Netinfo Security ›› 2022, Vol. 22 ›› Issue (3): 53-61.doi: 10.3969/j.issn.1671-1122.2022.03.006
Previous Articles Next Articles
LI Li, LI Zequn(), LI Xuemei, SHI Guozhen
Received:
2021-08-12
Online:
2022-03-10
Published:
2022-03-28
Contact:
LI Zequn
E-mail:lizer1996@163.com
CLC Number:
LI Li, LI Zequn, LI Xuemei, SHI Guozhen. FPGA Realization of Physical Unclonable Function Based on Cross-coupling Circuit[J]. Netinfo Security, 2022, 22(3): 53-61.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2022.03.006
[1] | SADEGHI A R, WACHSMANN C, WAIDNER M. Security and Privacy Challenges in Industrial Internet of Things [C]//ACM. 52nd Annual Design Automation Conference, June 7-11 2015, San Francisco, California, USA. New York: ACM, 2015: 1-6. |
[2] | ZHONG Jie, LEI Yanming, ZHENG Li, et al. Usability Availability Evaluation of Chip PUF[J]. Telecommunication Engineering, 2021, 61(4):391-395. |
钟杰, 雷颜铭, 郑力, 等. 芯片物理指纹的可用性评估[J]. 电讯技术, 2021, 61(4):391-395. | |
[3] | DEVADAS S, SUH E, PARAL S, et al. Design and Implementation of PUF-based “Unclonable” RFID ICs for Anti-counterfeiting and Security Applications [C]//IEEE. 2008 IEEE International Conference on RFID, April 16-17, 2008, Las Vegas, NV, USA. New Jersey: IEEE, 2008: 58-64. |
[4] |
LI Sensen, HUANG Yicai, YU Bin, et al. A PUF-based Low Cost Secure Communication Scheme for IoT[J]. Acta Electronica Sinica, 2019, 47(4):812-817.
doi: 10.3969/j.issn.0372-2112.2019.04.007 |
李森森, 黄一才, 郁滨, 等. 基于PUF的低开销物联网安全通信方案[J]. 电子学报, 2019, 47(4):812-817.
doi: 10.3969/j.issn.0372-2112.2019.04.007 |
|
[5] |
MA Chaofang, YE Jing, LI Xiaowei, et al. Adjustable and Configurable Ring Oscillator Physical Unclonable Function[J]. Journal of Computer-aided Design and Computer Graphics, 2021, 33(3):340-345.
doi: 10.3724/SP.J.1089.2021.18561 URL |
麻超方, 叶靖, 李晓维, 等. 可调可重构的环形振荡器物理不可克隆函数[J]. 计算机辅助设计与图形学学报, 2021, 33(3):340-345. | |
[6] |
CHEN Bin, WILLEMS J. Secret Key Generation over Biased Physical Unclonable Functions with Polar Codes[J]. IEEE Internet of Things Journal, 2019, 6(1):435-445.
doi: 10.1109/JIOT.2018.2864594 URL |
[7] |
TEHRANIPOOR F, KARIMIAN N, YAN Wei, et al. DRAM-based Intrinsic Physically Unclonable Functions for System-level Security and Authentication[J]. IEEE Transactions on Very Large Scale Integration Systems, 2017, 25(3):1085-1097.
doi: 10.1109/TVLSI.2016.2606658 URL |
[8] |
AMAN M, TANEJA S, SIKDAR B, et al. Token-based Security for the Internet of Things with Dynamic Energy-quality Tradeoff[J]. IEEE Internet of Things Journal, 2019, 6(2):2843-2859.
doi: 10.1109/JIoT.6488907 URL |
[9] |
PAPPU R, RECHT B, TAYLOR J, et al. Physical One-way Functions[J]. Science, 2002, 297(5589):2026-2030.
doi: 10.1126/science.1074376 URL |
[10] | LOFSTROM K, DAASCH W R, TAYLOR D. IC Identification Circuit Using Device Mismatch[EB/OL]. https://ieeexplore.ieee.org/document/839821, 2002-08-06. |
[11] | GAO Yansong, RANASINGHE D C, AL-SARAWI S F, et al. Emerging Physical Unclonable Functions with Nanotechnology[EB/OL]. https://ieeexplore.ieee.org/document/7420781, 2021-04-11. |
[12] |
GAO Yansong, AL-SARAWI S F, ABBOTT D. Physical Unclonable Functions[J]. Nature Electronics, 2020, 3(2):81-91.
