FPGA implementation of artificial neural network for PUF modeling
FPGA implementation of artificial neural network for PUF modeling
Corresponding Author:
Mohd Syafiq Mispan
Faculty of Electronics and Computer Technology and Engineering, Universiti Teknikal Malaysia Melaka
Jalan Hang Tuah Jaya, 76100 Durian Tunggal, Melaka, Malaysia
Email: [email protected]
1. INTRODUCTION
Internet of things (IoT) enable the ubiquitous electronic devices in which these devices are connected
via an internet network, and it is possible to exchange data among them. IoT implementation often requires
specific and unique network requirements, which can be programmed or reprogrammed in the field of applica-
tion with a cost and time-efficient manner. Field-programmable gate array (FPGA) is a foundation for building
the next generation of IoT systems since it offers scalability, low latency, and low power [1]-[3]. FPGA can
be programmed or reprogrammed according to the requirements of IoT applications. Examples of IoT applica-
tions include secure access, smart surveillance cameras, smart homes, and smart meters. All these applications
require user-specific data to be processed. Hence, it is very crucial to enable device identification and authen-
tication in IoT applications [4].
Physical unclonable function (PUF) is a technology that can be deployed in FPGA-based IoT ap-
plications for device identification and authentication. PUF provides root-of-trust from a hardware layer by
exploiting the integrated circuit (IC) manufacturing intrinsic process variations [5]. PUF maps an input known
as a challenge to generate a unique output known as a response. The mapping of the challenge and response
pairs (CRPs) is unique for a group of similar types of PUFs (i.e., device-specific response). Hence, PUF pro-
vides a great and promising capability to be used for device identification and authentication application. Figure
?? depicts the PUF-based identification and authentication process, which consists of two phases; enrollment
and authentication. During the enrollment phase, the CRPs of the prover are extracted and stored in the verifier
database, d, in a trusted environment. In the field of application, the prover sends its response (r̃) to the verifier
and compares it against the response (r) in the database. If both responses are matched, the prover is a genuine
or valid device, otherwise, the prover is identified as a fake device.
Verifier −→ Prover j
⟨cij , rij ⟩ with cij ← T RN G() ←→ rij ← P U F (cij )
1x Enrollment
dj ← d
⟨c, r⟩ ← ⟨cij , rij ⟩ with i ← dj
dj ← dj − 1
c
−→ r̃ ← P U F (c)
dx Authentication
PUF-based identification and authentication, as described above, has a major drawback of severe area
overhead in the verifier database. The CRPs are not allowed to be reused to avoid on-path attack or man-in-
the-middle attack [8]. Therefore, the verifier has to store an enormous amount of CRPs to authenticate the
PUFs. Storing the PUF computational model is an alternative solution to overcome the severe area overhead
in the verifier database [9]-[13]. Aghaie et al. [9] developed a technique to build the computational model
of delay-based PUFs by using an internal delay sensor known as a time-do-digital converter (TDC) in FPGA.
The sensor measures the delay of signals that pass through the switching components in delay-based PUF
architecture. Subsequently, the measured delay is used to build the PUF computational model. Although the
above method reduces the number of CRPs to build the PUF computational model, the sensors remain on-chip,
hence exposing the device to be easily modeled by the adversaries. In other studies [10]-[13], the machine
learning (ML) technique is used to model the PUF. Enormous CRPs are measured during the enrollment phase,
and subsequently the PUF model is built using ML technique based on the extracted CRPs.
