Inter
national
J
our
nal
of
Recongurable
and
Embedded
Systems
(IJRES)
V
ol.
14,
No.
1,
March
2025,
pp.
200
∼
207
ISSN:
2089-4864,
DOI:
10.11591/ijres.v14.i1.pp200-207
❒
200
FPGA
implementation
of
articial
neural
netw
ork
f
or
PUF
modeling
Mohd
Syaq
Mispan
1,2
,
Mohammad
Haziq
Ishak
2
,
Aiman
Zakwan
Jidin
1,2
,
Haslinah
Mohd
Nasir
2
1
Micro
and
Nano
Electronics
(MiNE)
Research
Group,
Centre
for
T
elecommunication
Research
and
Inno
v
ation
(CeTRI),
Uni
v
ersiti
T
eknikal
Malaysia
Melaka,
Durian
T
ungg
al,
Malaysia
2
F
aculty
of
Electronics
and
Computer
T
echnology
and
Engineering,
Uni
v
ersiti
T
eknikal
Malaysia
Melaka,
Durian
T
ungg
al,
Malaysia
Article
Inf
o
Article
history:
Recei
v
ed
Feb
26,
2024
Re
vised
Jul
22,
2024
Accepted
Aug
12,
2024
K
eyw
ords:
Computational
model
Hardw
are
ngerprinting
Lightweight
authentication
Machine
learning
Ph
ysical
unclonable
function
ABSTRA
CT
Field-programmable
g
ate
array
(FPGA)
is
a
prominent
de
vice
in
de
v
eloping
the
internet
of
things
(IoT)
application
since
it
of
fers
parallel
computation,
po
wer
ef
cienc
y
,
and
sca
lability
.
The
identication
and
authentication
of
these
FPGA-
based
IoT
applications
are
crucial
to
secure
the
user
-sensiti
v
e
data
transmitted
o
v
er
IoT
netw
orks.
Ph
ysical
unclonable
function
(PUF)
technology
pro
vides
a
great
capability
to
be
used
as
de
vice
identication
and
authentication
for
FPGA-
based
IoT
applications.
Ne
v
ertheless,
con
v
entional
PUF-based
authentication
suf
fers
a
huge
o
v
erhead
in
storing
the
challenge-response
pairs
(CRPs)
in
the
v
erier’
s
database.
Therefore,
i
n
this
paper
,
the
FPGA
implementation
of
the
Arbiter
-PUF
model
using
an
articial
neural
netw
ork
(ANN)
is
presented.
The
PUF
model
can
generate
the
CR
Ps
on-the-y
upon
the
authentication
request
(i.e.,
by
a
pro
v
er)
to
the
v
erier
and
eliminates
huge
storage
of
CRPs
database
in
the
v
erier
.
The
architecture
of
ANN
(i.e.,
Arbiter
-PUF
model)
is
designed
in
Xilinx
system
generator
and
subsequently
con
v
erted
into
intell
ectual
property
(IP).
Further
,
the
IP
is
programmed
in
Xilinx
Artix-7
FPGA
with
other
peripher
-
als
for
CRPs
gene
ration
and
v
alidation.
The
ndings
sho
w
that
the
Arbiter
-PUF
model
implementation
on
FPGA
using
the
ANN
technique
achie
v
es
approxi-
mately
98%
accurac
y
.
The
model
consumes
12,196
look-up
tables
(LUTs)
and
67
mW
po
wer
in
FPGA.
This
is
an
open
access
article
under
the
CC
BY
-SA
license
.
Corresponding
A
uthor:
Mohd
Syaq
Mispan
F
aculty
of
Electronics
and
Computer
T
echnology
and
Engineering,
Uni
v
ersiti
T
eknikal
Malaysia
Melaka
Jalan
Hang
T
uah
Jaya,
76100
Durian
T
ungg
al,
Melaka,
Malaysia
Email:
syaq.mispan@utem.edu.my
1.
INTR
ODUCTION
Internet
of
things
(IoT)
enable
the
ubiquitous
electronic
de
vices
in
which
these
de
vices
are
connected
via
an
internet
netw
ork,
and
it
is
possible
to
e
xchange
data
among
them.
IoT
implementation
often
requires
specic
and
unique
netw
ork
requirements,
which
can
be
programmed
or
reprogrammed
in
the
eld
of
applica-
tion
with
a
cost
and
time-ef
cient
manner
.
Field-programmable
g
ate
array
(FPGA)
is
a
foundation
for
b
uilding
the
ne
xt
generation
of
IoT
systems
since
it
of
fers
scalability
,
lo
w
latenc
y
,
and
lo
w
po
wer
[1]-[3].
FPGA
can
be
programmed
or
reprogrammed
according
to
the
requirements
of
IoT
applicat
ions.
Examples
of
IoT
applica-
tions
include
secure
access,
smart
surv
eillance
cameras,
smart
homes,
and
smart
meters.
All
these
applications
require
user
-specic
data
to
be
processed.
Hence,
it
is
v
ery
crucial
to
enable
de
vice
identication
and
authen-
tication
in
IoT
applications
[4].
