Next Article in Journal
A Study on the Effect of O2 Diffusion on the Retention Time of Inert Agents
Previous Article in Journal
Analysis of Serve and Serve-Return Strategies in Elite Male and Female Padel
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Hardware Security Architecture for IoT Device: PD-CRP (PUF Database and Challenge–Response Pair) Bloom Filter on Memristor-Based PUF

1
Department of Electronic and Electrical Engineering, Ewha Womans University, Seoul 03760, Korea
2
Smart Factory Multidisciplinary Program, Ewha Womans University, Seoul 03760, Korea
3
Department of Electrical and Computer Engineering, Seoul National University, Seoul 08826, Korea
*
Author to whom correspondence should be addressed.
Appl. Sci. 2020, 10(19), 6692; https://doi.org/10.3390/app10196692
Submission received: 24 August 2020 / Revised: 16 September 2020 / Accepted: 21 September 2020 / Published: 24 September 2020
(This article belongs to the Section Electrical, Electronics and Communications Engineering)

Abstract

Because the development of the Internet of Things (IoT) requires technology that transfers information between objects without human intervention, the core of IoT security will be secure authentication between devices or between devices and servers. Software-based authentication may be a security vulnerability in IoT, but hardware-based security technology can provide a strong security environment. Physical unclonable functions (PUFs) are hardware security element suitable for lightweight applications. PUFs can generate challenge–response pairs(CRPs) that cannot be controlled or predicted by utilizing inherent physical variations that occur in the manufacturing process. In particular, the pulsewidth-based memristive PUF (pm-PUF) improves security performance by applying different write pulse widths and bank structures. Bloom filters (BFs) are probabilistic data structures that answer membership queries using small memories. Bloom filters can improve search performance and reduce memory usage and are used in areas such as networking, security, big data, and IoT. In this paper, we propose a structure that applies Bloom filters based on the pm-PUF to reduce PUF data transmission errors. The proposed structure uses two different Bloom filter types that store different information and that are located in front of and behind the pm-PUF, reducing unnecessary access by removing challenges from attacker access. Simulation results show that the proposed structure decreases the data transmission error rate and reuse rate as the Bloom filter size increases; the simulation results also show that the proposed structure improves pm-PUF security with a very small Bloom filter memory.
Keywords: physical unclonable function; bloom filter; hardware security; PUF; memristor physical unclonable function; bloom filter; hardware security; PUF; memristor

Share and Cite

MDPI and ACS Style

Lee, J.; Choi, S.; Kim, D.; Choi, Y.; Sun, W. A Novel Hardware Security Architecture for IoT Device: PD-CRP (PUF Database and Challenge–Response Pair) Bloom Filter on Memristor-Based PUF. Appl. Sci. 2020, 10, 6692. https://doi.org/10.3390/app10196692

AMA Style

Lee J, Choi S, Kim D, Choi Y, Sun W. A Novel Hardware Security Architecture for IoT Device: PD-CRP (PUF Database and Challenge–Response Pair) Bloom Filter on Memristor-Based PUF. Applied Sciences. 2020; 10(19):6692. https://doi.org/10.3390/app10196692

Chicago/Turabian Style

Lee, Jungwon, Seoyeon Choi, Dayoung Kim, Yunyoung Choi, and Wookyung Sun. 2020. "A Novel Hardware Security Architecture for IoT Device: PD-CRP (PUF Database and Challenge–Response Pair) Bloom Filter on Memristor-Based PUF" Applied Sciences 10, no. 19: 6692. https://doi.org/10.3390/app10196692

APA Style

Lee, J., Choi, S., Kim, D., Choi, Y., & Sun, W. (2020). A Novel Hardware Security Architecture for IoT Device: PD-CRP (PUF Database and Challenge–Response Pair) Bloom Filter on Memristor-Based PUF. Applied Sciences, 10(19), 6692. https://doi.org/10.3390/app10196692

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop