首页> 美国卫生研究院文献>Micromachines >STT-DPSA: Digital PUF-Based Secure Authentication Using STT-MRAM for the Internet of Things
【2h】

STT-DPSA: Digital PUF-Based Secure Authentication Using STT-MRAM for the Internet of Things

机译:STT-DPSA:使用STT-MRAM进行物联网的基于数字PUF的安全认证

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Physical unclonable function (PUF), a hardware-efficient approach, has drawn a lot of attention in the security research community for exploiting the inevitable manufacturing variability of integrated circuits (IC) as the unique fingerprint of each IC. However, analog PUF is not robust and resistant to environmental conditions. In this paper, we propose a digital PUF-based secure authentication model using the emergent spin-transfer torque magnetic random-access memory (STT-MRAM) PUF (called STT-DPSA for short). STT-DPSA is an original secure identity authentication architecture for Internet of Things (IoT) devices to devise a computationally lightweight authentication architecture which is not susceptible to environmental conditions. Considering hardware security level or cell area, we alternatively build matrix multiplication or stochastic logic operation for our authentication model. To prove the feasibility of our model, the reliability of our PUF is validated via the working windows between temperature interval (−35 C, 110 C) and Vdd interval [0.95 V, 1.16 V] and STT-DPSA is implemented with parameters = 32, = = 1024, = 8, and = 2 using FPGA design flow. Under this setting of parameters, an attacker needs to take time complexity O( ) to compromise STT-DPSA. We also evaluate STT-DPSA using Synopsys design compiler with TSMC 0.18 um process.
机译:物理不可克隆功能(PUF)是一种硬件有效的方法,在安全性研究领域引起了很多关注,它们利用不可避免的制造可变性(IC)作为每个IC的唯一指纹来利用集成电路(IC)。但是,模拟PUF并不坚固并且不能抵抗环境条件。在本文中,我们提出了一种基于数字PUF的安全认证模型,该模型使用紧急自旋传递扭矩磁性随机存取存储器(STT-MRAM)PUF(简称为STT-DPSA)。 STT-DPSA是用于物联网(IoT)设备的原始安全身份认证架构,旨在设计一种不受环境影响的轻量级认证架构。考虑到硬件安全级别或单元区域,我们可以替代地为我们的身份验证模型构建矩阵乘法或随机逻辑运算。为了证明我们模型的可行性,我们通过温度间隔(−35 C,110 C)和Vdd间隔[0.95 V,1.16 V]之间的工作窗口验证了PUF的可靠性,并使用参数= 32实施了STT-DPSA ,= = 1024,= 8和= 2(使用FPGA设计流程)。在此参数设置下,攻击者需要花费时间复杂度O()才能破坏STT-DPSA。我们还使用台积电0.18 um工艺的Synopsys设计编译器评估了STT-DPSA。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号