scholarly journals Multibit-Generating Pulsewidth-Based Memristive-PUF Structure and Circuit Implementation

Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1446 ◽  
Author(s):  
Seoyeon Choi ◽  
Dayoung Kim ◽  
Yunyeong Choi ◽  
Wookyung Sun ◽  
Hyungsoon Shin

As Internet of Things (IoT) devices have evolved, physical unclonable functions (PUFs) have become a popular solution for hardware security. In particular, memristor devices are receiving attention as suitable candidates for reliable PUFs because they can be integrated into nano-cross point array circuits with ultra-high efficiency. However, it has been found that typical 1-bit generating PUFs consume too many challenge–response pairs (CRPs) to generate a single response. This issue has to be overcome to construct a strong and reliable PUF with a large number of valid CRPs. We suggest a bank design and quantizing entropy source method for constructing a multibit-generating PUF. In this paper, we propose a new pulsewidth-based memristive PUF (pm-PUF) architecture that incorporates analog memristor devices and a nano-cross point array. We describe the architecture’s circuit implementation and its operating process in detail. We also evaluate the inter and intra performances of the pm-PUF in terms of randomness, diffuseness, uniqueness, and steadiness to show that the proposed pm-PUF will be a promising solution for a high-density hardware security system.

Author(s):  
Lydia Negka ◽  
Georgios Gketsios ◽  
Nikolaos A. Anagnostopoulos ◽  
Georgios Spathoulas ◽  
Athanasios Kakarountas ◽  
...  

Photonics ◽  
2020 ◽  
Vol 7 (4) ◽  
pp. 87
Author(s):  
Cheng Liu ◽  
Bryan Melanson ◽  
Jing Zhang

AlGaN-delta-GaN quantum well (QW) structures have been demonstrated to be good candidates for the realization of high-efficiency deep-ultraviolet (DUV) light-emitting diodes (LEDs). However, such heterostructures are still not fully understood. This study focuses on investigation of the optical properties and efficiency of the AlGaN-delta-GaN QW structures using self-consistent six-band k⸱p modelling and finite difference time domain (FDTD) simulations. Structures with different Al contents in the AlxGa1−xN sub-QW and AlyGa1−yN barrier regions are examined in detail. Results show that the emission wavelength (λ) can be engineered through manipulation of delta-GaN layer thickness, sub-QW Al content (x), and barrier Al content (y), while maintaining a large spontaneous emission rate corresponding to around 90% radiative recombination efficiency (ηRAD). In addition, due to the dominant transverse-electric (TE)-polarized emission from the AlGaN-delta-GaN QW structure, the light extraction efficiency (ηEXT) is greatly enhanced when compared to a conventional AlGaN QW. Combined with the large ηRAD, this leads to the significant enhancement of external quantum efficiency (ηEQE), indicating that AlGaN-delta-GaN structures could be a promising solution for high-efficiency DUV LEDs.


Artificial Intelligence in contrast to Natural Intelligence also known as Machine Intelligence is intelligence revealed by machine. It is the science and engineering of making machines intelligent. Therefore, it is a technique that makes a machine work like humans. The IOT Internet of Things is a network of internet-connected objects which can connect and exchange data. The combination of AI and IoT called AIoT is the combination of Artificial Intelligence and Internet of Things to achieve more efficient IoT operations. When Artificial Intelligence is added to IoT it means that the devices can analyze data and make decisions and act accordingly without the intervention of humans. The combination of AI and IOT has several advantages like saving money, building deeper customer relationships, increased operational efficiency and productivity and enhanced security and safety. This research paper focuses on what is AIoT, its applications and challenges and further, it also focuses on AIoT security concern and how can we solve the security problem with the use of PUF which is hardware security which is a simple and fast solution for security purpose. PUF is also more compatible with AIoT gadgets. Attacks on IoT devices are on the upsurge. Physical Unclonable functions (PUFs) are recognized as a robust and mild-weight way for AIoT


Blockchain refers to a distributed ledger technology that represents an innovation in recording and sharing information without the need for a trusted third party. Blockchain technology offers new tools for security and privacy concerns. Marching towards digitization and analytics, this technology emerges as a promising solution for authentication and authorization issues. It sounds so amazing that this technology that originated with cryptocurrencies could not only be applied in digital contracts, financial and public records, and property ownership but also in medicine, education, science and so on. The use case of this technology springs up in every possible direction. This article first analyses the need for this breakthrough technology and explains how this technology works. This work presents a review on various types of blockchain, the consensus mechanisms used, their advantages and limitations. It provides an overview on the various use cases of this technology. This work mainly focuses on its application in Healthcare. The goal of this article is to analyze the usage of Blockchain technology in various fields of Healthcare such as Electronic Health Record, Health Insurance, Biomedical Research, Drug Supply, Medical Education, Remote Patient Monitoring, Interoperability, Location Sharing etc., It investigates the current research trends and finds the gaps and limitations of these approaches. Moreover, it proposes some enhancements to fill in the gaps in the present approach. This work also analyses the importance of Wearable Internet of Things (IoT) devices in HealthCare and the integration of these devices with Blockchain. Finally, this work concludes by comparing Blockchain 3.0 with previous versions.