doi: 10.1038/s41928-020-0372-5 URL |
[13] | KHAN S, SHAH A P, CHOUHAN S S, et al. A Symmetric D Flip-flop Based PUF with Improved Uniqueness[EB/OL]. https://www.sciencedirect.com/science/article/abs/pii/S0026271419308005, 2021-04-22. |
[14] | YUAN Xiaodong. D Flip-flop Based Physical Unclonable Functions[D]. Hangzhou: Zhejiang University, 2018. |
袁晓东. 基于D触发器的物理不可克隆函数[D]. 杭州:浙江大学, 2018. | |
[15] | GUAJARDO J, KUMAR S S, SCHRIJEN G J, et al. FPGA Intrinsic PUFs and Their Use for IP Protection[EB/OL]. https://dl.acm.org/doi/10.1007/978-3-540-74735-2_5, 2007-10-10. |
[16] | OROSA L, WANG Yaohua, PUDDU I, et al. Dataplant: Enhancing System Security with Low-cost In-DRAM Value Generation Primitives[EB/OL]. https://arxiv.org/abs/1902.07344v2, 2019-11-05. |
[17] | KUMAR S S, GUAJARDO J, MAES R, et al. Extended Abstract: the Butterfly PUF Protecting IP on Every FPGA [C]//IEEE. 2008 IEEE International Workshop on Hardware-oriented Security and Trust, June 9, 2008, Anaheim, CA, USA. New Jersey: IEEE, 2008: 67-70. |
[18] | ZHANG Peiyong, YUAN Xiaodong, WANG Xuejie, et al. D Flip-flop Based Physical Unclonable Functions[J]. Journal of ZheJiang University(Science Edition), 2019, 46(1):32-38. |
张培勇, 袁晓东, 王雪洁, 等. 基于D触发器的物理不可克隆函数[J]. 浙江大学学报(理学版), 2019, 46(1):32-38. | |
[19] | KHAN S, SHAH A P, GUPTA N, et al. An Ultra-low Power, Reconfigurable, Aging Resilient RO PUF for IoT Applications[EB/OL]. https://www.sciencedirect.com/science/article/abs/pii/S0026269219303593, 2019-10-22. |
[20] |
LIM D, LEE J W, GASSEND B, et al. Extracting Secret Keys from Integrated Circuits[J]. IEEE Transactions on Very Large Scale Integration Systems, 2005, 13(10):1200-1205.
doi: 10.1109/TVLSI.2005.859470 URL |
[21] | NGUYEN P H, SAHOO D P, JIN Chenglu, et al. The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks[EB/OL]. https://www.researchgate.net/publication/346705656, 2019-08-10. |
[22] | LU Lu, KIM T H. A Sequence-dependent Configurable PUF Based on 6T SRAM for Enhanced Challenge Response Space [C]//IEEE. 2019 IEEE International Symposium on Circuits and Systems(ISCAS), May 26-29, Sapporo, Japan. New Jersey: IEEE, 2019: 1-5. |
[23] | YANG Xuan, YE Wenqiang, CUI Xiaole. Design of PUF Based on RRAM Delay Unit[J]. Acta Electronica Sinica, 2020, 48(8):1565-1571. |
杨轩, 叶文强, 崔小乐. 基于RRAM延时单元的PUF设计[J]. 电子学报, 2020, 48(8):1565-1571. | |
[24] | HOU Shen, LI Jinglong, LIU Hailong, et al. Design of Lightweight Configurable Strong Physical non Clonable Function[J]. Journal of Computer-aided Design & Computer Graphics, 2021, 33(10):1627-1634. |
侯申, 李景龙, 刘海龙, 等. 轻量级可配置强物理不可克隆函数设计[J]. 计算机辅助设计与图形学学报, 2021, 33(10):1627-1634. | |
[25] | SANTIAGO L, PATIL V C, PRADO C B, et al. Realizing Strong PUF from Weak PUF via Neural Computing[C]//IEEE. 2017 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems(DFT), October, 23-25, Cambridge, UK. New Jersey: IEEE, 2017: 1-6. |
[26] | HOU Shen, GUO Yang, LI Tun, et al. A Lightweight Strong Physical Unclonable Function Design Based on LFSR[J]. Journal of Graphics, 2020, 41(1):125-131. |
侯申, 郭阳, 李暾, 等. 一种基于线性反馈移位寄存器的轻量级强PUF设计[J]. 图学学报, 2020, 41(1):125-131. | |
