Skip to main content

Cellular Automata and Arbiter PUF-Based Security Architecture for System-on-Chip Designs

  • Conference paper
  • First Online:
Microelectronics, Electromagnetics and Telecommunications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 521))

  • 955 Accesses

Abstract

The need for security against adversary access to the functionality of the chip has become a prerequisite for almost every product-based company with increasing reports of invasive, semi-invasive, and noninvasive attacks globally. This paper proposes a novel digital design that provides authentication-based access to the functionality of the System on Chip (SoC). Cellular Automata (Rule 45) and Arbiter PUF have been used as key components in order to attain the goal of providing security for system on chip. The design has been simulated with the help of Xilinx Vivado 2016.4v suite, and the detailed structure of the design with a focus on the key components has been illustrated in a lucid manner. Further, the advantages of the architecture detailed in this paper prove its sheer novelty and ability in resisting the adversary access to the functionality of SoC.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wolfram S (1984) Cellular automata as models of complexity. Nature 311:419–424

    Article  Google Scholar 

  2. Wolfram S (1986) Random sequence generation by cellular automata. Adv Appl Math 7(2):123–169

    Article  MathSciNet  Google Scholar 

  3. Herder C, Yu MD, Koushanfar F, Devadas S (2014) Physical unclonable functions and applications: a tutorial. Proc IEEE 102(8):1126–1141

    Article  Google Scholar 

  4. Ray S, Peeters E, Tehranipoor MM, Bhunia S (2018) System-on-chip platform security assurance: architecture and validation. In: Proceedings of the IEEE PP(99), pp 1–17

    Article  Google Scholar 

  5. Gartner Press Release (2017) Gartner says 8.4 billion connected “things” will be in use in 2017, Up 31 percent from 2016, Egham, U.K., Feb 2017. https://www.gartner.com/newsroom/id/3598917

  6. Gil Press (Forbes Contributor) (2017) 6 Hot internet of things (IoT) security technologies, 20 Mar 2017. https://www.forbes.com/sites/gilpress/2017/03/20/6-hot-internet-of-things-iot-security-technologies/#499f87d11b49

  7. Fatima A, Waseem SM (2017) Cellular automata based built-in-self test implementation for star topology NoC. In: 2017 11th international conference on intelligent systems and control (ISCO), Coimbatore, pp 45–48

    Google Scholar 

  8. Waseem SM, Fatima A (2017) Power optimized 7-port router design with BIST capability for 3D NoC architecture. J Electr Electron Eng 10(1):91–94, Oradea

    Google Scholar 

  9. Waseem SM, Fatima A (2017) Cellular automata logic block observer based testing for network on chip architecture. In: Proceedings of the 2nd international conference on intelligent computing and communication, 2–4 Aug 2017, Pune; Bhalla S (ed) Advances in intelligent systems and computing, vol 673, Springer

    Google Scholar 

  10. Gassend B, Clarke D, van Dijk M, Devadas S (2002) Controlled physical random functions. In: 2002 Proceedings of 18th annual computer security applications conference, pp 149–160

    Google Scholar 

  11. Kumar R, Burleson W (2012) PHAP: password based hardware authentication using PUFs. In: 2012 45th annual IEEE/ACM international symposium on microarchitecture workshops, Vancouver, BC, 2012, pp 24–31

    Google Scholar 

  12. Suh GE, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. In:  2007 44th ACM/IEEE design automation conference, San Diego, CA, pp 9–14

    Google Scholar 

  13. Devadas S, Suh E, Paral S, Sowell R, Ziola T, Khandelwal V (2008) Design and implementation of PUF-based “unclonable” RFID ICs for anti-counterfeiting and security applications. In: 2008 IEEE international conference on RFID, Las Vegas, NV, pp 58–64

    Google Scholar 

  14. Frikken KB, Blanton M, Atallah MJ (2009) Robust authentication using physically unclonable functions. In: Samarati P, Yung M, Martinelli F, Ardagna CA (eds) Information security. ISC 2009. Lecture notes in computer science, vol 5735. Springer, Berlin, Heidelberg

    Google Scholar 

  15. Kerr S, Kirkpatrick MS, Bertino E (2010) Pear: a hardware based protocol authentication system. In: Proceedings of the 3rd ACM SIGSPATIAL international workshop on security and privacy in GIS and LBS, ser. SPRINGL’10. ACM New York, NY, USA, pp 18–25

    Google Scholar 

  16. Sargent E, Weston J Authentication using a physically unclonable function. Department of Electrical and Computer Engineering, Utah State University. https://spaces.usu.edu/display/usuece5930hpsec/Home

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shaik Mohammed Waseem .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Waseem, S.M., Fatima, A. (2019). Cellular Automata and Arbiter PUF-Based Security Architecture for System-on-Chip Designs. In: Panda, G., Satapathy, S., Biswal, B., Bansal, R. (eds) Microelectronics, Electromagnetics and Telecommunications. Lecture Notes in Electrical Engineering, vol 521. Springer, Singapore. https://doi.org/10.1007/978-981-13-1906-8_28

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1906-8_28

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1905-1

  • Online ISBN: 978-981-13-1906-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics