Skip to Main Content
Frequently Asked Questions
Submit an ETD
Global Search Box
Need Help?
Keyword Search
Participating Institutions
Advanced Search
School Logo
Files
File List
A Trusted and Efficient Security Approach for the Detection of Hardware Trojansand Authentication of FPGA-based Systems.pdf (14.58 MB)
ETD Abstract Container
Abstract Header
A Trusted and Efficient Security Approach for the Detection of Hardware Trojans and Authentication of FPGA-based Systems
Author Info
Amsaad, Fathi Hassan Mohamed
ORCID® Identifier
http://orcid.org/0000-0002-7126-5984
Permalink:
http://rave.ohiolink.edu/etdc/view?acc_num=toledo1512494875469127
Abstract Details
Year and Degree
2017, Doctor of Philosophy, University of Toledo, Engineering (Computer Science).
Abstract
Research in the area of Hardware-Oriented Security and Trust (HOST) has recently gained momentum as it provides a unique layer of security and trust for semiconductor chips which are widely used in many industrial and life-critical applications such as automobiles, aerospace, defense, Internet of Things, and smart systems. Due to their rapid prototyping capabilities and ease of programmability, recongurable computing (RC) platforms including Field Programmable Gate Arrays (FPGAs) are becoming increasingly deployed in industry. However, these devices are not fully protected from new cyberattacks. In this research, to protect semiconductor platforms including FPGAs and Application Specic Integrated Circuits (ASICs) from invasive hardware attacks such as counterfeiting, physical tampering, and reverse engineering; a ring oscillator Physical Unclonable Function (ROPUF) based approach is proposed. This work describes the detailed physical implementation and performance measurement techniques for two novel ROPUF designs using dierent families of more than 50 Xilinx FPGAs. The impact of voltage variations, temperature variations, and aging on ROPUFs is studied in detail. Performance in terms of various metrics including uniqueness, accuracy, reproducibility, repeatability, reliability, and randomness is also evaluated. For this purpose, novel security techniques and algorithms such as systematic process variations reduction algorithm (SVRA), logarithmic abso lute diverseness technique (LDT), reproducibility with intra-die diverseness technique (RID), Logarithmic gamma (ln( )) function approach, and 1-out-of-16 coding algorithms are proposed. A detailed comparison between these techniques and other existing security techniques is presented. Experimental results show an improvement in the performance of the proposed ROPUFs over existing designs in terms of various quality metrics. Also, response bits generated from ROPUFs after applying the LDT and (ln( )) techniques successfully pass the NIST statistical test suites for randomness. Hardware Trojans are spurious specications deliberately embodied in silicon chips by an adversary to leak secret information, disable, and/or destroy the device. In order to detect Trojans, this research proposes two innovative ROPUF structures that are more sensitive to voltage uctuations. Experimental results show that the proposed techniques have the ability to detect Trojans inserted in the ICs with better accuracy as compared to earlier PUF structures. As an industrial application, a novel authentication key management scheme is proposed for the security of Advanced Metering Infrastructure (AMI) systems using congurable ROPUFs. The proposed key management scheme implements end-toend secret key exchange between the power utility companies and smart meters to ensure data condentiality and integrity. Results for various security levels show that the most frequently used security levels are L1 and L2 with total authentication times of 7.2 ms and 2.88 ms, respectively. The storage requirement for the keys is 456.7 MB over the lifespan of the smart meter. This shows that the proposed key management scheme has a small authentication time and less storage requirements as compared to earlier authentication schemes.
Committee
Mohammed Niamat, Prof. (Advisor)
Pages
222 p.
Subject Headings
Computer Engineering
;
Computer Science
Recommended Citations
Refworks
EndNote
RIS
Mendeley
Citations
Amsaad, F. H. M. (2017).
A Trusted and Efficient Security Approach for the Detection of Hardware Trojans and Authentication of FPGA-based Systems
[Doctoral dissertation, University of Toledo]. OhioLINK Electronic Theses and Dissertations Center. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1512494875469127
APA Style (7th edition)
Amsaad, Fathi.
A Trusted and Efficient Security Approach for the Detection of Hardware Trojans and Authentication of FPGA-based Systems.
2017. University of Toledo, Doctoral dissertation.
OhioLINK Electronic Theses and Dissertations Center
, http://rave.ohiolink.edu/etdc/view?acc_num=toledo1512494875469127.
MLA Style (8th edition)
Amsaad, Fathi. "A Trusted and Efficient Security Approach for the Detection of Hardware Trojans and Authentication of FPGA-based Systems." Doctoral dissertation, University of Toledo, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1512494875469127
Chicago Manual of Style (17th edition)
Abstract Footer
Document number:
toledo1512494875469127
Download Count:
575
Copyright Info
© 2017, all rights reserved.
This open access ETD is published by University of Toledo and OhioLINK.