In Situ XOR Encryption for Lightweight Security Using Nanoelectromechanical Physically Unclonable Functions

被引:0
|
作者
Kim, Changha [1 ,2 ]
Lee, Jin Wook [1 ,2 ]
Park, Geun Tae [1 ,2 ]
Shin, Myeong Su [1 ,2 ]
Baek, Seung Hun [1 ,2 ]
Woo, Jae Seung [1 ,2 ]
Choi, Woo Young [1 ,2 ]
机构
[1] Seoul Natl Univ, Dept Elect & Comp Engn, Seoul 08826, South Korea
[2] Seoul Natl Univ, Interuniv Semicond Res Ctr ISRC, Seoul 08826, South Korea
关键词
in situ encryption; IoT security; nanoelectromechanical switch; NEMS; physically unclonable functions; stiction; PUF;
D O I
10.1002/aisy.202400805
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An in situ XOR encryption/decryption approach using a nanoelectromechanical physically unclonable function (NEM-PUF) is proposed for the first time. It addresses the critical security issues during data transfer between servers/clouds and resource-constrained edge devices. The monolithic integration of NEM-PUFs using the complementary metal-oxide-semiconductor (CMOS) back-end-of-line (BEOL) process leverages process-induced intentional random stiction as an entropy source. The unique ability of NEM-PUF cells to store complementary data within a single cell enables bitwise in situ XOR operations. This feature of NEM-PUF-based in situ XOR encryption eliminates the need for complex cryptographic algorithms, which significantly reduces the power consumption, footprint, and latency compared with conventional cryptography schemes. The proposed in situ XOR encryption is demonstrated effectively within a typical federated learning domain, showcasing its broad potential applications for Internet of Things security.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] On the Encryption of the Challenge in Physically Unclonable Functions
    Vatajelu, Elena Ioana
    Di Natale, Giorgio
    Mispan, Mohd Syafiq
    Halak, Basel
    2019 IEEE 25TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2019), 2019, : 115 - 120
  • [2] Hash Based Encryption Schemes Using Physically Unclonable Functions
    Miandaob, Dina Ghanai
    Booher, Duane
    Cambou, Bertrand
    Assiri, Sareh
    INTELLIGENT COMPUTING, VOL 3, 2022, 508 : 602 - 616
  • [3] A White-Box Encryption Scheme using Physically Unclonable Functions
    Rasoamiaramanana, Sandra
    Minier, Marine
    Macario-Rat, Gilles
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 279 - 286
  • [4] PUFMon: Security Monitoring of FPGAs using Physically Unclonable Functions
    Tajik, Shahin
    Fietkau, Julian
    Lohrke, Heiko
    Seifert, Jean-Pierre
    Boit, Christian
    2017 IEEE 23RD INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS), 2017, : 186 - 191
  • [5] A framework to enhance security of physically unclonable functions using chaotic circuits
    Chen, Lanxiang
    PHYSICS LETTERS A, 2018, 382 (18) : 1195 - 1201
  • [6] Towards a Unified Security Model for Physically Unclonable Functions
    Armknecht, Frederik
    Moriyama, Daisuke
    Sadeghi, Ahmad-Reza
    Yung, Moti
    TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 271 - 287
  • [7] Hardware Intrinsic Security from Physically Unclonable Functions
    Handschuh, Helena
    Schrijen, Geert-Jan
    Tuyls, Pim
    TOWARDS HARDWARE-INTRINSIC SECURITY: FOUNDATIONS AND PRACTICE, 2010, : 39 - 53
  • [8] Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions
    Banerjee, Soumya
    Odelu, Vanga
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Rodrigues, Joel J. P. C.
    Park, Youngho
    IEEE ACCESS, 2019, 7 : 85627 - 85644
  • [9] Enhancing RFID Security and Privacy by Physically Unclonable Functions
    Sadeghi, Ahmad-Reza
    Visconti, Ivan
    Wachsmann, Christian
    TOWARDS HARDWARE-INTRINSIC SECURITY: FOUNDATIONS AND PRACTICE, 2010, : 281 - 305
  • [10] Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions
    Gope, Prosanta
    Lee, Jemin
    Quek, Tony Q. S.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (11) : 2831 - 2843