You are on page 1of 21

REVIEW

www.advintellsyst.com

Application of Memristors in Hardware Security: A Current


State-of-the-Art Technology
Shiya Lv, Jian Liu,* and Zhaoxin Geng*

memristor is presented as M ¼ dϕ dq , which


Memristors are widely used in hardware security applications. Research progress depicts the correlation between the charge
in memristor-based physical unclonable functions (PUFs), random number and the flux φ.[19] The HP laboratory discov-
generators (RNGs), and chaotic circuits is reviewed. To enhance device security, ered the sandwich structure of Pt/TiO2/Pt
along with its voltage scanning attributes in
PUFs and RNGs apply randomness of memristors and incorporate 3D crossbars
2008.[18] (Figure 1b). Less power consump-
to amplify the number of challenge-response pairs and provide proof of the tion and tighter security are observed in
destruction of the key, which enables the administrator to firmly control the devices with small geometries when
device information. In addition, the image encryption technique based on the compared with semiconductor devices.
chaotic system is summarized. Furthermore, an assessment of the research Hence, they are forecasted as substitutes
for a metal–oxide–semiconductor field-
advancement in PUFs, RNGs, and chaotic circuits is conducted. This Review
effect transistor (MOSFET).[20–22]
examines the characteristics, applications, progress, and challenges of mem- Presently, in the field of hardware
ristors in hardware security and compares the benefits and limitations of different security, the memristor has become an
schemes as accelerators for hardware information protection. essential discovery. There has been a rapid
development of physical unclonable func-
tions (PUFs), random number generators
(RNGs), and chaotic circuits, which can
1. Introduction be classified into two primary research directions. The first
method replaces the transistor with a single memristor.
With the development of the Internet, electronic gadgets are Hybrid devices of memristors and complementary metal–
increasingly intertwined with day-to-day activities and they oxide–semiconductor (CMOS) technology are usually produced.
unavoidably interfere with the privacy of individuals, enterprises, The second method replaces transistors completely with
and institutions.[1–5] To steal private information, hackers often memristor crossbars, creating an emerging device that can
attack electronic equipment,[6,7] for instance, side-channel significantly improve the performance of safety equipment.
attacks,[8,9] wormhole attacks,[10–12] hardware attacks,[13,14] This review first presents the properties of memristors and its
reverse new attacks,[15,16] and Internet protocol piracy attacks.[17] applications within the context of information security, and sub-
Therefore, a cost-effective approach to improve security is sequently summarizes innovations of memristors in PUFs,
urgently required. RNGs, and chaotic systems. Finally, a comparative analysis
A memristor is an emerging device capable of solving such of the advantages and drawbacks of the method is presented,
issues. Chua defined and derived the memristor in 1971 using followed by future challenges.
circuit completeness theory (Figure 1a). The expression of the

S. Lv, Prof. Z. Geng 2. Characteristics and Structural Classification of


School of Information Engineering Memristors
Minzu University of China
Beijing 100081, P. R. China The structure of the memristor can extend from a 3D to a 1D
E-mail: zxgeng@muc.edu.cn
assembly. Initially, 3D structures of memristors were discovered
Prof. J. Liu
comprising certain metal oxides, including TiO2, MoOx, and
State Key Laboratory of Superlattices and Microstructures
Institute of Semiconductors AgSiO2. Memristors will result in more power consumption
Chinese Academy of Sciences when the memristor becomes thicker along the Z-direction.
Beijing 10083, P. R. China Consequently, researchers slowly compressed the thickness of
E-mail: liujian@semi.ac.cn the memristors to reduce the rate of power consumption.
The ORCID identification number(s) for the author(s) of this article At a thickness of 10 nm, the memristor is classified as a 2D
can be found under https://doi.org/10.1002/aisy.202000127. memristor.[23] The requirements of lower power consumption
© 2020 The Authors. Published by Wiley-VCH GmbH. This is an open and higher flexibility encourage the study of efficient neural
access article under the terms of the Creative Commons Attribution network learning and training. Abunahla et al. proposed a
License, which permits use, distribution and reproduction in any mathematical model for a 1D memristor in 2016. The model
medium, provided the original work is properly cited. can stimulate anion-based memristor devices and predict their
DOI: 10.1002/aisy.202000127 performance.[24] The model is classified as a 1D memristor

