Next Article in Journal
Simultaneous Event-Triggered Fault Detection and Estimation for Stochastic Systems Subject to Deception Attacks
Next Article in Special Issue
Secure Indoor Localization Based on Extracting Trusted Fingerprint
Previous Article in Journal
Impact Analysis of Temperature and Humidity Conditions on Electrochemical Sensor Response in Ambient Air Quality Monitoring
Previous Article in Special Issue
Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Compact and Low Power RO PUF with High Resilience to the EM Side-Channel Attack and the SVM Modelling Attack of Wireless Sensor Networks

1
College of Internet of Things Engineering, Hohai University, Changzhou 213022, China
2
College of Electronic Science and Technology, Shenzhen University, Shenzhen 518060, China
3
College of Information Engineering, Shenzhen University, Shenzhen 518060, China
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(2), 322; https://doi.org/10.3390/s18020322
Submission received: 9 December 2017 / Revised: 14 January 2018 / Accepted: 20 January 2018 / Published: 23 January 2018
(This article belongs to the Special Issue Security, Trust and Privacy for Sensor Networks)

Abstract

:
Authentication is a crucial security service for the wireless sensor networks (WSNs) in versatile domains. The deployment of WSN devices in the untrusted open environment and the resource-constrained nature make the on-chip authentication an open challenge. The strong physical unclonable function (PUF) came in handy as light-weight authentication security primitive. In this paper, we present the first ring oscillator (RO) based strong physical unclonable function (PUF) with high resilience to both the electromagnetic (EM) side-channel attack and the support vector machine (SVM) modelling attack. By employing an RO based PUF architecture with the current starved inverter as the delay cell, the oscillation power is significantly reduced to minimize the emitted EM signal, leading to greatly enhanced immunity to the EM side-channel analysis attack. In addition, featuring superior reconfigurability due to the conspicuously simplified circuitries, the proposed implementation is capable of withstanding the SVM modelling attack by generating and comparing a large number of RO frequency pairs. The reported experimental results validate the prototype of a 9-stage RO PUF fabricated using standard 65 nm complementary-metal-oxide-semiconductor (CMOS) process. Operating at the supply voltage of 1.2 V and the frequency of 100 KHz, the fabricated RO PUF occupies a compact silicon area of 250 μ m 2 and consumes a power as low as 5.16 μ W per challenge-response pair (CRP). Furthermore, the uniqueness and the worst-case reliability are measured to be 50.17% and 98.30% for the working temperature range of −40∼120 C and the supply voltage variation of ±2%, respectively. Thus, the proposed PUF is applicable for the low power, low cost and secure WSN communications.

1. Introduction

Wireless sensor networks (WSNs) are intensely ubiquitous and encompass a broad range of new applications, such as AR/VR, Internet of Things (IoT), and vehicle network [1]. The smart sensors are the tentacles that sense the environmental conditions and communicate the information that is usually security and private critical. It is paramount to assure the integrity of the sensing and protect the collected information from malicious attacks during the data transmission through the untrusted communication channels. However, it is not feasible to implement the conventional cryptography modules on the resource-constrained sensor nodes, including advanced encryption standard (AES), elliptic curve cryptography (ECC) and so on. In light of this, the physical unclonable function (PUF) as a lightweight security primitive has raised more and more interests in the WSN research community [2,3].
PUF, broadly categorized as “weak PUF” and “strong PUF”, is an emerging low-cost on-chip secure primitive [2,4,5,6,7]. By converting the inherent uncontrollable and unpredictable variations of the semiconductor manufacturing process to a random digital bit string, a PUF generates a “response” upon a “challenge”, namely a challenge-response pair (CRP). Weak PUFs target the application of the key generation [2,4], while strong PUFs are more suitable for the device authentication [8]. The weak PUFs generally have very few CRPs. They can be essentially regarded as a special form of memory, which are resilient to the invasive attacks [8]. The strong PUF, as a disorderd physical system, features complex challenge-response behavior and large challenge-response space. It is almost impossible to physically clone a strong PUF, whose CRPs behave exactly the same as the original one. As a result, the strong PUF is more suitable for the wide range of device authentication applications than its counterpart of weak PUF [9,10,11]. Among the strong PUF implementations, ring oscillator (RO) PUF is superior due to the following reasons [12]: (1) the frequencies of the ROs in the PUF are irrelevant to the delay introduced by the outputs’ routing; (2) the difference of the RO pairs’ frequencies can be further increased by extending their oscillation time. However, the feature of public CRPs’ accessability for strong PUFs renders them vulnerable to modeling attacks [8]. In addition, Merli’s work demonstrates that the electromagnetic (EM) measurements are capable of disclosing both the frequency and the location of each RO, which enables the prediction of the RO PUF’s CRPs [12].
To address these security threats, this paper presents the first RO based strong PUF design to resist the EM side-channel attack and the support vector machine (SVM) modelling attack. Compared with the previous implementations, the proposed RO PUF features low power consumption, high area efficiency and improved security performance with high entropy. Specifically, in order to minimize the influence of the emitted EM signal, the RO’s delay cell consists of the current starved inverters, which operate at the subthreshold region and significantly reduce the overall power consumption. In addition, each RO used to generate the CRP includes one of the two current starved inverters in each inverter stage, resulting in the exponential increment of the RO number in a given area. Furthermore, the RO PUF architecture employs a linear feedback shift register (LFSR) counter to enhance the system’s logical reconfigurability and thwart the SVM modelling attack. The rest of the paper is organized as follows. Section 2 introduces the architecture and operation of proposed RO PUF. Experiments results are presented and discussed in Section 3. Finally, the conclusion is drawn in Section 4.

