Journal of Computer Applications ›› 2024, Vol. 44 ›› Issue (7): 2116-2122.DOI: 10.11772/j.issn.1001-9081.2023070936
• Cyber security • Previous Articles Next Articles
Shiyang LI, Shaojie NI, Ding DENG(), Lei CHEN, Honglei LIN
Received:
2023-07-14
Revised:
2023-09-12
Accepted:
2023-09-20
Online:
2023-10-26
Published:
2024-07-10
Contact:
Ding DENG
About author:
LI Shiyang, born in 1998, M. S. candidate. His research interests include hardware security.Supported by:
通讯作者:
邓丁
作者简介:
李诗扬(1998—),男,辽宁丹东人,硕士研究生,主要研究方向:硬件安全;基金资助:
CLC Number:
Shiyang LI, Shaojie NI, Ding DENG, Lei CHEN, Honglei LIN. Reliability enhancement algorithm for physical unclonable function based on non-orthogonal discrete transform[J]. Journal of Computer Applications, 2024, 44(7): 2116-2122.
李诗扬, 倪少杰, 邓丁, 陈雷, 林红磊. 基于非正交离散变换的物理不可克隆函数可靠性提升算法[J]. 《计算机应用》唯一官方网站, 2024, 44(7): 2116-2122.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2023070936
不稳定位个数 | 0 | 1 | 2 | 3 |
---|---|---|---|---|
概率/% | 56.35 | 34.25 | 8.37 | 1.03 |
Tab. 1 Probability distribution of unstable bits after pre-screening
不稳定位个数 | 0 | 1 | 2 | 3 |
---|---|---|---|---|
概率/% | 56.35 | 34.25 | 8.37 | 1.03 |
对比算法 | 原生可靠性/% | 处理后平均可靠性/% | 可靠性提升方案 | 掩码掩蔽率/% | 通用性 | 唯一性/% |
---|---|---|---|---|---|---|
本文算法 | 96.07 | 99.97 | 掩码、分类编解码 | 13.00 | 所有PUF | 49.92 |
JSSC 23[ | 96.80 | 100.00 | 掩码、新型PUF结构、检测与恢复算法 | 33.00 | 创新结构 | 49.95 |
Electronics 22[ | 90.00 | 100.00 | 卷积滤波 | — | SRAM PUF | 50.50 |
ISSCC 20[ | 91.38 | 99.91 | 掩码、空间多数表决、纠错码 | 25.00 | 创新结构 | 49.78 |
JSSC 22[ | 97.30 | 100.00 | 掩码、时间多数表决 | 3.64 | 创新结构 | 49.63 |
Tab. 2 Comparison of proposed algorithm with other reliability improvement schemes
对比算法 | 原生可靠性/% | 处理后平均可靠性/% | 可靠性提升方案 | 掩码掩蔽率/% | 通用性 | 唯一性/% |
---|---|---|---|---|---|---|
本文算法 | 96.07 | 99.97 | 掩码、分类编解码 | 13.00 | 所有PUF | 49.92 |
JSSC 23[ | 96.80 | 100.00 | 掩码、新型PUF结构、检测与恢复算法 | 33.00 | 创新结构 | 49.95 |
Electronics 22[ | 90.00 | 100.00 | 卷积滤波 | — | SRAM PUF | 50.50 |
ISSCC 20[ | 91.38 | 99.91 | 掩码、空间多数表决、纠错码 | 25.00 | 创新结构 | 49.78 |
JSSC 22[ | 97.30 | 100.00 | 掩码、时间多数表决 | 3.64 | 创新结构 | 49.63 |
1 | SUZUKI D, SHIMIZU K. The glitch PUF: a new delay-PUF architecture exploiting glitch shapes [C]// Proceedings of the 12th International Conference on Cryptographic Hardware and Embedded Systems. Berlin: Springer, 2010: 366-382. |
2 | SU Z, LI B, ZHANG W, et al. Reliability improvement on SRAM physical unclonable function (PUF) using an 8T cell in 28 nm FDSOI [J]. IEEE Transactions on Nuclear Science, 2022, 69(3): 333-339. |
3 | LI D, YANG K. A self-regulated and reconfigurable CMOS physically unclonable function featuring zero-overhead stabilization [J]. IEEE Journal of Solid-State Circuits, 2020, 55(1): 98-107. |
4 | L-Y CHIOU, HUANG J-Y, LI C-K, et al. A reliable near-threshold voltage SRAM-based PUF utilizing weight detection technique [C]// Proceedings of the 2021 International Symposium on VLSI Design, Automation and Test. Piscataway: IEEE, 2021: 1-4. |
5 | CATTANEO L, BALDO M, LEPRI N, et al. Enhancing reliability of a strong Physical Unclonable Function (PUF) solution based on virgin-state Phase Change Memory (PCM) [C]// Proceedings of the 2023 IEEE International Reliability Physics Symposium. Piscataway: IEEE, 2023: 1-6. |
