2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC) 2017
DOI: 10.1109/aspdac.2017.7858345
|View full text |Cite
|
Sign up to set email alerts
|

VOLtA: Voltage over-scaling based lightweight authentication for IoT applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(26 citation statements)
references
References 8 publications
0
26
0
Order By: Relevance
“…Non-linear APUFs based on Voltage Transfer Characteristics (VTC) [11] and current mirrors [19] have been proposed specifically to thwart such modeling attacks. Software and protocols-based solutions [20,21] have also relatively improved the resistance to ML attack. However, most of these designs have been proven to be vulnerable to advanced and well controlled ML attacks [22].…”
Section: Modeling Attack-resistant Puf Designsmentioning
confidence: 99%
“…Non-linear APUFs based on Voltage Transfer Characteristics (VTC) [11] and current mirrors [19] have been proposed specifically to thwart such modeling attacks. Software and protocols-based solutions [20,21] have also relatively improved the resistance to ML attack. However, most of these designs have been proven to be vulnerable to advanced and well controlled ML attacks [22].…”
Section: Modeling Attack-resistant Puf Designsmentioning
confidence: 99%
“…The LSBs are ignored in approximate computing, but can be used as IP watermarking, digital fingerprinting, or encryption keys. Approximate computing can also be leveraged to implement a lightweight authentication mechanism [20]. The voltage over-scaling (VOS) in [20] lowers the operating voltage to cause a timing error, which contains information of the process variation.…”
Section: Approximate Computingmentioning
confidence: 99%
“…Approximate computing can also be leveraged to implement a lightweight authentication mechanism [20]. The voltage over-scaling (VOS) in [20] lowers the operating voltage to cause a timing error, which contains information of the process variation. This timing error can be profiled to generate a device signature for authentication.…”
Section: Approximate Computingmentioning
confidence: 99%
“…Another interesting example can be found in Reference [ 44 ], where it is proposed the use of a lightweight cryptography protocol based on XOR Operations. Additionally, it is worth mentioning that some of the latest reviews on lightweight authentication protocols for wearables can be found in Reference [ 32 , 45 , 46 ].…”
Section: Related Workmentioning
confidence: 99%