Adv. Intell. Syst. 2021, 3, 2000127 2000127 (1 of 21) © 2020 The Authors. Published by Wiley-VCH GmbH
www.advancedsciencenews.com www.advintellsyst.com

Figure 1. Discovery of memristors: a) Four circuit elements along with all the correlations between the fundamental circuit variables (charge q, voltage υ,
current, and magnetic flux φ); b) Experimental I–V plot of a memristor composed of Pt-TiO2x-Pt. Reproduced with permission.[18] Copyright 2008,
Springer Nature.

because ions move only in a single direction. The drawback of attributes, it is feasible to widely apply memristors in the hard-
the 1D model is that it only considers the thickness of the oxide ware security field.
layer, operating temperature, and materials of memristors.
However, the practical implementation of 1D memristors has
not yet occurred. 2.1. Switching Characteristics of Memristors
A common feature of memristor materials is the variation of
the resistance with the current. We can present an analogy When the voltage changes continuously, the formation of the two
between memristors and pipes. Large flows increase the thick- states in resistance conversion is referred to as switching
ness of the pipe. Similarly, a large current increases the resis- characteristics. The values of both the high-resistance state
tance. Moreover, due to the nonlinear change in the (HRS) and low-resistance state (LRS) correspond to “0” and “1,”
resistance and current, the output of the voltage will also change. respectively (Figure 3a). The switching principles of the different
The various output voltage values of a memristor can form a key types of memristor materials vary and are described based on
that is applicable in diverse fields of hardware security. It is three mechanisms: 1) fuse–antifuse, 2) electrochemical metalli-
impossible for the conventional semiconductor material Si to zation memory, and 3) valence change memory.[24] Table 2 lists
achieve this type of attribute related to current memory. the principles and corresponding materials of different mecha-
Meanwhile, different properties are demonstrated by the mem- nisms. From the table, it is clearly observed that the mechanisms
ristors of different materials and structures. Table 1 (Figure 2) of fuse–antifuse and valence memory primarily depend on elec-
lists the summary and several relevant characteristics are tron migration or oxygen vacancy recombination. Moreover, the
extracted, such as switching characteristics, reliability, and ran- electrochemical metallization memory is affected by metal
domness, to provide a comprehensive explanation. Due to these cations produced during oxidation.

Table 1. Common structures and properties of memristors.

Dimension Common material Major material properties Application materials Ref. Figure

1D ZnO High flexibility Flexible electronic design [25] 2a


2D WS2 Low power consumption, short switching time (13 ns), Simulates the basic function of biological [26] 2b
low switching program current (1 A) synapses
MoS2 Switch has good durability and reliability Simulated synaptic activity [27,28] 2c
In2Se3/WSe2 Conductance of continuous modulation, under nanosecond Efficient training using biological synapses [29] 2d
pulse, to complete the long-term enhancement to short-term
enhancement conversion
Ti3C2Tx Ferroelectric heterostructure, reversible, nonvolatile Development information store [30] 2e
3D Ag:SiO2 Strong randomicity TRNG [31] 11a
TiO2 Ag/TiO2 switch is fast and stable Build a synapse simulator [32] 2f
MoOx Low voltage, low power Neuromorphic computation [33] 2g
Hybrid COMS-memristor Feasibility to modify the original transistor TRNG, PUF, biological synapse construction [34,35] 12c

Adv. Intell. Syst. 2021, 3, 2000127 2000127 (2 of 21) © 2020 The Authors. Published by Wiley-VCH GmbH
www.advancedsciencenews.com www.advintellsyst.com

Figure 2. Common materials for memristors: a) Schematic illustration of the fabrication of the polyethylene terephthalate/reduced graphene oxide/ZnO
nanorods/Au device; Reproduced with permission.[25] Copyright 2013, The Royal Society of Chemistry. b) Schematic of the Pd/WS2/Pt device;
Reproduced with permission.[26] Copyright 2019, Wiley-VCH. c) Schematic representation of the Ag/MoS2/Pt device and a graphene/Al2O3/MoS2 struc-
ture; Reproduced with permission.[27] Copyright 2017, Wiley-VCH; Reproduced with permission.[28] Copyright 2019, Wiley-VCH. d) Optical, atomic force
microscopy images of the α-In2Se3/WSe2 vertical heterostructure device and schematic diagram of the corresponding device; Reproduced with permis-
sion.[29] Copyright 2019, Science China Press and Springer-Verlag GmbH. e) Schematic structure of the Al/Ti3C2Tx/Pt device and Ti3C2Tx atomic structure;
Reproduced with permission.[30] Copyright 2019, Wiley-VCH. f ) I–V curve comparison for the two memristors and their relation to the memory crossbar
along with synaptic concept; Reproduced with permission.[32] Copyright 2020, MDPI. g) Schematic of Ag/MoOx/ITO devices for measurement.
Reproduced with permission.[33] Copyright 2019, Elsevier.

