{"title":"生物识别技术在硬件安全与信任中的应用:讨论与分析","authors":"A. Sengupta, Mahendra Rathor, Rahul Chaurasia","doi":"10.1109/MITP.2023.3277594","DOIUrl":null,"url":null,"abstract":"Ensuring hardware security and trust is not only important for securing the designer’s/owner’s revenue but also for his/her reputation and trust in the electronics market. Biometrics-based authentication is an emerging approach to ensure security and trust in hardware, as it offers a unique identification of the true hardware designer/owner. This article provides a novel discussion and analysis of recently employed biometric techniques—intellectual property (IP) fingerprint, facial, and palmprint—for hardware IP security. More explicitly, this article discusses the potential hardware security threats, followed by a discussion of existing techniques for security. Furthermore, the article also provides a design flow for the IP core fingerprint biometrics, IP facial biometrics, and IP palmprint biometrics along with their corresponding detection flows. Finally, the article provides an analysis of the hardware security strength achieved through different biometric techniques in terms of probability of coincidence.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"5 1","pages":"36-44"},"PeriodicalIF":2.6000,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Biometrics for Hardware Security and Trust: Discussion and Analysis\",\"authors\":\"A. Sengupta, Mahendra Rathor, Rahul Chaurasia\",\"doi\":\"10.1109/MITP.2023.3277594\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ensuring hardware security and trust is not only important for securing the designer’s/owner’s revenue but also for his/her reputation and trust in the electronics market. Biometrics-based authentication is an emerging approach to ensure security and trust in hardware, as it offers a unique identification of the true hardware designer/owner. This article provides a novel discussion and analysis of recently employed biometric techniques—intellectual property (IP) fingerprint, facial, and palmprint—for hardware IP security. More explicitly, this article discusses the potential hardware security threats, followed by a discussion of existing techniques for security. Furthermore, the article also provides a design flow for the IP core fingerprint biometrics, IP facial biometrics, and IP palmprint biometrics along with their corresponding detection flows. Finally, the article provides an analysis of the hardware security strength achieved through different biometric techniques in terms of probability of coincidence.\",\"PeriodicalId\":49045,\"journal\":{\"name\":\"IT Professional\",\"volume\":\"5 1\",\"pages\":\"36-44\"},\"PeriodicalIF\":2.6000,\"publicationDate\":\"2023-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IT Professional\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1109/MITP.2023.3277594\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IT Professional","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1109/MITP.2023.3277594","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Biometrics for Hardware Security and Trust: Discussion and Analysis
Ensuring hardware security and trust is not only important for securing the designer’s/owner’s revenue but also for his/her reputation and trust in the electronics market. Biometrics-based authentication is an emerging approach to ensure security and trust in hardware, as it offers a unique identification of the true hardware designer/owner. This article provides a novel discussion and analysis of recently employed biometric techniques—intellectual property (IP) fingerprint, facial, and palmprint—for hardware IP security. More explicitly, this article discusses the potential hardware security threats, followed by a discussion of existing techniques for security. Furthermore, the article also provides a design flow for the IP core fingerprint biometrics, IP facial biometrics, and IP palmprint biometrics along with their corresponding detection flows. Finally, the article provides an analysis of the hardware security strength achieved through different biometric techniques in terms of probability of coincidence.
IT ProfessionalCOMPUTER SCIENCE, INFORMATION SYSTEMS-COMPUTER SCIENCE, SOFTWARE ENGINEERING
CiteScore
5.00
自引率
0.00%
发文量
111
审稿时长
>12 weeks
期刊介绍:
IT Professional is a technical magazine of the IEEE Computer Society. It publishes peer-reviewed articles, columns and departments written for and by IT practitioners and researchers covering:
practical aspects of emerging and leading-edge digital technologies,
original ideas and guidance for IT applications, and
novel IT solutions for the enterprise.
IT Professional’s goal is to inform the broad spectrum of IT executives, IT project managers, IT researchers, and IT application developers from industry, government, and academia.