Design of Lector Based Approximate Adiabatic Logic for Enhancing Security
Keywords:
DPA (Differential Power Analysis), AMA, TSAA, TCAA.Abstract
On Internet of Things edge devices, approximation computing is used in error-tolerant applications is a viable choice for reducing power usage. Assaults via side channels, Differential power analysis, for example, is a distinct story, but it can be used to sabotage approximation calculation (DPA). The use of adiabatic logic in estimation edge computing could help to reduce energy consumption while simultaneously increasing security against side-channel attacks. Despite the fact that approximation and adiabatic logic-based solutions save space and improve security, they consume more power and take longer to complete. To reduce overall size the recommended approximation adders take advantage of adiabatic logic's dual-rail functionality to reduce both the use of electricity and the use of energy are two different things. The article starts with a proposed designs TSAA then moves on to a 2nd proposed design of TCAA.TSAA and TCAA based on adiabatic logic require fewer transistors than a CMOS-based accurate mirror adder. With a 45 nm technology node and a particular operational frequency, the adiabatic design of both proposed 1st & 2nd demonstrated significant power and energy savings over the conventional CMOS AMA. Both proposed architectures are also more resistant to DPA assaults, as demonstrated.
References
- P. Mohanty, According to IEEE Consumer Electronics Magazine, the internet of everything (ioe) age needs security and privacy by design.., vol. 9, no. 2, pp. 4–5, 2020.
- Satyanarayanan, The emergence of edge computing, Computer, vol. 50, no. 1, pp. 30–39, 2017.
- Yellu, N. Boskov, M. A. Kinsy, and Q. Yu, Security threats in approximate computing systems, in Proceedings of the 2019 on Great Lakes Symposium on VLSI, 2019, pp. 387–392.
- Regazzoni, C. Alippi, and I. Polian, Security: the dark side of approximate computing? in 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). IEEE, 2018, pp. 1–6.
- Gao, Q. Wang, M. T. Arafin, Y. Lyu, and G. Qu, Approximate computing for low power and security in the internet of things, Computer, vol. 50, no. 6, pp. 27– 34, 2017.
- Kahleifeh and H. Thapliyal, Adiabatic logic based energy-efficient security for smart consumer electronics,IEEE Consumer Electronics Magazine, pp. 1–1, 2020.
- D. Kumar, H. Thapliyal, and A. Mohammad, EESPFAL: A Novel Energy-Efficient Secure Positive Feedback Adiabatic Logic for DPA Resistant RFID and Smart Card, IEEE Transactions on Emerging Topics in Computing, vol. 7, no. 2, pp. 281–293, 2019.
- Weste and D. Harris, CMOS VLSI Design: A Circuits and Systems Perspective, 4th ed. USA: Addison-Wesley Publishing Company, 2010.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.