Skip to main content

Light Weight Two-Factor Authentication Using Hybrid PUF and FSM for SOC FPGA

  • Conference paper
  • First Online:
Smart and Innovative Trends in Next Generation Computing Technologies (NGCT 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 828))

Included in the following conference series:

Abstract

SoC FPGA are shrinking is size with advancement in the technologies. Miniaturization alone may not be sufficient to meet user requirements and hence security challenges remain unsolved. Existing approaches have their own limitations in terms of area and power. A model for two factor authentication is proposed with low- power, area and highly automative. It consists of a hybrid Physical unclonable functions (PUFs), which is used to abstract the unique ID of a chip and finite state machine (FSM) to verify that the Intellectual property (IP) is authentic or not. Recent hardware security applications such as IP protection, IC metering, hardware signature and obfuscation are mostly using PUF. Though most of these applications require a database to store the random outputs and complex security algorithms. This in turn increases the area, power, cost and energy consumption. A lightweight hybrid PUF model consisting of arbitrary and butterfly PUF along with the two-level FSM is projected for such security breaches which can be used for many IOT applications. Experimental results show that the area and power consumed is 5% and 9% respectively, for authenticating 26 IP in 13.25 s which is less than that of the conventional design.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Wang, D., et al.: Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans. Dependable Secure Comput. 12(4), 428–442 (2015)

    Google Scholar 

  2. Baklouti, M., et al.: FPGA-based many-core System-on-Chip design. Microprocess. Microsyst. 39(4), 302–312 (2015)

    Article  Google Scholar 

  3. Trimberger, S.M., Moore, J.J.: FPGA security: motivations, features, and applications. Proc. IEEE 102(8), 1248–1265 (2014)

    Article  Google Scholar 

  4. Yan, W., Tehranipoor, F., Chandy, J.A.: A novel way to authenticate untrusted integrated circuits, pp. 89–94 (2014)

    Google Scholar 

  5. Zhang, J., et al.: A PUF-FSM binding scheme for FPGA IP protection and pay-per-device licensing. IEEE Trans. Inf. Forensics Secur. 10(6), 1137–1150 (2015)

    Google Scholar 

  6. Narasimhan, S., Chakraborty, R.S., Chakraborty, S.: Hardware IP protection during evaluation using embedded sequential trojan. IEEE Des. Test Comput. 29(3), 70–79 (2012)

    Google Scholar 

  7. Aysu, A., Schaumont, P.: Hardware/software co-design of physical unclonable function based authentications on FPGAs. Microprocess. Microsyst. 39(7), 589–597 (2015)

    Article  Google Scholar 

  8. Zaker Shahrak, M.: Secure and lightweight hardware authentication using isolated physical unclonable function (2016)

    Google Scholar 

  9. Herder, C., et al.: Physical unclonable functions and applications: a tutorial. Proc. IEEE 102(8), 1126–1141 (2014)

    Google Scholar 

  10. Kumar, S.S., et al.: The butterfly PUF protecting IP on every FPGA. In: IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008. IEEE (2014)

    Google Scholar 

  11. Zhang, J., et al.: Design and implementation of a delay-based PUF for FPGA IP protection. In: 2013 International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics). IEEE (2013)

    Google Scholar 

  12. Kokila, J., Ramasubramanian, N., Indrajeet, S.: A survey of hardware and software co-design issues for system on chip design. In: Choudhary, R.K., Mandal, J.K., Auluck, N., Nagarajaram, H.A. (eds.) Advanced Computing and Communication Technologies. AISC, vol. 452, pp. 41–49. Springer, Singapore (2016). https://doi.org/10.1007/978-981-10-1023-1_4

    Chapter  Google Scholar 

  13. Frikken, K.B., Blanton, M., Atallah, M.J.: Robust authentication using physically unclonable functions. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 262–277. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04474-8_22

    Chapter  Google Scholar 

  14. Lao, Y., et al.: Reliable PUF-based local authentication with self-correction. IEEE Trans. Comput.-Aided Des. Integr. Circ. Syst. 36(2) 201–213 (2017)

    Article  Google Scholar 

  15. Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th Annual Design Automation Conference. ACM (2007)

    Google Scholar 

  16. Shahrak, M., et al.: Two-way real time multimedia stream authentication using physical unclonable functions. In: IEEE 18th International Workshop on Multimedia Signal Processing (MMSP). IEEE (2016)

    Google Scholar 

  17. Johnson, A.P., Chakraborty, R.S., Mukhopadhyay, D.: A PUF-enabled secure architecture for FPGA-based IoT applications. IEEE Trans. Multi-Scale Comput. Syst. 1(2), 110–122 (2015)

    Google Scholar 

  18. Aysu, A., Schaumont, P.: PASC: physically authenticated stable-clocked SoC platform on low-cost FPGAs. In: 2013 International Conference on Reconfigurable Computing and FPGAs (ReConFig). IEEE (2013)

    Google Scholar 

  19. Sutar, S., Raha, A., Raghunathan, V.: D-PUF: an intrinsically reconfigurable DRAM PUF for device authentication in embedded systems. In: 2016 International Conference on Compliers, Architectures, and Sythesis of Embedded Systems (CASES). IEEE (2016)

    Google Scholar 

  20. Wang, X., et al.: IIPS: Infrastructure IP for secure SoC design. IEEE Trans. Comput. 64(8), 2226–2238 (2015)

    Article  MathSciNet  Google Scholar 

  21. Maiti, A., Gunreddy, V., Schaumont, P.: A systematic method to evaluate and compare the performance of physical unclonable functions. In: Athanas, P., Pnevmatikatos, D., Sklavos, N. (eds.) Embedded Systems Design with FPGAs, pp. 245–267. Springer, New York (2013). https://doi.org/10.1007/978-1-4614-1362-2_11

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. Kokila .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kokila, J., Baby Chellam, M., Murali Das, A., Ramasubramanian, N. (2018). Light Weight Two-Factor Authentication Using Hybrid PUF and FSM for SOC FPGA. In: Bhattacharyya, P., Sastry, H., Marriboyina, V., Sharma, R. (eds) Smart and Innovative Trends in Next Generation Computing Technologies. NGCT 2017. Communications in Computer and Information Science, vol 828. Springer, Singapore. https://doi.org/10.1007/978-981-10-8660-1_29

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8660-1_29

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8659-5

  • Online ISBN: 978-981-10-8660-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics