A Novel Security Key Generation Method for SRAM PUF Based on Fourier Analysis

被引:7
|
作者
Liu, Wenchao [1 ,2 ]
Lu, Zhaojun [1 ]
Liu, Hailong [1 ]
Min, Run [1 ]
Zeng, Zhangfan [2 ]
Liu, Zhenglin [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Opt & Elect Informat, Wuhan 430074, Hubei, Peoples R China
[2] Hubei Univ, Sch Comp Sci & Informat Engn, Wuhan 430062, Hubei, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Fourier analysis; key generation; PUF; SRAM;
D O I
10.1109/ACCESS.2018.2868824
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the current security key generation schemes for static random access memory physical unclonable function (SRAM PUF) are based on a fuzzy extractor. However, it is difficult to deploy the fuzzy extractor in resource-constrained systems since the implementation of error correcting codes is complicated and requires huge processing resources. To this end, we propose a novel security key generation method for SRAM PUF based on a Fourier analysis. The SRAM PUF Boolean function is introduced to describe the power-up behavior of an SRAM device, which is followed by its Fourier spectrums. By exploring spectrums of the SRAM device, it is observed that the sign-bits of Fourier coefficients at certain generalized frequency points are randomly distributed and noise resistant. As such, the generalized frequency points as well as the sign-bits are suggested for security key generation in conjunction with a sign-bit encoding algorithm. The proposed method is well compared with the conventional fuzzy extractor. It is highlighted that error correcting code will not be involved in the whole lifecycle. Consequently, the method is suitable for the resource-constrained system applications. The proposed method is performed through couple of real measurements on two different platforms. The experimental results show that 8-kB SRAM cells have sufficient entropy for 128-bit security key generation.
引用
收藏
页码:49576 / 49587
页数:12
相关论文
共 49 条
  • [31] A DWT-Based PHY Key Generation Scheme for the Cross-Layer Security in IoT Networks
    Liu, Fangfang
    Liu, Yueyi
    An, Wei
    Li, Xiaona
    IEEE COMMUNICATIONS LETTERS, 2024, 28 (06) : 1258 - 1262
  • [32] Designing and performance analysis of 7 T CNTFET based novel SRAM cell for IoT application
    Mathur, Neha
    Birla, Shilpi
    ENGINEERING RESEARCH EXPRESS, 2024, 6 (01):
  • [33] Statistical Analysis Based Feature Selection Enhanced RF-PUF With >99.8% Accuracy on Unmodified Commodity Transmitters for IoT Physical Security
    Bari, Md Faizul
    Agrawal, Parv
    Chatterjee, Baibhab
    Sen, Shreyas
    FRONTIERS IN ELECTRONICS, 2022, 3
  • [34] Key generation method from fingerprint image based on deep convolutional neural network model
    Hashem, Mithak Ibrahim
    Kuban, Kadhim Hasen
    NEXO REVISTA CIENTIFICA, 2023, 36 (06): : 906 - 925
  • [35] An Efficient Timing Analysis Model for 6T FinFET SRAM using Current-Based Method
    Cui, Tiansong
    Li, Ji
    Shafaei, Alireza
    Nazarian, Shahin
    Pedram, Massoud
    PROCEEDINGS OF THE SEVENTEENTH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN ISQED 2016, 2016, : 263 - 268
  • [36] A novel blockchain's private key generation mechanism based on facial biometrics and physical unclonable function
    Wang, Yazhou
    Li, Bing
    Zhang, Yan
    Wu, Jiaxin
    Liu, Guozhu
    Li, Yuqi
    Mao, Zhen
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [37] A new biometrics-based key establishment protocol in WBAN: energy efficiency and security robustness analysis
    Sammoud, Amal
    Chalouf, Mohamed Aymen
    Hamdi, Omessaad
    Montavont, Nicolas
    Bouallegue, Ammar
    COMPUTERS & SECURITY, 2020, 96
  • [38] FPGA Based Device Specific Key Generation Method using Physically Uncloanble Functions and Neural Networks
    Pappala, Swetha
    Niamat, Mohammed
    Sun, Weiqing
    2012 IEEE 55TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2012, : 330 - 333
  • [39] A novel class of reconfigurable parallel kinematic manipulators: Concepts and Fourier-based singularity analysis
    Camacho-Arreguin, Josue
    Wang, Mingfeng
    Dong, Xin
    Axinte, Dragos
    MECHANISM AND MACHINE THEORY, 2020, 153
  • [40] Performance Analysis of RSS-AoA-Based Key Generation Scheme for Mobile Wireless Nodes
    Wang, Yida
    Guan, Xinrong
    Yang, Weiwei
    Cai, Yueming
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (10): : 2167 - 2171