Enhancing security in QCA-based circuits using optimal key gate placement

被引:0
|
作者
Amutha, M. [1 ]
Kavitha, K. R. [1 ]
机构
[1] Anna Univ, Sona Coll Technol, Salem 636005, India
关键词
QCA; Logic locking; Optimal key placement; LOGIC LOCKING; QUANTUM; RESISTANT; ATTACK;
D O I
10.1007/s10207-024-00842-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantum-dot Cellular Automata (QCA) is an emerging nanotechnology that explores the potential of using quantum effects to build compact and energy-efficient computational devices. The hardware attacks on QCA primarily target understanding the physical structure and operation of these nanotechnological circuits. The circuits like cryptographic processors hold sensitive data that needs protection from third-party attacks. Logic locking is a hardware protection technique that adds additional gates to the original circuits to prevent circuits from these attacks. In this work, a new logic locking approach is proposed for QCA based circuits. The new configurable logic gate or key gate is introduced for logic locking. This gate can be configured to either wire or inverter based on key gate inputs. Further, the metaheuristic optimization based optimal key gate placement algorithm proposed to achieve higher security with minimum key gate placement. The proposed approach is verified in QCA benchmark circuits using QCA-Designer. Results shows that the proposed achieves maximum security with minimal gate replacements.
引用
收藏
页码:2395 / 2405
页数:11
相关论文
共 50 条
  • [41] Enhancing Manet Security Using Hybrid Techniques in Key Generation Mechanism
    Dhanalakshmi, K. S.
    Kannapiran, B.
    Divya, A.
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [42] QCA-Based Secure RAM Cell Structure Using Logic Transformation and Cell Interaction with Signal Reliability and Energy Dissipation in Quantum Computing
    Seo, Duck-Kyu
    Jeon, Jun-Cheol
    APPLIED SCIENCES-BASEL, 2023, 13 (18):
  • [43] Trusted Third Party Based Key Management for enhancing LoRaWAN Security
    Naoui, Sarra
    Elhdhili, Mohamed Elhoucine
    Saidane, Leila Azouz
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 1306 - 1313
  • [44] Optimal Parking Lot Placement Considering Operational and Security limitations Using COA
    Shekari, Tohid
    Gholami, Amin
    Aminifar, Farrokh
    2014 SMART GRID CONFERENCE (SGC), 2014,
  • [45] Security-constrained optimal placement of PMUs using Crow Search Algorithm
    Johnson, Teena
    Moger, Tukaram
    APPLIED SOFT COMPUTING, 2022, 128
  • [46] Scheduling and optimal register placement for synchronous circuits derived using software pipelining techniques
    Chabini, N
    Aboulhamid, EM
    Chabini, I
    Savaria, Y
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2005, 10 (02) : 187 - 204
  • [47] Enhancing Cyber Security Using Audio Techniques: A Public Key Infrastructure for Sound
    Phipps, Anthony
    Ouazzane, Karim
    Vassilev, Vassil
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1429 - 1437
  • [48] Biogeography based optimization for optimal meter placement for security constrained state estimation
    Jamuna, K.
    Swarup, K. S.
    SWARM AND EVOLUTIONARY COMPUTATION, 2011, 1 (02) : 89 - 96
  • [49] Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios
    Rullo, Antonino
    Serra, Edoardo
    Bertino, Elisa
    Lobo, Jorge
    COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 419 - 436
  • [50] An efficient approach for enhancing security in Internet of Things using the optimum authentication key
    Kalyani G.
    Chaudhari S.
    International Journal of Computers and Applications, 2020, 42 (03) : 306 - 314