A comparative analysis of VLSI trusted virtual sensors

被引:0
|
作者
Martinez-Rodriguez, Macarena C. [1 ]
Brox, Piedad [1 ]
Baturone, Iluminada [1 ]
机构
[1] Univ Seville, CSIC, Inst Microelect Sevilla IMSE CNM, Americo Vespucio 28, Seville 41092, Spain
关键词
Virtual sensors; Data security; Hardware security; Authenticated ciphers; Piecewise linear approximation; CMOS Integrated circuits; FPGA; IMPLEMENTATIONS;
D O I
10.1016/j.micpro.2018.05.016
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper analyzes three cryptographic modules suitable for digital designs of trusted virtual sensors into integrated circuits, using 90-nm CMOS technology. One of them, based on the keyed-hash message authentication code (HMAC) standard employing a PHOTON-80/20/16 lightweight hash function, ensures integrity and authentication of the virtual measurement. The other two, based on CAESAR (the Competition for Authenticated Encryption: Security, Applicability, and Robustness) third-round candidates AEGIS-128 and ASCON-128, ensure also confidentiality. The cryptographic key required is not stored in the sensor but recovered in a configuration operation mode from non-sensitive data stored in the non-volatile memory of the sensor and from the start-up values of the sensor SRAM acting as a Physical Unclonable Function (PUF), thus ensuring that the sensor is not counterfeit. The start-up values of the SRAM are also employed in the configuration operation mode to generate the seed of the nonces that make sensor outputs different and, hence, resistant to replay attacks. The configuration operation mode is slower if using CAESAR candidates because the cryptographic key and nonce have 128 bits instead of the 60 bits of the key and 32 bits of the nonce in HMAC. Configuration takes 416.8 mu s working at 50 MHz using HMAC and 426.2 mu s using CAESAR candidates. In the other side, the trusted sensing mode is much faster with CAESAR candidates with similar power consumption. Trusted sensing takes 212.62 mu s at 50 MHz using HMAC, 0.72 mu s using ASCON, and 0.42 mu s using AEGIS. AEGIS allows the fastest trusted measurements at the cost of more silicon area, 4.4 times more area than HMAC and 5.4 times more than ASCON. ASCON allows fast measurements with the smallest area occupation. The module implementing ASCON occupies 0.026 mm(2) in a 90-nm CMOS technology.
引用
收藏
页码:108 / 116
页数:9
相关论文
共 50 条
  • [41] DEVICES MEETING FOCUSES ON VLSI, GAAS, AND SENSORS
    CAPECE, R
    MOKHOFF, N
    ELECTRONICS, 1978, 51 (25): : 129 - 133
  • [42] Virtual sensors for dynamic virtual environments
    Piza, HI
    Ramos, FF
    Zúñiga, F
    IEEE CAMSAP 2005: FIRST INTERNATIONAL WORKSHOP ON COMPUTATIONAL ADVANCES IN MULTI-SENSOR ADAPTIVE PROCESSING, 2005, : 177 - 180
  • [43] A Comparative Usability Analysis of Virtual Reality Goggles
    Pontes de Franca, Ana Carol
    Vitorino, Danilo Fernandes
    Neves, Aline de Oliveira
    de Lima, Cristiane Nunes
    Soares, Marcelo Marcio
    DESIGN, USER EXPERIENCE, AND USABILITY: DESIGNING PLEASURABLE EXPERIENCES, DUXU 2017, PT II, 2017, 10289 : 565 - 574
  • [44] Comparative analysis of real and virtual garment fit
    Ancutiene, Kristina
    INDUSTRIA TEXTILA, 2014, 65 (03): : 158 - 165
  • [45] Trusted virtual machine management model for cloud computing
    Zhou, Zhen-Ji
    Wu, Li-Fa
    Hong, Zheng
    Lai, Hai-Guang
    Zheng, Cheng-Hui
    1600, Editorial Board of Journal on Communications (35): : 94 - 105
  • [46] Subscriber authentication in cellular networks with trusted virtual SIMs
    Kasper, Miclaael
    Kuntze, Nicolai
    Schmidt, Andreas U.
    10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 903 - 908
  • [47] Virtual governance networking policies: A comparative analysis
    Didehvar F.
    Danaeefard H.
    Public Organization Review, 2010, 10 (1) : 1 - 16
  • [48] Virtual forms for the organization of production: A comparative analysis
    Corvello, Vincenzo
    Migliarese, Piero
    INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2007, 110 (1-2) : 5 - 15
  • [49] Trusted Virtual Domains - Design, Implementation and Lessons Learned
    Catuogno, Luigi
    Dmitrienko, Alexandra
    Eriksson, Konrad
    Kuhlmann, Dirk
    Ramunno, Gianluca
    Sadeghi, Ahmad-Reza
    Schulz, Steffen
    Schunter, Matthias
    Winandy, Marcel
    Zhan, Jing
    TRUSTED SYSTEMS, 2010, 6163 : 156 - +
  • [50] A Method of Constructing the Model of Trusted Virtual Machine Migration
    Shi Y.
    Zhang H.
    Wu F.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2017, 54 (10): : 2284 - 2295