Affiliation:
1. Department of Electronics and Communication Engineering, The LNM Institute of Information Technology, Jaipur 302031, India
2. Department of Information and Communication Technology, University of Agder, 4879 Grimstad, Norway
Abstract
Field-programmable gate arrays (FPGAs) have firmly established themselves as dynamic platforms for the implementation of physical unclonable functions (PUFs). Their intrinsic reconfigurability and profound implications for enhancing hardware security make them an invaluable asset in this realm. This groundbreaking study not only dives deep into the universe of FPGA-based PUF designs but also offers a comprehensive overview coupled with a discerning comparative analysis. PUFs are the bedrock of device authentication and key generation and the fortification of secure cryptographic protocols. Unleashing the potential of FPGA technology expands the horizons of PUF integration across diverse hardware systems. We set out to understand the fundamental ideas behind PUF and how crucially important it is to current security paradigms. Different FPGA-based PUF solutions, including static, dynamic, and hybrid systems, are closely examined. Each design paradigm is painstakingly examined to reveal its special qualities, functional nuances, and weaknesses. We closely assess a variety of performance metrics, including those related to distinctiveness, reliability, and resilience against hostile threats. We compare various FPGA-based PUF systems against one another to expose their unique advantages and disadvantages. This study provides system designers and security professionals with the crucial information they need to choose the best PUF design for their particular applications. Our paper provides a comprehensive view of the functionality, security capabilities, and prospective applications of FPGA-based PUF systems. The depth of knowledge gained from this research advances the field of hardware security, enabling security practitioners, researchers, and designers to make wise decisions when deciding on and implementing FPGA-based PUF solutions.
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Software
Reference144 articles.
1. Security, Privacy and Trust in Internet of Things: The Road Ahead;Sicari;Comput. Netw.,2015
2. Radomirovic, S. (2010, January 29). Towards a Model for Security and Privacy in the Internet of Things. Proceedings of the First International Workshop on the Security of the Internet of Things, Tokyo, Japan.
3. Wurm, J., Hoang, K., Arias, O., Sadeghi, A.-R., and Jin, Y. (2016, January 25–28). Security Analysis on Consumer and Industrial IoT Devices. Proceedings of the 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), Macao, China.
4. Shrouf, F., Ordieres, J., and Miragliotta, G. (2014, January 9–12). Smart Factories in Industry 4.0: A Review of the Concept and of Energy Management Approached in Production Based on the Internet of Things Paradigm. Proceedings of the 2014 IEEE International Conference on Industrial Engineering and Engineering Management, Selangor, Malaysia.
5. A Survey on Silicon PUFs;Zerrouki;J. Syst. Archit.,2022
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献