2020
DOI: 10.1109/access.2020.3028514
|View full text |Cite
|
Sign up to set email alerts
|

A Highly Reliable Arbiter PUF With Improved Uniqueness in FPGA Implementation Using Bit-Self-Test

Abstract: Physically unclonable functions (PUFs) promise to be a critical hardware primitive for billions of Internet of Things (IoT) devices. The arbiter PUF (A-PUF) is one of the most well-known PUF circuits. However, its FPGA implementation has a poor reliability, and error correction codes (ECCs) are usually needed to eliminate the noise in the responses, which incur additional high hardware overhead and require NVM for helper data storage. In this paper, we present a highly reliable arbiter PUF with improved unique… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 47 publications
(19 citation statements)
references
References 44 publications
0
19
0
Order By: Relevance
“…The proposed protocol is designed based on BST-PUF, which can generate the reliability flag [27], and the PUF model is shown in Figure 2. The PUF can generate a response R and a reliable flag F when the challenge C is input, and F can be used as the reliability of a response to pre-process the original PUF response.…”
Section: Proposed Schemementioning
confidence: 99%
See 3 more Smart Citations
“…The proposed protocol is designed based on BST-PUF, which can generate the reliability flag [27], and the PUF model is shown in Figure 2. The PUF can generate a response R and a reliable flag F when the challenge C is input, and F can be used as the reliability of a response to pre-process the original PUF response.…”
Section: Proposed Schemementioning
confidence: 99%
“…In this paper, an authentication protocol is designed based on BST-PUF [27], and the security authentication can be performed between a cryptographic device with a PUF entity and the server. There is no need to use FE or any ECCs on the device during protocol execution, while pseudorandom functions are used instead of symmetric encryption algorithms, which further reduces the execution overhead of the device.…”
Section: Proposed Authentication Protocolmentioning
confidence: 99%
See 2 more Smart Citations
“…For the PUF, it is required to generate the same response for the same challenge and generate a new response for each challenge. In literature, many architectures of PUFs have been proposed and implemented, such as Ring Oscillator PUF (RO-PUF) [6]- [9], Arbiter PUF [10], [11], Transient Effect Ring Oscillator PUF (TERO-PUF) [12]- [15], and SRAM PUF [16]- [19]. The Arbiter PUF is delaybased.…”
Section: Introductionmentioning
confidence: 99%