2. Architecture and Operation of Proposed RO PUF

Figure 1 illustrates the architecture of the proposed 9-stage RO PUF. It basically consists of one LFSR counter, one reconfigurable current starved RO and one bidirectional counter. The key component is the reconfigurable current starved RO. Its oscillation frequency is determined by the delay t d of its current starved inverter stage. Here t d is given as:
t d = C 0 V d d i D
where C 0 is the load capacitance, i D is the average charging/discharging current and V d d is the power supply voltage. The key component in the proposed RO PUF is the MUX based current starved RO with reconfigurability. The delay cell in the RO is the current starved inverter. As shown in Figure 2, two additional bias transistors are added into the regular inverter to realize the current starved inverter.
In the current starved inverter, the output capacitance is charged/discharged by the maximum drain current I D of the pull-up/pull-down transistor initially, which is decreased during the transition. Without considering the leakage and short-circuit current, the average current i D is equal to η I D , where the fraction η is fixed for a given device. The current starved inverter can be made to work in the sub-threshold region by biasing the voltages V p and V n . The maximum current I D is formulated by [13]:
I D = μ C O X W L ( κ B T q ) 2 ( n 1 ) e q ( V G S V t ) n κ B T ( 1 e q V D κ B T )
n = 1 + ( C S + C i t ) C O X
where κ B is the Boltzmann constant; C S , C i t and C o x are the capacitances associated with the semiconductor, fast surface states and gate oxide, respectively. From (2), the current is controlled by the V G S of each transistor. Therefore, the power and oscillation frequency of the RO can be tuned by V p and V n . It should be noted that two multiplexors are placed in each inverter stage: one at the gate outputs, the other one at the gate inputs. The multiplexors are realized with transmission gates to reduce their delay and transistor count as shown in Figure 3. It is difficult to model the temperature dependency of the multiplexors as the transistors can operate in several regions [14]. What is more feasible is to increase their transistors’ width to make their contribution to the timing variation of the RO negligible relative to the inverters.
Each response bit of this PUF is produced by comparing two randomly selected ROs’ frequencies. The operation of the proposed PUF is explained as follows. The LFSR counter is firstly fed with an 8-bit challenge C through S e r i a l _ I n port by setting the signal M o d e high. E N in the RO is set to low to disable the oscillation. After C from the LFSR counter settles down, E N is set to high. Then a rising edge of R s t is applied to reset the bidirectional counter, which can record the RO’s output frequency. Suppose the RO selected by C is R O A . Its oscillation frequency f A is measured by the bidirectional counter with U p / d o w n ¯ equal to high for a specific time of t. Similarly, another challenge C is generated by shifting C in the LFSR counter with N c l k ( N c l k < 2 8 ) cycles. The frequency f B of the new RO R O B is recorded by the bidirectional counter with U p / d o w n ¯ set to low for the time of t. Finally, the recorded value in the bidirectional counter represents the frequency difference of the RO pair (i.e. R O A and R O B ). The most significant bit (MSB) of the bidirectional counter is used as the PUF’s output bit. In the proposed RO PUF, the heat generated by the oscillation of R O A is too small and can be negligible due to the low power feature of the current starved inverter working in the subthreshold region.
It is noted that, with a different N c l k in the LFSR counter, the same input challenge can produce different responses for the same PUF instance. As a result, this structure can be considered as a logically reconfigurable PUF [15], In contrast to the controlled PUF (CPUF) [16], which adds simple hash functions to a PUF to forbid the untrusted user to access the PUF directly, the proposed PUF allows for changing the CRP behavior by varying N c l k , without the physical replacement and modification of the underlying PUF. This logical reconfigurability makes the proposed PUF more resilient to SVM based attack, which is a subclass of modeling attacks. Modeling attack assumes that the adversary can create a model of the targeted PUF, given a number of CRPs [8]. The rest CRPs can be predicted with the help of this model. To predict the CRPs with SVM, the attackers need to model the CRP generation accurately. Without considering the reconfigurability, N c l k for the LFSR counter is assumed to be a known constant. The oscillation frequency of each RO in the proposed PUF is reversely proportional to the sum of the delay in each stage. The applied challenge C / C selects the top or bottom path. An additive delay model for the proposed PUF structure can be constructed as follows. The response corresponding to the challenge C can be expressed as:
R = 1 if δ ( n + 1 ) > δ ( n + 1 ) 1 if δ ( n + 1 ) < δ ( n + 1 )
where δ ( n + 1 ) and δ ( n + 1 ) are the signal delays from the NAND gate input to the output of the RO’s last inverter stage (i.e., the ( n + 1 ) -th) in Figure 1, upon the application of the challenge C and the shadow challenge C after N c l k cycles, respectively. These two delays are then written as:
δ ( i ) = 1 + C i 2 p i + 1 C i 2 q i + δ ( i 1 )
δ ( i ) = 1 + C i 2 p i + 1 C i 2 q i + δ ( i 1 )
where p i and q i ( i = 1 , 2 , , n + 1 ) are the top and bottom inverter delays at the i-th inverter stage of the RO, respectively, and C i , C i { 1 , 1 } . In contrast to the arbiter PUF whose two competing-signals are generated at the same time (by the rising edge from the very beginning of the delay chain), the proposed RO PUF generates the two competing-signals at different times (one is generated when Challenge C is applied, the other one is generated when the shadow Challenge C is applied). The frequency distance between two selected ROs is then calculated by subtraction with the help of the following bi-directional counter. Let Δ ( i ) denote the difference between δ ( i ) and δ ( i ) . By subtracting (5) from (6), we can have:
Δ ( i ) = p i q i 2 ( C i C i ) + Δ ( i 1 )
Δ ( i ) = p i q i 2 ( C i C i ) + p i 1 q i 1 2 ( C i 1 C i 1 ) + Δ ( 0 )
where Δ ( 0 ) = 0 . The final delay difference Δ ( n + 1 ) can be represented as an inner product:
Δ ( n + 1 ) = < w , x >
where w = 1 2 ( ( p 0 q 0 ) , , ( p n + 1 q n + 1 ) ) and x = ( ( C 0 C 0 ) , , ( C n + 1 C n + 1 ) ) . In this way, a separating hyperplane in the space of all feature vectors x can be determined by the SVM. However, if N c l k is not fixed but randomly reconfigurable by the user, x becomes unpredictable. In order to secure N c l k , N c l k can be encrypted and sent along with the challenge to the device when an authentication is inquired.

