The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2017
DOI: 10.3390/electronics6030067
|View full text |Cite
|
Sign up to set email alerts
|

Ultra-Low-Power Design and Hardware Security Using Emerging Technologies for Internet of Things

Abstract: Abstract:In this review article for Internet of Things (IoT) applications, important low-power design techniques for digital and mixed-signal analog-digital converter (ADC) circuits are presented. Emerging low voltage logic devices and non-volatile memories (NVMs) beyond CMOS are illustrated. In addition, energy-constrained hardware security issues are reviewed. Specifically, light-weight encryption-based correlational power analysis, successive approximation register (SAR) ADC security using tunnel field effe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(9 citation statements)
references
References 127 publications
0
9
0
Order By: Relevance
“…[ 160 ] Additionally, an all‐spin logic device which utilized the variation in magnetization direction to change the circuit functionality without changing the overall device structure was also successfully demonstrated. [ 161 ] Other obfuscation techniques involving TFETs, [ 162 ] amorphous resistance change in PCM cells, [ 163 ] intrinsic stochasticity and polymorphism of giant spin‐Hall effect (GSHE) switches, [ 164 ] and ferroelectric active interconnects [ 165 ] have also been successful. More recently, independent from exploiting defects, obfuscation techniques based on 2D materials such as graphene, BP, and TMDs which rely on the intrinsic ambipolar transport and the substitutional doping of channel materials have been demonstrated.…”
Section: D‐material‐based Camouflagingmentioning
confidence: 99%
“…[ 160 ] Additionally, an all‐spin logic device which utilized the variation in magnetization direction to change the circuit functionality without changing the overall device structure was also successfully demonstrated. [ 161 ] Other obfuscation techniques involving TFETs, [ 162 ] amorphous resistance change in PCM cells, [ 163 ] intrinsic stochasticity and polymorphism of giant spin‐Hall effect (GSHE) switches, [ 164 ] and ferroelectric active interconnects [ 165 ] have also been successful. More recently, independent from exploiting defects, obfuscation techniques based on 2D materials such as graphene, BP, and TMDs which rely on the intrinsic ambipolar transport and the substitutional doping of channel materials have been demonstrated.…”
Section: D‐material‐based Camouflagingmentioning
confidence: 99%
“…Even with a shift toward neuromorphic computing architectures, the security of everyday devices will remain a paramount concern. With increasing device connectivity and the advent of the IoT, most of these devices will communicate wirelessly through the Internet, where malicious adversaries can easily intercept communicated information due to advancements in computing power, machine learning attacks, etc . However, for these devices to retain the desired energy efficiency of neuromorphic computing, similarly energy-efficient security approaches are necessary. For decades, physically unclonable functions (PUF) have been proposed as a promising solution to support secure and reliable security solutions in information security .…”
Section: Applicationsmentioning
confidence: 99%
“…The DC power consumption for a supply voltage of 1.8 V equals around 8.3 µW per current branch, which becomes clearly a dominating factor, if two to three current branches need to be considered for a standard OTA. Two methods to relax the pramplifier speed specification are the extension of sampling phase ( [5], [10]), and the use of a parallel charge reservoir. Both methods affect power consumption and sample rate of the system.…”
Section: Design Limitationsmentioning
confidence: 99%