TY - JOUR
T1 - Kernel-based response extraction approach for efficient configurable ring oscillator PUF
AU - Abulibdeh, Enas
AU - Saleh, Hani
AU - Mohammad, Baker
AU - Al-Qutayri, Mahmoud
AU - Hussain, Asif
N1 - Publisher Copyright:
© The Author(s) 2025.
PY - 2025/12
Y1 - 2025/12
N2 - The Physically Unclonable Function (PUF) is an emerging hardware security primitive that provides a promising solution for lightweight security. PUFs can be used to generate a secret key that depends on the manufacturing process variation for authentication and device identification. However, the resource requirements of PUFs pose challenges for their application in resource-constrained Internet of Things (IoT) devices. This work proposes a new approach for response extraction in Configurable Ring Oscillator (CRO) PUFs that contributes to reducing area and power consumption by eliminating the need for duplicating Ring Oscillators (ROs) and decreasing associated switching activity. The kernel-based response extraction approach exploits the phase shift of the delay elements and the frequency of ROs to generate unique responses effectively. The extraction approach uses a time-based kernel that enables the internal counters of the PUF and evaluates the propagated signals within ROs for a predefined period. The extraction approach has been implemented and verified on a design variant of the CRO PUF, which is also proposed within the scope of this work. The proposed PUF has been implemented in 22-nm FDSOI technology using Synopsys tools. A comprehensive security analysis has been conducted utilizing Challenge-Response Pairs (CRPs) collected from 8 chips. The extracted responses achieve an average of 49.42%, 38.25%, 9.95%, and 45.5% for uniformity, diffuseness, IntraHD, and uniqueness, respectively. Compared with state-of-the-art designs, the proposed design achieves an 86% reduction in area and a 65.1% reduction in power consumption while delivering 2(4n+log2n) CRPs, classified as a strong PUF. Finally, 12 tests from the National Institute of Standards and Technology (NIST) and machine learning models are conducted to verify the security of responses. The NIST tests are successfully passed, and the average prediction accuracy of machine learning models is found to be 65.3%.
AB - The Physically Unclonable Function (PUF) is an emerging hardware security primitive that provides a promising solution for lightweight security. PUFs can be used to generate a secret key that depends on the manufacturing process variation for authentication and device identification. However, the resource requirements of PUFs pose challenges for their application in resource-constrained Internet of Things (IoT) devices. This work proposes a new approach for response extraction in Configurable Ring Oscillator (CRO) PUFs that contributes to reducing area and power consumption by eliminating the need for duplicating Ring Oscillators (ROs) and decreasing associated switching activity. The kernel-based response extraction approach exploits the phase shift of the delay elements and the frequency of ROs to generate unique responses effectively. The extraction approach uses a time-based kernel that enables the internal counters of the PUF and evaluates the propagated signals within ROs for a predefined period. The extraction approach has been implemented and verified on a design variant of the CRO PUF, which is also proposed within the scope of this work. The proposed PUF has been implemented in 22-nm FDSOI technology using Synopsys tools. A comprehensive security analysis has been conducted utilizing Challenge-Response Pairs (CRPs) collected from 8 chips. The extracted responses achieve an average of 49.42%, 38.25%, 9.95%, and 45.5% for uniformity, diffuseness, IntraHD, and uniqueness, respectively. Compared with state-of-the-art designs, the proposed design achieves an 86% reduction in area and a 65.1% reduction in power consumption while delivering 2(4n+log2n) CRPs, classified as a strong PUF. Finally, 12 tests from the National Institute of Standards and Technology (NIST) and machine learning models are conducted to verify the security of responses. The NIST tests are successfully passed, and the average prediction accuracy of machine learning models is found to be 65.3%.
UR - http://www.scopus.com/inward/record.url?scp=85219138013&partnerID=8YFLogxK
U2 - 10.1038/s41598-025-89769-5
DO - 10.1038/s41598-025-89769-5
M3 - Article
C2 - 39966616
AN - SCOPUS:85219138013
SN - 2045-2322
VL - 15
JO - Scientific Reports
JF - Scientific Reports
IS - 1
M1 - 5938
ER -