Elsewhere, Idris et al. [14] developed a lightweight authentication protocol that is built using the
PUF model. The usage of the PUF model in the verifier database and its physical PUF in the prover device
without any protection mechanism is insecure, as an adversary can perform a modeling attack by collecting the
exposed CRPs. Hence, the protocol in [14] deploys secret pattern recognition to perform mutual authentication
between the verifier and prover. In another study, Yue et al. [15] proposed an authentication scheme involving
the sequence of dynamic random access memory (DRAM) power-up values and convolutional neural network
(CNN). Power-up values in memory are random and exhibit device-specific features. CNN is deployed to model
these unique features based on the DRAM power-up sequence that has been converted to a two-dimensional
(2D) image structure. The proposed authentication scheme requires only the DRAM-PUF model (i.e., unique
feature) in the database. Nevertheless, deploying deep learning architecture such as CNN in the proposed
authentication scheme requires a huge area as deep learning typically consists of a significant number of layers
and a complex computational matrix.
All of the above studies show that deploying the PUF model in the database of verifier is getting the
attention of the PUF research community. Nevertheless, the chosen ML technique must be able to build the PUF
model in a cost-efficient manner. Moreover, the previous studies only focusing on methodical approach (i.e.,
building protocol of using PUF model) and/or simulation-level analysis only. Therefore, this study focuses on a
PUF computational model development in Xilinx Artix-7 FPGA board using an artificial neural network (ANN)
to enable lightweight authentication protocol in FPGA-based IoT applications. The PUF model accuracy, area
and power consumption are evaluated and discussed.
FPGA implementation of artificial neural network for PUF modeling (Mohd Syafiq Mispan)
202 ❒ ISSN: 2089-4864
2. METHOD
k-bit Arbiter-PUF [16], [17] is used as a case study for building the computational model of PUF in
FPGA. Figure ?? illustrates the top-level architecture of k-bit Arbiter-PUF. Arbiter-PUF is chosen in our study
as it has a lightweight architecture [18] and k value is set to 32 to provide considerably enough process vari-
ations for Arbiter-PUF implementation in FPGA [19]. There are three major design steps in the development
of PUF modeling in FPGA. First, the physical Arbiter-PUF is implemented on FPGA following the methods
as described in [20]. Subsequently, random and unique challenges were generated using 32-bit linear-feedback
shift register (LFSR) with a primitive polynomial of x32 + x31 + x30 + x10 + 1 and applied to the physi-
cal Arbiter-PUF to generate the 1-bit corresponding responses. In total, 20,200 CRPs are extracted from the
physical Arbiter-PUF for building the PUF model.
Switching Component
c1 = 0 c2 = 1 ck-1 = 0 ck = 1
Based on the extracted CRPs, the next step is to build the PUF model in a MATLAB using the ANN
technique. A 3-layer of ANN architecture is used, which consists of one input layer, one hidden layer with
five neurons, and one output layer. The number of neurons has been determined based on the rule of thumb
described in [21]. Log-sigmoid function is used as an activation in the hidden layers, which is given as f (x) =
1
1+e−x . Following [22], a resilient backpropagation algorithm is used as the training algorithm as it provides
fast convergence time and optimum prediction accuracy. 20,000 CRPs are used as a training data set, and the
remaining 200 CRPs are used as a test data set. The weightage and bias values from the successful training of
PUF modeling in MATLAB are extracted for the subsequent design steps.
The third design step is to implement the above ANN architecture (i.e., with the extracted weight and
bias values) in Xilinx system generator. Xilinx system generator is a MATLAB Simulink add-on that enables
the development of architecture-level FPGA designs using graphical block programming [23]. The design of
the 32-bit Arbiter-PUF model in Xilinx system generator is subsequently converted into intellectual property
(IP) core. Finally, the IP core, MicroBlaze core processor, and other peripherals are programmed into Xilinx
Artix-7 FPGA using Xilinx Vivado Design Suite to validate the functionality of the Arbiter-PUF model as
compared to the physical Arbiter-PUF.
