A PUF-enabled Secure Architecture for FPGA-based IoT Applications

Anju Johnson, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay

Research output: Contribution to journalArticle

20 Citations (Scopus)

Abstract

The Internet of Things (IoT) is a dynamic, ever-evolving “living” entity. Hence, modern Field Programmable Gate
Array (FPGA) devices with Dynamic Partial Reconfiguration (DPR) capabilities, which allow in-field non-invasive modifications to the
circuit implemented on the FPGA, are an ideal fit. Usually, the activation of DPR capabilities requires the procurement of additional
licenses from the FPGA vendor. In this work, we describe how IoTs can take advantage of the DPR capabilities of FPGAs, using a
modified DPR methodology that does not require any paid “add-on” utility, to implement a lightweight cryptographic security protocol.
We analyze possible threats that can emanate from the availability of DPR at IoT nodes, and propose possible solution techniques
based on Physically Unclonable Function (PUF) circuits to prevent such threats.
LanguageEnglish
Pages110-122
Number of pages13
JournalIEEE Transactions on Multi-Scale Computing Systems
Volume1
Issue number2
DOIs
Publication statusPublished - 26 Oct 2015
Externally publishedYes

Fingerprint

Internet of things
Field programmable gate arrays (FPGA)
Chemical activation
Availability
Network protocols
Networks (circuits)

Cite this

Johnson, Anju ; Chakraborty, Rajat Subhra ; Mukhopadhyay, Debdeep . / A PUF-enabled Secure Architecture for FPGA-based IoT Applications. In: IEEE Transactions on Multi-Scale Computing Systems. 2015 ; Vol. 1, No. 2. pp. 110-122.
@article{5160d7a9aafe47adb228ef8be9bc277c,
title = "A PUF-enabled Secure Architecture for FPGA-based IoT Applications",
abstract = "The Internet of Things (IoT) is a dynamic, ever-evolving “living” entity. Hence, modern Field Programmable GateArray (FPGA) devices with Dynamic Partial Reconfiguration (DPR) capabilities, which allow in-field non-invasive modifications to thecircuit implemented on the FPGA, are an ideal fit. Usually, the activation of DPR capabilities requires the procurement of additionallicenses from the FPGA vendor. In this work, we describe how IoTs can take advantage of the DPR capabilities of FPGAs, using amodified DPR methodology that does not require any paid “add-on” utility, to implement a lightweight cryptographic security protocol.We analyze possible threats that can emanate from the availability of DPR at IoT nodes, and propose possible solution techniquesbased on Physically Unclonable Function (PUF) circuits to prevent such threats.",
keywords = "Cryptographic protocol, dynamic partial reconfiguration, Internet of Things, , field programmable gate arrays, hardware Trojans, physically unclonable functions",
author = "Anju Johnson and Chakraborty, {Rajat Subhra} and Debdeep Mukhopadhyay",
year = "2015",
month = "10",
day = "26",
doi = "10.1109/TMSCS.2015.2494014",
language = "English",
volume = "1",
pages = "110--122",
journal = "IEEE Transactions on Multi-Scale Computing Systems",
issn = "2332-7766",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "2",

}

A PUF-enabled Secure Architecture for FPGA-based IoT Applications. / Johnson, Anju; Chakraborty, Rajat Subhra; Mukhopadhyay, Debdeep .

In: IEEE Transactions on Multi-Scale Computing Systems, Vol. 1, No. 2, 26.10.2015, p. 110-122.

Research output: Contribution to journalArticle

TY - JOUR

T1 - A PUF-enabled Secure Architecture for FPGA-based IoT Applications

AU - Johnson, Anju

AU - Chakraborty, Rajat Subhra

AU - Mukhopadhyay, Debdeep

PY - 2015/10/26

Y1 - 2015/10/26

N2 - The Internet of Things (IoT) is a dynamic, ever-evolving “living” entity. Hence, modern Field Programmable GateArray (FPGA) devices with Dynamic Partial Reconfiguration (DPR) capabilities, which allow in-field non-invasive modifications to thecircuit implemented on the FPGA, are an ideal fit. Usually, the activation of DPR capabilities requires the procurement of additionallicenses from the FPGA vendor. In this work, we describe how IoTs can take advantage of the DPR capabilities of FPGAs, using amodified DPR methodology that does not require any paid “add-on” utility, to implement a lightweight cryptographic security protocol.We analyze possible threats that can emanate from the availability of DPR at IoT nodes, and propose possible solution techniquesbased on Physically Unclonable Function (PUF) circuits to prevent such threats.

AB - The Internet of Things (IoT) is a dynamic, ever-evolving “living” entity. Hence, modern Field Programmable GateArray (FPGA) devices with Dynamic Partial Reconfiguration (DPR) capabilities, which allow in-field non-invasive modifications to thecircuit implemented on the FPGA, are an ideal fit. Usually, the activation of DPR capabilities requires the procurement of additionallicenses from the FPGA vendor. In this work, we describe how IoTs can take advantage of the DPR capabilities of FPGAs, using amodified DPR methodology that does not require any paid “add-on” utility, to implement a lightweight cryptographic security protocol.We analyze possible threats that can emanate from the availability of DPR at IoT nodes, and propose possible solution techniquesbased on Physically Unclonable Function (PUF) circuits to prevent such threats.

KW - Cryptographic protocol

KW - dynamic partial reconfiguration

KW - Internet of Things

KW - , field programmable gate arrays

KW - hardware Trojans

KW - physically unclonable functions

UR - https://ieeexplore.ieee.org/document/7303941

U2 - 10.1109/TMSCS.2015.2494014

DO - 10.1109/TMSCS.2015.2494014

M3 - Article

VL - 1

SP - 110

EP - 122

JO - IEEE Transactions on Multi-Scale Computing Systems

T2 - IEEE Transactions on Multi-Scale Computing Systems

JF - IEEE Transactions on Multi-Scale Computing Systems

SN - 2332-7766

IS - 2

ER -