Next Article in Journal
Editorial for the Special Issue on ‘Agent-Based Artificial Markets’
Previous Article in Journal
The CLoTH Simulator for HTLC Payment Networks with Introductory Lightning Network Performance Results
Article Menu

Export Article

Open AccessArticle
Information 2018, 9(9), 224;

Reliable Delay Based Algorithm to Boost PUF Security Against Modeling Attacks

School of Computing, University of Southern Mississippi, Hattiesburg, MS 39406, USA
Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606-3390, USA
Department of Electrical Engineering, University of South Florida, Tampa, FL 33620, USA
This paper is an extended version of our paper published in the Annual IEEE Connecticut Conference on Industrial Electronics, Technology and Automation (CT-IETA), Bridgeport, CT, USA, 14–15 October 2016.
Author to whom correspondence should be addressed.
Received: 6 July 2018 / Revised: 15 August 2018 / Accepted: 18 August 2018 / Published: 3 September 2018
Full-Text   |   PDF [839 KB, uploaded 3 September 2018]   |  


Silicon Physical Unclonable Functions (sPUFs) are one of the security primitives and state-of-the-art topics in hardware-oriented security and trust research. This paper presents an efficient and dynamic ring oscillator PUFs (d-ROPUFs) technique to improve sPUFs security against modeling attacks. In addition to enhancing the Entropy of weak ROPUF design, experimental results show that the proposed d-ROPUF technique allows the generation of larger and updated challenge-response pairs (CRP space) compared with simple ROPUF. Additionally, an innovative hardware-oriented security algorithm, namely, the Optimal Time Delay Algorithm (OTDA), is proposed. It is demonstrated that the OTDA algorithm significantly improves PUF reliability under varying operating conditions. Further, it is shown that the OTDA further efficiently enhances the d-ROPUF capability to generate a considerably large set of reliable secret keys to protect the PUF structure from new cyber-attacks, including machine learning and modeling attacks. View Full-Text
Keywords: hardware security; PUFs; reliability; FPGAs; modeling attacks hardware security; PUFs; reliability; FPGAs; modeling attacks

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Amsaad, F.; Niamat, M.; Dawoud, A.; Kose, S. Reliable Delay Based Algorithm to Boost PUF Security Against Modeling Attacks. Information 2018, 9, 224.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Information EISSN 2078-2489 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top