Advances in Physical Unclonable Functions Based on New Technologies: A Comprehensive Review
-
Published:2023-12-25
Issue:1
Volume:12
Page:77
-
ISSN:2227-7390
-
Container-title:Mathematics
-
language:en
-
Short-container-title:Mathematics
Author:
Cao Yuan1ORCID, Xu Jianxiang1ORCID, Wu Jichun1, Wu Simeng1, Huang Zhao2ORCID, Zhang Kaizhao1
Affiliation:
1. College of Information Science and Engineering, Hohai University, Changzhou 213200, China 2. Guangzhou Institute of Technology, Xidian University, Guangzhou 510555, China
Abstract
A physical unclonable function (PUF) is a technology designed to safeguard sensitive information and ensure data security. PUFs generate unique responses for each challenge by leveraging random deviations in the physical microstructures of integrated circuits (ICs), making it incredibly difficult to replicate them. However, traditional silicon PUFs are now susceptible to various attacks, such as modeling attacks using conventional machine learning techniques and reverse engineering strategies. As a result, PUFs based on new materials or methods are being developed to enhance their security. However, in the realm of survey papers, it has come to our attention that there is a notable scarcity of comprehensive summaries and introductions concerning these emerging PUFs. To fill this gap, this article surveys PUFs based on novel technologies in the literature. In particular, we first provide an insightful overview of four types of PUFs that are rooted in advanced technologies: bionic optical PUF, biological PUF, PUF based on printed electronics (PE), and PUF based on memristors. Based on the overview, we further discuss the evaluation results of their performance based on specific metrics and conduct a comparative analysis of their performance. Despite significant progress in areas such as limited entry and regional expertise, it is worth noting that these PUFs still have room for improvement. Therefore, we have identified their potential shortcomings and areas that require further development. Moreover, we outline various applications of PUFs and propose our own future prospects for this technology. To sum up, this article contributes to the understanding of PUFs based on novel technologies by providing an in-depth analysis of their characteristics, performance evaluation, and potential improvements. It also sheds light on the wide range of applications for PUFs and presents enticing prospects for future advancements in this field.
Funder
National Natural Science Foundation of China Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province Key Research and Development Program of Jiangsu Province Postdoctoral Science Foundation of Jiangsu Province Guangzhou Municipal Science and Technology Project Fundamental Research Funds for the Central Universities Natural Science Basic Research Program of Shaanxi Changzhou City Key R&D Plan
Subject
General Mathematics,Engineering (miscellaneous),Computer Science (miscellaneous)
Reference59 articles.
1. Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K., and Shieh, S. (2014, January 17–19). IoT security: Ongoing challenges and research opportunities. Proceedings of the 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, Matsue, Japan. 2. Bada, M., and Nurse, J.R. (2020). Emerging Cyber Threats and Cognitive Vulnerabilities, Elsevier. 3. A digital signature scheme secure against adaptive chosen-message attacks;Goldwasser;SIAM J. Comput.,1988 4. Schramm, K., Wollinger, T., and Paar, C. (2003, January 24–26). A new class of collision attacks and its application to DES. Proceedings of the Fast Software Encryption: 10th International Workshop, FSE 2003, Lund, Sweden. 5. Physical one-way functions;Pappu;Science,2002
|
|