3. Experimental Results and Discussions

The microphotograph of the fabricated chip using standard 65 nm CMOS process is shown in Figure 4. The proposed PUF’s core area is only 5 × 50 μ m 2 . The setup of the probe station for the post-silicon test is shown in Figure 5, where Agilent oscilloscope with 1GS/s sampling rate is used to measure the output frequencies of the current starved ROs and capture the responses of the PUF. The LFSR counter and other control signals are generated by a Xilinx Virtex-II Pro FPGA board externally. Figure 6 shows the distribution of RO’s oscillation frequency in one sample chip. There are totally 2 8 = 256 ROs in each PUF instance. The average oscillation frequency is 101 KHz. The most important figures of merits for the PUF, namely, the uniqueness, reliability, power and security are presented and discussed in the following subsections.

3.1. Uniqueness

The uniqueness measures how different the CRPs produced by a PUF are from the other chips. The average inter-die Hamming Distance (HD) of the PUF’s CRPs is generally used to calculate the uniqueness. With the same input challenge C to two different chips, u and v, two n-bit responses R u and R v can be generated. The average inter-die HD for m chips is expressed as [17]:
U = 2 m ( m 1 ) u = 1 m 1 v = u + 1 m H D ( R u , R v ) n × 100 %
Figure 7 shows the measured frequency distribution of the inter-die Hamming Distance (HD) for 10 PUF dies. The uniqueness measured from the proposed PUF’s inter-die HD is 50.17%, with the ideal value equal to 50%. A Gaussian distribution with mean μ = 50.17% and standard deviation σ = 0.43% can well fit this distribution as shown in Figure 7.

3.2. Reliability

The reliability represents how reproducible the CRPs generated by a PUF are, under variable operating conditions, e.g., different temperature, supply voltage, ambient noises, etc. The intra-die HD is a way to estimate the reliability. Given an input challenge C, each chip i produces an n-bit reference response R i under the normal operating condition. It is then measured k times with the same set of challenges under varying operation environments. The produced responses are R i , j ( j = 1 , 2 , , k ) . The assessing of reliability for chip i can be written as [17]:
S = 1 B E R = 1 1 k j = 1 k H D ( R i , R i , j ) n × 100 %
where B E R stands for the bit error rate. With 1000 CRPs produced by the PUF under various temperatures and supply voltages, the reliability is measured. Figure 8a,b show the fabricated RO PUF’s reliability with the temperature and voltage variations, respectively. The worst-case reliability is observed to be 98.30% at −40 C and 1.22 V. The proposed PUF is characterized with a high temperature reliability over a long temperature range. This is because the delay cell we implemented in each RO is the current starved inverter. The oscillation frequency of the RO using the current starved inverter is much less sensitive to the temperature variations [18].

3.3. Power Consumption

In our proposed RO PUF, the RO’s frequency and the power consumption can be optimized by tuning V p and V n of the current starved inverters. Figure 9 presents the measured average power consumption versus the RO’s frequency. It is indicated that the minimum measurable oscillation frequency is 100 KHz and the corresponding power consumption is only 5.16 μ W. This low power consumption feature is more suitable for the resource-constrained WSN devices working in the distributed area.

3.4. Security Analysis

3.4.1. SVM Attack

With the above-mentioned reconfigurability in Section 2, the proposed PUF is able to thwart the SVM modelling attack. In order to have a fair comparison with SVM attack on the 64-stage arbiter [11], we have extensively simulated a 64-stage proposed PUF using the UMC 65 nm CMOS technology to generate the enough training and testing CRPs. Figure 10 shows the prediction results for the proposed 64-bit RO PUF with and without reconfigurability using the tool S V M l i g h t [19]. The reconfigurability is disabled by fixing the value of N c l k in the LFSR counter. The prediction accuracy is higher than 90% with only 1000 training CRPs for the RO PUF without reconfigurability. This is because, if the reconfigurable parameter N c l k is fixed, the relation of C and C is fixed. The model for the proposed PUF is similar to the arbiter PUF [11], which is very vulnerable to the SVM attack. However, when the reconfigurability is enabled by setting N c l k as a random number, our proposed PUF is proved to be more resilient to the SVM modeling attack, as the SVM predication accuracy for our proposed PUF response only fluctuates around 50% even with a large training set size of ten thousand CRPs.

3.4.2. EM Side-Channel Attack

EM side-channel attack has been successfully adopted to break the RO PUFs [12]. The analysis is based on the study and comparison of the detectable EM emanations’ frequency spectrum for the active RO. According to Friis transmission equation [20]:
P r = G t G r ( λ 4 π R ) 2 P t
where G t and G r are the antenna gains of the transmitting and receiving antennas, respectively, λ is the wavelength, R is the distance from the detector probe to the device, P r is detectable magnitude of the EM radiation and P t is the device’s working power consumption. Our proposed hybrid RO PUF has lower power consumption over the classic RO PUF. Since P r is proportional to P t , it will have a lower magnitude of EM radiation.
To validate our proposed PUF’s resilience against EM side-channel attack, FLS 106 IC scanner is used to capture the EM radiation close to the fabricated chip’s surface. Figure 11a,b illustrate the measured spectrum of the regular RO and the proposed RO fabricated in the same chip, respectively. It is noticed that an EM radiation of 100.38 dB μ V at 278 MHz is detected for the regular RO, however, the EM radiation magnitude of the proposed RO is too small to be distinguished from the noise floor. Additionally, as the proposed RO PUF only occupies a tiny silicon area with an interleaving structure, it is quite challenging to pinpoint it on the chip, which further elevated the proposed RO’s security performance [21].

4. Conclusions

In this paper, we present a compact RO PUF with high resilience to both the EM side-channel attack and the SVM modelling attack. By utilizing the current starved inverters as the RO’s delay cell, both the oscillation power and the emitted EM signal are minimized, leading to significantly enhanced immunity to the EM based side-channel attack. Additionally, the prototype of the proposed PUF fabricated using 65 nm CMOS process only consumes a low power of 5.16 μ W per CRP at 1.2 V, under an oscillation frequency of 100 KHz. In addition, the measured CRPs exhibits a superior uniqueness of 50.17% and a BER of 1.7% with the operation temperature varied from −40 C to 120 C. Furthermore, with the external challenge randomized by the incorporated LFSR counter, the reconfigurable CRPs are capable of providing substantial resilience to the prediction attack by SVM. The proposed PUF shows great promise to a wide range of light-weight WSN security applications with limited battery capacity.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Grant No. 61601168, 61504087, 11574072), the Fundamental Research Funds for the Central Universities (Grant No. 2016B15314), the Key Research Project of Jiangsu Province (Grant No. BE2016056) and the Fundamental Research Foundation of Shenzhen (Grant No. JCYJ20170302151209762 and JCYJ20160520170741660).

