Please use this identifier to cite or link to this item: https://doi.org/https://doi-org.libproxy1.nus.edu.sg/10.1002/sstr.202200060
DC FieldValue
dc.titleApplication of Two-Dimensional Materials in Hardware Security for IoT: Progress and Perspective
dc.contributor.authorHeng Xiang
dc.contributor.authorYu-Chieh Chien
dc.contributor.authorYufei Shi
dc.contributor.authorKah Wee Ang
dc.date.accessioned2023-04-04T04:32:27Z
dc.date.available2023-04-04T04:32:27Z
dc.date.issued2022-06-25
dc.identifier.citationHeng Xiang, Yu-Chieh Chien, Yufei Shi, Kah Wee Ang (2022-06-25). Application of Two-Dimensional Materials in Hardware Security for IoT: Progress and Perspective. Small structures 3 (8). ScholarBank@NUS Repository. https://doi.org/https://doi-org.libproxy1.nus.edu.sg/10.1002/sstr.202200060
dc.identifier.issn2688-4062
dc.identifier.urihttps://scholarbank.nus.edu.sg/handle/10635/238669
dc.description.abstractInternet-of-Things (IoT) is a ubiquitous network that features a tremendous amount of data and myriads of heterogeneous devices, which are interconnected and accessible or controllable anywhere and anytime. The security of IoT is therefore unequivocally crucial in several aspects, such as device-to-device communication, sensing and actuating, and information exchange. Conventional cryptographic algorithms and silicon-based security primitives are constantly challenged by evolving methods of attack. By far, many efforts and achievements have been made using 2D materials for various electronics applications. Therefore, it is plausible to explore the implementation of hardware security using 2D materials, for example, true random number generators (TRNGs), physical unclonable functions (PUFs), camouflage, and anticounterfeit. TRNGs and PUFs are critical elements of hardware security and are widely deployed in cryptographic keys, identification, and authentication. In contrast to conventional utilization of manufacturing variations, security primitives using 2D materials have other entropy sources to exploit, such as the random nature of material growth and intrinsic randomness in charge trapping/detrapping. In this review, research progresses in 2D material-based TRNGs, PUFs, and other security applications are summarized, along with the discussion on entropy sources, reliability, circuit, and machine learning modeling attacks launched on TRNGs and PUFs.
dc.description.urihttps://onlinelibrary-wiley-com.libproxy1.nus.edu.sg/doi/epdf/10.1002/sstr.202200060#accessDenialLayout
dc.publisherWiley
dc.rightsCC0 1.0 Universal
dc.rights.urihttp://creativecommons.org/publicdomain/zero/1.0/
dc.subjecthardware security
dc.subjectInternet-of-Things (IoT)
dc.subjectphysical unclonable functions
dc.subjecttrue random number generators
dc.subject2D materials
dc.typeReview
dc.contributor.departmentELECTRICAL & COMPUTER ENGINEERING
dc.description.doihttps://doi-org.libproxy1.nus.edu.sg/10.1002/sstr.202200060
dc.description.sourcetitleSmall structures
dc.description.volume3
dc.description.issue8
dc.published.statePublished
Appears in Collections:Staff Publications
Elements
Students Publications

Show simple item record
Files in This Item:
File Description SizeFormatAccess SettingsVersion 
Heng_Xiang_etal.docx5.3 MBMicrosoft Word XML

OPEN

Post-printView/Download

Google ScholarTM

Check

Altmetric


This item is licensed under a Creative Commons License Creative Commons