6 | RIZK D, RIZK R, RIZK F, et al. An economic uniqueness-improved reliable reconfigurable RO PUF for IoT security [C]// Proceedings of the 2022 IEEE International Symposium on Circuits and Systems. Piscataway: IEEE, 2022: 1680-1684. |
7 | SARAZA-CANFLANCA P, CARRASCO-LOPEZ H, SANTANA-ANDREO A, et al. Improving the reliability of SRAM-based PUFs under varying operation conditions and aging degradation[J]. Microelectronics Reliability, 2021, 118: 114049. |
8 | MILLER A, SHIFMAN Y, WEIZMAN Y, et al. A highly reliable SRAM PUF with a capacitive preselection mechanism and pre-ECC BER of 7.4E-10 [C]// Proceedings of the 2019 IEEE Custom Integrated Circuits Conference. Piscataway: IEEE, 2019: 1-4. |
9 | SATPATHY S, MATHEW S K, SURESH V, et al. A 4-fJ/b delay-hardened physically unclonable function circuit with selective bit destabilization in 14-nm trigate CMOS [J]. IEEE Journal of Solid-State Circuits, 2017, 52(4): 940-949. |
10 | BHARGAVA M, MAI K. An efficient reliable PUF-based cryptographic key generator in 65nm CMOS [C]// Proceedings of the 2014 Design, Automation & Test in Europe Conference & Exhibition. Piscataway: IEEE, 2014: 1-6. |
11 | BATURONE I, PRADA-DELGADO M A, EIROA S. Improved generation of identifiers, secret keys, and random numbers from SRAMs [J]. IEEE Transactions on Information Forensics and Security, 2015, 10(12): 2653-2668. |
12 | LIU M, ZHOU C, TANG Q, et al. A data remanence based approach to generate 100% stable keys from an SRAM physical unclonable function [C]// Proceedings of the 2017 IEEE/ACM International Symposium on Low Power Electronics and Design. Piscataway: IEEE, 2017: 1-6. |
13 | LEE J, LEE D, LEE Y, et al. A 445F2leakage-based physically unclonable function with lossless stabilization through remapping for IoT security [C]// Proceedings of the 2018 IEEE International Solid-State Circuits Conference. Piscataway: IEEE, 2018: 132-134. |
14 | LU L, KIM T T-H. A high reliable SRAM-based PUF with enhanced challenge-response space [J]. IEEE Transactions on Circuits and Systems, 2022, 69(2): 589-593. |
15 | CHOI Y, KARPINSKYY B, K-M AHN, et al. Physically unclonable function in 28nm FDSOI technology achieving high reliability for AEC-Q 100 grade 1 and ISO26262 ASIL-B [C]// Proceedings of the 2020 IEEE International Solid- State Circuits Conference. Piscataway: IEEE, 2020: 426-428. |
16 | LIU W, LU Z, LIU H, et al. A novel security key generation method for SRAM PUF based on Fourier analysis [J]. IEEE Access, 2018, 6: 49576-49587. |
17 | 刘文超.存储单元PUF密钥提取关键算法研究[D].武汉:华中科技大学, 2018. |
LIU W C. Research on the key algorithms of security key extraction based on memory-based PUF [D]. Wuhan: Huazhong University of Science and Technology, 2018. | |
18 | 王子裕.布尔函数仿射等价判定算法研究[D].成都:电子科技大学, 2021. |
WANG Z Y. Research on the method of determining affine equivalence of Boolean function [D]. Chengdu: University of Electronic Science and Technology of China, 2021. | |
19 | DOBRAUNIG C, EICHLSEDER M, MENDEL F, et al. Ascon v1.2: lightweight authenticated encryption and hashing [J]. Journal of Cryptology, 2021, 34(3): No. 33. |
20 | WILDE F. Large scale characterization of SRAM on Infineon XMC microcontrollers as PUF [C]// Proceedings of the 4th Workshop on Cryptography and Security in Computing Systems. New York: ACM, 2017: 13-18. |
