Abstract
The need for security against adversary access to the functionality of the chip has become a prerequisite for almost every product-based company with increasing reports of invasive, semi-invasive, and noninvasive attacks globally. This paper proposes a novel digital design that provides authentication-based access to the functionality of the System on Chip (SoC). Cellular Automata (Rule 45) and Arbiter PUF have been used as key components in order to attain the goal of providing security for system on chip. The design has been simulated with the help of Xilinx Vivado 2016.4v suite, and the detailed structure of the design with a focus on the key components has been illustrated in a lucid manner. Further, the advantages of the architecture detailed in this paper prove its sheer novelty and ability in resisting the adversary access to the functionality of SoC.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wolfram S (1984) Cellular automata as models of complexity. Nature 311:419–424
Wolfram S (1986) Random sequence generation by cellular automata. Adv Appl Math 7(2):123–169
Herder C, Yu MD, Koushanfar F, Devadas S (2014) Physical unclonable functions and applications: a tutorial. Proc IEEE 102(8):1126–1141
Ray S, Peeters E, Tehranipoor MM, Bhunia S (2018) System-on-chip platform security assurance: architecture and validation. In: Proceedings of the IEEE PP(99), pp 1–17
Gartner Press Release (2017) Gartner says 8.4 billion connected “things” will be in use in 2017, Up 31 percent from 2016, Egham, U.K., Feb 2017. https://www.gartner.com/newsroom/id/3598917
Gil Press (Forbes Contributor) (2017) 6 Hot internet of things (IoT) security technologies, 20 Mar 2017. https://www.forbes.com/sites/gilpress/2017/03/20/6-hot-internet-of-things-iot-security-technologies/#499f87d11b49
Fatima A, Waseem SM (2017) Cellular automata based built-in-self test implementation for star topology NoC. In: 2017 11th international conference on intelligent systems and control (ISCO), Coimbatore, pp 45–48
Waseem SM, Fatima A (2017) Power optimized 7-port router design with BIST capability for 3D NoC architecture. J Electr Electron Eng 10(1):91–94, Oradea
Waseem SM, Fatima A (2017) Cellular automata logic block observer based testing for network on chip architecture. In: Proceedings of the 2nd international conference on intelligent computing and communication, 2–4 Aug 2017, Pune; Bhalla S (ed) Advances in intelligent systems and computing, vol 673, Springer
Gassend B, Clarke D, van Dijk M, Devadas S (2002) Controlled physical random functions. In: 2002 Proceedings of 18th annual computer security applications conference, pp 149–160
Kumar R, Burleson W (2012) PHAP: password based hardware authentication using PUFs. In: 2012 45th annual IEEE/ACM international symposium on microarchitecture workshops, Vancouver, BC, 2012, pp 24–31
Suh GE, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. In: 2007 44th ACM/IEEE design automation conference, San Diego, CA, pp 9–14
Devadas S, Suh E, Paral S, Sowell R, Ziola T, Khandelwal V (2008) Design and implementation of PUF-based “unclonable” RFID ICs for anti-counterfeiting and security applications. In: 2008 IEEE international conference on RFID, Las Vegas, NV, pp 58–64
Frikken KB, Blanton M, Atallah MJ (2009) Robust authentication using physically unclonable functions. In: Samarati P, Yung M, Martinelli F, Ardagna CA (eds) Information security. ISC 2009. Lecture notes in computer science, vol 5735. Springer, Berlin, Heidelberg
Kerr S, Kirkpatrick MS, Bertino E (2010) Pear: a hardware based protocol authentication system. In: Proceedings of the 3rd ACM SIGSPATIAL international workshop on security and privacy in GIS and LBS, ser. SPRINGL’10. ACM New York, NY, USA, pp 18–25
Sargent E, Weston J Authentication using a physically unclonable function. Department of Electrical and Computer Engineering, Utah State University. https://spaces.usu.edu/display/usuece5930hpsec/Home
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Waseem, S.M., Fatima, A. (2019). Cellular Automata and Arbiter PUF-Based Security Architecture for System-on-Chip Designs. In: Panda, G., Satapathy, S., Biswal, B., Bansal, R. (eds) Microelectronics, Electromagnetics and Telecommunications. Lecture Notes in Electrical Engineering, vol 521. Springer, Singapore. https://doi.org/10.1007/978-981-13-1906-8_28
Download citation
DOI: https://doi.org/10.1007/978-981-13-1906-8_28
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1905-1
Online ISBN: 978-981-13-1906-8
eBook Packages: EngineeringEngineering (R0)