It is feasible to apply Equation (1) for computing the drift.[43,44] To examine the switch mutation of the memristor,
distribution of electrons, assuming it is possible to the gradients of the electric potential, temperature, and
summarize the switching mechanism of the device based on concentration can be changed to allow the transportation of
the tunneling of electrons through the insulation gap. At this vacant oxygen inside the metal oxide (Figure 3d). Based on this,
moment, the width of this gap and the corresponding device a new current–voltage (I–V ) curve was discovered by Abunahla
resistance can be changed by applying an input voltage or et al., to be generated in each switching event. Alternatively,
current. Therefore, through the adjustment of the appropriate a single memristor was incorporated by Abunahla et al. into
voltage, the switching characteristics of memristors can be con- the original coding circuit. Through this memristor, a new
trolled. session key can be generated for every new communication.
Z t     Internet communication security can be further developed by
1  plnffiffiffiT 1 ln t including a session key to the host/trusted third party. The mem-
Fðt; τ, σ t Þ ¼ pffiffiffiffiffi e 2τσt dT ¼ erfc  pffiffiffiffiffiffiffi (1)
0 2π σ t T 2 2τσ ristor structure that generates the session key is shown in
Figure 3d.
Here, F, t, and erfc represent the cumulative distribution Memristor materials can be created from metal oxides and
function of the lognormal distribution, cumulative time, and metal sulfides. The direction of the conductor-mediated DC in
complementary error function, respectively. Deviation σt programmable switches using sulfur compounds can result in
depends on the applied voltage amplitude, and τ depends on innovative developments (Figure 3i).[42] Therefore, assuming
the voltage (any further modification here will alter the context we want to explore the features of mediated rectification, a mem-
and lower the standard). ristor model that considers the sulfur vacancy in MoS2 can be
Recently, the control of switching characteristics has become established. Recently, a neural network was developed by
a trending topic. The switching rate of metal oxides can be Liang and co-workers using MoS2 to simulate the ion interaction
controlled by changing the driving force of the oxygen vacancy between neurons.

Adv. Intell. Syst. 2021, 3, 2000127 2000127 (3 of 21) © 2020 The Authors. Published by Wiley-VCH GmbH
www.advancedsciencenews.com www.advintellsyst.com

Figure 3. Switching characteristics of memristors: a) Cumulative switching probability distribution for ON and OFF switching under different applied
voltage amplitudes; Reproduced with permission.[31] Copyright 2019, The Royal Society of Chemistry. b) Three switching mechanisms (fuse–antifuse on
the left, electrochemical metallization memory in the middle, valence change memory on the right); c) Schematic, I–V characteristic diagram, and a
transmission electron microscope (TEM) image of Pt/ZnO/Pt switching device; Reproduced with permission.[36] Copyright 2013, ACS. d) Schematic
representation of the prevalent electrical switching pathway occurring inside the microscale Pd/Hf/HfO2/Pd memristors; Reproduced with permission.[37]
Copyright 2018, Elsevier. e) Schematic, I–V characteristic diagram, and TEM image of TiN/TaOx/Pt switching device; Reproduced with permission.[38]
Copyright 2009, The Royal Society of Chemistry. f ) Schematic, I–V characteristic diagram, and TEM image of Ag/a-LSMO/Pt switching device;
Reproduced with permission.[39] Copyright 2013, The Royal Society of Chemistry. g) Schematic, I–V characteristic diagram, and TEM image of Ag/
SiO2/Ta2O5/Pt switching device; Reproduced with permission.[40] Copyright 2013, Wiley-VCH. h) Schematic, I–V characteristic diagram, and TEM image
of Au/Ta2O5/Au switching device; Reproduced with permission.[41] Copyright 2015, Wiley-VCH. i) Schematic, I–V characteristic diagram of the Au/MoS2/
Au switching device. Reproduced with permission.[42] Copyright 2018, ACS.

