Nothing Special   »   [go: up one dir, main page]

Kokila et al., 2019 - Google Patents

Resource efficient metering scheme for protecting SoC FPGA device and IPs in IOT applications

Kokila et al., 2019

Document ID
4422613350157886898
Author
Kokila J
Ramasubramanian N
Naganathan N
Publication year
Publication venue
IEEE Transactions on Very Large Scale Integration (VLSI) Systems

External Links

Snippet

Due to the fact that most of the functions in SoC are handled by the intellectual property (IP) blocks, the CPU plays a minimum role in scheduling the functionality of the IP blocks wherever IP reuse is vital in order to increase the performance and to reduce the resource …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0485Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks

Similar Documents

Publication Publication Date Title
Shamsoshoara et al. A survey on physical unclonable function (PUF)-based security solutions for Internet of Things
Yang et al. Hardware designs for security in ultra-low-power IoT systems: An overview and survey
Gassend Physical random functions
Huang et al. A PUF-based unified identity verification framework for secure IoT hardware via device authentication
Drimer Volatile FPGA design security–a survey
Drimer Security for volatile FPGAs
WO2012001796A1 (en) Individual-specific information generation device and individual-specific information generation method
Wachsmann et al. Physically unclonable functions (PUFs): Applications, models, and future directions
Hemavathy et al. Arbiter PUF—A review of design, composition, and security aspects
CN109766672B (en) Anonymous authentication method for core copyright
Zerrouki et al. A survey on silicon PUFs
Kokila et al. Resource efficient metering scheme for protecting SoC FPGA device and IPs in IOT applications
El-Hajj et al. A taxonomy of PUF Schemes with a novel Arbiter-based PUF resisting machine learning attacks
Liang et al. Study on PUF based secure protection for IC design
Zhang et al. A pragmatic per-device licensing scheme for hardware IP cores on SRAM-based FPGAs
Sami et al. Poca: First power-on chip authentication in untrusted foundry and assembly
Roy et al. Device-specific security challenges and solution in IoT edge computing: a review
Plusquellic et al. Privacy-preserving authentication protocols for iot devices using the sirf puf
Pan et al. Device-bind key-storageless hardware ai model ip protection: A puf and permute-diffusion encryption-enabled approach
Adeli et al. Challenging the security of “A PUF-based hardware mutual authentication protocol”
Hutle et al. Resilience against physical attacks
Kokila et al. Enhanced authentication using hybrid PUF with FSM for protecting IPs of SoC FPGAs
Jin et al. Erasable pufs: Formal treatment and generic design
Halak et al. Hardware-based security applications of physically unclonable functions
Duncan et al. SeRFI: secure remote FPGA initialization in an untrusted environment