Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4863
Title: Enhanced Security of DSP Circuits Using Multi-Key Based Structural Obfuscation and Physical-Level Watermarking for Consumer Electronics Systems
Authors: Sengupta, Anirban
Rathor, Mahendra
Keywords: Clone cells;Malware;Network security;Timing circuits;Watermarking;Double line;DSP kernel;key-based structural obfuscation;Physical level;security;Digital signal processing
Issue Date: 2020
Publisher: Institute of Electrical and Electronics Engineers Inc.
Citation: Sengupta, A., & Rathor, M. (2020). Enhanced security of DSP circuits using multi-key based structural obfuscation and physical-level watermarking for consumer electronics systems. IEEE Transactions on Consumer Electronics, 66(2), 163-172. doi:10.1109/TCE.2020.2972808
Abstract: Security of Digital Signal Processing (DSP) based Intellectual Property (IP) core is very important for the overall security and reliability of Consumer Electronics (CE) systems. These DSP based IP cores are highly vulnerable to threats such as reverse engineering (RE) leading to Trojan insertion, counterfeiting and cloning. Thus developing robust defense mechanisms is highly significant for these DSP circuits used in CE systems, especially to thwart the aforesaid threats. This article presents for the first time a double line of defense mechanism using robust multi-key based structural obfuscation integrated with tamper-tolerant physical level watermarking to counter such hardware threats. The proposed approach introduces novel key-driven partitioning based obfuscation and key-driven folding knob based obfuscation, along with other key-driven transformation based obfuscations. Additionally, the proposed approach presents novel multi-variable signature encoding based physical-level watermarking on key-based structurally obfuscated DSP circuits. The presented double line of defense incurs zero overhead as well yields high tamper tolerance during hardware watermarking. The proposed approach yields stronger strength of obfuscation, lower probability of co-incidence and larger key-space at low design cost against attacks. © 1975-2011 IEEE.
URI: https://doi.org/10.1109/TCE.2020.2972808
https://dspace.iiti.ac.in/handle/123456789/4863
ISSN: 0098-3063
Type of Material: Journal Article
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: