IET Computers & Digital Techniques
Volume 12, Issue 6, November 2018
Volumes & issues:
Volume 12, Issue 6
November 2018
-
- Source: IET Computers & Digital Techniques, Volume 12, Issue 6, p. 249 –250
- DOI: 10.1049/iet-cdt.2018.5178
- Type: Article
- + Show details - Hide details
-
p.
249
–250
(2)
- Author(s): Seyed Mohammad Sebt ; Ahmad Patooghy ; Hakem Beitollahi ; Michel Kinsy
- Source: IET Computers & Digital Techniques, Volume 12, Issue 6, p. 251 –257
- DOI: 10.1049/iet-cdt.2018.5108
- Type: Article
- + Show details - Hide details
-
p.
251
–257
(7)
A hardware Trojan (HT) is an extra circuitry inserted into a chip design with the malicious aim of functionality alteration, reliability degradation or secret information leakage. It is normally very hard to find HT activation signals since such signals are intended to activate upon occurring very rare conditions on specific nets of the infected circuit. A security engineer would have to search among thousands of gates and modules to make sure about the non-existence of design-time HTs in the circuit. The authors propose efficient net susceptibility metrics to significantly speedup functional-HT detection in gate-level digital designs. The proposed metrics perform a computationally low overhead analysis on the controllability and observability parameters of each net of the under HT-test circuit. Then, using a proposed net classifier method, a very low percentage of circuit nets is determined as HT trigger suspicious nets. To show practicality and detection accuracy of the proposed metrics, gate-level circuits of Trust-HUB benchmark suite are examined by the proposed metrics. Results confirm a 100% HT trigger detection with a low false positive as compared with previous metrics. More importantly, unlike previously proposed methods, the authors detection accuracy is totally independent of the switching probability of circuit inputs.
- Author(s): He Li ; Qiang Liu ; Fuqiang Chen
- Source: IET Computers & Digital Techniques, Volume 12, Issue 6, p. 258 –267
- DOI: 10.1049/iet-cdt.2018.5101
- Type: Article
- + Show details - Hide details
-
p.
258
–267
(10)
Hardware Trojan (HT), which usually is activated under rare conditions associated with low transition bits in a circuit, can lead to circuit functional failure or information leakage. Effectively activating hidden HTs is a major challenge during the HT detection process. In this study, the authors propose a novel approach for efficiently activating Trojans hidden in digital signal processing (DSP) circuits by increasing the transition activity of rare bits. In particular, the bit-level transition activity can be increased by controlling signal word-level statistical properties, such as standard deviation and autocorrelation, and their propagation through various operators involved in DSP circuit design. As a result, the proposed approach can generate appropriate test vectors, which effectively activate internal rare nodes and trigger HTs. The experimental results show that using the proposed approach the transition activity of rare bits is significantly increased and various HTs inserted into DSP circuits are activated with reduced time. By comparing to an existing activation approach working at the bit level, the proposed approach is superior in test vectors generation time up to 9 times reduction and HT activation time up to 66 times reduction.
- Author(s): Deepak Kachave ; Anirban Sengupta ; Shubha Neema ; Panugothu Sri Harsha
- Source: IET Computers & Digital Techniques, Volume 12, Issue 6, p. 268 –278
- DOI: 10.1049/iet-cdt.2018.5081
- Type: Article
- + Show details - Hide details
-
p.
268
–278
(11)
Device aging is a critical failure mechanism in nanoscale designs. Prolonged device degradation may result in failure. Delay degradation of a design depends on various factors such as threshold voltage, temperature, input vector pattern and so on. An attacker who is aware of this phenomenon may exploit by accelerating the performance degradation mechanism. This study proposes a novel reliability and threat analysis of negative bias temperature instability (NBTI) stress on digital signal processing (DSP) cores. The main contributions of this study are as follows: (a) identifying input vectors that cause maximum degradation of DSP cores due to NBTI stress, (b) analysing impact of NBTI stress for varying stress time on DSP core in terms of delay degradation and (c) analysing performance comparison of stress versus no-stress condition for various input vector samples.
- Author(s): Saman Kaedi ; Mohammad Ali Doostari ; Mohammad Bagher Ghaznavi-Ghoushchi
- Source: IET Computers & Digital Techniques, Volume 12, Issue 6, p. 279 –288
- DOI: 10.1049/iet-cdt.2018.5098
- Type: Article
- + Show details - Hide details
-
p.
