SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization

Abstract Recently, the finite state machine (FSM)‐based digital controllers are susceptible to fault‐injection and side‐channel attacks, which makes FSM security a more prominent factor. FSM optimality is another crucial element when designed. A state encoding approach is applied for FSM security an...

Full description

Bibliographic Details
Main Authors: Nitish Das, Aruna Priya Panchanathan
Format: Article
Language:English
Published: Hindawi-IET 2021-09-01
Series:IET Computers & Digital Techniques
Subjects:
Online Access:https://doi.org/10.1049/cdt2.12029
_version_ 1797422716685385728
author Nitish Das
Aruna Priya Panchanathan
author_facet Nitish Das
Aruna Priya Panchanathan
author_sort Nitish Das
collection DOAJ
description Abstract Recently, the finite state machine (FSM)‐based digital controllers are susceptible to fault‐injection and side‐channel attacks, which makes FSM security a more prominent factor. FSM optimality is another crucial element when designed. A state encoding approach is applied for FSM security and optimization. This article proposes the security‐dominated FSM state assignment technique (SD‐SHO), which obtains a satisfactory level of FSM optimization as well. It is a deterministic algorithm and consists of two key techniques, such as state assignment using an improved quadratic sum code, and state assignment using a gradient‐based interior point method. A fuzzy bi‐level programming logic is introduced in the proposed approach for regulating the constituting algorithms optimally. Experiments are conducted to evaluate the FSM security and optimality using the MCNC FSM benchmarks. Results indicate a substantial reduction in the error masking probability using SD‐SHO. It also demonstrates that SD‐SHO achieves a satisfactory level of area and power reduction compared with other existing works.
first_indexed 2024-03-09T07:37:30Z
format Article
id doaj.art-966a88536af34396a304ed99f533164d
institution Directory Open Access Journal
issn 1751-8601
1751-861X
language English
last_indexed 2024-03-09T07:37:30Z
publishDate 2021-09-01
publisher Hindawi-IET
record_format Article
series IET Computers & Digital Techniques
spelling doaj.art-966a88536af34396a304ed99f533164d2023-12-03T05:29:31ZengHindawi-IETIET Computers & Digital Techniques1751-86011751-861X2021-09-0115537239210.1049/cdt2.12029SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimizationNitish Das0Aruna Priya Panchanathan1Department of Electronics and Communication Engg. SRM Institute of Science and Technology Chennai IndiaDepartment of Electronics and Communication Engg. SRM Institute of Science and Technology Chennai IndiaAbstract Recently, the finite state machine (FSM)‐based digital controllers are susceptible to fault‐injection and side‐channel attacks, which makes FSM security a more prominent factor. FSM optimality is another crucial element when designed. A state encoding approach is applied for FSM security and optimization. This article proposes the security‐dominated FSM state assignment technique (SD‐SHO), which obtains a satisfactory level of FSM optimization as well. It is a deterministic algorithm and consists of two key techniques, such as state assignment using an improved quadratic sum code, and state assignment using a gradient‐based interior point method. A fuzzy bi‐level programming logic is introduced in the proposed approach for regulating the constituting algorithms optimally. Experiments are conducted to evaluate the FSM security and optimality using the MCNC FSM benchmarks. Results indicate a substantial reduction in the error masking probability using SD‐SHO. It also demonstrates that SD‐SHO achieves a satisfactory level of area and power reduction compared with other existing works.https://doi.org/10.1049/cdt2.12029digital controlencodingfinite state machinesfuzzy set theorylogic designoptimisation
spellingShingle Nitish Das
Aruna Priya Panchanathan
SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization
IET Computers & Digital Techniques
digital control
encoding
finite state machines
fuzzy set theory
logic design
optimisation
title SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization
title_full SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization
title_fullStr SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization
title_full_unstemmed SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization
title_short SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization
title_sort sd sho security dominated finite state machine state assignment technique with a satisfactory level of hardware optimization
topic digital control
encoding
finite state machines
fuzzy set theory
logic design
optimisation
url https://doi.org/10.1049/cdt2.12029
work_keys_str_mv AT nitishdas sdshosecuritydominatedfinitestatemachinestateassignmenttechniquewithasatisfactorylevelofhardwareoptimization
AT arunapriyapanchanathan sdshosecuritydominatedfinitestatemachinestateassignmenttechniquewithasatisfactorylevelofhardwareoptimization