In hardware, when an electronic chip fails or a functional module generates erroneous outputs, it can wreak havoc on people’s lives—from private key leakages to radar failing in battle zones during incoming air strikes.
For hardware system vendors, such security breaches can be catastrophic both to their reputation and to the essential trust that their customers require.
To address this, researchers have been exploring biometrics-based authentication as a way of reducing security vulnerability in hardware systems.
In the IT Professional magazine article, “Biometrics for Hardware Security and Trust: Discussion and Analysis,” Anirban Sengupta, Mahendra Rathor, and Rahul Chaurasia describe three such authentication approaches:
They also analyze the strengths of these techniques using an experimental validation method. Here, we offer a brief overview.
Cutting-edge electronic systems achieve functionalities using various modules, or intellectual property (IP) cores, developed by third-party hardware designers/vendors.
These IP cores might include
The vulnerability of IP cores to sabotage or piracy at various points in the third-party IP core supply chain makes verifying trust essential. To this end, there are two traditional approaches:
These techniques insert an IP vendor’s secret information into the design itself during the design process. Then, when the IP cores are inspected, authentic IPs can be isolated from counterfeit ones.
However, if these secret marks are leaked to attackers, it can be challenging for genuine IP vendors to prove ownership. To overcome this and other deficiencies of traditional approaches to hardware security, researchers propose the use of biometrics.
Biometrics-based authentication techniques associate a vendor’s unique personal identity with the hardware security constraints embedded in the design.
Because each individual has unique biometric information, it can’t be replicated or copied and misused to falsely claim IP ownership or authentication. As a result, biometric approaches may offer more robust security against threats than traditional approaches.
As the article describes, three common biometrics techniques are fingerprint, facial feature, and palmprint authentication.
To use biometrics for identity verification, biometric templates are created in a multistep process.
With this approach, an individual fingerprint’s inherently unique major minutiae features—such as ridge bifurcations and ridge endings—are exploited for verification to create a digital signature as follows:
The fingerprint constraints are then inserted into the design for identity verification.
The signature palmprint template is generated based on an individual’s unique palmprint features, which may include
The dimensions of each feature are then measured and converted into the corresponding binary representation. As with fingerprints, the binary values of all features are concatenated in a chosen order to generate the palmprint signature digital template.
In the facial-biometrics-based verification process, a facial image is used for security validation.
A facial template is created as follows:
The various features’ binary values are then concatenated in a selected order to generate the final signature digital template.
The general authentication process for these biometrics entails various steps, including the following
In addition to offering detailed descriptions of the creation and authentication processes for each biometric, the article also describes the authors’ experimental validation process for biometric robustness using a probability of coincidence (Pc) metric.
To read more, check out Sengupta, Rathor, and Chaurasia’s article, “Biometrics for Hardware Security and Trust: Discussion and Analysis,” in IT Professional magazine.