279
–288
(10)
The hardware security issues are emerging in crypto-algorithms of embedded portable Internet-of-Things-Devices (IoTD). The communication protocols/standards including MQTT (Message Queuing Telemetry Transport) are enforcing additional cares in device-to-system design perspectives. Due to computation-capacity limitations (CCLs) in battery-operated IoTD, heavy-duty crypto-algorithms are prohibited. This results in compromised hardware using lightweight algorithms. In this study, a new implementation schema for hierarchically-connected IoTD for indoor applications is proposed. This schema allows the IoT network to utilise strong-crypto-algorithms (i.e. RSA) instead of lightweight algorithms (i.e. attribute-based encryption (ABE)). Therefore, without increasing the consumption power or complexity, the security in the IoT network increases. This method brings about a new low CCL RSA with two-folded power-aware implementation. Furthermore, without complexity overhead, the proposed method is more secure than the conventional implementation due to the inherent countermeasure against the side-channel attacks. The presented schema is implemented on a target IoT network, utilising in XC7A100T-FPGA as IoT nodes. Furthermore, both the conventional and the proposed RSA-2048 have been implemented in Spartan6-LX75 on a SAKURA-GW board. The results show that the proposed method has reduced the RSA execution time and consumption power of IoTD at about 50 and 60%, respectively. The most noticeable drawback of the current implementation is an overhead in the range of 30–53% on block-random access memory (RAM) usage.
- Author(s): Paul Wortman ; Wei Yan ; John Chandy ; Fatemeh Tehranipoor
- Source: IET Computers & Digital Techniques, Volume 12, Issue 6, p. 289 –296
- DOI: 10.1049/iet-cdt.2018.5099
- Type: Article
- + Show details - Hide details
-
p.
289
–296
(8)
Continued growth and development in the consumer electronic market have greatly increased in the realm of home automation. With this swelling in smart, Internet-connected consumer electronics, there is a need to ensure the safe and secure use of these products. So how does one authenticate each product in a large connected environment? How can the authors minimise counterfeiting, cloning, and the presence of Trojans in customer electronics? In this study, they explore their method of using various physically unclonable functions (PUFs) as a potential seed for a pseudorandom number generators (PRNGs) element. These can then be used to authenticate consumer electronic devices or protect communication over a large interconnected network. The advantage of this work is that their method increases the difficulty of attackers to learn patterns of the seed of each PRNG while optimising PUF-based constraints in different consumer electronic domains. Through this work they enhance the function of PRNGs, increasing the difficulty of attackers’ ability to model security systems, as well as present a lightweight and efficient solution to the growing security concerns. By making the PRNG more difficult to model, malicious actors are less able to overcome their proposed security enhancement leading to a safe and secure environment.
- Author(s): Daniel Brown ; Ava Hedayatipour ; Md. Badruddoja Majumder ; Garrett S. Rose ; Nicole McFarlane ; Donatello Materassi
- Source: IET Computers & Digital Techniques, Volume 12, Issue 6, p. 297 –305
- DOI: 10.1049/iet-cdt.2018.5005
- Type: Article
- + Show details - Hide details
-
p.
297
–305
(9)
The authors report on the realisation of an encryption process in real-time analogue circuitry using on-the-shelf components and minimal processing power. Self-synchronisation of two similar systems through a single shared state is a unique property of the chaotic Lorenz attractor system. In this process, the single parameters of the system are modulated to mask a message before transmitting securely through a single-shared state. However, these techniques are vulnerable to the return map attack. They show that time-scaling can further obfuscate the modulation process and improve return map attack immunity and demonstrate a fabricated printed circuit board implementation of the system.
Guest Editorial: Hardware-Assisted Techniques for Security and Protection of Consumer Electronics
Circuit enclaves susceptible to hardware Trojans insertion at gate-level designs
Signal word-level statistical properties-based activation approach for hardware Trojan detection in DSP circuits
Effect of NBTI stress on DSP cores used in CE devices: threat model and performance estimation
Low-complexity and differential power analysis (DPA)-resistant two-folded power-aware Rivest–Shamir–Adleman (RSA) security schema implementation for IoT-connected devices
P2M-based security model: security enhancement using combined PUF and PRNG models for authenticating consumer electronic devices
Practical realisation of a return map immune Lorenz-based chaotic stream cipher in circuitry
Most viewed content
Most cited content for this Journal
-
High-performance elliptic curve cryptography processor over NIST prime fields
- Author(s): Md Selim Hossain ; Yinan Kong ; Ehsan Saeedi ; Niras C. Vayalil
- Type: Article
-
Majority-based evolution state assignment algorithm for area and power optimisation of sequential circuits
- Author(s): Aiman H. El-Maleh
- Type: Article
-
Scalable GF(p) Montgomery multiplier based on a digit–digit computation approach
- Author(s): M. Morales-Sandoval and A. Diaz-Perez
- Type: Article
-
Fabrication and characterisation of Al gate n-metal–oxide–semiconductor field-effect transistor, on-chip fabricated with silicon nitride ion-sensitive field-effect transistor
- Author(s): Rekha Chaudhary ; Amit Sharma ; Soumendu Sinha ; Jyoti Yadav ; Rishi Sharma ; Ravindra Mukhiya ; Vinod K. Khanna
- Type: Article
-
Adaptively weighted round-robin arbitration for equality of service in a many-core network-on-chip
- Author(s): Hanmin Park and Kiyoung Choi
- Type: Article