Kokila et al., 2019 - Google Patents
Resource efficient metering scheme for protecting SoC FPGA device and IPs in IOT applicationsKokila et al., 2019
- Document ID
- 4422613350157886898
- Author
- Kokila J
- Ramasubramanian N
- Naganathan N
- Publication year
- Publication venue
- IEEE Transactions on Very Large Scale Integration (VLSI) Systems
External Links
Snippet
Due to the fact that most of the functions in SoC are handled by the intellectual property (IP) blocks, the CPU plays a minimum role in scheduling the functionality of the IP blocks wherever IP reuse is vital in order to increase the performance and to reduce the resource …
- 238000010367 cloning 0 abstract description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0485—Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shamsoshoara et al. | A survey on physical unclonable function (PUF)-based security solutions for Internet of Things | |
Yang et al. | Hardware designs for security in ultra-low-power IoT systems: An overview and survey | |
Gassend | Physical random functions | |
Huang et al. | A PUF-based unified identity verification framework for secure IoT hardware via device authentication | |
Drimer | Volatile FPGA design security–a survey | |
Drimer | Security for volatile FPGAs | |
WO2012001796A1 (en) | Individual-specific information generation device and individual-specific information generation method | |
Wachsmann et al. | Physically unclonable functions (PUFs): Applications, models, and future directions | |
Hemavathy et al. | Arbiter PUF—A review of design, composition, and security aspects | |
CN109766672B (en) | Anonymous authentication method for core copyright | |
Zerrouki et al. | A survey on silicon PUFs | |
Kokila et al. | Resource efficient metering scheme for protecting SoC FPGA device and IPs in IOT applications | |
El-Hajj et al. | A taxonomy of PUF Schemes with a novel Arbiter-based PUF resisting machine learning attacks | |
Liang et al. | Study on PUF based secure protection for IC design | |
Zhang et al. | A pragmatic per-device licensing scheme for hardware IP cores on SRAM-based FPGAs | |
Sami et al. | Poca: First power-on chip authentication in untrusted foundry and assembly | |
Roy et al. | Device-specific security challenges and solution in IoT edge computing: a review | |
Plusquellic et al. | Privacy-preserving authentication protocols for iot devices using the sirf puf | |
Pan et al. | Device-bind key-storageless hardware ai model ip protection: A puf and permute-diffusion encryption-enabled approach | |
Adeli et al. | Challenging the security of “A PUF-based hardware mutual authentication protocol” | |
Hutle et al. | Resilience against physical attacks | |
Kokila et al. | Enhanced authentication using hybrid PUF with FSM for protecting IPs of SoC FPGAs | |
Jin et al. | Erasable pufs: Formal treatment and generic design | |
Halak et al. | Hardware-based security applications of physically unclonable functions | |
Duncan et al. | SeRFI: secure remote FPGA initialization in an untrusted environment |