Hardware Security Exploiting Post-CMOS Devices: Fundamental Device Characteristics, State-of-the-Art Countermeasures , Challenges and Roadmap

被引:18
作者
Japa, Aditya [1 ]
Majumder, Manoj Kumar [1 ]
Sahoo, Subhendu K. [2 ]
Vaddi, Ramesh [3 ]
Kaushik, Brajesh Kumar [4 ]
机构
[1] DSPM Int Inst Informat Technol, Dept Elect & Commun, Naya Raipur 493661, Chhattisgarh, India
[2] Birla Inst Technol & Sci, Dept Elect & Elect Engn, Hyderabad 500078, India
[3] SRM Univ, Sch Engn & Appl Sci, Dept Elect & Commun, Guntur 522502, Andhra Pradesh, India
[4] Indian Inst Technol Roorkee, Dept Elect & Commun Engn, Roorkee 247667, Uttar Pradesh, India
关键词
RANDOM-NUMBER GENERATOR; PHASE-CHANGE MEMORY; PHYSICALLY UNCLONABLE FUNCTION; DIFFERENTIAL POWER ANALYSIS; LOGIC OBFUSCATION; ENERGY-EFFICIENT; DESIGN; DPA; CIRCUIT; PUF;
D O I
10.1109/MCAS.2021.3092532
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Emerging nanoelectronic semiconductor devices have been quite promising in enhancing hardware-oriented security and trust. However, implementing hardware security primitives and methodologies requires large area overhead and power consumption. Furthermore, emerging new attack models and vulnerabilities are regularly evolving and cannot be adequately addressed by current CMOS technology. This paper for the first time presents a comprehensive review of numerous post-CMOS technologies based hardware security primitives and methodologies, particularly true random number generators, physically unclonable functions, side-channel analysis countermeasures, and hardware obfuscation techniques. Various beyond-CMOS device technologies including tunneling FET (TFET), hybrid phase transition FET (HyperFET), carbon nanotube FET (CNTFET), silicon nanowire FET (SiNWFET), symmetrical tunneling FET (SymFET), phase-change memory (PCM), spin-transfer torque magnetic tunnel junction (STT-MTJ), resistive random access memory (RRAM) have been considered in this study. First, the basic principle of operation and unusual characteristics of nanoelectronic devices used for hardware security applications have been extensively discussed. Later, CMOS technology challenges and benefits of emerging nanotechnologies for the design of hardware security primitives and methodologies have been reported. Finally, different analyses have been presented to demonstrate the promising performance of post-CMOS devices over the current CMOS technology in different countermeasures. Additionally, challenges, future directions, and plans have been presented to achieve more research outcomes in this field.
引用
收藏
页码:4 / 30
页数:27
相关论文
共 144 条
  • [1] Tunneling Field Effect Transistors for Enhancing Energy Efficiency and Hardware Security of IoT Platforms: Challenges and Opportunities
    Aditya, Japa
    Nagateja, T.
    Vishvakarma, Santosh Kumar
    Yellappa, Palagani
    Choi, Jun Rim
    Vaddi, Ramesh
    [J]. 2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
  • [2] Amini E., 2018, J. Hardw. Syst. Secur, V2, P345, DOI [10.1007/s41635-018-0052-3, DOI 10.1007/S41635-018-0052-3]
  • [3] [Anonymous], 2018, The cost of malicious cyber activity to the US economy
  • [4] Aziz A, 2017, IEEE T ELECTRON DEV, V64, P1358, DOI 10.1109/TED.2017.2650598
  • [5] Steep Switching Hybrid Phase Transition FETs (Hyper-FET) for Low Power Applications: A Device-Circuit Co-design Perspective-Part I
    Aziz, Ahmedullah
    Shukla, Nikhil
    Datta, Suman
    Gupta, Sumeet Kumar
    [J]. IEEE TRANSACTIONS ON ELECTRON DEVICES, 2017, 64 (03) : 1350 - 1357
  • [6] 3-Gb/s High-Speed True Random Number Generator Using Common-Mode Operating Comparator and Sampling Uncertainty of D Flip-Flop
    Bae, Sang-Geun
    Kim, Yongtae
    Park, Yunsoo
    Kim, Chulwoo
    [J]. IEEE JOURNAL OF SOLID-STATE CIRCUITS, 2017, 52 (02) : 605 - 610
  • [7] Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions
    Banerjee, Soumya
    Odelu, Vanga
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Rodrigues, Joel J. P. C.
    Park, Youngho
    [J]. IEEE ACCESS, 2019, 7 : 85627 - 85644
  • [8] Straintronics-Based True Random Number Generator for High-Speed and Energy-Limited Applications
    Barangi, Mahmood
    Chang, Joseph S.
    Mazumder, Pinaki
    [J]. IEEE TRANSACTIONS ON MAGNETICS, 2016, 52 (01)
  • [9] Near-infrared optical sensors based on single-walled carbon nanotubes
    Barone, PW
    Baik, S
    Heller, DA
    Strano, MS
    [J]. NATURE MATERIALS, 2005, 4 (01) : 86 - U16
  • [10] Secure STT-MRAM Bit-Cell Design Resilient to Differential Power Analysis Attacks
    Ben Dodo, Samir
    Bishnoi, Rajendra
    Tahoori, Mehdi B.
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2020, 28 (01) : 263 - 272