IoT: Source of test challenges

The semiconductor industry has been driving a major part of its growth through first the PC and more recently the mobile market. Unfortunately, the PC market is in decline and also the end of the growth curve for mobile products is in sight now that virtually everyone on the planet has a smartphone and/or tablet. Hence, the semiconductor industry is putting its bets on `Internet of Things' (IoT) as the next application wave that will allow them to sell a lot of silicon real estate. Although what exactly IoT encompasses is under definition and hence still volatile, the first emerging products depict an image which is quite different from the traditional microprocessors or smartphone SOCs: small but with ubiquitous presence, wirelessly connected, energy harvesting, equipped with smart sensors, secure, and low cost. All these aspects have a profound impact on the challenges, solutions, and associated trade-offs for testing IoT chips and provide rich grounds for research. This paper provides seven views from different angles.

[1]  Ping-Hsuan Hsieh,et al.  An RF Energy Harvester With 44.1% PCE at Input Available Power of -12 dBm , 2015, IEEE Transactions on Circuits and Systems I: Regular Papers.

[2]  C. P. Ravikumar,et al.  Test Strategies for Low Power Devices , 2008, 2008 Design, Automation and Test in Europe.

[3]  Wayne P. Burleson,et al.  On-chip lightweight implementation of reduced NIST randomness test suite , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[4]  Erik Jan Marinissen,et al.  IEEE Std P1838: DfT standard-under-development for 2.5D-, 3D-, and 5.5D-SICs , 2016, 2016 21th IEEE European Test Symposium (ETS).

[5]  Daniel E. Holcomb,et al.  Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.

[6]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[7]  Ingrid Verbauwhede,et al.  TOTAL: TRNG on-the-fly testing for attack detection using Lightweight hardware , 2016, 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[8]  Ingrid Verbauwhede,et al.  Low-cost implementations of on-the-fly tests for random number generators , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[9]  Srinivas Devadas,et al.  PUF Modeling Attacks on Simulated and Silicon Data , 2013, IEEE Transactions on Information Forensics and Security.

[10]  Philip Heng Wai Leong,et al.  Towards a unique FPGA-based identification circuit using process variations , 2009, 2009 International Conference on Field Programmable Logic and Applications.

[11]  Tanja Lange,et al.  Factoring RSA keys from certified smart cards: Coppersmith in the wild , 2013, IACR Cryptol. ePrint Arch..

[12]  Refet Firat Yazicioglu,et al.  28.4 A battery-powered efficient multi-sensor acquisition system with simultaneous ECG, BIO-Z, GSR, and PPG , 2016, 2016 IEEE International Solid-State Circuits Conference (ISSCC).

[13]  John Kelsey,et al.  Recommendation for the Entropy Sources Used for Random Bit Generation , 2018 .

[14]  Sandip Ray,et al.  The Changing Computing Paradigm With Internet of Things: A Tutorial Introduction , 2016, IEEE Design & Test.

[15]  Chi-En Daniel Yin,et al.  Obtaining Statistically Random Information From Silicon Physical Unclonable Functions , 2014, IEEE Transactions on Emerging Topics in Computing.

[16]  Refet Firat Yazicioglu,et al.  18.3 A multi-parameter signal-acquisition SoC for connected personal health applications , 2014, 2014 IEEE International Solid-State Circuits Conference Digest of Technical Papers (ISSCC).

[17]  Ingrid Verbauwhede,et al.  Embedded HW/SW platform for on-the-fly testing of true random number generators , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[18]  G. Edward Suh,et al.  Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[19]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .

[20]  Arjen K. Lenstra,et al.  Public Keys , 2012, CRYPTO.

[21]  Dawu Gu,et al.  Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[22]  Swaroop Ghosh,et al.  A family of Schmitt-Trigger-based arbiter-PUFs and selective challenge-pruning for robustness and quality , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[23]  Yervant Zorian,et al.  An Effective Multi-Chip BIST Scheme , 1997, J. Electron. Test..

[24]  Eric Wustrow,et al.  Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices , 2012, USENIX Security Symposium.

[25]  Julien Penders,et al.  Energy Harvesting for Autonomous Wireless Sensor Networks , 2010, IEEE Solid-State Circuits Magazine.

[26]  Olivier Sentieys,et al.  On-line monitoring of Random Number Generators for embedded security , 2009, 2009 IEEE International Symposium on Circuits and Systems.