2.2. Reliability and Randomness of Memristors modifications in the exterior of the devices are not expected to
generate different results, which is a property known as reliabil-
From the analysis listed in Table 2, it can be noted that the ran- ity. Thus, the randomness of memristors and reliability are
domness of the memristor is caused by the unpredictability of properties that contradict each other. In this context, by analyzing
wire formation/fracture and vacancy migration. Thus, because the reliability, the randomness of memristors and reliability are
of this specific property, it becomes complicated to estimate devi- elaborately examined (Table 3).
ces, including the true random number generator (TRNG),[31] As listed in Table 3, the reliability of memristors is affected by
PUF,[48–50] chaotic circuit;[51–53] moreover, artificial projection three factors, namely variability,[57–59] durability,[27,58,62] and
simulation produces outputs. The randomness of memristors random telegraph noise (RTN).[63,64] To obtain process variabil-
is important in hardware security devices, as it protects against ity, it is feasible to apply a memristor that utilizes different
hacking and amplifies the robustness of the devices.[31,54–57] materials or to utilize the same memristor under different volt-
Nevertheless, randomness is not only required to ensure output age scanning cycles to obtain the HRS and LRS at a variety of
diversity but also to modify the output to control it. Subtle voltage ranges. Moreover, variability can be achieved using the

Adv. Intell. Syst. 2021, 3, 2000127 2000127 (4 of 21) © 2020 The Authors. Published by Wiley-VCH GmbH
www.advancedsciencenews.com www.advintellsyst.com

Table 2. Switching characteristics of different mechanisms.

Switch mechanism Principle Examples of corresponding Application Ref. Figure


(Figure 3b) materials

Fuse–antifuse Generation and recombination of oxygen vacancies through Pt/ZnO thin film/Pt Multistate storage [36] 3c
joule heating is the basis for creating and rupturing of Pd/Hf/HfO2/Pd Resistive random access [37,43–45] 3d
conducting filaments. memory (RRAM)
Pt/TiN/TaOx/Pt RRAM [38] 3e
Electrochemical Oxidation of the active electrode occurs under the scanning Ag/a-LSMO/Pt Information storage [39] 3f
metallization memory voltage, and the resulting metal cation migrates to the inert Ag/SiO2/Ta2O5/Pt Electrochemical metallized cell [40] 3g
electrode along the electric field. In the course of moving, there
is a reduction in the metal guide wire that subsequently
changes the device from HRS to LRS.[46,47] During amplification
of the reverse voltage, the conductance wire breaks to produce
a HRS resulting in resistance switching, which ensures that the
switching procedure is completed.
Valence change It relies on the vacancy migration that causes redox reactions Au/Ta2O5/Au RRAM [41] 3h
memory and results in the modification of the insulator layer
stoichiometry.

Table 3. Reliability of memristors.

Factors affecting Generating principle Result Resolution Limitation Utilization Ref.


reliability

Variability Variation of oxygen vacancy – High voltage, large pulse Reduces RRAM PUF, TRNG, RRAM [58–61]
in doped concentration, a difference width, low temperature reading stability
in area (S) and thickness (L)
Endurance Degradation mechanism and Distance between high- Optimize setting and HRS and LRS – [27,58,62]
endurance failure and low-resistance values reset voltage parameters change
RTN Capture and emission of charge Causes changes in the threshold – Reading instability – [59,63,64]
carriers near the interface voltage (VT) and drain current (Id) of RRAM memory
in the MOSFET

equipment in varied operating conditions, such as voltage, pulse The wear of the memristor tends to be significantly reduced in
width, and temperature. The changes in the speed and level of the course of the same switching period by applying an adequate
switching between the two states of a memristor are due to an switching voltage. RTN represents the third factor that impacts
increase in the number of switches. This is sometimes known as the reliability of memristors. The RTN causes distinct random
durability.[65,66] The figure on the left side of Figure 4a shows that fluctuations at consistent values in memristors, which denotes
once the proportion of switches arrives at a particular level, the a regular phenomenon that occurs within the semiconductor
memristors are degraded and their memory properties are lost. devices. The fluctuation occurs between two values. This distance
From the comparison of the picture located on the left and right is designated as RTNp (Figure 4b).[59] As the fluctuation becomes
sides of Figure 4a, it can be observed that the durability of the smaller, the impact of external noise on the memristor is reduced
memristor can be affected by the setting of the switching voltage. and consequently its reliability is enhanced.