J
ournal
homepage:
http://ijr
es.iaescor
e
.com
Evaluation Warning : The document was created with Spire.PDF for Python.
Int
J
Recongurable
&
Embedded
Syst
ISSN:
2089-4864
❒
201
Ph
ysical
unclonable
function
(PUF)
is
a
technology
that
can
be
deplo
yed
in
FPGA-based
IoT
ap-
plications
for
de
vice
identication
and
authentication.
PUF
pro
vides
root-of-trust
from
a
hardw
are
layer
by
e
xploiting
the
inte
grated
circuit
(IC)
manuf
acturing
intrinsic
process
v
ariations
[5].
PUF
maps
an
input
kno
wn
as
a
challenge
to
generate
a
unique
output
kno
wn
as
a
response.
The
mapping
of
the
challenge
and
response
pairs
(CRPs)
is
unique
for
a
group
of
similar
types
of
PUFs
(i.e.,
de
vice-specic
response).
Hence,
PUF
pro-
vides
a
great
and
promising
capability
to
be
used
for
de
vice
identication
and
authentication
application.
Figure
1
depicts
the
PUF-based
identication
and
authentication
process,
which
consists
of
tw
o
phases;
enrollment
and
authentication.
During
the
enrollment
phase,
the
CRPs
of
the
pro
v
er
are
e
xtracted
and
stored
in
the
v
erier
database,
d
,
in
a
trusted
en
vironment.
In
the
eld
of
application,
the
pro
v
er
sends
its
response
(
˜
r
)
to
the
v
erier
and
compares
it
ag
ainst
the
response
(
r
)
in
the
database.
If
both
responses
are
matched,
the
pro
v
er
is
a
genuine
or
v
alid
de
vice,
otherwise,
the
pro
v
er
is
identied
as
a
f
ak
e
de
vice.
V
erier
−
→
Pr
o
v
er
j
⟨
c
ij
,
r
ij
⟩
with
c
ij
←
T
R
N
G
()
←
→
r
ij
←
P
U
F
(
c
ij
)
1x
Enrollment
d
j
←
d
⟨
c
,
r
⟩
←
⟨
c
ij
,
r
ij
⟩
with
i
←
d
j
d
x
Authentication
d
j
←
d
j
−
1
c
−
→
˜
r
←
P
U
F
(
c
)
Abort
if
HD
(
˜
r,r
)
>
ϵ
˜
r
←
−
Figure
1.
Identication
and
authentication
process
using
PUF
[6],
[7]
PUF-based
identication
and
authentication,
as
described
abo
v
e,
has
a
major
dra
wback
of
se
v
ere
area
o
v
erhead
in
the
v
erier
database.
The
CRPs
are
not
allo
wed
to
be
reused
to
a
v
oid
on-path
attack
or
man-in-
the-middle
attack
[8].
Therefore,
the
v
erier
has
to
store
an
enormous
amount
of
CRP
s
to
authenticate
the
PUFs.
Storing
the
PUF
computational
model
is
an
alternati
v
e
solution
to
o
v
ercome
the
se
v
ere
area
o
v
erhead
in
the
v
erier
database
[9]-[13].
Aghaie
et
al.
[9]
de
v
eloped
a
technique
to
b
uild
the
computational
model
of
delay-based
PUFs
by
using
an
internal
delay
sensor
kno
wn
as
a
time-do-digital
con
v
erter
(TDC)
in
FPGA.
The
sensor
measures
the
delay
of
signals
that
pass
through
the
switching
components
in
delay-based
PUF
architecture.
Subsequently
,
the
measured
delay
is
used
to
b
uild
the
PUF
computational
model.
Although
the
abo
v
e
method
reduces
the
number
of
CRPs
to
b
uild
the
PUF
computational
model,
the
sensors
remain
on-chip,
hence
e
xposing
the
de
vice
to
be
easily
model
ed
by
the
adv
ersaries.
In
other
studies
[10]-[13],
the
machine
learning
(ML)
technique
is
used
to
model
the
PUF
.
Enormous
CRPs
are
measured
during
the
enrollment
phase,
and
subsequently
the
PUF
model
is
b
uilt
using
ML
technique
based
on
the
e
xtracted
CRPs.
Else
where,
Idris
et
al.
[14]
de
v
eloped
a
lightweight
authentication
protocol
that
is
b
uilt
using
the
PUF
model.
The
usage
of
the
PUF
model
in
the
v
erier
database
and
its
ph
ysical
PUF
in
the
pro
v
er
de
vice
without
an
y
protection
mechanism
is
insecure,
as
an
adv
ersary
can
perform
a
modeling
attack
by
coll
ecting
the
e
xposed
CRPs.
Hence,
the
protocol
in
[14]
deplo
ys
secret
pattern
recognition
to
perform
mutual
authentication
between
the
v
erier
and
pro
v
er
.
In
another
study
,
Y
ue
et
al.
