Journal of Electronic Testing
https://doi.org/10.1007/s10836-019-05808-w
Enhanced Authentication Using Hybrid PUF with FSM for Protecting
IPs of SoC FPGAs
J. Kokila
1
· N. Ramasubramanian
1
Received: 20 February 2019 / Accepted: 27 May 2019
© Springer Science+Business Media, LLC, part of Springer Nature 2019
Abstract
A new generation of technology is harder and costlier to deliver because of the physical design limitations of the silicon
chip. The minute chip alone is not only compromising the requirements of the user but also creates challenges with respect
to security. Architecture for two-factor authentication is designed with low-power, area and with less- human intervention.
The proposed model consists of hybrid physical unclonable functions (PUFs) and finite state machine (FSM), which is used
to secure the chip and intellectual property (IP) respectively. The PUFs are most often used in recent security applications
such as IP protection, IC metering, hardware signature, and obfuscation. This application needs a complex algorithm with a
database which consumes more cost and time. In this paper, we have proposed an authentication model consisting of strong
and weak PUF with an FSM which can be used for IoT applications. The main focus of this proposal is to authenticate
hardware and software IP in circuits. The Experimental evaluation illustrates that the area and power consumed are 5% and
9%, respectively, for authenticating 26 IPs with no false acceptance ratio (FAR) and 1% false rejection ratio (FRR).
Keywords System-on-a-chip design · Field - programmable gate array · Arbiter PUF · Butterfly PUF · Finite state
machine · Two-factor authentication · Hardware security and IP protection
1 Introduction
Everyday activity is completely associated with embedded
devices. The design cost and complexity of such a device
are increasing day by day with a demand for the light-
weight authentication technique that can be implemented on
a prevalent device. The technique used for authentication
should be aware of the physical attack because the attacker
will directly access the device at any time [1]. The existing
authentication methods suffer from computational delay and
performance reduction because of multifactor involvement,
which is not appropriate for any high-speed, hand-held and
sensitive applications.
Responsible Editor: O. Sinanoglu
J. Kokila
406114002@nitt.edu
N. Ramasubramanian
nrs@nitt.edu
1
Department of Computer Science and Engineering, National
Institute of Technology, Tiruchirappalli, India
System-on-a-chip (SoC) design incorporates the entire
modern computer system onto a distinct die. It is embedded
with a high-speed processor like ARM along with GPU,
dual data rate (DDR) memory, USB controller, WiFi,
power management circuits, and wireless radios. The SoC
technology serves as a subset of embedded systems, as all
the basic features will be available and extra functionality
can be added to meet recent advancement [2]. The SoC is
the multidisciplinary technology that is used in smartphones
and consumer devices and has a vital role in the field of
agriculture, medical, academic, research, engineering, and
technology. The SoC is the multidisciplinary technology
that is used in smartphones and consumer devices and has an
important role in the field of agriculture, medical, academic,
research, engineering, and technology.
Field-programmable gate array (FPGA) is known for
its flexibility in design, less time to market and low cost,
hence it is more preferred in chip design recently instead
of application-specific integrated circuits (ASICs). FPGAs
are used as a standard platform for designing hardware and
software in consumer electronics and space equipment as
referred in [3]. Such FPGAs can be embedded with high-
speed processors to form an SoC FPGA platform. Hence,
they offer high flexibility, bandwidth communication by