Figure 4. Reliability and randomness of memristors: a) Endurance behavior in memristive devices; Reproduced with permission.[66] Copyright 2018,
Elsevier. b) Current fluctuations in resistive random access memory because of RTNp.

Adv. Intell. Syst. 2021, 3, 2000127 2000127 (5 of 21) © 2020 The Authors. Published by Wiley-VCH GmbH
www.advancedsciencenews.com www.advintellsyst.com

In summary, the three factors listed earlier restrict the uncontrollable parameters during the production procedure.
dependability of memristors. The switching voltage values, In several circumstances, it is feasible to use the unique ID to
voltage pulses, and temperature impact these three factors. protect information. To avoid malicious changes to the encryp-
Thus, to ensure that the memristor is reliable, it becomes imper- tion parameter in the one-time programmable memory, informa-
ative for the manufactured devices to pass complex tests, such as tion managers integrate the ID with parameters.[83] Furthermore,
cycle and temperature tests.[31,56,67] Concurrently, it is impossible to prevent transport attacks, the manager can connect the ID to
to separate the reliability and randomness of a memristor. specific models.[84] The data is certain to record failure in other
Therefore, while developing memristors, it is necessary to models, assuming the model and data of ID are integrated into
consider the contradiction between the performance parameters the ciphertext, even if the encrypted data theft occurs during
of memristors as the reliability is enhanced, and randomness is transmission. This is because the application of the encrypted
weakened. data is possible only when the decryption of the ID is performed
in combination with the model. Other scenarios that often occur
2.3. Other Characteristics in the field of artificial intelligence are malicious reverse
engineering, hardware analysis, and inconspicuous stealing.
In contrast to digital circuit devices, transistor memristors have It is conducive for the ID of the PUF output to counterbalance
additional excellent features, as (Table 4): 1) Uniqueness: Under reverse engineering.[85,86] Thus, before the utilization of the chip,
different initial conditions, it is feasible for the same input signal it is mandatory for users to have a special ID. However, it is pos-
to output different I–V orbitals.[68] Hence, different keys can be sible to clone the entire conventional PUF developed by CMOS.
generated using similar devices, and the manager can ensure the The moment the attacker clones the PUF, it becomes easy for
destruction of keys in the random fingerprint that is returned him to break the encryption algorithm by obtaining the ID of
from the device.[69–71] 2) Nonvolatile: In the absence of power the output. The solution to this problem is to apply memristors
excitation, the original resistance value can be maintained by to the PUF. The discrete nature of memristors is further
the memristor (Figure 5, Panel 1). Memristors are classified into increased due to the randomness of the memristor while build-
positive and negative poles. A HRS is attained when the mem- ing a PUF, which is now adjudged to be similar to placing an
ristor is placed at the positive pole, whereas a LRS is achieved enhanced RNG in PUF. The randomness along with reliability
when the placement is at the negative pole. It is feasible for of the PUF is enhanced and reinforced by the uniqueness of
the memristor to switch from a HRS to a LRS as the position the PUF and the reliability of the memristors. Reliability is a
of the positive pulse occurs at both the positive and negative ter- factor that indicates the potential of equipment to maintain its
minals. The memristor obtains a LRS once the positive pulse is original performance when subjected to varying conditions, such
input at the negative pole. Based on the resistance attribute of the as different temperatures, responses, and other external environ-
memristor, the resistance state of the positive pulse requires con- mental conditions. In Section 2.2, it is discussed that the external
siderable time before it can return to a high state from a low state environment can impact the reliability of memristors. Thus, to
if the positive pulse is input at the positive pole at a particular confirm their reliability, it is necessary to perform temperature
time duration. 3) Integration: It is feasible to incorporate a mem- and voltage cycle tests for PUFs. Moreover, other properties of
ristor into a 3D crossbar. From Figure 5, the capability of arrang- the PUF should also be considered. Table 5 lists the catalog of
ing multiple 3D memristor crossbars periodically in an key features as well as the specific computational approaches.
integrated memristor array is revealed. In addition to the afore- The attributes of memristors can be quantified based on the
mentioned features, the other features of a memristor include uniqueness, uniformity, reliability, diffuseness, and bit-aliasing
multiple choices, low cost, low power consumption, high com- of the PUF, as listed in the table; moreover, based on these prop-
patibility as well as being considered as a circuit component that erties, memristors can be adjusted into more suitable conditions.
can be used in the future.[82] PUFs are of various forms. It can be categorized into strong and
weak PUFs based on the excitation response algorithm.
From the perspective of different applications, the PUF can be
3. Applications
divided into the following categories: arbiter PUF (APUF), ring
3.1. Memristor-Based PUFs oscillator PUF (ROPUF), and public PUF (PPUF). Figure 6
shows other classification methods. Presently, the integration
The term uniqueness insinuates the tendency of the PUF to of memristors into PUF has been performed by researchers
produce a single, random identity document (ID) based on using two approaches. In the first approach, independent mem-
the structural configuration of the chip generated through ristors are applied to modify the existing circuit.[48,91] In the

