JOURNAL ARTICLE

Trusted root and trusted computing platform architecture design based on physical unclonable function

Wu JinXu Jinfu

Year: 2018 Journal:   DOAJ (DOAJ: Directory of Open Access Journals)

Abstract

Physical Unclonable Functions(PUFs) are highly flexible in applications such as device authentication and secure key storage, and are widely used in embedded system security. In this paper, we use PUF technology to provide the root of trust(RoT) for dual-core security architecture, and design the chain of trust and key update protocol based on PUF-based RoT, to ensure the gradual extension of trusted relationship and the reliability and security of secure boot on SoC system. The experimental results show that PUF-based RoT can operate in a dual-core isolated SoC system with a small TCB, and its random number seed and unique device key are resistant to multiple attacks. It proves that the PUF can provide the security and flexibility RoT for the embedded system.

Keywords:
Physical unclonable function Direct Anonymous Attestation Trusted Computing Trusted Platform Module Architecture Function (biology) Computer science Root (linguistics) Computer security Embedded system Human–computer interaction Cryptography Art Cell biology Biology

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
0.35
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Physical Unclonable Functions (PUFs) and Hardware Security
Physical Sciences →  Computer Science →  Hardware and Architecture
© 2026 ScienceGate Book Chapters — All rights reserved.