiang +2 位作者 YI Shengyu LIU Wenkai QIAN He 《Journal of Shanghai Jiaotong university(Science)》 EI 2019年第1期101-106,共6页
Due to the unique response mechanism, physical unclonable function(PUF) has been extensively studied as a hardware security primitive. And compared to other PUFs, the resistive random access memory(RRAM)based PUF has ... Due to the unique response mechanism, physical unclonable function(PUF) has been extensively studied as a hardware security primitive. And compared to other PUFs, the resistive random access memory(RRAM)based PUF has more flexibility with the change of conductive filaments. In this work, we propose an exclusive or(XOR) strong PUF based on the 1 Kbit 1-transistor-1-resistor(1 T1 R) arrays, and unlike the traditional RRAM based strong PUF, the XOR PUF has a stronger anti-machine learning attack ability in our experiments. The reliability of XOR RRAM PUF is determined by the read instability, thermal dependence of RRAM resistance,and aging. We used a split current distribution scheme to make the reliability of XOR PUF significantly improved.After baking for 50 h at a high temperature of 150?C, the intra-chip Hamming distance(Intra-HD) only increased from 0 to 4.5%. The inter-chip Hamming distance(Inter-HD) and uniformity are close to 50%(ideally). And it is proven through the NIST test that XOR PUF has a high uniqueness. 展开更多
关键词 physical unclonable functions resistive random access memory machine learning attack anti-machine learning attack XOR RRAM PUF
原文传递
A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
13
作者 Liquan Chen Jinlong Wang +2 位作者 Bangwei Yin Kunliang Yu Jinguang Han 《China Communications》 SCIE CSCD 2023年第5期198-216,共19页
With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying ... With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying issue that frequent end-edgecloud communication is over a public or adversarycontrolled channel.Additionally,with the presence of resource-constrained devices,it’s imperative to conduct the secure communication mechanism,while still guaranteeing efficiency.Physical unclonable functions(PUF)emerge as promising lightweight security primitives.Thus,we first construct a PUF-based security mechanism for vulnerable IoT devices.Further,a provably secure and PUF-based authentication key agreement scheme is proposed for establishing the secure channel in end-edge-cloud empowered IoT,without requiring pre-loaded master keys.The security of our scheme is rigorously proven through formal security analysis under the random oracle model,and security verification using AVISPA tool.The comprehensive security features are also elaborated.Moreover,the numerical results demonstrate that the proposed scheme outperforms existing related schemes in terms of computational and communication efficiency. 展开更多
关键词 Internet of Things end-edge-cloud orchestration secure communication physical unclonable function authentication key agreement
在线阅读 下载PDF
PUF-Based Key Distribution in Wireless Sensor Networks
14
作者 Zheng Zhang Yanan Liu +3 位作者 Qinyuan Zuo Lein Harn Shuo Qiu Yuan Cheng 《Computers, Materials & Continua》 SCIE EI 2020年第8期1261-1280,共20页
Physical Unclonable Functions(PUFs)can be seen as kind of hardware one-way functions,who are easily fabricated but difficult to clone,duplicate or predict.Therefore,PUFs with unclonable and unpredictable properties ar... Physical Unclonable Functions(PUFs)can be seen as kind of hardware one-way functions,who are easily fabricated but difficult to clone,duplicate or predict.Therefore,PUFs with unclonable and unpredictable properties are welcome to be applied in designing lightweight cryptography protocols.In this paper,a Basic Key Distribution Scheme(Basic-KDS)based on PUFs is firstly proposed.Then,by employing different deployment modes,a Random Deployment Key Distribution Scheme(RD-KDS)and a Grouping Deployment Key Distribution Scheme(GD-KDS)are further proposed based on the Basic-KDS for large scale wireless sensor networks.In our proposals,a sensor is not pre-distributed with any keys but will generate one by the embedded PUF when receiving a challenge from the gateway,which provides perfect resilience against sensor capture attacks.Besides,the unclonable and unpredictable properties of PUF guarantee the key uniqueness and two-way authentication.Analysis and experiment results show that our proposals have better performances in improving the resilience,secure-connectivity,and efficiency as compared to other schemes. 展开更多
关键词 Key distribution physical unclonable functions PUF wireless sensor networks deployment mode
在线阅读 下载PDF
A method to improve PUF reliability in FPGAs
15
作者 Liang Huaguo Li Weidi +1 位作者 Xu Xiumin Wang Haoyu 《Journal of Southeast University(English Edition)》 EI CAS 2018年第1期15-20,共6页