Table 4. Various properties and applications of memristors.

Characteristics Transistor Memristor Applications Ref.

Uniqueness No Yes Forms a key, proof that the key is destroyed [68–72]
Nonvolatile Loss of power, Loses power, still Brain-like nerve morphology calculation, [73–77]
loss of state in the previous state nonvolatile memory, nonvolatile logic operation
Integration Low integration High integration level Microchip miniaturization [34,35,78]

Adv. Intell. Syst. 2021, 3, 2000127 2000127 (6 of 21) © 2020 The Authors. Published by Wiley-VCH GmbH
www.advancedsciencenews.com www.advintellsyst.com

Figure 5. Subsequent attributes: Panel 1. Typical nonvolatile memristor devices: a) Schematic, I–V characteristic diagram of the TaOx device; Reproduced
with permission.[79] Copyright 2018, Springer Nature. b) Neuromorphic computing using nonvolatile memory; Reproduced with permission.[73] Copyright
2016, Informa UK Limited. c) Nonvolatile memristor for neural computation; Reproduced with permission.[80] Copyright 2018, Wiley-VCH. Panel 2.
Memristors improve integration: a) Efficient multiply–accumulate operations chip; Reproduced with permission.[34] Copyright 2019, Springer Nature.
b) In-situ learning chip. Reproduced with permission.[81] Copyright 2018, Springer Nature.

second method, rather than utilizing the existing design, the conducted by Mathew et al. provides an illustrated example of
memristor crossbar is used. The diffusion memristor crossbar research on the hybrid memristor–CMOS PUF.[48]
is the most frequently used method.[56] This technique is A report was published pertaining to the hybrid memristor–
comprehensively discussed in the subsequent section. CMOS PUF based on delay variation.[48] The core concept is
focused on saving hardware overhead. The most significant
3.1.1. Hybrid Memristor–CMOS PUF Circuit (APUF and ROPUF) challenge is in attempting to ascertain whether it is possible
to select the fragments in the delayed path. It is feasible to com-
An increasing number of systems are now developing conven- bine the delay fragments for producing the delayed path and
tional PUFs based on CMOS devices.[92,93] Due to the suitable obtain the response bit. Thus, the amount of memristor–
attributes of memristors as well as the compatible nature of CMOS hardware entering a multibit response can be controlled
the manufacturing technologies used for memristors and through the selection of a delayed fragment.
CMOS devices, research has been intensified by scientists on The general layout of the circuit along with its associated
hybrid memristor–CMOS circuits. With a lower power consump- control signals is shown in Figure 7. From Figure 7, it can be
tion and more suitable integration, PUF circuits based on observed that the circuit is composed of the time-control module,
memristors have eclipsed the CMOS-oriented circuit.[88] A study delay path, reset element, and n-type metal–oxide–semiconductor

Adv. Intell. Syst. 2021, 3, 2000127 2000127 (7 of 21) © 2020 The Authors. Published by Wiley-VCH GmbH
www.advancedsciencenews.com www.advintellsyst.com

Table 5. Key PUF parameter definitions and ideal values.

Metrics Description Definition Ideal value Ref.


