| Literature DB >> 31013741 |
Weizheng Wang1,2, Zhuo Deng3, Jin Wang4,5,6.
Abstract
With the rapid development of the Internet-of-Things (IoT), sensors are being widely applied in industry and human life. Sensor networks based on IoT have strong Information transmission and processing capabilities. The security of sensor networks is progressively crucial. Cryptographic algorithms are widely used in sensor networks to guarantee security. Hardware implementations are preferred, since software implementations offer lower throughout and require more computational resources. Cryptographic chips should be tested in a manufacturing process and in the field to ensure their quality. As a widely used design-for-testability (DFT) technique, scan design can enhance the testability of the chips by improving the controllability and observability of the internal flip-flops. However, it may become a backdoor to leaking sensitive information related to the cipher key, and thus, threaten the security of a cryptographic chip. In this paper, a secure scan test architecture was proposed to resist scan-based noninvasive attacks on cryptographic chips with boundary scan design. Firstly, the proposed DFT architecture provides the scan chain reset mechanism by gating a mode-switching detection signal into reset input of scan cells. The contents of scan chains will be erased when the working mode is switched between test mode and functional mode, and thus, it can deter mode-switching based noninvasive attacks. Secondly, loading the secret key into scan chains of cryptographic chips is prohibited in the test mode. As a result, the test-mode-only scan attack can also be thwarted. On the other hand, shift operation under functional mode is disabled to overcome scan attack in the functional mode. The proposed secure scheme ensures the security of cryptographic chips for sensor networks with extremely low area penalty.Entities:
Keywords: Internet-of-Things; cryptographic chips; information security; sensor networks; sensors
Year: 2019 PMID: 31013741 PMCID: PMC6515428 DOI: 10.3390/s19081752
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Scan design. (a) Scan architecture including regular and boundary scan chain. (b) Internal architecture of a RSC. (c) Internal architecture of a BSC.
Figure 2The flow of encryption of AES algorithm.
Figure 3Proposed secure scan test architecture.
Figure 4Functional-mode shift disability mechanism.
Figure 5Architecture of scan chain. (a) Standard scan chain. (b) Secure scan chain with scan chain reset mechanism.
Figure 6Main part of original key unit (for 128-bit AES hardware).
Figure 7The data input and scan chain structure of key register. (a) the original data input and scan chain structure of key register. (b) the data input and scan chain structure of key register for the proposed technique.
The relation between {A1’, A2’ } and {, A1, A2}.
|
| A1 A2 | A1’ A2’ |
|---|---|---|
| 1 | 00 | 11 |
| 1 | 01 | 01 |
| 1 | 10 | 10 |
| 1 | 11 | 11 |
| 0 | 00 | 00 |
| 0 | 01 | 01 |
| 0 | 10 | 10 |
| 0 | 11 | 11 |
Figure 8State diagram of proposed secure scan test scheme.
Test effectiveness results for standard scan design and proposed secure architecture.
| AES | Standard Scan Design | Proposed Secure Architecture | ||||
|---|---|---|---|---|---|---|
| Test Vectors | Fault Coverage | Test Vectors | Test Vectors Changed | Fault Coverage | Fault Coverage Changed | |
| Pipelined | 903 | 97.26% | 910 | +0.78% | 97.23% | −0.03% |
| Iterative | 608 | 97.90% | 611 | +0.49% | 97.88% | −0.02% |
Synthesis results of original implementation, standard scan design and proposed secure architecture.
| AES | Architecture | Area | Area Overhead | ||
|---|---|---|---|---|---|
| Original | Standard | Proposed | Overhead | Ratio | |
| Pipelined | 205,934 | 217,720 | 217,804 | 84 | 0.039% |
| Iterative | 25,052 | 29,032 | 29,053 | 21 | 0.072% |
Area overhead comparison of different secure schemes.
| AES | Area Overhead Ratio | ||||||
|---|---|---|---|---|---|---|---|
| Proposed | MKR [ | Secure | SOSD [ | DOS [ | |||
| DFT [ | SOSD-64 | SOSD-128 | DOS-10% | DOS-30% | |||
| Pipelined | 0.039% | 0.15% | 0.11% | 0.18% | 0.34% | 0.85% | 2.01% |
| Iterative | 0.072% | 1.32% | 0.96% | 1.52% | 2.81% | - | - |
Comparison of different security scan schemes.
| Scheme | Security | Impact on | Impact on Test | ||
|---|---|---|---|---|---|
| Vulnerability (*) | Probability of Brute Force | IP Design | Test Time | Test Application | |
| Proposed | None | Brute force is inapplicable | A D flip-flop and a few logic gates insertion; no introduction of extra input signals | No extra cycles are needed | Online testing cannot be applied |
| MKR [ | Test-mode-only attacks for boundary scan design | Brute force is inapplicable | Secure control circuit insertion; scan chain modification; extra control signals introduction | No extra cycles are needed | Online testing cannot be applied |
| Mode reset [ | Test-mode-only attacks for boundary scan design | Brute force is inapplicable | System mode security manager, scan_enable integrity controller, reset controller and test controller insertion | No extra cycles are needed | Online testing cannot be applied |
| Smart controller [ | Test-mode-only attacks for boundary scan design | Brute force is inapplicable | Smart controller and multiple multiplexers insertion | No extra cycles are needed | Online testing cannot be applied |
| Secure DFT [ | Test-mode-only attacks for boundary scan design | Brute force is inapplicable | A small secure test controller and a few logic gates insertion | No extra cycles are needed | Online testing cannot be applied |
| SOSD-64 [ | None |
| Test key loading controller, shift register insertion; scan-enabling input modification in scan chains | 64 clock cycles before testing | Delay test based on LoC cannot be applied |
| SOSD-128 [ | None |
| Test key loading controller, shift register insertion; scan-enabling input modification in scan chains | 128 clock cycles before testing | Delay test based on LoC cannot be applied |
| DOS [ | None | LFSR, shadow chain and control unit insertion; scan chain modification | No extra cycles are needed | All the tests can be applied | |
| Scan chain encryption [ | None | Scan cipher insertion at scan inputs and outputs | multiple clock cycles for pattern decryption | All the tests can be applied | |
| Scan chain scrambling [ | None | Test configuration module, unpredictable number generator and multiple multiplexers insertion; scan chain modification | Immaterial | All the tests can be applied | |
Notes: (*) It’s the vulnerability to external abnormal operation of scan-based test infrastructure. Notes: (**) k and λ represent the number and length of parallel scan chains for the DOS scheme, respectively. Notes: (***) m represents the key length of scan cipher for the scan chain encryption scheme. Notes: (****) n represents the length of test key for the scan chain scrambling scheme.