Javascript must be enabled to continue!
Multibit-Generating Pulsewidth-Based Memristive-PUF Structure and Circuit Implementation
View through CrossRef
As Internet of Things (IoT) devices have evolved, physical unclonable functions (PUFs) have become a popular solution for hardware security. In particular, memristor devices are receiving attention as suitable candidates for reliable PUFs because they can be integrated into nano-cross point array circuits with ultra-high efficiency. However, it has been found that typical 1-bit generating PUFs consume too many challenge–response pairs (CRPs) to generate a single response. This issue has to be overcome to construct a strong and reliable PUF with a large number of valid CRPs. We suggest a bank design and quantizing entropy source method for constructing a multibit-generating PUF. In this paper, we propose a new pulsewidth-based memristive PUF (pm-PUF) architecture that incorporates analog memristor devices and a nano-cross point array. We describe the architecture’s circuit implementation and its operating process in detail. We also evaluate the inter and intra performances of the pm-PUF in terms of randomness, diffuseness, uniqueness, and steadiness to show that the proposed pm-PUF will be a promising solution for a high-density hardware security system.
Title: Multibit-Generating Pulsewidth-Based Memristive-PUF Structure and Circuit Implementation
Description:
As Internet of Things (IoT) devices have evolved, physical unclonable functions (PUFs) have become a popular solution for hardware security.
In particular, memristor devices are receiving attention as suitable candidates for reliable PUFs because they can be integrated into nano-cross point array circuits with ultra-high efficiency.
However, it has been found that typical 1-bit generating PUFs consume too many challenge–response pairs (CRPs) to generate a single response.
This issue has to be overcome to construct a strong and reliable PUF with a large number of valid CRPs.
We suggest a bank design and quantizing entropy source method for constructing a multibit-generating PUF.
In this paper, we propose a new pulsewidth-based memristive PUF (pm-PUF) architecture that incorporates analog memristor devices and a nano-cross point array.
We describe the architecture’s circuit implementation and its operating process in detail.
We also evaluate the inter and intra performances of the pm-PUF in terms of randomness, diffuseness, uniqueness, and steadiness to show that the proposed pm-PUF will be a promising solution for a high-density hardware security system.
Related Results
PUF based Secure Computing for Constraint Cyber Physical Object
PUF based Secure Computing for Constraint Cyber Physical Object
Utilisation des fonction physiques non clonages pour la Securisation des systemes embarques
Le travail de recherche pratiqué dans ce programme de doctorat est consa...
Modelling and characterization of physically unclonable functions
Modelling and characterization of physically unclonable functions
Modélisation et caractérisation des fonctions non clonables physiquement
Les fonctions non clonables physiquement, appelées PUF (Physically Unclonable Functions), r...
Development of the variable pulsewidth mode-locked femtosecond laser using coherent coupling
Development of the variable pulsewidth mode-locked femtosecond laser using coherent coupling
Laser processing field demand high energy pulses, thus widening pulsewidth is necessary for femtosecond pulses [1,2]. We have developed a novel method variable pulsewidth laser, wh...
Boosted PUF: Boosting Efficiency and Resilience in Configurable RO PUF for IoT Devices
Boosted PUF: Boosting Efficiency and Resilience in Configurable RO PUF for IoT Devices
In the realm of Internet of Things (IoT) security, the Physical Unclonable Function (PUF) emerges as a viable solution for generating individualized secure keys. These keys play...
Analysis of Entropy in a Hardware-Embedded Delay PUF
Analysis of Entropy in a Hardware-Embedded Delay PUF
The magnitude of the information content associated with a particular implementation of a Physical Unclonable Function (PUF) is critically important for security and trust in emerg...
An Efficient Post-Processing Method for SSL-PUF in MEC Security Authentication
An Efficient Post-Processing Method for SSL-PUF in MEC Security Authentication
Computation offloading is a key technology in mobile edge computing (MEC) that addresses the performance and energy constraints faced by mobile devices when handling computationall...
Dibutyltin dilaurate catalysed guar gum and toluene diisocyanate polyurethane foam for the removal of malachite green from wastewater
Dibutyltin dilaurate catalysed guar gum and toluene diisocyanate polyurethane foam for the removal of malachite green from wastewater
AbstractIn view of the huge potential in various applications, biopolymer‐based polyurethane foams (PUF) are attracting researchers. In the present study, we report the modificatio...
Memristive neural network circuit with fault tolerance for character recognition
Memristive neural network circuit with fault tolerance for character recognition
Abstract
Memristor-based neural networks are one of the most promising approaches for hardware implementation of artificial neural networks. In this paper, a memr...

