4.8 Article

All-in-one, bio-inspired, and low-power crypto engines for near-sensor security based on two-dimensional memtransistors

Journal

NATURE COMMUNICATIONS
Volume 13, Issue 1, Pages -

Publisher

NATURE PORTFOLIO
DOI: 10.1038/s41467-022-31148-z

Keywords

-

Funding

  1. Army Research Office (ARO) [W911NF1920338]
  2. National Science Foundation (NSF) [ECCS-2042154]
  3. NSF [DMR-2039351]

Ask authors/readers for more resources

The authors propose a solution for IoT edge sensors based on two-dimensional (2D) memtransistors, integrating sensing, storage, and encryption functionalities. The sensors offer low power consumption and near-sensor security.
In the emerging era of the internet of things (IoT), ubiquitous sensors continuously collect, consume, store, and communicate a huge volume of information which is becoming increasingly vulnerable to theft and misuse. Modern software cryptosystems require extensive computational infrastructure for implementing ciphering algorithms, making them difficult to be adopted by IoT edge sensors that operate with limited hardware resources and at low energy budgets. Here we propose and experimentally demonstrate an all-in-one 8 x 8 array of robust, low-power, and bio-inspired crypto engines monolithically integrated with IoT edge sensors based on two-dimensional (2D) memtransistors. Each engine comprises five 2D memtransistors to accomplish sensing and encoding functionalities. The ciphered information is shown to be secure from an eavesdropper with finite resources and access to deep neural networks. Our hardware platform consists of a total of 320 fully integrated monolayer MoS2-based memtransistors and consumes energy in the range of hundreds of picojoules and offers near-sensor security. Internet of things (IoT) sensors can collect, store and communicate large volumes of information, which require effective security measures. Here, the authors report the realization of low-power edge sensors based on photosensitive and programmable 2D memtransistors, integrating sensing, storage and encryption functionalities.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available