Author Contributions

All authors have contributed to this work. Yuan Cao proposed the VLSI architecture, conducted the simulation and drafted the manuscript. Xiaojin Zhao and Qingbang Han conducted the theoretical deduction. Wenbin Ye and Xiaofang Pan analyzed the experimental results. All authors have read and revised the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ergen, S.C.; Sangiovanni-Vincentelli, A. Intravehicular energy-harvesting wireless networks: Reducing costs and emissions. IEEE Veh. Technol. Mag. 2017, 12, 77–85. [Google Scholar] [CrossRef]
  2. Liu, R.; Wu, H.; Pang, Y.; Qian, H.; Yu, S. Experimental characterization of physical unclonable function based on 1 kb resistive random access memory arrays. IEEE Electron Device Lett. 2015, 36, 1380–1383. [Google Scholar] [CrossRef]
  3. Li, D.; Lu, Z.; Zou, X.; Liu, Z. PUFKEY: A high-security and high-throughput hardware true random number generator for sensor networks. Sensors 2015, 15, 26251–26266. [Google Scholar] [CrossRef] [PubMed]
  4. Kim, M.S.; Moon, D.I.; Yoo, S.K.; Lee, S.H.; Choi, Y.K. Investigation of physically unclonable functions using flash memory for integrated circuit authentication. IEEE Trans. Nanotechnol. 2015, 14, 384–389. [Google Scholar] [CrossRef]
  5. Das, J.; Scott, K.; Rajaram, S.; Burgett, D.; Bhanja, S. MRAM PUF: A novel geometry based magnetic PUF with integrated CMOS. IEEE Trans. Nanotechnol. 2015, 14, 436–443. [Google Scholar] [CrossRef]
  6. Chen, A. Utilizing the variability of resistive random access memory to implement reconfigurable physical unclonable functions. IEEE Electron Device Lett. 2015, 36, 138–140. [Google Scholar] [CrossRef]
  7. Li, J.; Seok, M. Ultra-compact and robust physically unclonable function based on voltage-compensated proportional-to-absolute-temperature voltage generators. IEEE J. Solid-State Circuits 2016, 51, 2192–2202. [Google Scholar] [CrossRef]
  8. Rührmair, U.; Sölter, J.; Sehnke, F.; Xu, X.; Mahmoud, A.; Stoyanova, V.; Dror, G.; Schmidhuber, J.; Burleson, W.; Devadas, S. PUF modeling attacks on simulated and silicon data. IEEE Trans. Inf. Forensics Secur. 2013, 8, 1876–1891. [Google Scholar] [CrossRef] [Green Version]
  9. Yang, K.; Dong, Q.; Blaauw, D.; Sylvester, D. A physically unclonable function with BER <10−8 for robust chip authentication using oscillator collapse in 40 nm CMOS. In Proceedings of the 2015 IEEE International Solid State Circuits Conference, San Francisco, CA, USA, 22–26 February 2015; pp. 1–3. [Google Scholar]
  10. Komurcu, G.; Pusane, A.; Dundar, G. Analysis of ring oscillator structures to develop a design methodology for RO-PUF circuits. In Proceedings of the International Conference on Very Large Scale Integration (VLSI-SoC), Istanbul, Turkey, 7–9 October 2013; pp. 332–335. [Google Scholar]
  11. Lin, L.; Srivathsa, S.; Krishnappa, D.K.; Shabadi, P.; Burleson, W. Design and validation of arbiter-based PUFs for sub-45-nm low-power security applications. IEEE Trans. Inf. Forensics Secur. 2012, 7, 1394–1403. [Google Scholar] [CrossRef]
  12. Merli, D.; Heyszl, J.; Heinz, B.; Schuster, D.; Stumpf, F.; Sigl, G. Localized electromagnetic analysis of RO PUFs. In Proceedings of the Hardware-Oriented Security and Trust (HOST), Austin, TX, USA, 2–3 June 2013; pp. 19–24. [Google Scholar]
  13. Taur, Y.; Ning, T. Fundamentals of Modern VLSI Devices; Cambridge University Press: Cambridge, UK, 1998. [Google Scholar]
  14. Mondal, S.; Talapatra, S.; Rahaman, H. Analysis, modeling and optimization of transmission gate delay. In Proceedings of the Asia Symposium on Quality Electronic Design (ASQED), Kuala Lumpur, Malaysia, 19–20 July 2011; pp. 246–253. [Google Scholar]
  15. Katzenbeisser, S.; Koçabas, Ü.; Van Der Leest, V.; Sadeghi, A.R.; Schrijen, G.J.; Schröder, H.; Wachsmann, C. Recyclable PUFs: Logically reconfigurable PUFs. J. Cryptogr. Eng. 2011, 1, 177–186. [Google Scholar] [CrossRef]
