Algorithm 1 Multi-layered security model using PUF: New client |
Prerequisites:
-
(a)
New client , requesting application access is known to an existing client as a genuine applicant.
-
(b)
have built-in controllers to facilitate secure dynamic partial reconfiguration.
-
(c)
has built-in controllers to facilitate secure dynamic partial reconfiguration initiated by the cloud.
-
(d)
The fabric is divided into two parts, (a) static fabric and (b) dynamic fabric. Static fabric consists of hardware configurations which existed before deployment. The dynamic fabric of the is dedicated to configure additional security primitives (mostly PUFs) for any genuine clients using secure dynamic partial reconfiguration.
-
(e)
The fabric is divided into two parts, (a) static fabric and (b) dynamic fabric. Static fabric consists of hardware configurations which existed before deployment. The has secure remote DPR controllers in the static partition facilitating configuration of PUF mathematical model in the dynamic fabric, via an obfuscated bitstream.
Input:, , , , , of
-
(a)
Tenant session: S
-
(b)
Contents of session packets:
-
(c)
Contents of FW:
-
(d)
Contents of
-
(e)
Contents of
-
(f)
Contents of
-
(g)
Contents of
Note: represents content of layer j
Output: A value in Flag to show a successful dynamic partial reconfiguration () or denied ().
|
Steps:
-
1.
Initialize ,
-
2.
to management plane : request access to application A
-
3.
to : sends a random number and a set of challenges consisting of q challenge bits each of length ‘n’.
-
4.
calculates the following:
, ,
, , }
=
-
5.
to : certificate
-
6.
-
7.
if; AuthoriseTenantAccess()
|