z-logo
open-access-imgOpen Access
Secure lightweight obfuscated delay-based physical unclonable function design on FPGA
Author(s) -
Mohammad Haziq Bin Ishak,
Mohd Syafiq Mispan,
Yan Chiew Wong,
Muhammad Raihaan Kamaruddin,
Mikhail Aleksandrovich Korobkov
Publication year - 2022
Publication title -
bulletin of electrical engineering and informatics
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.251
H-Index - 12
ISSN - 2302-9285
DOI - 10.11591/eei.v11i2.3265
Subject(s) - physical unclonable function , arbiter , field programmable gate array , computer science , embedded system , spoofing attack , obfuscation , reliability (semiconductor) , routing (electronic design automation) , bitstream , computer hardware , computer network , computer security , algorithm , decoding methods , power (physics) , physics , quantum mechanics
The internet of things (IoT) describes the network of physical objects equipped with sensors and other technologies to exchange data with other devices over the Internet. Due to its inherent flexibility, field-programmable gate array (FPGA) has become a viable platform for IoT development. However, various security threats such as FPGA bitstream cloning and intellectual property (IP) piracy have become a major concern for this device. Physical unclonable function (PUF) is a promising hardware fingerprinting technology to solve the above problems. Several PUFs have been proposed, including the implementation of reconfigurable-XOR PUF (R-XOR PUF) and multi-PUF (MPUF) on the FPGA. However, these proposed PUFs have drawbacks, such as high delay imbalances caused by routing constraints. Therefore, in this study, we explore relative placement method to implement the symmetric routing in the obfuscated delay-based PUF on the FPGA board. The delay analysis result proves that our method to implement the symmetric routing was successful. Therefore, our work has achieved good PUF quality with uniqueness of 48.75%, reliability of 99.99%, and uniformity of 52.5%. Moreover, by using the obfuscation method, which is an Arbiter-PUF combined with a random challenge permutation technique, we reduced the vulnerability of Arbiter-PUF against machine learning attacks to 44.50%.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here