  16. Gassend, B.; Clarke, D.; Van Dijk, M.; Devadas, S. Silicon physical random functions. In Proceedings of the ACM Conference on Computer and Communications Security, Washington, DC, USA, 18–22 November 2002; pp. 148–160. [Google Scholar]
  17. Maiti, A.; Schaumont, P. Improving the quality of a Physical Unclonable Function using configurable Ring Oscillators. In Proceedings of the International Conference on Field Programmable Logic and Applications, Prague, Czech Republic, 31 August–2 September 2009; pp. 703–707. [Google Scholar]
  18. Ramazani, A.; Biabani, S.; Hadidi, G. CMOS ring oscillator with combined delay stages. Int. J. Electron. Commun. 2014, 68, 515–519. [Google Scholar] [CrossRef]
  19. Joachims, T. Learning to classify text using support vector machines: Methods, theory and algorithms. Comput. Linguist. 2003, 29, 655–664. [Google Scholar]
  20. Hogg, D. Fun with the Friis free-space transmission formula. IEEE Antennas Propag. Mag. 1993, 35, 33–35. [Google Scholar] [CrossRef]
  21. He, W.; de la Torre, E.; Riesgo, T. An interleaved EPE-immune PA-DPL structure for resisting concentrated EM side channel attacks on FPGA implementation. In Proceedings of the International Conference on Constructive Side-Channel Analysis and Secure Design (COSADE), Darmstadt, Germany, 3–4 May 2012; pp. 39–53. [Google Scholar]
Figure 1. Architecture of the proposed ring oscillator (RO) PUF.
Figure 1. Architecture of the proposed ring oscillator (RO) PUF.
Sensors 18 00322 g001
Figure 2. Schematics of (a) regular inverter and (b) current starved inverter.
Figure 2. Schematics of (a) regular inverter and (b) current starved inverter.
Sensors 18 00322 g002
Figure 3. Schematic of the MUX in the proposed physical unclonable function (PUF).
Figure 3. Schematic of the MUX in the proposed physical unclonable function (PUF).
Sensors 18 00322 g003
Figure 4. The microphotograph of the proposed RO PUF chip.
Figure 4. The microphotograph of the proposed RO PUF chip.
Sensors 18 00322 g004
Figure 5. The probe station for testing the sample chips.
Figure 5. The probe station for testing the sample chips.
Sensors 18 00322 g005
Figure 6. The distribution of RO’s oscillation frequency for one sample chip.
Figure 6. The distribution of RO’s oscillation frequency for one sample chip.
Sensors 18 00322 g006
Figure 7. The measured inter-die HD distribution for the proposed RO PUF.
Figure 7. The measured inter-die HD distribution for the proposed RO PUF.
Sensors 18 00322 g007
Figure 8. (a) The measured average reliability of the proposed RO PUF versus the temperature variations; (b) the measured average reliability of the proposed RO PUF versus the voltage variations.
Figure 8. (a) The measured average reliability of the proposed RO PUF versus the temperature variations; (b) the measured average reliability of the proposed RO PUF versus the voltage variations.
Sensors 18 00322 g008
Figure 9. The measured average power consumption per challenge-response pair (CRP) of the proposed PUF at different ROs frequencies.
Figure 9. The measured average power consumption per challenge-response pair (CRP) of the proposed PUF at different ROs frequencies.
Sensors 18 00322 g009
Figure 10. The prediction accuracy by support vector machine (SVM) for the proposed PUF with and without reconfigurability.
Figure 10. The prediction accuracy by support vector machine (SVM) for the proposed PUF with and without reconfigurability.
Sensors 18 00322 g010
Figure 11. (a) The measured EM radiation for the regular RO; (b) the measured EM radiation for the proposed RO.
Figure 11. (a) The measured EM radiation for the regular RO; (b) the measured EM radiation for the proposed RO.
Sensors 18 00322 g011