Int J Reconfigurable & Embedded Syst, Vol. 14, No. 1, March 2025: 200–207
Int J Reconfigurable & Embedded Syst ISSN: 2089-4864 ❒ 203
Figure 4. Partial computational block diagram of each neuron in the hidden layer
The output of each neuron, x is input to the log-sigmoid activation function, which is given as
f (x) = 1+e1−x . The log-sigmoid activation function bounds its output to the range of (0,1). According to
Tisan et al. [25], a piecewise second-order approximation is used in our study to reduce the computational
complexity. Figure ?? illustrates the implementation of the log-sigmoid activation function in Xilinx sys-
tem generator. Meanwhile, Figure ?? depicts the graph comparison of an ideal log-sigmoid versus piecewise
second-order approximation. As can be seen, the approximation technique requires a bigger x value to bounds
its output to the range of (0,1).
FPGA implementation of artificial neural network for PUF modeling (Mohd Syafiq Mispan)
204 ❒ ISSN: 2089-4864
0.8
0.6
f(x)
0.4
0.2
Piecewise approximation
Ideal log-sigmoid
0
−60 −40 −20 0 20 40 60
x
Subsequently, the activated output is input to the third layer or output layer. Figure ?? illustrates
the computational block diagram of an output layer. The computational process in the output layer can be
represented as o = Σnj=1 wj yj + θ where o is the output, y is equivalent to f (x) (i.e., the activated output),
w is the weightage, θ is the bias value, and n is the total number of neurons. The output layer performs the
classification process to classify the response ‘0’ and ‘1’. In the output layer, an additional block called a
comparator is required to counteract the approximated computation of log-sigmoid functions. The design of
32-bit Arbiter-PUF model in Xilinx system generator which based on ANN architecture as discussed above
is converted into an IP core. Subsequently, the IP core, MicroBlaze core processor, and other peripherals are
programmed into Xilinx Artix-7 FPGA as illustrated in Figure ?? for CRPs collection.
Int J Reconfigurable & Embedded Syst, Vol. 14, No. 1, March 2025: 200–207
Int J Reconfigurable & Embedded Syst ISSN: 2089-4864 ❒ 205
100
90
Modeling Accuracy (%)
80
70
60
50
0 0.5 1 1.5 2
CRPs (104 )
FPGA implementation of artificial neural network for PUF modeling (Mohd Syafiq Mispan)
206 ❒ ISSN: 2089-4864
4. CONCLUSION
In this study, the 32-bit Arbiter PUF has been modeled using the ANN technique in MATLAB and
subsequently, the model is implemented on FPGA using Xilinx system generator and Xilinx Vivado Design
Suite. The FPGA implementation consumes 12196 LUTs, 67 mW power, and ≈ 98% accuracy. A successful
implementation of the PUF model can replace the conventional CRPs database in the verifier. The verifier
consists of the ANN architecture and a database of weightage and biases of provers. PUF model provides
scalability in which an unlimited number of authentications can be performed by a prover. Future direction
may focus on security enhancement of the verifier database to avoid adversaries’ attacks on retrieving the
weightage/biases information.
ACKNOWLEDGEMENT
The authors would like to thank the Universiti Teknikal Malaysia Melaka and Ministry of Higher Ed-
ucation Malaysia for the financial funding of project completion. Grant No. FRGS/1/2020/TK0/UTEM/02/56.
REFERENCES
[1] M. Elnawawy, A. Farhan, A. A. Nabulsi, A. R. Al-Ali, and A. Sagahyroon, “Role of FPGA in internet of things applica-
tions,” in IEEE International Symposium on Signal Processing and Information Technology, pp. 1-6, 2019, doi: 10.1109/IS-
SPIT47144.2019.9001747.
[2] A. Magyari and Y. Chen, “Review of state-of-the-art FPGA applications in IoT networks,” Sensors, vol. 22, no. 19, pp. 1-18, 2022,
doi: 10.3390/s22197496.
[3] T. P. Dinh, C. Pham-Quoc, T. N. Thinh, B. K. D. Nguyen, and P. C. Kha, “A flexible and efficient FPGA-based random forest
architecture for IoT applications,” Internet of Things, vol. 22, pp. 1-14, 2023, doi: 10.1016/j.iot.2023.100813.