Due to the impact of voltage,temperature and device aging,the traditional ring oscillator-based physical unclonable functions(RO-PUF)suffers from a unreliability issue,i.e.,PUF output is subject to a constant change.T... Due to the impact of voltage,temperature and device aging,the traditional ring oscillator-based physical unclonable functions(RO-PUF)suffers from a unreliability issue,i.e.,PUF output is subject to a constant change.To improve the reliability of the PUF,a stability test scheme related to the PUF mapping unit is proposed.The scheme uses ring oscillators with multiple complexity and various frequencies as sources of interference,which are placed near the PUF prototype circuit to interfere with it.By identifying and discarding unstable slices whichlead to t e instability of PUF,PUF reliability can be effectively improved.Experimental results show that surrounding logic circuits with multiple complexity and multiple frequencies can identify different unstable slices,a d the higher the complexity,t e more unstable slices are detected.Moreover,compared with newly published PUF literature,t e PUF cicuit possesses better statistical characteristic of randomness and lower resource consumption.W it temperatures varying from 0 to 120 t and voltage fluctuating between 0.85 and 1.2 V,its uniqueness and stability can achieve 49.78%a d 98.00%,respectively,which makes it better for use in t e field of security. 展开更多
关键词 field programmable gate aray(FPGA) physical unclonable function(PUF) security ring oscillator(RO) RELIABILITY
在线阅读 下载PDF
DESIGN OF LIGHTWEIGHT PUF CIRCUIT BASED ON SELECTABLE CROSS-COUPLED INVERTERS
16
作者 Zhang Xuelong Li Jianrui +1 位作者 Wang Pengjun Zhang Yuejun 《Journal of Electronics(China)》 2014年第6期513-518,共6页
By analyzing the principle of process variations, a lightweight Physical Unclonable Function (PUF) circuit based on selectable cross-coupled inverters is proposed in this paper. Firstly, selectable cross-coupled inv... By analyzing the principle of process variations, a lightweight Physical Unclonable Function (PUF) circuit based on selectable cross-coupled inverters is proposed in this paper. Firstly, selectable cross-coupled inverters are chosen for two delay paths. Simultaneously, the circuit takes challenge signal to control each delay path. The PUF cell circuit is implemented in Semiconductor Manufacturing International Corporation (SMIC) 65 nm CMOS technology and the layout area is 2.94μm × 1.68μm. Then the 64-bit PUF circuit is achieved with the cascade connection of cell circuits. The simulation results show that the randomness is 49.4% and the reliability is 96.5%. Compared to the other works, this PUF circuit improves the encrypt performance and greatly reduces the area. 展开更多
关键词 LIGHTWEIGHT Physical unclonable Punction (PUF) Cross-coupled inverter Circuit design
在线阅读 下载PDF
保护物联网免受黑客攻击的基础
17
作者 郭正伟 《中国集成电路》 2021年第11期18-23,30,共7页
随着连接到物联网(IoT)的设备数量不断增加,对这些设备的强大安全解决方案的需求持续增加。物联网的安全性绝不应是事后考虑,原因在于产品被破坏会导致高达数千万美元的巨额损失和责任索赔。您可以提前支付安全费用或稍后支付巨额赔偿金... 随着连接到物联网(IoT)的设备数量不断增加,对这些设备的强大安全解决方案的需求持续增加。物联网的安全性绝不应是事后考虑,原因在于产品被破坏会导致高达数千万美元的巨额损失和责任索赔。您可以提前支付安全费用或稍后支付巨额赔偿金,但这永远不会是免费的。本文主要内容:一是阐述了通过查看需要保护的互联设备的最基本资产来解决安全需求:保护数据和对网络上的设备彼此进行身份验证所需的密钥和标识。这些敏感资产是任何安全架构的核心,需要保护其免受攻击者的攻击,以确保设备安全。二是介绍了需要这些资产的场景,从芯片供应商和设备制造商的角度思考,并比较了保护这些重要资产的不同方法。三是除了介绍存储敏感信息的传统方法外,还额外介绍了一种基于物理不可克隆函数(PUF)的方法。它显示了PUF的性能如何优于传统方法,特别是在将物联网有效扩展到数十亿设备的背景下、并从芯片和设备制造商的角度进行了分析。 展开更多
关键词 信任根(Root of Trust) PUF(Physical unclonable Function) SRAMPUF 非易失性存储器(NVM) 根密钥 安全芯片(SE)
在线阅读 下载PDF
Artificial optical microfingerprints for advanced anticounterfeiting
18
作者 Xueke Pang Qiang Zhang +7 位作者 Jingyang Wang Xin Jiang Menglin Wu Mingyue Cui Zhixia Feng Wenxin Xu Bin Song Yao He 《Nano Research》 SCIE EI CSCD 2024年第5期4371-4378,共8页
Artificial optical microfingerprints,known as physically unclonable functions(PUFs)offer a groundbreaking approach for anti-counterfeiting.However,these PUFs artificial optical microfingerprints suffer from a limited ... Artificial optical microfingerprints,known as physically unclonable functions(PUFs)offer a groundbreaking approach for anti-counterfeiting.However,these PUFs artificial optical microfingerprints suffer from a limited number of challenge-response pairs,making them vulnerable to machine learning(ML)attacks when additional error-correcting units are introduced.This study presents a pioneering demonstration of artificial optical microfingerprints that combine the advantages of PUFs,a large encoding capacity algorithm,and reliable deep learning authentication against ML attacks.Our approach utilizes the triple-mode PUFs,incorporating bright-field,multicolor fluorescence wrinkles,and the topography of surface enhanced Raman scattering in the mechanical and optical layers.Notably,the quaternary encoding of these PUFs artificial microfingerprints allows for an encoding capacity of 6.43×10^(24082) and achieves 100%deep learning recognition accuracy.Furthermore,the PUFs artificial optical microfingerprints exhibit high resilience against ML attacks,facilitated by generative adversarial networks(GAN)(with mean prediction accuracy of~85.0%).The results of this study highlight the potential of utilizing up to three PUFs in conjunction with a GAN training system,paving the way for achieving encoded information that remains resilient to ML attacks. 展开更多
关键词 artificial microfingerprints physically unclonable functions deep learning ANTI-COUNTERFEITING
原文传递
Insider Attack Prevention:LAPUP—Lightweight Authentication Protocol Using PUF
19
作者 Siranjeevi Rajamanickam Satyanarayana Vollala N.Ramasubramanian 《Journal of Communications and Information Networks》 EI CSCD 2024年第2期192-206,共15页
The incredible progress in technologies has drastically increased the usage of Web applications.Users share their credentials like userid and password or use their smart cards to get authenticated by the application s... The incredible progress in technologies has drastically increased the usage of Web applications.Users share their credentials like userid and password or use their smart cards to get authenticated by the application servers.Smart cards are handy to use,but they are susceptible to stolen smart card attacks and few other notable security attacks.Users prefer to use Web applications that guarantee for security against several security attacks,especially insider attacks,which is crucial.Cryptanalysis of several existing schemes prove the security pitfalls of the protocols from preventing security attacks,specifically insider attacks.This paper introduces LAPUP:a novel lightweight authentication protocol using physically unclonable function(PUF)to prevent security attacks,principally insider attacks.The PUFs are used to generate the security keys,challenge-response pair(CRP)and hardware signature for designing the LAPUP.The transmitted messages are shared as hash values and encrypted by the keys generated by PUF.These messages are devoid of all possible attacks executed by any attacker,including insider attacks.LAPUP is also free from stolen verifier attacks,as the databases are secured by using the hardware signature generated by PUFs.Security analysis of the protocol exhibits the strength of LAPUP in preventing insider attacks and its resistance against several other security attacks.The evaluation results of the communication and computation costs of LAPUP clearly shows that it achieves better performance than existing protocols,despite providing enhanced security. 展开更多
关键词 physically unclonable function(PUF) insiderattacks authenticationkeymanagementserver(AKMS) SECURITY
原文传递
Authentication through residual attention-based processing of tampered optical responses
20
作者 Blake Wilson Yuheng Chen +6 位作者 Daksh Kumar Singh Rohan Ojha Jaxon Pottle Michael Bezick Alexandra Boltasseva Vladimir M.Shalaev Alexander V.Kildishev 《Advanced Photonics》 CSCD 2024年第5期41-50,共10页
The global chip industry is grappling with dual challenges:a profound shortage of new chips and a surge of counterfeit chips valued at$75 billion,introducing substantial risks of malfunction and unwanted surveillance.... The global chip industry is grappling with dual challenges:a profound shortage of new chips and a surge of counterfeit chips valued at$75 billion,introducing substantial risks of malfunction and unwanted surveillance.To counteract this,we propose an optical anti-counterfeiting detection method for semiconductor devices that is robust under adversarial tampering features,such as malicious package abrasions,compromised thermal treatment,and adversarial tearing.Our new deep-learning approach uses a RAPTOR(residual,attention-based processing of tampered optical response)discriminator,showing the capability of identifying adversarial tampering to an optical,physical unclonable function based on randomly patterned arrays of gold nanoparticles.Using semantic segmentation and labeled clustering,we efficiently extract the positions and radii of the gold nanoparticles in the random patterns from 1000 dark-field images in just 27 ms and verify the authenticity of each pattern using RAPTOR in 80 ms with 97.6%accuracy under difficult adversarial tampering conditions.We demonstrate that RAPTOR outperforms the state-ofthe-art Hausdorff,Procrustes,and average Hausdorff distance metrics,achieving a 40.6%,37.3%,and 6.4%total accuracy increase,respectively. 展开更多
关键词 machine learning PLASMONICS physical unclonable function ANTI-COUNTERFEITING tampering detection
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部