2015
DOI: 10.1109/tmscs.2015.2494014
|View full text |Cite
|
Sign up to set email alerts
|

A PUF-Enabled Secure Architecture for FPGA-Based IoT Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
4

Relationship

3
6

Authors

Journals

citations
Cited by 70 publications
(35 citation statements)
references
References 20 publications
0
35
0
Order By: Relevance
“…FPGA based security solutions are quite prominent and widely adopted due to reconfigurability. Therefore, light-weight and secure cryptographic algorithms have been implemented on FPGA, and employed for the IoT security [24].…”
Section: Introductionmentioning
confidence: 99%
“…FPGA based security solutions are quite prominent and widely adopted due to reconfigurability. Therefore, light-weight and secure cryptographic algorithms have been implemented on FPGA, and employed for the IoT security [24].…”
Section: Introductionmentioning
confidence: 99%
“…Xilinx Zedboard, All Programmable SoC, were used to do this experiment [16]. Three IP Cores-OLED, s1423 Benchmark IP and a Full Adder IP -were used in this design.…”
Section: Methodsmentioning
confidence: 99%
“…The unit price is lower compared to the normal expensive license fees. An Internet of Things architecture which facilitates run-time modifications to the hardware components is described by Anju P Johnson [16]. This Partially Reconfigurable FPGA architecture is inspired from the principles of hardware sharing and hardware mixing.…”
Section: Review Of Literaturementioning
confidence: 99%
“…To avoid DPR being exploited by attacks, and to permit its advantages to the fullest possible extent, careful protocol design to transfer only trusted DPR bitstreams to the FPGA is needed as well. A security protocol for unrestricted DPR usingPhysical Unclonable Functions (PUFs) for FPGA authentication and bitstream validation is a wise choice [27]. Our future research efforts would be directed towards designing a secure IoT protocol that permits unrestricted DPR to be performed on the system.…”
Section: Countermeasures Against the Proposed Attackmentioning
confidence: 99%