4.8 Review

Application of 2D Materials in Hardware Security for Internet-of-Things: Progress and Perspective

期刊

SMALL STRUCTURES
卷 3, 期 8, 页码 -

出版社

WILEY
DOI: 10.1002/sstr.202200060

关键词

hardware security; Internet-of-Things (IoT); physical unclonable functions; true random number generators; 2D materials

资金

  1. National Research Foundation Competitive Research Program [NRF-CRP24-2020-0002]
  2. A*STAR Science and Engineering Research Council under its AME IRG Program [A2083c0061]
  3. Ministry of Education, Singapore, under its AcRF Tier-1 Grant [R-263-000-E15-114]
  4. Applied Materials-NUS Advanced Corporate Laboratory Scholarship (A*STAR) [IAF-ICP I1801E0022]

向作者/读者索取更多资源

The security of Internet-of-Things (IoT) is crucial in various aspects such as device-to-device communication, sensing and actuating, and information exchange. Conventional cryptographic algorithms and silicon-based security primitives are constantly challenged by evolving attack methods, thus the implementation of hardware security using 2D materials is worth exploring. This review summarizes the research progress in 2D material-based true random number generators (TRNGs), physical unclonable functions (PUFs), and other security applications, and discusses entropy sources, reliability, circuit, and machine learning modeling attacks on TRNGs and PUFs.
Internet-of-Things (IoT) is a ubiquitous network that features a tremendous amount of data and myriads of heterogeneous devices, which are interconnected and accessible or controllable anywhere and anytime. The security of loT is therefore unequivocally crucial in several aspects, such as device-to-device communication, sensing and actuating, and information exchange. Conventional cryptographic algorithms and silicon-based security primitives are constantly challenged by evolving methods of attack. By far, many efforts and achievements have been made using 2D materials for various electronics applications. Therefore, it is plausible to explore the implementation of hardware security using 2D materials, for example, true random number generators (TRNGs), physical unclonable functions (PUFs), camouflage, and anticounterfeit. TRNGs and PUFs are critical elements of hardware security and are widely deployed in cryptographic keys, identification, and authentication. In contrast to conventional utilization of manufacturing variations, security primitives using 2D materials have other entropy sources to exploit, such as the random nature of material growth and intrinsic randomness in charge trapping/detrapping. In this review, research progresses in 2D material-based TRNGs, PUFs, and other security applications are summarized, along with the discussion on entropy sources, reliability, circuit, and machine learning modeling attacks launched on TRNGs and PUFs.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据