[15]
proposed
an
authentication
scheme
in
v
olving
the
sequence
of
dynamic
random
acces
s
memory
(DRAM)
po
wer
-up
v
alues
and
con
v
olutional
neural
netw
ork
(CNN).
Po
wer
-up
v
alues
in
memory
are
random
and
e
xhibit
de
vice-
specic
features
.
CNN
is
deplo
yed
to
model
these
unique
features
based
on
the
DRAM
po
wer
-up
sequence
that
has
been
con
v
erted
to
a
tw
o-dimensional
(2D)
image
structure.
The
proposed
authentication
scheme
requires
only
the
DRAM-PUF
m
o
de
l
(i.e.,
unique
feature)
in
the
database.
Ne
v
ertheless,
deplo
ying
deep
learning
architecture
such
as
CNN
in
the
proposed
authentication
scheme
requires
a
huge
area
as
deep
learning
typically
consists
of
a
signicant
number
of
layers
and
a
comple
x
computational
matrix.
All
of
the
abo
v
e
studies
sho
w
that
deplo
ying
the
PUF
model
in
the
database
of
v
erier
is
getting
the
attention
of
the
PUF
research
community
.
Ne
v
ertheless,
the
chose
n
ML
technique
must
be
able
to
b
uild
the
PUF
model
in
a
cost-ef
cient
manner
.
Moreo
v
er
,
the
pre
vious
studies
only
focusing
on
methodical
approach
(i.e.,
b
uilding
protocol
of
using
PUF
model)
and/or
simulation-le
v
el
analysis
only
.
Therefore,
this
study
focuses
on
a
PUF
computational
model
de
v
elopment
in
Xilinx
Artix-7
FPGA
board
using
an
articial
neural
netw
ork
(ANN)
to
enable
lightweight
authentication
protocol
in
FPGA-based
IoT
applications.
The
PUF
model
accurac
y
,
area
and
po
wer
consumption
are
e
v
aluated
and
discussed.
FPGA
implementation
of
articial
neur
al
network
for
PUF
modeling
(Mohd
Syaq
Mispan)
Evaluation Warning : The document was created with Spire.PDF for Python.
202
❒
ISSN:
2089-4864
2.
METHOD
k
-bit
Arbit
er
-PUF
[16],
[17]
is
used
as
a
case
study
for
b
uilding
the
computational
model
of
PUF
in
FPGA.
Figure
2
illustrates
the
top-le
v
el
architecture
of
k
-bit
Arbiter
-PUF
.
Arbiter
-PUF
is
chosen
in
our
study
as
it
has
a
lightweight
architecture
[18]
and
k
v
alue
is
set
to
32
to
pro
vide
considerably
enough
process
v
ariations
for
Arbiter
-PUF
implementation
in
FPGA
[19].
There
are
three
major
design
steps
in
the
de
v
elopment
of
PUF
modeling
in
FPGA.
First,
the
ph
ysical
Arbiter
-PUF
is
implemented
on
FPGA
follo
wing
the
methods
as
described
in
[20].
Subsequently
,
random
and
unique
challenges
were
generated
using
32-bit
linear
-feedback
shift
re
gister
(LFSR)
with
a
primiti
v
e
polynomial
of
x
32
+
x
31
+
x
30
+
x
10
+
1
and
applied
to
the
ph
ysical
Arbiter
-
PUF
to
generate
the
1-bit
corresponding
responses.
In
total,
20,200
CRPs
are
e
xtracted
from
the
ph
ysical
Arbiter
-PUF
for
b
uilding
the
PUF
model.
Ar
b
ite
r
(S
R
l
atch)
A
B
Swit
ch
in
g
Co
m
p
o
n
e
n
t
Inp
u
t
c
1
=
0
c
2
=
1
c
k
=
1
c
k
-
1
=
0
∆
t
Resp
o
n
se
0
/
1
t
o
p
0
b
o
t
0
t
o
p
1
b
o
t
1
t
o
p
k
-
1
b
o
t
k
-
1
t
o
p
k
b
o
t
k
0
1
1
0
0
1
1
0
0
1
1
0
0
1
1
0
0
1
1
0
0
1
1
0
0
1
1
0
0
1
1
0
Figure
2.
k
-bit
Arbiter
-PUF
architecture
Based
on
the
e
xtracted
CRPs,
the
ne
xt
step
is
to
b
uild
the
PUF
model
in
a
MA
TLAB
using
the
ANN
technique.
A
3-layer
of
ANN
architecture
is
used,
which
consi
sts
of
one
input
layer
,
one
hidden
layer
with
v
e
neurons,
and
one
output
layer
.
The
number
of
neurons
has
been
determined
based
on
the
rule
of
thumb
described
in
[21].
Log-si
gmoid
function
is
used
as
an
acti
v
ation
in
the
hidden
layers,
which
is
gi
v
en
as
f
(
x
)
=
1
1+
e
−
x
.
F
ollo
wing
[22],
a
resilient
backpropag
ation
algorithm
is
used
as
the
training
algorithm
as
it
pro
vides
f
ast
con
v
er
gence
time
and
optimum
prediction
accurac
y
.
