Nano meets security

Exploring nanoelectronic devices for security applications

Jeyavijayan Rajendran, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan Mcdonald, Garrett S. Rose, Bryant Wysocki

Research output: Contribution to journalArticle

Abstract

Information security has emerged as an important system and application metric. Classical security solutions use algorithmic mechanisms that address a small subset of emerging security requirements, often at high-energy and performance overhead. Further, emerging side-channel and physical attacks can compromise classical security solutions. Hardware security solutions overcome many of these limitations with less energy and performance overhead. Nanoelectronics-based hardware security preserves these advantages while enabling conceptually new security primitives and applications. This tutorial paper shows how one can develop hardware security primitives by exploiting the unique characteristics such as complex device and system models, bidirectional operation, and nonvolatility of emerging nanoelectronic devices. This paper then explains the security capabilities of several emerging nanoelectronic devices: memristors, resistive random-access memory, contact-resistive random-access memory, phase change memories, spin torque-transfer random-access memory, orthogonal spin transfer random access memory, graphene, carbon nanotubes, silicon nanowire field-effect transistors, and nanoelectronic mechanical switches. Further, the paper describes hardware security primitives for authentication, key generation, data encryption, device identification, digital forensics, tamper detection, and thwarting reverse engineering. Finally, the paper summarizes the outstanding challenges in using emerging nanoelectronic devices for security.

Original languageEnglish (US)
Pages (from-to)829-849
Number of pages21
JournalProceedings of the IEEE
Volume103
Issue number5
DOIs
StatePublished - May 1 2015

Fingerprint

Nanoelectronics
Data storage equipment
Memristors
Phase change memory
Reverse engineering
Security of data
Field effect transistors
Graphene
Authentication
Cryptography
Nanowires
Carbon nanotubes
Torque
Switches
Silicon
Hardware security

Keywords

  • Emerging technologies
  • hardware security
  • memristors
  • PCMs
  • physical unclonable functions

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Cite this

Rajendran, J., Karri, R., Wendt, J. B., Potkonjak, M., Mcdonald, N., Rose, G. S., & Wysocki, B. (2015). Nano meets security: Exploring nanoelectronic devices for security applications. Proceedings of the IEEE, 103(5), 829-849. https://doi.org/10.1109/JPROC.2014.2387353

Nano meets security : Exploring nanoelectronic devices for security applications. / Rajendran, Jeyavijayan; Karri, Ramesh; Wendt, James B.; Potkonjak, Miodrag; Mcdonald, Nathan; Rose, Garrett S.; Wysocki, Bryant.

In: Proceedings of the IEEE, Vol. 103, No. 5, 01.05.2015, p. 829-849.

Research output: Contribution to journalArticle

Rajendran, J, Karri, R, Wendt, JB, Potkonjak, M, Mcdonald, N, Rose, GS & Wysocki, B 2015, 'Nano meets security: Exploring nanoelectronic devices for security applications', Proceedings of the IEEE, vol. 103, no. 5, pp. 829-849. https://doi.org/10.1109/JPROC.2014.2387353
Rajendran, Jeyavijayan ; Karri, Ramesh ; Wendt, James B. ; Potkonjak, Miodrag ; Mcdonald, Nathan ; Rose, Garrett S. ; Wysocki, Bryant. / Nano meets security : Exploring nanoelectronic devices for security applications. In: Proceedings of the IEEE. 2015 ; Vol. 103, No. 5. pp. 829-849.
@article{5a93c6f597ee4dad8588f230eb1d3e93,
title = "Nano meets security: Exploring nanoelectronic devices for security applications",
abstract = "Information security has emerged as an important system and application metric. Classical security solutions use algorithmic mechanisms that address a small subset of emerging security requirements, often at high-energy and performance overhead. Further, emerging side-channel and physical attacks can compromise classical security solutions. Hardware security solutions overcome many of these limitations with less energy and performance overhead. Nanoelectronics-based hardware security preserves these advantages while enabling conceptually new security primitives and applications. This tutorial paper shows how one can develop hardware security primitives by exploiting the unique characteristics such as complex device and system models, bidirectional operation, and nonvolatility of emerging nanoelectronic devices. This paper then explains the security capabilities of several emerging nanoelectronic devices: memristors, resistive random-access memory, contact-resistive random-access memory, phase change memories, spin torque-transfer random-access memory, orthogonal spin transfer random access memory, graphene, carbon nanotubes, silicon nanowire field-effect transistors, and nanoelectronic mechanical switches. Further, the paper describes hardware security primitives for authentication, key generation, data encryption, device identification, digital forensics, tamper detection, and thwarting reverse engineering. Finally, the paper summarizes the outstanding challenges in using emerging nanoelectronic devices for security.",
keywords = "Emerging technologies, hardware security, memristors, PCMs, physical unclonable functions",
author = "Jeyavijayan Rajendran and Ramesh Karri and Wendt, {James B.} and Miodrag Potkonjak and Nathan Mcdonald and Rose, {Garrett S.} and Bryant Wysocki",
year = "2015",
month = "5",
day = "1",
doi = "10.1109/JPROC.2014.2387353",
language = "English (US)",
volume = "103",
pages = "829--849",
journal = "Proceedings of the IEEE",
issn = "0018-9219",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "5",

