Abstract
The Internet of Things (IoT) is a dynamic, ever-evolving “living” entity. Hence, modern Field Programmable Gate Array (FPGA) devices with Dynamic Partial Reconfiguration (DPR) capabilities, which allow in-field non-invasive modifications to the circuit implemented on the FPGA, are an ideal fit. Usually, the activation of DPR capabilities requires the procurement of additional licenses from the FPGA vendor. In this work, we describe how IoTs can take advantage of the DPR capabilities of FPGAs, using a modified DPR methodology that does not require any paid “add-on” utility, to implement a lightweight cryptographic security protocol. We analyze possible threats that can emanate from the availability of DPR at IoT nodes, and propose possible solution techniques based on Physically Unclonable Function (PUF) circuits to prevent such threats.
Original language | English |
---|---|
Pages (from-to) | 110-122 |
Number of pages | 13 |
Journal | IEEE Transactions on Multi-Scale Computing Systems |
Volume | 1 |
Issue number | 2 |
Publication status | Published - 26 Oct 2015 |
Keywords
- Cryptographic Protocol
- Dynamic Partial Reconfiguration
- field programmable gate arrays (FPGAs)
- Hardware Trojan Horse
- Internet of things
- Physically Unclonable Functions