Author(s):  
Konstantinos Nomikos ◽  
Athanasios Papadimitriou ◽  
George Stergiopoulos ◽  
Dimitris Koutras ◽  
Mihalis Psarakis ◽  
...  

Sensors ◽  
2019 ◽  
Vol 19 (14) ◽  
pp. 3208 ◽  
Author(s):  
Armin Babaei ◽  
Gregor Schiele

Attacks on Internet of Things (IoT) devices are on the rise. Physical Unclonable Functions (PUFs) are proposed as a robust and lightweight solution to secure IoT devices. The main advantage of a PUF compared to the current classical cryptographic solutions is its compatibility with IoT devices with limited computational resources. In this paper, we investigate the maturity of this technology and the challenges toward PUF utilization in IoT that still need to be addressed.


2017 ◽  
pp. 441-459
Author(s):  
Grzegorz Chmaj ◽  
Henry Selvaraj

Nowadays we are witnessing a trend with significantly increasing number of networked and computing-capable devices being integrated into everyday environment. This trend is expected to continue. With computing devices available as logic structures, they might use each other's processing capabilities to achieve a given goal. In this paper, the authors propose an architectural solution to perform the processing of tasks using a distributed structure of Internet of Things devices. They also include ZigBee devices that are not connected to the Internet, but participate with the processing swarm using local network. This significantly extends the flexibility and potential of the IoT structure, while being still not a well-researched area. Unlike many high-level realizations for IoT processing, the authors present a realization operating on the communications, computing and near protocol level that achieves energy consumption efficiency. They also include the reconfigurability of IoT devices. The authors' work is suitable to be the base for higher-level realizations, especially for systems with devices operating on battery power. At the same time, the architecture presented in this paper uses minimal centralization, moving maximum responsibilities to regular devices. The proposed realizations are described using linear programming models and their high efficiency is evaluated.


Author(s):  
Ishfaq Sultan ◽  
Mohammad Tariq Banday

The spatial ubiquity and the huge number of employed nodes monitoring the surroundings, individuals, and devices makes security a key challenge in IoT. Serious security apprehensions are evolving in terms of data authenticity, integrity, and confidentiality. Consequently, IoT requires security to be assured down to the hardware level, as the authenticity and the integrity need to be guaranteed in terms of the hardware implementation of each IoT node. Physically unclonable functions recreate the keys only while the chip is being powered on, replacing the conventional key storage which requires storing information. Compared to extrinsic key storage, they are able to generate intrinsic keys and are far less susceptible against physical attacks. Physically unclonable functions have drawn considerable attention due to their ability to economically introduce hardware-level security into individual silicon dice. This chapter introduces the notion of physically unclonable functions, their scenarios for hardware security in IoT devices, and their interaction with traditional cryptography.


Symmetry ◽  
2018 ◽  
Vol 10 (8) ◽  
pp. 352 ◽  
Author(s):  
An Braeken

Key agreement between two constrained Internet of Things (IoT) devices that have not met each other is an essential feature to provide in order to establish trust among its users. Physical Unclonable Functions (PUFs) on a device represent a low cost primitive exploiting the unique random patterns in the device and have been already applied in a multitude of applications for secure key generation and key agreement in order to avoid an attacker to take over the identity of a tampered device, whose key material has been extracted. This paper shows that the key agreement scheme of a recently proposed PUF based protocol, presented by Chatterjee et al., for Internet of Things (IoT) is vulnerable for man-in-the-middle, impersonation, and replay attacks in the Yao–Dolev security model. We propose an alternative scheme, which is able to solve these issues and can provide in addition a more efficient key agreement and subsequently a communication phase between two IoT devices connected to the same authentication server. The scheme also offers identity based authentication and repudiation, when only using elliptic curve multiplications and additions, instead of the compute intensive pairing operations.


Sign in / Sign up

Export Citation Format

Share Document