Abstract
The Internet of Things (IoTs) is made up of several interconnected, resource-constrained devices, including sensors, actuators, and nodes that are connected to the Internet. These devices often have limited feature size/area and energy resources, making the cost of using traditional cryptography very expensive and infeasible. In recent years, physically unclonable functions (PUFs), a promising hardware security primitive, have emerged. In this paper, we discuss PUF as an alternative to these already available security protocols based on traditional mathematical cryptography. The PUFs are security primitives that address security issues such as IC authentication, Intellectual Property (IP) protection, etc. These PUFs are compatible with well-developed CMOS technology and are built on delay (such as; Arbiter, Loop, etc.) or memory structures (such as; RRAM, SRAM, etc.). IC Authentication Mechanism of PUFs and Types of PUFs have been discussed in brief in this paper. The potential of PUFs in different novel applications has also been discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M (2014) Internet of things for smart cities. IEEE Internet Things J 1:22–32. https://doi.org/10.1109/JIOT.2014.2306328
Panhwar MA, Sullemanmemon M, Saddar S, Rajput U, Fellow R (2017) 5G future technology: research challenges for an emerging wireless networks. IJCSNS Int J Comput Sci Netw Secur 17
Airehrour D, Gutierrez J, Ray SK (2016) Secure routing for internet of things: a survey. J Netw Comput Appl 66:198–213. https://doi.org/10.1016/J.JNCA.2016.03.006
Kumar M, Meena J, Singh R, Vardhan M (2016) Data outsourcing: a threat to confidentiality, integrity, and availability. In: Proceedings of the 2015 international conference on green computing and internet of things, ICGCIoT. pp 1496–1501. https://doi.org/10.1109/ICGCIOT.2015.7380703
Yee CK, Zolkipli MF (2021) Review on confidentiality, integrity and availability in information security. J ICT Educ 8:34–42. https://doi.org/10.37134/JICTIE.VOL8.2.4.2021
Lv S, Liu J, Geng Z (2021) Application of memristors in hardware security: a current state-of-the-art technology. Adv Intell Syst 3:2000127. https://doi.org/10.1002/AISY.202000127
Hardware is the Key to Information Security. https://www.securosys.com/about/stories/hardware-is-the-key-to-information-security. Accessed 25 Oct 2022
Mateos Matilla D, Lozano Murciego Á, Jiménez-Bravo DM, Sales Mendes A, Leithardt VRQ (2021) Low-cost edge computing devices and novel user interfaces for monitoring pivot irrigation systems based on Internet of Things and LoRaWAN technologies. Biosyst Eng https://doi.org/10.1016/J.BIOSYSTEMSENG.2021.07.010
Mansouri Y, Babar MA (2021) A review of edge computing: features and resource virtualization. J Parallel Distrib Comput 150:155–183. https://doi.org/10.1016/J.JPDC.2020.12.015
Sreekumar L, Ramesh P (2016) Selection of an optimum entropy source design for a true random number generator. Procedia Technol 25:598–605. https://doi.org/10.1016/J.PROTCY.2016.08.150
(2017) Random number generators for cryptography. Circuits Syst Secur Priv 269–310 https://doi.org/10.1201/B19499-14
Rose GS (2016) Security meets nanoelectronics for internet of things applications. In: Proceedings of the ACM international conference of the great lakes symposium on VLSI, GLSVLSI. 18-20-NaN-2016. pp 181–183. https://doi.org/10.1145/2902961.2903045
How Physical Unclonable Functions (PUFs) are Creating Trust. https://www.wevolver.com/article/how-physical-unclonable-functions-pufs-are-creating-trust. Accessed 25 Oct 2022
Gao Y, Li G, Ma H, Al-Sarawi SF, Kavehei O, Abbott D, Ranasinghe DC (2016) Obfuscated challenge-response: a secure lightweight authentication mechanism for PUF-based pervasive devices. In: 2016 IEEE international conference on pervasive computing and communications workshops and other affiliated events. PerCom Work. https://doi.org/10.1109/PERCOMW.2016.7457162
Roy S, Das D, Mondal A, Mahalat MH, Roy S, Sen B (2021) PUF based lightweight authentication and key exchange protocol for IoT. In: Proceedings of 18th international conference on security and cryptography. SECRYPT. pp 698–703. https://doi.org/10.5220/0010550906980703
Li Z, Chu Y, Liu X, Zhang Y, Feng J, Xiang X (2021) Physical unclonable function based identity management for IoT with blockchain. Procedia Comput Sci 198:454–459. https://doi.org/10.1016/j.procs.2021.12.269
Kim JH, Jeon S, In JH, Nam S, Jin HM, Han KH, Yang GG, Choi HJ, Kim KM, Shin J, Son SW, Kwon SJ, Kim BH, Kim SO (2022) Nanoscale physical unclonable function labels based on block co-polymer self-assembly. Nat Electron 5:433–442. https://doi.org/10.1038/s41928-022-00788-w
Dai L, Yan Q, Yi S, Liu W, Qian H (2019) A Novel RRAM based PUF for anti-machine learning attack and high reliability. J Shanghai Jiaotong Univ 24:101–106. https://doi.org/10.1007/s12204-019-2043-0
Oh J, Kim S, Choi J, Cha J, Im SG, Jang BC, Choi S (2022) Memristor‐based security primitives robust to malicious attacks for highly secure neuromorphic systems. Adv Intell Syst 2200177. https://doi.org/10.1002/aisy.202200177
Kim D, Kim T-H, Choi Y, Lee GH, Lee J, Sun W, Park B-G, Kim H, Shin H (2021) Selected bit-line current PUF: implementation of hardware security primitive based on a memristor crossbar array. IEEE Access 9:120901–120910. https://doi.org/10.1109/ACCESS.2021.3108534
Uddin M, Majumder MB, Rose GS (2017) Robustness analysis of a memristive crossbar PUF against modeling attacks. IEEE Trans Nanotechnol 16:396–405. https://doi.org/10.1109/TNANO.2017.2677882
Santikellur P, Subhra R (2021) Deep Learning for computational problems in hardware security modeling attacks on strong physically
Khan MI, Ali S, Al-Tamimi A, Hassan A, Ikram AA, Bermak A (2021) A robust architecture of physical unclonable function based on Memristor crossbar array. Microelectronics J 116:105238. https://doi.org/10.1016/j.mejo.2021.105238
Munjal S, Khare N (2021) Compliance current controlled volatile and nonvolatile memory in Ag/CoFe2O4/Pt resistive switching device. Nanotechnology 32:185204. https://doi.org/10.1088/1361-6528/abdd5f
Munjal S, Khare N (2020) Forming free resistive switching characteristics in Al/NiFe2O4/FTO device. AIP Conf Proc 2220:20171. https://doi.org/10.1063/5.0001806
Pandey V, Adiba A, Ahmad T, Nehla P, Munjal S (2022) Forming-free bipolar resistive switching characteristics in Al/Mn3O4/FTO RRAM device. J Phys Chem Solid 165:110689. https://doi.org/10.1016/j.jpcs.2022.110689
Aghaie A, Moradi A, Tobisch J, Wisiol N (2022) Security analysis of delay-based strong PUFs with multiple delay lines. In: Proceedings of 2022 IEEE international symposium on hardware oriented security and trust. HOST 2022. pp 125–128. https://doi.org/10.1109/HOST54066.2022.9840099
Williams P, Idriss H, Bayoumi M Mc-PUF (2021) Memory-based and machine learning resilient strong PUF for device authentication in internet of things. In: Proceedings of the 2021 IEEE international conference on cyber security and resilience, CSR. pp 61–65. https://doi.org/10.1109/CSR51186.2021.9527930
Zhang JL, Qu G, Lv YQ, Zhou Q (2014) A survey on silicon PUFs and recent advances in ring oscillator PUFs. J Comput Sci Technol 29:664–678. https://doi.org/10.1007/s11390-014-1458-1
Yehoshuva C, Raja Adhithan R, Nalla Anandakumar N (2021) A survey of security attacks on silicon based weak PUF architectures. In: Thampi SM, Wang G, Rawat DB, Ko R, Fan C-I (eds) Communications in computer and information science. Springer Singapore, Singapore, pp 107–122. https://doi.org/10.1007/978-981-16-0422-5_8
Shamsoshoara A, Korenda A, Afghah F, Zeadally S (2020) A survey on physical unclonable function (PUF)-based security solutions for internet of things. Comput Netw 183:107593. https://doi.org/10.1016/j.comnet.2020.107593
Likhithashree R, Kiran D (2020) Area-efficient physically unclonable functions for FPGA using ring oscillator. In: 2nd international conference on innovative mechanisms for industry applications. ICIMIA. pp 403–408. https://doi.org/10.1109/ICIMIA48430.2020.9074968
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Panchal, H., Chaudhary, N.K., Munjal, S. (2024). A Mini Review on—Physically Unclonable Functions: The Hardware Security Primitives. In: Patel, S.J., Chaudhary, N.K., Gohil, B.N., Iyengar, S.S. (eds) Information Security, Privacy and Digital Forensics. ICISPD 2022. Lecture Notes in Electrical Engineering, vol 1075. Springer, Singapore. https://doi.org/10.1007/978-981-99-5091-1_22
Download citation
DOI: https://doi.org/10.1007/978-981-99-5091-1_22
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-5090-4
Online ISBN: 978-981-99-5091-1
eBook Packages: Computer ScienceComputer Science (R0)