20,000
CRPs
are
used
as
a
training
data
set,
and
the
remaining
200
CRPs
are
used
as
a
test
data
set.
The
weightage
and
bias
v
alues
from
the
successful
trai
ning
of
PUF
modeling
in
MA
TLAB
are
e
xtracted
for
the
subsequent
design
steps.
The
third
design
step
is
to
implement
the
abo
v
e
ANN
architecture
(i.e.,
with
the
e
xtracted
weight
and
bias
v
alues)
in
Xilinx
system
generator
.
Xilinx
system
generator
is
a
MA
TLAB
Simulink
add-on
that
enables
the
de
v
elopment
of
architecture-le
v
el
FPGA
designs
using
graphical
block
programming
[23].
The
design
of
the
32-bit
Arbiter
-PUF
model
in
Xilinx
system
generator
is
subsequently
con
v
erted
into
intellectual
property
(IP)
core.
Finally
,
the
IP
core,
MicroBlaze
core
processor
,
and
other
peripherals
are
programmed
into
Xilinx
Artix-7
FPGA
using
Xilinx
V
i
v
ado
Design
Suite
to
v
alidate
the
functionality
of
the
Arbiter
-PUF
model
as
compared
to
the
ph
ysical
Arbiter
-PUF
.
3.
RESUL
TS
AND
DISCUSSION
3.1.
Articial
neural
netw
ork
ar
chitectur
e
As
described
in
section
2,
32-bit
Arbiter
-PUF
can
be
modeled
by
using
ANN
in
which
the
ANN
architecture
consists
of
3
layers
which
are
input,
hidden,
and
output
layer
.
Figure
3
illustrates
the
top-le
v
el
architecture
of
ANN
in
the
Xilinx
system
generator
en
vironment.
The
number
of
i
np
ut
at
the
input
layer
is
equi
v
alent
to
k
.
The
feature
e
xtraction
is
also
implemented
at
the
input
layer
to
transform
the
inputs
to
parity
v
ectors
[24].
The
transformed
inputs
are
fed
to
the
hidden
layer
for
the
subsequent
process.
In
the
hidden
layer
,
it
consists
of
v
e
neurons.
The
e
xtracted
weightage
and
bias
v
alues
from
the
ANN
modeling
in
MA
TLAB
are
applied
in
the
Xilinx
system
generator
en
vironment
for
the
computational
of
the
neuron’
s
output.
The
computati
onal
process
in
each
neuron
can
be
represented
as
x
=
Σ
k
i
=1
w
i
c
i
+
θ
where
x
is
the
neuron’
s
output,
c
is
the
i
-th
transformed
input,
w
is
the
weightage,
and
θ
is
the
bias
v
alue.
Figure
4
depicts
the
partial
computational
block
diagram
to
compute
the
neuron’
s
output
in
the
hidden
layer
.
Block
CMult
is
used
to
compute
multiplication
of
w
c
and
block
AddSub
is
used
to
compute
Σ
.
Int
J
Recongurable
&
Embedded
Syst,
V
ol.
14,
No.
1,
March
2025:
200–207
Evaluation Warning : The document was created with Spire.PDF for Python.
Int
J
Recongurable
&
Embedded
Syst
ISSN:
2089-4864
❒
203
Figure
3.
T
op-le
v
el
of
ANN
architecture
for
modeling
the
32-bit
Arbiter
-PUF
Figure
4.
P
artial
computational
block
diagram
of
each
neuron
in
the
hidden
layer
The
output
of
each
neuron,
x
is
input
to
the
log-sigmoid
acti
v
ation
function,
which
is
gi
v
en
as
f
(
x
)
=
1
1+
e
−
x
.
The
log-sigmoid
acti
v
ation
function
bounds
its
output
to
the
range
of
(0,1).
According
to
T
isan
et
al.
[25],
a
piece
wise
second-order
approximation
is
used
i
n
our
study
to
reduce
the
computational
comple
x-
ity
.
Figure
5
illustrates
the
implementation
of
the
log-sigmoid
acti
v
ation
functi
on
in
Xilinx
system
generator
.
Meanwhile,
Figure
6
depicts
the
graph
comparison
of
an
ideal
log-sigmoid
v
ersus
piece
wise
second-order
ap-
proximation.
As
can
be
seen,
the
approximation
technique
requires
a
bigger
x
v
alue
to
bounds
its
output
to
the
range
of
(0,1).
FPGA
implementation
of
articial
neur
al
network
for
PUF
modeling
(Mohd
Syaq
Mispan)
Evaluation Warning : The document was created with Spire.PDF for Python.
204
❒
ISSN:
2089-4864
Figure
5.
Computational
block
diagram
of
sigmoid
acti
v
ation
function
−
60
−
40
−
20
0
20
40
60
0
0
.
2
0
.
4
0
.
6
0
.
8
1
x
f(x)
Piece
wise
approximation
Ideal
log-sigmoid
Figure
6.
Comparison
of
an
ideal
and
approximation
log-sigmoid
acti
v
ation
functions
Subsequently
,
the
acti
v
ated
output
is
input
to
the
third
layer
or
output
layer
.
Figure
7
illus
trates
the
computational
block
diagram
of
an
output
layer
.
The
computational
process
in
the
output
layer
can
be
represented
as
o
=
Σ
n
j
=1
w
j
y
j
+
θ
where
o
is
the
output,
y
is
equi
v
alent
to
f
(
x
)
(i.e.,
the
acti
v
ated
output),
w
is
the
weightage,
θ
is
the
bias
v
alue,
and
n
is
the
total
number
of
neurons.
The
output
layer
performs
the
classication
process
to
classify
the
response
‘0’
and
‘1’.
In
the
output
layer
,
an
additional
block
called
a
comparator
is
required
to
counteract
the
approximated
computation
of
log-sigmoid
functions.
The
des
ign
of
32-bit
Arbiter
-PUF
model
in
Xilinx
system
generator
which
based
on
ANN
architecture
as
discussed
abo
v
e
is
con
v
erted
into
an
IP
core.
Subsequently
,
the
I
P
core,
MicroBlaze
core
processor
,
and
other
peripherals
are
programmed
into
Xilinx
Artix-7
FPGA
as
illustrated
in
Figure
8
for
CRPs
collection.
Figure
7.
Computational
block
diagram
of
an
output
layer
Int
J
Recongurable
&
Embedded
Syst,
V
ol.
14,
No.
1,
March
2025:
200–207
Evaluation Warning : The document was created with Spire.PDF for Python.
Int
J
Recongurable
&
Embedded
Syst
ISSN:
2089-4864
❒
205
Figure
8.
CRPs
e
xtraction
using
microblaze
core
processor
3.2.
Modeling
accuracy
and
ar
ea
consumption
20,000
CRPs
are
collected
from
the
Arbiter
-PUF
model
using
the
MicroBlaze
core
processor
as
con-
gured
in
Figure
8.
These
CRPs
are
compared
ag
ainst
the
measured
CRPs
of
ph
ysical
Arbiter
-PUF
.
Figure
9
depicts
the
modeling
accurac
y
of
the
Arbiter
-PUF
model.
The
number
of
CRPs
is
v
aried
from
400
CRPs
up
to
20,000
CRPs.
The
r
esults
sho
w
that
the
Arbiter
-PUF
model
achie
v
es
v
ery
high
accurac
y
,
approximately
on
a
v
erage
98%.
T
able
1
lists
the
area
and
po
wer
consumption
of
the
Arbiter
-PUF
model.
The
area
and
po
wer
con-
sumption
of
the
PUF
model
is
higher
than
the
ph
ysical
PUF
because
of
the
comple
xity
of
ANN
architecture
as
compared
to
Arbiter
-PUF
architecture
(see
Figure
2).
Based
on
these
ndings,
the
Arbiter
-PUF
is
suitable
to
be
used
in
resource-constrained
pro
v
ers
as
it
consumes
insignicant
area
o
v
erhead
and
po
wer
.
The
corresponding
PUF
model
can
be
congured
in
the
v
erier
to
perform
the
authentication
process.
As
discussed
in
section
1,
storing
the
PUF
model
in
the
v
erier
signicantly
reduces
the
area
o
v
erhead
as
compared
to
storing
CRPs
for
each
PUF-based
de
vice.
All
the
pre
viously
proposed
techniques
of
using
PUF
model
[9]-[15]
as
discussed
in
section
1
are
methodical
approach
(i.e.,
b
uilding
protocol
of
using
PUF
model)
and/or
simulation-le
v
el
analysis.
Therefore,
no
comparison
of
the
area
o
v
erhead
and
po
wer
consumption
can
be
made.
The
successful
PUF
model
pro
vides
scalability
in
which
an
unlimited
number
of
authentications
can
be
performed
by
a
pro
v
er
as
it
is
no
longer
limited
by
the
number
of
CRPs
stored
in
the
v
erier’
s
database.
0
0
.
5
1
1
.
5
2
50
60
70
80
90
100
CRPs
(
10
4
)
Modeling
Accurac
y
(%)
Figure
9.
Modeling
accurac
y
of
32-bit
Arbiter
-PUF
modelled
using
ANN
technique
T
able
1.
Area
o
v
erhead
and
po
wer
consumption
Unit
block
LUTs
Po
wer
consumption
(mW)
Ph
ysical
arbiter
-PUF
32
<
1
Arbiter
-PUF
model
12196
67
FPGA
implementation
of
articial
neur
al
network
for
PUF
modeling
(Mohd
Syaq
Mispan)
Evaluation Warning : The document was created with Spire.PDF for Python.
206
❒
ISSN:
2089-4864
4.
CONCLUSION
In
this
st
udy
,
the
32-bit
Arbiter
PUF
has
been
modeled
using
the
ANN
technique
in
MA
TLAB
and
subsequently
,
the
model
is
implemented
on
FPGA
using
Xilinx
system
generator
and
Xilinx
V
i
v
ado
Design
Suite.
The
FPGA
implementation
consumes
12196
LUTs,
67
mW
po
wer
,
and
≈
98%
accurac
y
.
A
successful
implementation
of
the
PUF
model
can
replace
the
c
o
n
v
entional
CRPs
database
in
the
v
erier
.
The
v
erier
consists
of
the
ANN
architecture
and
a
database
of
weightage
and
biases
of
pro
v
ers.
PUF
model
pro
vides
scalability
in
which
an
unlimited
number
of
authentications
can
be
performed
by
a
pro
v
er
.
Future
direction
may
focus
on
security
enhancement
of
the
v
erier
database
to
a
v
oid
adv
ersaries’
attacks
on
retrie
ving
the
weightage/biases
information.
A
CKNO
WLEDGEMENT
The
authors
w
ould
lik
e
to
thank
the
Uni
v
ersiti
T
eknikal
Malaysia
Melaka
and
Ministry
of
Higher
Ed-
ucation
Malaysia
for
the
nancial
funding
of
project
completion.
Grant
No.
FRGS/1/2020/TK0/UTEM/02/56.
REFERENCES
[1]
M
.
Elna
w
a
wy
,
A.
F
arhan,
A.
A.
Nab
ulsi,
A.
R.
Al-Ali
,
and
A.
Sag
ah
yroon,
“Role
of
FPGA
in
internet
of
things
applica-
tions,
”
in
IEEE
International
Symposium
on
Signal
Pr
ocessing
and
Information
T
ec
hnolo
gy
,
pp.
1-6,
2019,
doi:
10.1109/IS-
SPIT47144.2019.9001747.
[2]
A.
Magyari
and
Y
.
Chen,
“Re
vie
w
of
state-of-the-art
FPGA
applicati
ons
in
IoT
netw
orks,
”
Sensor
s
,
v
ol.
22,
no.
19,
pp.
1-18,
2022,
doi:
10.3390/s22197496.
[3]
T
.
P
.
Dinh,
C.
Pham-Quoc,
T
.
N.
Thinh,
B.
K.
D.
Nguyen,
and
P
.
C.
Kha,
“A
e
xible
and
ef
cient
FPGA-based
random
forest
architecture
for
IoT
applications,
”
Internet
of
Things
,
v
ol.
22,
pp.
1-14,
2023,
doi:
10.1016/j.iot.2023.100813.
[4]
R.
Mahmoud,
T
.
Y
ousuf,
F
.
Aloul,
and
I.
Zualk
ernan,
“Internet
of
things
(IoT)
security:
Current
status,
challenges
and
prospecti
v
e
measures,
”
in
International
Confer
ence
for
Internet
T
ec
hnolo
gy
and
Secur
ed
T
r
ansactions
,
pp.
336-341,
2016,
doi:
10.1109/IC-
ITST
.2015.7412116.
[5]
M.
S.
Mispan,
B.
Halak,
and
M.
Zw
olinski,
“A
surv
e
y
on
the
susceptibility
of
PUFs
to
in
v
asi
v
e,
semi-in
v
asi
v
e
and
non-in
v
asi
v
e
attacks:
challenges
and
opportunities
for
future
directions,
”
J
ournal
of
Cir
cuits,
Systems
and
Computer
s
,
v
ol.
30,
no.
11,
pp.
1-37,
2021,
doi:
10.1142/S0218126621300099.
[6]
G.
E.
Suh
and
S.
De
v
adas,
“Ph
ysical
Unclonable
Functions
for
de
vice
authentication
and
secret
k
e
y
generation,
”
in
A
CM/IEEE
Design
A
utomation
Confer
ence
,
pp.
9-14,
2007,
doi:
10.1145/1278480.1278484.
[7]
J.
Delv
aux,
R.
Peeters,
D.
Gu,
and
I.
V
erbauwhede,
“
A
surv
e
y
on
lightwei
ght
entity
authentication
with
strong
PUFs,
”
A
CM
Com-
puting
Surv
e
ys
,
v
ol.
48,
no.
2,
pp.
1–42,
No
v
.
2015,
doi:
10.1145/2818186.
[8]
M.
S.
Mispan,
A.
Z.
Jidin,
M.
R.
Kamaruddin,
and
H.
M.
Nasir
,
“Proof
of
concept
for
lightweight
PUF-based
authentication
protocol
using
NodeMCU
ESP8266,
”
Indonesian
J
ournal
of
Electrical
Engineering
and
Computer
Science
,
v
ol.
24,
no.
3,
pp.
1392-1398,
2021,
doi:
10.11591/ijeecs.v24.i3.pp1392-1398.
[9]
A.
Aghaie,
M.
Ender
,
and
A.
Moradi,
“PUFs
ph
ysical
learning:
accelerating
the
enrollment
via
delay-based
model
e
xtraction,
”
IEEE
T
r
ansactions
on
Emer
ging
T
opics
in
Computing
,
v
ol.
10,
no.
3,
pp.
1621-1632,
2022,
doi:
10.1109/TETC.2021.3115176.
[10]
A.
Aghaie,
M.
