Abstract

As Internet of Things (IoT) devices have evolved, physical unclonable functions (PUFs) have become a popular solution for hardware security. In particular, memristor devices are receiving attention as suitable candidates for reliable PUFs because they can be integrated into nano-cross point array circuits with ultra-high efficiency. However, it has been found that typical 1-bit generating PUFs consume too many challenge–response pairs (CRPs) to generate a single response. This issue has to be overcome to construct a strong and reliable PUF with a large number of valid CRPs. We suggest a bank design and quantizing entropy source method for constructing a multibit-generating PUF. In this paper, we propose a new pulsewidth-based memristive PUF (pm-PUF) architecture that incorporates analog memristor devices and a nano-cross point array. We describe the architecture’s circuit implementation and its operating process in detail. We also evaluate the inter and intra performances of the pm-PUF in terms of randomness, diffuseness, uniqueness, and steadiness to show that the proposed pm-PUF will be a promising solution for a high-density hardware security system.

Highlights

  • As Internet of Things (IoT) applications have rapidly proliferated, connected IoT device designs have trended toward sharing private data during communication; the shared data are not always secure from advanced hacking technology

  • We report on a circuit simulation with HSPICE to demonstrate the unique performance of pm-physical unclonable functions (PUFs) in terms of randomness, diffuseness, uniqueness, and steadiness

  • A pulsewidth-based memristive PUF (pm-PUF) architecture is newly proposed as a promising candidate for a PUF

Read more

Summary

Introduction

As Internet of Things (IoT) applications have rapidly proliferated, connected IoT device designs have trended toward sharing private data during communication; the shared data are not always secure from advanced hacking technology. Hardware security systems have been suggested; one of the solutions is using non-volatile memory (NVM) with its high density, reduced power consumption, and non-volatility. This scheme proves to be vulnerable to invasive physical attacks on systems to reveal their secret information [1]. PUFs utilize inherent physical variations that occur naturally during hardware device manufacturing and that are theoretically impossible to duplicate because some of them are unpredictable and uncontrollable [2]. These variations are the source of entropy that makes the responses unique

Methods
Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call