Solving energy and cybersecurity constraints in IoT devices using energy recovery computing

Himanshu Thapliyal, Zachary Kahleifeh

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

With the growth of Internet-of-Things (IoT), the potential threat vectors for malicious cyber and hardware attacks are rapidly expanding. As the IoT paradigm emerges, there are challenging requirements to design energy-efficient and secure systems. To address these challenges, we illustrate energy recovery computing as a potential solution to design low-energy hardware security primitives for IoT devices. Energy Recovery (ER) is a circuit design technique in which circuits recycle the charge stored in the load capacitor. This overview provides example applications of ER computing in (i) low-energy and Differential Power Analysis (DPA) resistant design, (ii) low-energy Physically Unclonable Function (PUF), and (iii) hardware trojan detection.

Original languageEnglish
Title of host publicationGLSVLSI 2019 - Proceedings of the 2019 Great Lakes Symposium on VLSI
Pages525-530
Number of pages6
ISBN (Electronic)9781450362528
DOIs
StatePublished - May 13 2019
Event29th Great Lakes Symposium on VLSI, GLSVLSI 2019 - Tysons Corner, United States
Duration: May 9 2019May 11 2019

Publication series

NameProceedings of the ACM Great Lakes Symposium on VLSI, GLSVLSI

Conference

Conference29th Great Lakes Symposium on VLSI, GLSVLSI 2019
Country/TerritoryUnited States
CityTysons Corner
Period5/9/195/11/19

Bibliographical note

Publisher Copyright:
© 2019 Owner/Author.

Keywords

  • Dpa attack
  • Hardware security
  • Hardware trojan
  • Low-power
  • Physically unclonable functions

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Solving energy and cybersecurity constraints in IoT devices using energy recovery computing'. Together they form a unique fingerprint.

Cite this