[4] R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan, “Internet of things (IoT) security: Current status, challenges and prospective
measures,” in International Conference for Internet Technology and Secured Transactions, pp. 336-341, 2016, doi: 10.1109/IC-
ITST.2015.7412116.
[5] M. S. Mispan, B. Halak, and M. Zwolinski, “A survey on the susceptibility of PUFs to invasive, semi-invasive and non-invasive
attacks: challenges and opportunities for future directions,” Journal of Circuits, Systems and Computers, vol. 30, no. 11, pp. 1-37,
2021, doi: 10.1142/S0218126621300099.
[6] G. E. Suh and S. Devadas, “Physical Unclonable Functions for device authentication and secret key generation,” in ACM/IEEE
Design Automation Conference, pp. 9-14, 2007, doi: 10.1145/1278480.1278484.
[7] J. Delvaux, R. Peeters, D. Gu, and I. Verbauwhede, “A survey on lightweight entity authentication with strong PUFs,” ACM Com-
puting Surveys, vol. 48, no. 2, pp. 1–42, Nov. 2015, doi: 10.1145/2818186.
[8] M. S. Mispan, A. Z. Jidin, M. R. Kamaruddin, and H. M. Nasir, “Proof of concept for lightweight PUF-based authentication protocol
using NodeMCU ESP8266,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 24, no. 3, pp. 1392-1398,
2021, doi: 10.11591/ijeecs.v24.i3.pp1392-1398.
[9] A. Aghaie, M. Ender, and A. Moradi, “PUFs physical learning: accelerating the enrollment via delay-based model extraction,” IEEE
Transactions on Emerging Topics in Computing, vol. 10, no. 3, pp. 1621-1632, 2022, doi: 10.1109/TETC.2021.3115176.
[10] A. Aghaie, M. Ender, and A. Moradi, “PUFs Physical Learning: Accelerating the Enrollment via Delay-Based Model Extraction,”
IEEE Transactions on Emerging Topics in Computing, vol. 10, no. 3, pp. 1621–1632, Jul. 2022, doi: 10.1109/TETC.2021.3115176.
[11] A. Ali-Pour, F. Afghah, D. Hely, V. Beroulle, and G. Di Natale, “Secure PUF-based Authentication and Key Exchange Protocol
using Machine Learning,” in Proceedings of IEEE Computer Society Annual Symposium on VLSI, ISVLSI, IEEE, Jul. 2022, pp.
386–389, doi: 10.1109/ISVLSI54635.2022.00086.
[12] M. S. E. Quadir and J. A. Chandy, “Embedded systems authentication and encryption using strong PUF modeling,” in IEEE Inter-
national Conference on Consumer Electronics, pp. 1-6, 2020, doi: 10.1109/ICCE46568.2020.9043104.
[13] Y. Yilmaz, S. R. Gunn, and B. Halak, “Lightweight PUF-based authentication protocol for IoT devices,” in 2018 IEEE 3rd Interna-
tional Verification and Security Workshop, IVSW 2018, pp. 38–43, 2018, doi: 10.1109/IVSW.2018.8494884.
[14] T. A. Idriss, H. A. Idriss, and M. A. Bayoumi, “A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition
for Constrained IoT Devices,” IEEE Access, vol. 9, pp. 80546–80558, 2021, doi: 10.1109/ACCESS.2021.3084903.
[15] M. Yue, N. Karimian, W. Yan, N. A. Anagnostopoulos, and F. Tehranipoor, “DRAM-Based Authentication Using Deep Convolu-
tional Neural Networks,” IEEE Consumer Electronics Magazine, vol. 10, no. 4, pp. 8–17, 2021, doi: 10.1109/MCE.2020.3002528.
[16] D. Lim, “Extracting secret keys from integrated circuits,” M.S. thesis, Massachusetts Institute of Technology, Cambridge, United
States, 2004.