21 | HE Y, LI D, YU Z, et al. ASCH-PUF: a “Zero” bit error rate CMOS physically unclonable function with dual-mode low-cost stabilization [J]. IEEE Journal of Solid-State Circuits, 2023, 58(7): 2087-2097. |
22 | CAO R, MEI N, LIAN Q. Method for improving the reliability of SRAM-based PUF using convolution operation [J]. Electronics, 2022, 11(21): 3493. |
23 | PARK J, KIM B, J-Y SIM. A BER-suppressed PUF with an amplification of process mismatch effect in an oscillator collapse topology [J]. IEEE Journal of Solid-State Circuits, 2022, 57(7): 2208-2219. |
[1] | Lei WANG, Shijuan CHENG, Yu HAN. Reliability evaluation of multi-component system based on time-varying Copula function [J]. Journal of Computer Applications, 2024, 44(3): 953-959. |
[2] | Sirui WANG, Shijuan CHENG, Feimeng YUAN. Reliability evaluation method of high-reliability products based on improved evidence fusion [J]. Journal of Computer Applications, 2023, 43(7): 2140-2146. |
[3] | Kai FENG, Tong LIU. Reliability of k-ary (n-m)-cube subnetworks under probabilistic fault condition [J]. Journal of Computer Applications, 2023, 43(4): 1198-1205. |
[4] | Haiyan HU, Qiaoyan KANG, Shuo ZHAO, Jianfeng WANG, Youbin FU. Service function chain deployment optimization method based on node comprehensive importance ranking [J]. Journal of Computer Applications, 2023, 43(3): 860-868. |
[5] | Kai FENG, Jiande LI, Zhangjian JI. Approximate evaluation method of k-ary (n-1)-cube subnetwork reliability [J]. Journal of Computer Applications, 2023, 43(12): 3875-3881. |
[6] | Zongren ZHANG, Zibin DAI, Yanjiang LIU, Xiaolei ZHANG. RA-NLBF: design method of reconfigurable operation unit for stream cipher non-linear Boolean function [J]. Journal of Computer Applications, 2023, 43(11): 3527-3533. |
[7] | Binwei SONG, Yao WANG. Low-cost pay-per-use licensing scheme for FPGA intellectual property protection [J]. Journal of Computer Applications, 2023, 43(10): 3142-3148. |
[8] | LI Jing, LUO Jinfei, LI Bingchao. Reliability analysis models for replication-based storage systems with proactive fault tolerance [J]. Journal of Computer Applications, 2021, 41(4): 1113-1121. |
[9] | ZHAO Jihong, WU Doudou, QU Hua, YIN Zhenyu. Survivable virtual network embedding guarantee mechanism based on software defined network [J]. Journal of Computer Applications, 2020, 40(3): 770-776. |
[10] | GAO Jian, MAO Yingchi, LI Zhitao. Trajectory prediction based on Gauss mixture time series model [J]. Journal of Computer Applications, 2019, 39(8): 2261-2270. |
[11] | YANG Yuxing, LI Xiaohui. Three-length-path structure connectivity and substructure connectivity of hypercube networks [J]. Journal of Computer Applications, 2019, 39(2): 509-512. |
[12] | FENG Kai, LI Jing. Reliability assessment of k-ary n-cube networks [J]. Journal of Computer Applications, 2019, 39(11): 3323-3327. |
[13] | LU Qiuqin, JIN Chao. Reliability simulation analysis of coal transportation road network [J]. Journal of Computer Applications, 2019, 39(1): 292-297. |
[14] | LI Jing, LIU Dongshi. Reliability evaluation model for cloud storage systems with proactive fault tolerance [J]. Journal of Computer Applications, 2018, 38(9): 2631-2636. |
[15] | HU Jingjing, HUANG Youfang. Hub backup to deal with hub failure in hub and spoke network [J]. Journal of Computer Applications, 2018, 38(6): 1814-1819. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||