2019
DOI: 10.1007/978-981-13-8379-3_4
|View full text |Cite
|
Sign up to set email alerts
|

Applications of Resistive Switching Memory as Hardware Security Primitive

Abstract: With the widespread diffusion of ubiquitous mobile computing and internet of things (IoT), secured communication and chip authentication become key requirements. Hardware-based security concepts generally provide the best performance in terms of good security standard, low power consumption, and large area density. In these concepts, the stochastic properties of the device, such as the physical and geometrical variations of the process, are harnessed to generate random bits and functions. This is the basis for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 81 publications
0
7
0
Order By: Relevance
“…Memristors, usually implemented as metal/insulator/metal (MIM) nanocells with a conductance that can be adjusted to two or more levels by applying sequences of electrical stresses 10 , could be an efficient entropy source for TRNG circuits because they can produce random variations of different magnitudes (e.g., state resistance, switching voltage/time) during operation while consuming little energy, in some cases down to ~0.1 pJ per state transition [11][12][13][14] . References [15][16][17][18][19][20] subjected metal-oxide memristors to sequences of ramped voltage stresses (RVS) of different polarities or pulsed write/verify schemes 21,22 to induce cyclical switching between a high resistive state (HRS) and low resistive state (LRS), and used the switching voltages, cycle-to-cycle resistance variability or stochastic time-dependent relaxation as entropy source in a TRNG circuit -as the switching is related to ionic movement in the MIM nanocell, these values show some degree of variability in every cycle, and they cannot be accurately predicted.…”
Section: Main Textmentioning
confidence: 99%
See 1 more Smart Citation
“…Memristors, usually implemented as metal/insulator/metal (MIM) nanocells with a conductance that can be adjusted to two or more levels by applying sequences of electrical stresses 10 , could be an efficient entropy source for TRNG circuits because they can produce random variations of different magnitudes (e.g., state resistance, switching voltage/time) during operation while consuming little energy, in some cases down to ~0.1 pJ per state transition [11][12][13][14] . References [15][16][17][18][19][20] subjected metal-oxide memristors to sequences of ramped voltage stresses (RVS) of different polarities or pulsed write/verify schemes 21,22 to induce cyclical switching between a high resistive state (HRS) and low resistive state (LRS), and used the switching voltages, cycle-to-cycle resistance variability or stochastic time-dependent relaxation as entropy source in a TRNG circuit -as the switching is related to ionic movement in the MIM nanocell, these values show some degree of variability in every cycle, and they cannot be accurately predicted.…”
Section: Main Textmentioning
confidence: 99%
“…, state resistance and switching voltage/time) during operation while consuming little energy, in some cases down to ∼0.1 pJ per state transition. 11–14 Ref. 15–20 subjected metal oxide memristors to sequences of ramped voltage stresses (RVS) of different polarities or pulsed write/verify schemes 21,22 to induce cyclical switching between a high resistive state (HRS) and a low resistive state (LRS), and used the switching voltages, cycle-to-cycle resistance variability or stochastic time-dependent relaxation as an entropy source in a TRNG circuit—as the switching is related to ionic movement in the MIM nanocell, these values show some degree of variability in every cycle, and they cannot be accurately predicted.…”
mentioning
confidence: 99%
“…Strong PUFs are resistant to brute force attacks. The main characteristics of PUFs are reliability (it should always provide same CRPs), unpredictability (PUF CRPs should not be predicted based on other CRPs), unclonability (CRP mappings should be physically unclonable), and physical unbreakability (physical PUF modification should result of malfunction or permanent damage to chip as protection of chip integrity) [ 60 ]. Advantages of the PUFs are resistant to invasive attacks and have no need for extra programming, testing, and processing power [ 61 ].…”
Section: Hardware Assisted Security Of Fog Computing Devicesmentioning
confidence: 99%
“…A large applications space for these devices has accordingly emerged, ranging from high-density storage class memory [8], [9] to multiply and accumulate (MAC) units for neuromorphic computing [10], [11]. ReRAM devices can also be used to realize various security primitives for such architectures due to their reconfigurability and inter-device variability [12], including physical unclonable functions (PUFs) for device authentication [13], [14], truerandom number generators (TRNGs) [15], reconfigurable vias enabling split manufacturing [16], switch boxes for non-volatile FPGAs [17], and programmable "memory fingerprints" for provable destruction of digital keys after use [18].…”
Section: Introductionmentioning
confidence: 99%