Share and Cite

MDPI and ACS Style

Cao, Y.; Zhao, X.; Ye, W.; Han, Q.; Pan, X. A Compact and Low Power RO PUF with High Resilience to the EM Side-Channel Attack and the SVM Modelling Attack of Wireless Sensor Networks. Sensors 2018, 18, 322. https://doi.org/10.3390/s18020322

AMA Style

Cao Y, Zhao X, Ye W, Han Q, Pan X. A Compact and Low Power RO PUF with High Resilience to the EM Side-Channel Attack and the SVM Modelling Attack of Wireless Sensor Networks. Sensors. 2018; 18(2):322. https://doi.org/10.3390/s18020322

Chicago/Turabian Style

Cao, Yuan, Xiaojin Zhao, Wenbin Ye, Qingbang Han, and Xiaofang Pan. 2018. "A Compact and Low Power RO PUF with High Resilience to the EM Side-Channel Attack and the SVM Modelling Attack of Wireless Sensor Networks" Sensors 18, no. 2: 322. https://doi.org/10.3390/s18020322

APA Style

Cao, Y., Zhao, X., Ye, W., Han, Q., & Pan, X. (2018). A Compact and Low Power RO PUF with High Resilience to the EM Side-Channel Attack and the SVM Modelling Attack of Wireless Sensor Networks. Sensors, 18(2), 322. https://doi.org/10.3390/s18020322

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop