| Literature DB >> 31652631 |
WeiZheng Wang1,2, Zhuo Deng3, Jin Wang4,5,6, Arun Kumar Sangaiah7, Shuo Cai8, Zafer Almakhadmeh9, Amr Tolba10,11.
Abstract
Wireless sensor networks (WSN) have deeply influenced the working and living styles of human beings. Information security and privacy for WSN is particularly crucial. Cryptographic algorithms are extensively exploited in WSN applications to ensure the security. They are usually implemented in specific chips to achieve high data throughout with less computational resources. Cryptographic hardware should be rigidly tested to guarantee the correctness of encryption operation. Scan design improves significantly the test quality of chips and thus is widely used in semiconductor industry. Nevertheless, scan design provides a backdoor for attackers to deduce the cipher key of a cryptographic core. To protect the security of the cryptographic system we first present a secure scan architecture, in which an automatic test control circuitry is inserted to isolate the cipher key in test mode and clear the sensitive information at mode switching. Then, the weaknesses of this architecture are analyzed and an enhanced scheme using concept of test authorization is proposed. If the correct authorization key is applied within the specific time, the normal test can be performed. Otherwise, only secure scan test can be performed. The enhanced scan scheme ensures the security of cryptographic chips while remaining the advantages of scan design.Entities:
Keywords: cryptography; hardware security; scan-based attack; wireless sensor networks
Year: 2019 PMID: 31652631 PMCID: PMC6832598 DOI: 10.3390/s19204598
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Scan design: (a) A standard scan cell (SC); (b) A full-scan circuit with single scan chain.
Figure 2Hardware framework of proposed secure scan test scheme.
Figure 3State diagram of automatic test control unit.
Figure 4Architecture of the automatic test control unit.
Figure 5The actual state diagram.
Figure 6Aided resetting logic.
Figure 7Isolating logic.
Figure 8Test authorization mechanism.
Figure 9Architecture of improved automatic test control unit.
Areas of original circuit, standard scan design and proposed ISSATCU.
| AES | Area: The Number of Equivalent 2-Input NAND Gates | ||||||
|---|---|---|---|---|---|---|---|
| Original | Standard | ISSATCU | |||||
| pipelined | 205,934 | 212,280 | 212,551 | 212,567 | 212,571 | 212,575 | 212,587 |
| iterative | 25,052 | 25,512 | 25,783 | 25,799 | 25,803 | 25,807 | 25,819 |
Percentage area penalty of proposed ISSATCU.
| AES | ISSATCU | Area Penalty | ΔArea |
|---|---|---|---|
| pipelined | 271 | 0.128% | |
| 287 | 0.135% | ||
| 291 | 0.137% | ||
| 295 | 0.139% | ||
| 307 | 0.145% | ||
| iterative | 271 | 1.06% | |
| 287 | 1.12% | ||
| 291 | 1.14% | ||
| 295 | 1.16% | ||
| 307 | 1.20% |
Figure 10Relationship curve between the area penalty and the length of test authorization key.
Comparison of different security schemes.
| Secure | Area Penalty (%) | Security | Impact on | Limit on Test | ||
|---|---|---|---|---|---|---|
| Pipelined | Iterative | Vulnerability | Brute Force Probability | |||
| ISSATCU with 128-bit authori-zation key | 0.15 | 1.20 | None | 2−128 | less than or equal to 128 clock cycles | All types of tests are applicable |
| Secure DFT | 0.11 | 0.96 | None | inapplicable | No extra clock cycles | Online testing is inapplicable |
| MKR | 0.15 | 1.32 | None | inapplicable | No extra clock cycles | Online testing is inapplicable |
| Mode switching reset [ | ≈10 | -- | Test-mode- | inapplicable | No extra clock cycles | Online testing is inapplicable |
| SOSD-128 | 0.34 | 2.81 | Test-mode- | 2−128 | 128 clock cycles before testing | LOC Delay testing is inapplicable |
| DOSD-128 | 0.47 | 3.91 | None | 2−128 | 128 clock cycles before testing | LOC Delay testing is inapplicable |
| DOS [ | 2.01 | -- | Memory attack | 2− | No extra clock cycles | All types of tests are applicable |
| SIE [ | 2.52 | -- | Memory attack | 2− | multiple clock cycles for vector decryption | All types of tests are applicable |
| FTSL-128 | 3.80 | 31.66 | None | 2−128 | 128 clock cycles before testing | LOC Delay testing is not applicable |
* k and λ denote the number and the length of scan chains. ** m denotes the key length of block cipher.