SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization
Abstract Recently, the finite state machine (FSM)‐based digital controllers are susceptible to fault‐injection and side‐channel attacks, which makes FSM security a more prominent factor. FSM optimality is another crucial element when designed. A state encoding approach is applied for FSM security an...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-IET
2021-09-01
|
Series: | IET Computers & Digital Techniques |
Subjects: | |
Online Access: | https://doi.org/10.1049/cdt2.12029 |
_version_ | 1797422716685385728 |
---|---|
author | Nitish Das Aruna Priya Panchanathan |
author_facet | Nitish Das Aruna Priya Panchanathan |
author_sort | Nitish Das |
collection | DOAJ |
description | Abstract Recently, the finite state machine (FSM)‐based digital controllers are susceptible to fault‐injection and side‐channel attacks, which makes FSM security a more prominent factor. FSM optimality is another crucial element when designed. A state encoding approach is applied for FSM security and optimization. This article proposes the security‐dominated FSM state assignment technique (SD‐SHO), which obtains a satisfactory level of FSM optimization as well. It is a deterministic algorithm and consists of two key techniques, such as state assignment using an improved quadratic sum code, and state assignment using a gradient‐based interior point method. A fuzzy bi‐level programming logic is introduced in the proposed approach for regulating the constituting algorithms optimally. Experiments are conducted to evaluate the FSM security and optimality using the MCNC FSM benchmarks. Results indicate a substantial reduction in the error masking probability using SD‐SHO. It also demonstrates that SD‐SHO achieves a satisfactory level of area and power reduction compared with other existing works. |
first_indexed | 2024-03-09T07:37:30Z |
format | Article |
id | doaj.art-966a88536af34396a304ed99f533164d |
institution | Directory Open Access Journal |
issn | 1751-8601 1751-861X |
language | English |
last_indexed | 2024-03-09T07:37:30Z |
publishDate | 2021-09-01 |
publisher | Hindawi-IET |
record_format | Article |
series | IET Computers & Digital Techniques |
spelling | doaj.art-966a88536af34396a304ed99f533164d2023-12-03T05:29:31ZengHindawi-IETIET Computers & Digital Techniques1751-86011751-861X2021-09-0115537239210.1049/cdt2.12029SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimizationNitish Das0Aruna Priya Panchanathan1Department of Electronics and Communication Engg. SRM Institute of Science and Technology Chennai IndiaDepartment of Electronics and Communication Engg. SRM Institute of Science and Technology Chennai IndiaAbstract Recently, the finite state machine (FSM)‐based digital controllers are susceptible to fault‐injection and side‐channel attacks, which makes FSM security a more prominent factor. FSM optimality is another crucial element when designed. A state encoding approach is applied for FSM security and optimization. This article proposes the security‐dominated FSM state assignment technique (SD‐SHO), which obtains a satisfactory level of FSM optimization as well. It is a deterministic algorithm and consists of two key techniques, such as state assignment using an improved quadratic sum code, and state assignment using a gradient‐based interior point method. A fuzzy bi‐level programming logic is introduced in the proposed approach for regulating the constituting algorithms optimally. Experiments are conducted to evaluate the FSM security and optimality using the MCNC FSM benchmarks. Results indicate a substantial reduction in the error masking probability using SD‐SHO. It also demonstrates that SD‐SHO achieves a satisfactory level of area and power reduction compared with other existing works.https://doi.org/10.1049/cdt2.12029digital controlencodingfinite state machinesfuzzy set theorylogic designoptimisation |
spellingShingle | Nitish Das Aruna Priya Panchanathan SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization IET Computers & Digital Techniques digital control encoding finite state machines fuzzy set theory logic design optimisation |
title | SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization |
title_full | SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization |
title_fullStr | SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization |
title_full_unstemmed | SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization |
title_short | SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization |
title_sort | sd sho security dominated finite state machine state assignment technique with a satisfactory level of hardware optimization |
topic | digital control encoding finite state machines fuzzy set theory logic design optimisation |
url | https://doi.org/10.1049/cdt2.12029 |
work_keys_str_mv | AT nitishdas sdshosecuritydominatedfinitestatemachinestateassignmenttechniquewithasatisfactorylevelofhardwareoptimization AT arunapriyapanchanathan sdshosecuritydominatedfinitestatemachinestateassignmenttechniquewithasatisfactorylevelofhardwareoptimization |