Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs.
Due to Hardware Trojan (HT), trustworthiness of Integrated Circuit (IC) supply chain is a burning issue in Semiconductor Industry nowadays. Over the last decade, extensive research has been carried on HT detection methods for digital circuits. However, the HT issue remains largely unexplored in the...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Public Library of Science (PLoS)
2021-01-01
|
Series: | PLoS ONE |
Online Access: | https://doi.org/10.1371/journal.pone.0254903 |
id |
doaj-ac72aefde03941e99555da282eb25b5f |
---|---|
record_format |
Article |
spelling |
doaj-ac72aefde03941e99555da282eb25b5f2021-08-03T04:31:23ZengPublic Library of Science (PLoS)PLoS ONE1932-62032021-01-01167e025490310.1371/journal.pone.0254903Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs.Liakot AliFarshadDue to Hardware Trojan (HT), trustworthiness of Integrated Circuit (IC) supply chain is a burning issue in Semiconductor Industry nowadays. Over the last decade, extensive research has been carried on HT detection methods for digital circuits. However, the HT issue remains largely unexplored in the domain of Analog Mixed Signal (AMS)/ RF circuit where it is now an appealing target for the attackers. The increasing popularity of Orthogonal Frequency Division Multiplexing (OFDM) based wireless cryptographic ICs in modern communication systems makes it a lucrative target for HT-based attacks which could have a devastating impact on data security. This paper presents a trigger-based Hardware Trojan Threat model that exploits the extended cyclic prefix (ECP) property of the OFDM communication scheme to leak the secret encryption key over low noise Additive White Gaussian Channel (AWGN) and developed a Cyclic Prefix (CP) checker based detection mechanism named "SENTRY" to detect such trojans once it is triggered.https://doi.org/10.1371/journal.pone.0254903 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Liakot Ali Farshad |
spellingShingle |
Liakot Ali Farshad Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs. PLoS ONE |
author_facet |
Liakot Ali Farshad |
author_sort |
Liakot Ali |
title |
Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs. |
title_short |
Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs. |
title_full |
Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs. |
title_fullStr |
Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs. |
title_full_unstemmed |
Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs. |
title_sort |
analog hardware trojan design and detection in ofdm based wireless cryptographic ics. |
publisher |
Public Library of Science (PLoS) |
series |
PLoS ONE |
issn |
1932-6203 |
publishDate |
2021-01-01 |
description |
Due to Hardware Trojan (HT), trustworthiness of Integrated Circuit (IC) supply chain is a burning issue in Semiconductor Industry nowadays. Over the last decade, extensive research has been carried on HT detection methods for digital circuits. However, the HT issue remains largely unexplored in the domain of Analog Mixed Signal (AMS)/ RF circuit where it is now an appealing target for the attackers. The increasing popularity of Orthogonal Frequency Division Multiplexing (OFDM) based wireless cryptographic ICs in modern communication systems makes it a lucrative target for HT-based attacks which could have a devastating impact on data security. This paper presents a trigger-based Hardware Trojan Threat model that exploits the extended cyclic prefix (ECP) property of the OFDM communication scheme to leak the secret encryption key over low noise Additive White Gaussian Channel (AWGN) and developed a Cyclic Prefix (CP) checker based detection mechanism named "SENTRY" to detect such trojans once it is triggered. |
url |
https://doi.org/10.1371/journal.pone.0254903 |
work_keys_str_mv |
AT liakotali analoghardwaretrojandesignanddetectioninofdmbasedwirelesscryptographicics AT farshad analoghardwaretrojandesignanddetectioninofdmbasedwirelesscryptographicics |
_version_ |
1721224103148388352 |