Ender
,
and
A.
Moradi,
“PUFs
Ph
ysical
Learning:
Accelerating
the
Enrollment
via
Delay-B
ased
Model
Extraction,
”
IEEE
T
r
ansactions
on
Emer
ging
T
opics
in
Computing
,
v
ol.
10,
no.
3,
pp.
1621–1632,
Jul.
2022,
doi:
10.1109/TETC.2021.3115176.
[11]
A.
Ali-Pour
,
F
.
Afghah,
D.
Hely
,
V
.
Beroulle,
and
G.
Di
Natale,
“Secure
PUF-based
Authentication
and
K
e
y
Exchange
Protocol
using
Ma
chine
Learning,
”
in
Pr
oceedings
of
IEEE
Computer
Society
Annual
Symposium
on
VLSI,
ISVLSI
,
IEEE,
Jul.
2022,
pp.
386–389,
doi:
10.1109/ISVLSI54635.2022.00086.
[12]
M.
S.
E.
Quadir
and
J.
A.
Chandy
,
“Embedded
systems
authentication
and
encryption
using
strong
PUF
modeling,
”
in
IEEE
Inter
-
national
Confer
ence
on
Consumer
Electr
onics
,
pp.
1-6,
2020,
doi:
10.1109/ICCE46568.2020.9043104.
[13]
Y
.
Y
ilmaz,
S.
R.
Gunn,
and
B.
Halak,
“Lightweight
PUF-based
authentication
protocol
for
IoT
de
vices,
”
in
2018
IEEE
3r
d
Interna-
tional
V
erication
and
Security
W
orkshop,
IVSW
2018
,
pp.
38–43,
2018,
doi:
10.1109/IVSW
.2018.8494884.
[14]
T
.
A.
Idriss,
H.
A.
Idriss,
and
M.
A.
Bayoumi,
“
A
Lightweight
PUF-Based
Authentication
Protocol
Using
Secret
P
attern
Recognition
for
Constrained
IoT
De
vices,
”
IEEE
Access
,
v
ol.
9,
pp.
80546–80558,
2021,
doi:
10.1109/A
CCESS.2021.3084903.
[15]
M.
Y
ue,
N.
Karimian,
W
.
Y
an,
N.
A.
Anagnostopoulos,
and
F
.
T
ehranipoor
,
“DRAM-Based
Authentication
Using
Deep
Con
v
olu-
tional
Neural
Netw
orks,
”
IEEE
Consumer
Electr
onics
Ma
gazine
,
v
ol.
10,
no.
4,
pp.
8–17,
2021,
doi:
10.1109/MCE.2020.3002528.
[16]
D.
Lim,
“Extracting
secret
k
e
ys
from
inte
grated
circuits,
”
M.S.
thesis,
Massachusetts
Instit
ute
of
T
echnology
,
Cambridge,
United
States,
2004.
[17]
J.
W
.
Lee,
D.
Lim,
B.
Gassend,
G.
E.
Suh,
M.
V
an
Dijk,
and
S.
De
v
adas,
“
A
technique
to
b
uild
a
secret
k
e
y
in
inte
grated
circuits
for
identication
and
authentication
applications,
”
IEEE
Symposium
on
VLSI
Cir
cuits,
Dig
est
of
T
ec
hnical
P
aper
s
,
pp.
176–179,
2004,
doi:
10.1109/vlsic.2004.1346548.
[18]
A.
Babaei
and
G.
Schiele,
“Ph
ys
ical
unclonable
functions
in
the
internet
of
things:
State
of
the
art
and
open
challenges,
”
Sensor
s
(Switzerland)
,
v
ol.
19,
no.
14,
pp.
1–18,
Jul.
2019,
doi:
10.3390/s19143208.
[19]
T
.
Xu,
“Digital
ph
ysical
unclonable
functions
:
architecture
and
applications,
”
M.S.
thesis,
Uni
v
ersity
of
California,
2014.
[20]
M.
H.
Ishak,
M.
S.
Mispan,
W
.
Y
.
Chie
w
,
M.
R.
Kamaruddin,
and
M.
A.
K
orobk
o
v
,
“Secure
lightweight
obfuscated
delay-based
ph
ysical
unclonable
function
design
on
FPGA,
”
Bulletin
of
Electrical
Engineering
and
Informatics
,
v
ol.
11,
no.
2,
pp.
1075–1083,
Apr
.
2022,
doi:
10.11591/eei.v11i2.3265.
[21]
J.
Heaton,
Intr
oduction
to
neur
al
networks
for
J
ava,
2nd
Edition
,
2nd
ed.
Heaton
Research,
Inc.,
2008.
Int
J
Recongurable
&
Embedded
Syst,
V
ol.
14,
No.
1,
March
2025:
200–207
Evaluation Warning : The document was created with Spire.PDF for Python.
Int
J
Recongurable
&
Embedded
Syst
ISSN:
2089-4864
❒
207
[22]
J.
Mathe
w
,
R.
S.
Chakraborty
,
D.
P
.
Sahoo,
Y
.
Y
ang,
and
D.