}

TY - JOUR

T1 - Nano meets security

T2 - Exploring nanoelectronic devices for security applications

AU - Rajendran, Jeyavijayan

AU - Karri, Ramesh

AU - Wendt, James B.

AU - Potkonjak, Miodrag

AU - Mcdonald, Nathan

AU - Rose, Garrett S.

AU - Wysocki, Bryant

PY - 2015/5/1

Y1 - 2015/5/1

N2 - Information security has emerged as an important system and application metric. Classical security solutions use algorithmic mechanisms that address a small subset of emerging security requirements, often at high-energy and performance overhead. Further, emerging side-channel and physical attacks can compromise classical security solutions. Hardware security solutions overcome many of these limitations with less energy and performance overhead. Nanoelectronics-based hardware security preserves these advantages while enabling conceptually new security primitives and applications. This tutorial paper shows how one can develop hardware security primitives by exploiting the unique characteristics such as complex device and system models, bidirectional operation, and nonvolatility of emerging nanoelectronic devices. This paper then explains the security capabilities of several emerging nanoelectronic devices: memristors, resistive random-access memory, contact-resistive random-access memory, phase change memories, spin torque-transfer random-access memory, orthogonal spin transfer random access memory, graphene, carbon nanotubes, silicon nanowire field-effect transistors, and nanoelectronic mechanical switches. Further, the paper describes hardware security primitives for authentication, key generation, data encryption, device identification, digital forensics, tamper detection, and thwarting reverse engineering. Finally, the paper summarizes the outstanding challenges in using emerging nanoelectronic devices for security.

AB - Information security has emerged as an important system and application metric. Classical security solutions use algorithmic mechanisms that address a small subset of emerging security requirements, often at high-energy and performance overhead. Further, emerging side-channel and physical attacks can compromise classical security solutions. Hardware security solutions overcome many of these limitations with less energy and performance overhead. Nanoelectronics-based hardware security preserves these advantages while enabling conceptually new security primitives and applications. This tutorial paper shows how one can develop hardware security primitives by exploiting the unique characteristics such as complex device and system models, bidirectional operation, and nonvolatility of emerging nanoelectronic devices. This paper then explains the security capabilities of several emerging nanoelectronic devices: memristors, resistive random-access memory, contact-resistive random-access memory, phase change memories, spin torque-transfer random-access memory, orthogonal spin transfer random access memory, graphene, carbon nanotubes, silicon nanowire field-effect transistors, and nanoelectronic mechanical switches. Further, the paper describes hardware security primitives for authentication, key generation, data encryption, device identification, digital forensics, tamper detection, and thwarting reverse engineering. Finally, the paper summarizes the outstanding challenges in using emerging nanoelectronic devices for security.

KW - Emerging technologies

KW - hardware security

KW - memristors

KW - PCMs

KW - physical unclonable functions

UR - http://www.scopus.com/inward/record.url?scp=85027955678&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85027955678&partnerID=8YFLogxK

U2 - 10.1109/JPROC.2014.2387353

DO - 10.1109/JPROC.2014.2387353

M3 - Article

VL - 103

SP - 829

EP - 849

JO - Proceedings of the IEEE

JF - Proceedings of the IEEE

SN - 0018-9219

IS - 5

ER -