TY - JOUR
T1 - Nano meets security
T2 - Exploring nanoelectronic devices for security applications
AU - Rajendran, Jeyavijayan
AU - Karri, Ramesh
AU - Wendt, James B.
AU - Potkonjak, Miodrag
AU - Mcdonald, Nathan
AU - Rose, Garrett S.
AU - Wysocki, Bryant
N1 - Publisher Copyright:
© 1963-2012 IEEE.
PY - 2015/5/1
Y1 - 2015/5/1
N2 - Information security has emerged as an important system and application metric. Classical security solutions use algorithmic mechanisms that address a small subset of emerging security requirements, often at high-energy and performance overhead. Further, emerging side-channel and physical attacks can compromise classical security solutions. Hardware security solutions overcome many of these limitations with less energy and performance overhead. Nanoelectronics-based hardware security preserves these advantages while enabling conceptually new security primitives and applications. This tutorial paper shows how one can develop hardware security primitives by exploiting the unique characteristics such as complex device and system models, bidirectional operation, and nonvolatility of emerging nanoelectronic devices. This paper then explains the security capabilities of several emerging nanoelectronic devices: memristors, resistive random-access memory, contact-resistive random-access memory, phase change memories, spin torque-transfer random-access memory, orthogonal spin transfer random access memory, graphene, carbon nanotubes, silicon nanowire field-effect transistors, and nanoelectronic mechanical switches. Further, the paper describes hardware security primitives for authentication, key generation, data encryption, device identification, digital forensics, tamper detection, and thwarting reverse engineering. Finally, the paper summarizes the outstanding challenges in using emerging nanoelectronic devices for security.
AB - Information security has emerged as an important system and application metric. Classical security solutions use algorithmic mechanisms that address a small subset of emerging security requirements, often at high-energy and performance overhead. Further, emerging side-channel and physical attacks can compromise classical security solutions. Hardware security solutions overcome many of these limitations with less energy and performance overhead. Nanoelectronics-based hardware security preserves these advantages while enabling conceptually new security primitives and applications. This tutorial paper shows how one can develop hardware security primitives by exploiting the unique characteristics such as complex device and system models, bidirectional operation, and nonvolatility of emerging nanoelectronic devices. This paper then explains the security capabilities of several emerging nanoelectronic devices: memristors, resistive random-access memory, contact-resistive random-access memory, phase change memories, spin torque-transfer random-access memory, orthogonal spin transfer random access memory, graphene, carbon nanotubes, silicon nanowire field-effect transistors, and nanoelectronic mechanical switches. Further, the paper describes hardware security primitives for authentication, key generation, data encryption, device identification, digital forensics, tamper detection, and thwarting reverse engineering. Finally, the paper summarizes the outstanding challenges in using emerging nanoelectronic devices for security.
KW - Emerging technologies
KW - PCMs
KW - hardware security
KW - memristors
KW - physical unclonable functions
UR - http://www.scopus.com/inward/record.url?scp=85027955678&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85027955678&partnerID=8YFLogxK
U2 - 10.1109/JPROC.2014.2387353
DO - 10.1109/JPROC.2014.2387353
M3 - Article
AN - SCOPUS:85027955678
SN - 0018-9219
VL - 103
SP - 829
EP - 849
JO - Proceedings of the IEEE
JF - Proceedings of the IEEE
IS - 5
ER -