Design World

  • Home
  • Technologies
    • 3D CAD
    • Electronics • electrical
    • Fastening & Joining
    • Factory automation
    • Linear Motion
    • Motion Control
    • Test & Measurement
    • Sensors
    • 流体动力
  • Learn
    • Ebooks / Tech Tips
    • Engineering Week
    • Future of Design Engineering
    • MC² Motion Control Classrooms
    • Podcasts
    • Videos
    • Webinars
  • LEAP AWARDS
  • 领导
    • 2022 Voting
    • 2021 Winners
  • Design Guide Library
  • Resources
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Women in Engineering
  • Supplier Listings

Can a PUF solve sensor/network vulnerabilities?

ByRFrank|August 18, 2021

Share

The Internet of Things (IoT) and sensors are inextricably linked. According to a recentarticlein Forbes, “by 2025, it is expected that there will be more than 30 billion IoT connections…and…trillions of sensors connecting and interacting on these devices.” The downside to all this connectivity is that it leaves sensors and their connected networks vulnerable to attacks.

While today’s most vulnerable devices include laptops, computers, smartphones and tablets, most IoT devices, specifically sensors, have fewer processing and storage capabilities and much greater cost sensitivities. As a result, traditional anti-virus, firewalls and other security applications cannot be used. In addition, traditional embedded cryptographic mechanisms are a drain on power and counterproductive to the cost and performance goals of a sensor. Here is where Physically Unclonable Function (PUF) technology comes into play.

PUF’s have been around in some form or another since around for a couple of decades or so. While the focus for PUF technology has usually been at the system or device level, researchers have investigated its use in optical circuits, a CMOS image sensor and a pressure sensing relay in the past.

A PUF protected sensor. Source:MDPI。

In the technical paper “内在物理Unclonable函数(PUF)感官rs in Commodity Devices,” the authors discuss an intrinsic temperature sensor based on the decay feature of dynamic random-access memory (DRAM) PUF. The alternative approach to providing security authentication assurance relies on hardware circuitry with unique binary or analog behavior which depends on variations in the integrated circuit manufacturing process, such as delays, frequencies or capacitances to achieve unclonability.

IceMOS Technology Ltd., a Northern Ireland supplier of engineered substrates including microelectromechanical systems (MEMS) for many applications, is investigating the use of PUF technology for sensors. By adding another layer of device authenticity, and thereby security, at the starting substrate level, IceMOS expects to provide another value-added feature for customers in its manufacturing process. To do this, the company is looking for potential customers and/or partners to verify the potential for the technology and take the concept from feasibility into production. Interested parties should email IceMOS Technology at[email protected].


Filed Under:Sensor Tips
Tagged With:icemos technology

Related ArticlesRead More >

What sensor measurements are made using buoys?
How is biomarker sensing expanding?
ToF sensor maps 3D surfaces
Stainless-steel pressure sensors handle 0 kPa to 100 MPa range

DESIGN GUIDE LIBRARY

“motion

Enews Sign Up

Motion Control Classroom

Design World Digital Edition

cover

Browse the most current issueof Design World and back issues in an easy to use high quality format. Clip, share and download with the leading design engineering magazine today.

EDABoard the Forum for Electronics

Top global problem solving EE forum covering Microcontrollers, DSP, Networking, Analog and Digital Design, RF, Power Electronics, PCB Routing and much more

EDABoard: Forum for electronics

Sponsored Content

  • Case study: How a 3D-printed tool saved thousands of hours and dollars
  • WAGO’s smartDESIGNER Online Provides Seamless Progression for Projects
  • Stop over-designing: How to save time and money with a light-duty ring
  • Five Reasons: The 2065 Connector is a Reliable Alternative to Manual Soldering
  • Disaster recovery in industrial automation starts with source control
  • HELUAKBEL – Your Source for IE Cable Solutions

Design World Podcasts

February 27, 2022
What’s next for additive software
See More >
Engineering Exchange

The Engineering Exchange is a global educational networking community for engineers.

Connect, share, and learn today »

Design World
  • Advertising
  • About us
  • Contact
  • Manage your Design World Subscription
  • Subscribe
  • Design World Digital Network
  • Engineering White Papers
  • LEAP AWARDS

Copyright © 2022 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy|Advertising|About Us

Search Design World

  • Home
  • Technologies
    • 3D CAD
    • Electronics • electrical
    • Fastening & Joining
    • Factory automation
    • Linear Motion
    • Motion Control
    • Test & Measurement
    • Sensors
    • 流体动力
  • Learn
    • Ebooks / Tech Tips
    • Engineering Week
    • Future of Design Engineering
    • MC² Motion Control Classrooms
    • Podcasts
    • Videos
    • Webinars
  • LEAP AWARDS
  • 领导
    • 2022 Voting
    • 2021 Winners
  • Design Guide Library
  • Resources
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Women in Engineering
  • Supplier Listings
We use cookies to personalize content and ads, to provide social media features and to analyze our traffic. We also share information about your use of our site with our social media, advertising and analytics partners who may combine it with other information that you’ve provided to them or that they’ve collected from your use of their services. You consent to our cookies if you continue to use this website. OkNoRead more