access icon free Secure memristor replicator architecture with physical uncloneability

A lightweight and highly versatile architecture for replicating the resistance of a source memristor into a destination memristor is presented. This can be useful for storing or backing up sensed analogue information, e.g. sensed resistance, voltage, etc. in a single memristor. The architecture, which is simple and power efficient, is also able to produce non-linear digital codes during the replication process for added security by taking advantage of the non-linear behaviour of memristors. The generated codes can also be used to retrieve the analogue value within acceptable conversion errors, with circuit elements already built into the replicator. The authors also show that the architecture demonstrates physical uncloneable properties.

Inspec keywords: memristors; nonlinear codes

Other keywords: nonlinear digital codes; sensed resistance; replication process; conversion errors; single memristor; physical uncloneability; lightweight architecture; physical uncloneable properties; nonlinear behaviour; destination memristor; secure memristor replicator architecture; source memristor

Subjects: Codes; Resistors

References

    1. 1)
    2. 2)
      • 6. Vijayakumar, A., Kundu, S.: ‘A novel modeling attack resistant PUF design based on non-linear voltage transfer characteristics’. Design, Automation and Test in Europe Conference and Exhibition, Grenoble, 2015, pp. 653658.
    3. 3)
    4. 4)
    5. 5)
      • 4. Olumodeji, O.A., Gottardi, M.: ‘Emulating the physical properties of HP memristor using an arduino and a digital potentiometer’. 2016 12th Conf. on Ph.D. Research in Microelectronics and Electronics (PRIME), Lisbon, 2016, pp. 14.
    6. 6)
    7. 7)
http://iet.metastore.ingenta.com/content/journals/10.1049/el.2019.1538
Loading

Related content

content/journals/10.1049/el.2019.1538
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading