计算机科学
利用
密码学
硬件安全模块
随机数生成
物理不可克隆功能
加密时值
计算机安全
认证(法律)
随机性
加密
统计
数学
作者
Heng Xiang,Yu‐Chieh Chien,Yufei Shi,Kah‐Wee Ang
标识
DOI:10.1002/sstr.202200060
摘要
Internet‐of‐Things (IoT) is a ubiquitous network that features a tremendous amount of data and myriads of heterogeneous devices, which are interconnected and accessible or controllable anywhere and anytime. The security of IoT is therefore unequivocally crucial in several aspects, such as device‐to‐device communication, sensing and actuating, and information exchange. Conventional cryptographic algorithms and silicon‐based security primitives are constantly challenged by evolving methods of attack. By far, many efforts and achievements have been made using 2D materials for various electronics applications. Therefore, it is plausible to explore the implementation of hardware security using 2D materials, for example, true random number generators (TRNGs), physical unclonable functions (PUFs), camouflage, and anticounterfeit. TRNGs and PUFs are critical elements of hardware security and are widely deployed in cryptographic keys, identification, and authentication. In contrast to conventional utilization of manufacturing variations, security primitives using 2D materials have other entropy sources to exploit, such as the random nature of material growth and intrinsic randomness in charge trapping/detrapping. In this review, research progresses in 2D material‐based TRNGs, PUFs, and other security applications are summarized, along with the discussion on entropy sources, reliability, circuit, and machine learning modeling attacks launched on TRNGs and PUFs.
科研通智能强力驱动
Strongly Powered by AbleSci AI