K.
Pradhan,
“
A
no
v
el
memristor
-based
hardw
are
security
primiti
v
e,
”
A
CM
T
r
ansactions
on
Embedded
Computing
Systems
,
v
ol.
14,
no.
3,
pp.
1–20,
May
2015,
doi:
10.1145/2736285.
[23]
Xilinx,
V
ivado
design
suite
tutorial
-
model-based
DSP
design
using
system
g
ener
ator
,
2020.
[24]
Y
.
Gao
et
al.,
“Obfuscated
challenge-response:
A
secure
lightweight
authenti
cation
mechanism
for
PUF-based
perv
asi
v
e
de
vices,
”
in
2016
IEEE
International
Confer
ence
on
P
ervasive
Computing
and
Communication
W
orkshops,
P
erCom
W
orkshops
2016
,
IEEE,
Mar
.
2016,
pp.
1–6,
doi:
10.1109/PERCOMW
.2016.7457162.
[25]
A.
T
isan,
S.
Onig
a,
D.
MIC,
and
A.
Buchman,
“
Digital
implementation
of
the
sigmoid
function
for
FPGA
circuit
s,
”
Acta
T
ec
hnica
Napocensis
,
v
ol.
50,
no.
2,
pp.
15-20,
2009.
BIOGRAPHIES
OF
A
UTHORS
Mohd
Syaq
Mispan
recei
v
ed
B.Eng.
electrical
(electronics)
and
M.Eng.
electrical
(computer
and
microelectronic
system)
from
Uni
v
ersi
ti
T
eknologi
Malaysia,
Malaysia
in
2007
and
2010
respecti
v
ely
.
He
had
e
xperienced
w
orking
in
semiconductor
industries
from
2007
until
2014
before
pursuing
hi
s
Ph.D.
de
gree.
He
obtained
his
Ph.D.
de
gree
in
electronics
and
electrical
engi-
neering
from
Uni
v
ersity
of
Southampton,
United
Kingdom
in
2018.
He
is
currently
a
senior
lecturer
in
F
aculty
of
Electronics
and
Computer
T
echnology
and
Engineering,
Uni
v
ersiti
T
eknikal
Malaysia
Melaka.
His
current
research
interests
incl
ude
hardw
are
security
,
CMOS
reliability
,
VLSI
design,
and
electronic
systems
design.
He
can
be
contacted
at
email:
syaq.mispan@utem.edu.my
.
Mohammad
Haziq
Ishak
recei
v
ed
B.Eng.
electronics
from
Uni
v
ersiti
T
eknikal
Malaysia
Melaka,
Malaysia
in
2021.
He
is
w
orking
to
w
ard
tw
oshe
M.Sc.
de
gree
in
electronics
engineering
with
the
Uni
v
ersiti
T
eknikal
Malaysia
Melaka
(UT
eM).
His
M.Sc.
de
gree
research
is
focusing
on
the
implementation
of
a
lightweight
authentication
scheme
using
ph
ysical
unclonable
function
for
FPGA-based
IoT
applications.
He
can
be
contacted
at
email:
haziqsepd@gmail.com.
Aiman
Zakwan
Jidin
is
currently
a
Ph.D.
candidate
at
Uni
v
ersiti
Malaysia
Perli
s,
Malaysia.
His
research
topic
is
focusing
on
optimizing
memory
testing
algorithm
ef
cienc
y
for
im-
pro
ving
f
ault
co
v
erage.
Pre
viously
,
he
obtained
his
M.Eng.
in
electronic
and
microelectronic
system
from
ESIEE
Engineering
P
aris,
France
in
2011,
before
w
orking
as
FPGA
IP
Core
Design
Engineer
at
Altera
Corporation
Malaysia
(no
w
part
of
Intel).
He
is
a
full-time
lecturer
and
researcher
at
Uni-
v
ersiti
T
eknikal
Malaysia
Melaka
(UT
eM),
in
electronic
and
computer
engineering.
His
research
interests
include
DFT
,
VLSI,
and
FPGA
system
design.
He
can
be
contacted
at
email:
aimanzak-
w
an@utem.edu.my
.
Haslinah
Mohd
Nasir
recei
v
ed
her
bachel
or
de
gree
in
electrical
-
electronic
engineer
-
ing
(2008)
from
Uni
v
ersiti
T
eknologi
Malaysia
(UTM),
M.Sc.
(2016)
and
Ph.D.
(2019)
in
elec-
tronic
engineering
from
Uni
v
ersiti
T
eknikal
Malaysia
Melaka
(UT
eM).
She
had
5
years
(2008-2013)
e
xperience
w
orking
in
industry
and
currently
a
lecturer
in
UT
eM.
Her
research
interest
includes
microelectronics,
articial
intelligence,
and
biomedical.
She
can
be
contacted
at
email:
hasli-
nah@utem.edu.my
.
FPGA
implementation
of
articial
neur
al
network
for
PUF
modeling
(Mohd
Syaq
Mispan)
Evaluation Warning : The document was created with Spire.PDF for Python.