[27] | GU Chongyan, CUI Yijun, HANLEY N, et al. Novel Lightweight FF-APUF Design for FPGA [C]//IEEE. 29th IEEE International System-on-Chip Conference(SOCC), September 6-9, 2016, Seattle, WA, USA. New Jersey: IEEE, 2016: 75-80. |
[28] | MAITI A, GUNREDDY V, SCHAUMONT P. A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions[M]. Heidelberg: Springer, 2011. |
[29] | LEE J W, LIM D, GASSEND B, et al. A Technique to Build a Secret Key in Integrated Circuits for Identification and Authentication Applications [C]//IEEE. 2004 Symposium on VLSI Circuits, June 17-19, 2004, Hawaii, USA. New Jersey: IEEE, 2004: 176-179. |
[1] | HU Yi, SHE Kun. Blockchain and Smart Contract Based Dual-Chain Internet of Vehicles System [J]. Netinfo Security, 2022, 22(8): 26-35. |
[2] | YU Kechen, GUO Li, YIN Hongwei, YAN Xuesong. The High-Value Data Sharing Model Based on Blockchain and Game Theory for Data Centers [J]. Netinfo Security, 2022, 22(6): 73-85. |
[3] | SONG Jing, DIAO Run, ZHOU Jie, QI Jianhuai. The Optimization Method of Industrial Control System Functional Safety and Information Security Policy [J]. Netinfo Security, 2022, 22(11): 68-76. |
[4] | MENG Xi. Study on Counter Intelligence Mechanism and Optimization Strategy for Network Information Security [J]. Netinfo Security, 2022, 22(10): 76-81. |
[5] | HU Bowen, ZHOU Chunjie, LIU Lu. Coordination of Functional Safety and Information Security for Intelligent Instrument Based on Fuzzy Multi-objective Decision [J]. Netinfo Security, 2021, 21(7): 10-16. |
[6] | YU Kechen, GUO Li, YAO Mengmeng. Design of Blockchain-based High-value Data Sharing System [J]. Netinfo Security, 2021, 21(11): 75-84. |
[7] | ZHANG Minqing, ZHOU Neng, LIU Mengmeng, KE Yan. Research on Reversible Data Hiding Technology in Homomorphic Encrypted Domain [J]. Netinfo Security, 2020, 20(8): 25-36. |
[8] | WANG Li, LI Erxia, JI Yuchen, LI Xiaoyong. PUF-based Anti-physical Cloning RFID Security Authentication Protocol [J]. Netinfo Security, 2020, 20(8): 89-97. |
[9] | ZHANG Zheng, ZHA Daren, LIU Yanan, FANG Xuming. PUF-based Kerberos Extension Protocol with Formal Analysis [J]. Netinfo Security, 2020, 20(12): 91-97. |
[10] | Yihua ZHOU, Zhuqing LV, Yuguang YANG, Weimin SHI. Data Deposit Management System Based on Blockchain Technology [J]. Netinfo Security, 2019, 19(8): 8-14. |
[11] | Lin LI, Xuxia ZHANG. National Secret Substitution of zk-snark Bilinear Pair [J]. Netinfo Security, 2019, 19(10): 10-15. |
[12] | Yan CHEN, Jianyong GE, Jing LAI, Zhen LU. Security System of the Information System in the Cloud [J]. Netinfo Security, 2018, 18(4): 79-86. |
[13] | Congdong LV, Zhen HAN. A Security Model of Cloud Computing Based on IP Model [J]. Netinfo Security, 2018, 18(11): 27-32. |
[14] | Baoyuan KANG, Jiaqiang WANG, Dongyang SHAO, Chunqing LI. A Secure Authentication and Key Agreement Protocol for Heterogeneous Ad Hoc Wireless Sensor Networks [J]. Netinfo Security, 2018, 18(1): 23-30. |
[15] | Chunhua GU, Yuan GAO, Xiuxia TIAN. Security Optimized RBAC Access Control Model [J]. Netinfo Security, 2017, 17(5): 74-79. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||