[17] J. W. Lee, D. Lim, B. Gassend, G. E. Suh, M. Van Dijk, and S. Devadas, “A technique to build a secret key in integrated circuits for
identification and authentication applications,” IEEE Symposium on VLSI Circuits, Digest of Technical Papers, pp. 176–179, 2004,
doi: 10.1109/vlsic.2004.1346548.
[18] A. Babaei and G. Schiele, “Physical unclonable functions in the internet of things: State of the art and open challenges,” Sensors
(Switzerland), vol. 19, no. 14, pp. 1–18, Jul. 2019, doi: 10.3390/s19143208.
[19] T. Xu, “Digital physical unclonable functions : architecture and applications,” M.S. thesis, University of California, 2014.
[20] M. H. Ishak, M. S. Mispan, W. Y. Chiew, M. R. Kamaruddin, and M. A. Korobkov, “Secure lightweight obfuscated delay-based
physical unclonable function design on FPGA,” Bulletin of Electrical Engineering and Informatics, vol. 11, no. 2, pp. 1075–1083,
Apr. 2022, doi: 10.11591/eei.v11i2.3265.
[21] J. Heaton, Introduction to neural networks for Java, 2nd Edition, 2nd ed. Heaton Research, Inc., 2008.
Int J Reconfigurable & Embedded Syst, Vol. 14, No. 1, March 2025: 200–207
Int J Reconfigurable & Embedded Syst ISSN: 2089-4864 ❒ 207
[22] J. Mathew, R. S. Chakraborty, D. P. Sahoo, Y. Yang, and D. K. Pradhan, “A novel memristor-based hardware security primitive,”
ACM Transactions on Embedded Computing Systems, vol. 14, no. 3, pp. 1–20, May 2015, doi: 10.1145/2736285.
[23] Xilinx, Vivado design suite tutorial - model-based DSP design using system generator, 2020.
[24] Y. Gao et al., “Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices,”
in 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016, IEEE,
Mar. 2016, pp. 1–6, doi: 10.1109/PERCOMW.2016.7457162.
[25] A. Tisan, S. Oniga, D. MIC, and A. Buchman, “Digital implementation of the sigmoid function for FPGA circuits,” Acta Technica
Napocensis, vol. 50, no. 2, pp. 15-20, 2009.
BIOGRAPHIES OF AUTHORS
Mohd Syafiq Mispan received B.Eng. electrical (electronics) and M.Eng. electrical
(computer and microelectronic system) from Universiti Teknologi Malaysia, Malaysia in 2007 and
2010 respectively. He had experienced working in semiconductor industries from 2007 until 2014
before pursuing his Ph.D. degree. He obtained his Ph.D. degree in electronics and electrical engi-
neering from University of Southampton, United Kingdom in 2018. He is currently a senior lecturer
in Faculty of Electronics and Computer Technology and Engineering, Universiti Teknikal Malaysia
Melaka. His current research interests include hardware security, CMOS reliability, VLSI design,
and electronic systems design. He can be contacted at email: [email protected].
Mohammad Haziq Ishak received B.Eng. electronics from Universiti Teknikal Malaysia
Melaka, Malaysia in 2021. He is working toward twoshe M.Sc. degree in electronics engineering
with the Universiti Teknikal Malaysia Melaka (UTeM). His M.Sc. degree research is focusing on
the implementation of a lightweight authentication scheme using physical unclonable function for
FPGA-based IoT applications. He can be contacted at email: [email protected].
Haslinah Mohd Nasir received her bachelor degree in electrical - electronic engineer-
ing (2008) from Universiti Teknologi Malaysia (UTM), M.Sc. (2016) and Ph.D. (2019) in elec-
tronic engineering from Universiti Teknikal Malaysia Melaka (UTeM). She had 5 years (2008-2013)
experience working in industry and currently a lecturer in UTeM. Her research interest includes
microelectronics, artificial intelligence, and biomedical. She can be contacted at email: hasli-
[email protected].
FPGA implementation of artificial neural network for PUF modeling (Mohd Syafiq Mispan)