PNchips 1 PNchips
Uniqueness Estimates the differences that are produced Uniqueness ð%Þ ¼ 100  2
Nchips  ðNchips 1Þ i ¼1 j ¼ i þ 1 ri ⊗ rj, 50% [48,87,88]
when two different PUFs use identical challenges where Nchips is the number of PUFs or chips to be measured, and
ri, rj are responses from the i-th and j-th chip, respectively
PNchallanges
Uniformity Measures the ratio of “1” and “0” Uniformity ð%Þ ¼ 100  Nchallanges 1
c¼1 r c , where Nchallenges is the 50% [55,87]
in the response vector number of challenges applied to a single PUF and rc is the response
for the c-th challenge
PNcycles 1 PNcycles
Reliability Measures the ability that the PUF can reproduce Reliability ð%Þ ¼ 100  100  Ncycles þ ðN 2
cycles 1Þ i¼1 it ¼ t þ 1 r t ⊗ r it . 0% [48,87]
the response bits in different test conditions Here, Ncycles is the number of times of applying a challenge is applied
and cycles and a response is measured
PNchallanges 1 P
Diffuseness Measures the degree of variations among Diffuseness ð%Þ ¼ 100  Nchallanges þ ðN 2
challanges 1Þ i¼1 j 50% [87]
responses when using two different challenges ¼ t þ 1Nchallanges r i ⊗ r j . Here, Nchallenges is the number of challenges
applied to the same PUF to be measured, and ri, rj are responses from the i-th and j-th
challenge, respectively
P ID
Bit-aliasing If bit-aliasing happens, different chips may Bit  aliasing ð%Þ ¼ 100  N1ID N i ¼ 1 r i , where NID is the number 50% [89,90]
produce nearly identical PUF responses, which of indexes of an ID in a chip and ri indicates the responses from
is an undesirable effect. the i-th challenge

(NMOS) switch. When the signal is input at one terminal, the with NMOS and to limit the exposure to attack.[91] As listed in
movement of the signal passes through two delay paths. Table 6, despite the improved reliability of the scheme, the dif-
Through the timing and control unit, the excitation pulse is ferent bits are inconsistent and the hardware resources are uti-
provided. In contrast to the conventional PUFs and certain lized at a low rate. Hence, based on the actual requirement, two
memristor–CMOS hybrid PUFs proposed in the past, the aim options are available for reasonable selection.
of the researcher was to ensure the reduction in circuit area, hard- Similarly, the modification of the ROPUF was performed
ware resources, and the eradication of the complex and costly using memristors (Figure 7, Panel 2). To lower the circuit size
post-processing. These forms of processing ensure the easy appli- and rate of power consumption, the ring oscillator inverter
cability of PUF to actual security protocols. is incorporated with a memristor.[96] Thus, the number of
The path delay distribution of APUF is shown in Panel 1b of challenge-response pairs (CRPs) can be amplified without
Figure 7. It is not easy to model machine-learning-based attacks enhancing the circuit overhead.
for this new PUF because an unpredictable signature through Modification of the memristor-oriented PUF can be per-
multiple delayed paths is generated by the hybrid APUF. formed by replacing the CMOS with independent memristors
Concurrently, more stability is conferred on the security protocol and by enhancing the number of CRPs with memristor cross-
and hardware encryption due to the impressive statistical ran- bars. In the subsequent section, the modification of memristor
domness of the PUF. However, this scheme can be subjected crossbars is discussed.
to cryptanalysis attacks.[91] The reason for improving the scheme
is to ensure that the memristor is controlled in correspondence
3.1.2. Nano-PPUF Based on Memristor Crossbars

From the PUF, the PPUF, which is a hardware encryption


method, was developed. Researchers are required to provide a
public model of PPUF, because, when compared to other devi-
ces, it is different. However, the published simulation model can
be used by attackers to quickly traverse the entire results, assum-
ing that the model lacks a sufficient number of CRPs. Thus, it is
anticipated that the PPUF should enhance the number of CRPs
and conceal the boundary conditions to lower the prospect of an
attacker obtaining the right response.[97] Rajendran et al. sug-
gested that the memristor can accomplish this function. The
author proposed a time-constraint authentication scenario,[55]
as shown in Figure 8, Panel 1.
The possibilities of the nano-PPUF are diverse (>1010).
Furthermore, it is possible for the correct response and boundary
voltage to be promptly secured by the owner of the proposed
PPUF. The only information that the attacker can possibly
retrieve from the public registry is the simulation model of
Figure 6. Classification of different PUF implementations. Person A, as it is forbidden to access the input excitation and

Adv. Intell. Syst. 2021, 3, 2000127 2000127 (8 of 21) © 2020 The Authors. Published by Wiley-VCH GmbH
www.advancedsciencenews.com www.advintellsyst.com

Figure 7. Hybrid memristor–CMOS PUF circuit: Panel 1. a) Architecture of the hybrid memristor–CMOS PUF circuit; Reproduced with permission.[48]
Copyright 2015, the Royal Society of Chemistry. b) Modified memristor-based PUF circuit; Reproduced with permission.[94] Copyright 2019, Institute of
Advanced Engineering and Science. Panel 2. a) ROPUF based on CMOS; Reproduced with permission.[95] Copyright 2007, the Royal Society of Chemistry.
b) ROPUF modified by memristor. Reproduced with permission.[96] Copyright 2019, Institute of Advanced Engineering and Science.

Table 6. Memristor PUF performance metrics.

Scheme PUF size [%] Uniqueness [%] Uniformity [%] Reliability Reliability Bit- Time Ref.
(temperature) [%] (voltage) [%] aliasing [%] [%]
[%]

Memrisor–CMOS PUF A 16 bit 50.04 52.30 92.70 96.00 50.70 2015 [48]
32 bit 50.04 50.70 98.00 97.75 49.30
48 bit 50.03 53.80 99.40 98.50 49.20
64 bit 49.94 50.60 99.00 99.25 52.37
Memrisor–CMOS PUF B 16 bit 51.06 51.20 99.70 98.80 50.60 2016 [91]
32 bit 50.01 50.30 98.50 98.60 52.10
48 bit 52.00 54.80 99.60 97.90 48.50
64 bit 49.40 51.20 99.20 97.20 53.37

boundary conditions. Thus, it appears to be extremely improba- for the simulation is in decades, i.e., 109 s. As the crossbar size
ble that the note chosen by the attacker will be similar to that increases, the time required by the attacker to perform a simula-
selected by Person B. Consequently, the attacker will require sev- tion significantly increases. This also marginally enhances the
eral years to simulate the CRPs. Furthermore, the feasibility of actual execution time of the PPUF model holder by a few micro-
implementing a time-limit security basis for authentication was seconds, as shown in Figure 8, Panel 3b. The time interval
also verified in this article. The exponential increase in the size of between simulation and execution is 1015 s, which is consider-
the selected area simultaneously generates a linear increase in ably beyond the normal time of validation.
the simulation time, as shown in Figure 8, Panel 3a. For example, In summary, using this design, the originally weak PUF is
if a 20  20 memristor crossbar is considered, the time required converted into a strong PUF by modifying the memristor, which

Adv. Intell. Syst. 2021, 3, 2000127 2000127 (9 of 21) © 2020 The Authors. Published by Wiley-VCH GmbH
www.advancedsciencenews.com www.advintellsyst.com

Figure 8. Nano-PPUF based on memristor crossbars: Panel 1. Execution of a limited-time authentication process using nano-PPUF; Panel 2. Nano-PPUF
with 8  8 array; Person B can verify the identity of Person A by randomly selecting one of the six colored selections in the figure; Panel 3. a) There is
variation in the number of selections in the 20  20 memristor crossbar that is qualified along with simulation time of the attacker according to the
selection size; b) Variation exists between the size of memristor crossbars and the executions and simulation times. Reproduced with permission.[98]
Copyright 2019, Wiley-VCH.

subsequently enhances the number of CRPs, reduces the com- variance of approximately 50% and 0%, respectively, indicate that
plementary excitation of hackers, and enhances the time cost of the randomicity of the PUF integrated with a diffusion memris-
the attackers, thereby preventing attacks. Hence, the long dura- tor crossbar is suitable. The attribute that results in the uncrack-
tion required by the attacker to crack the response should not be ability of the PUF and ensures the consistency of PUF-generated
considered as it is beyond the validation time. keys is uniqueness. Furthermore, the experiment evaluated the
changes in binary bitmaps obtained through the conversion of
memristor crossbars under conditions of high temperatures
3.1.3. PUFs Based on Nanoscale Diffusive Memristor Crossbars and persistent challenge cycling. The output current generated
by ten randomly selected memristors was recorded in the tem-
Zhang et al. demonstrated the method and principle of establish- perature range of 300–500 K; moreover, the 1.8 V analysis is
ing PUFs using nanoscale diffusion memristor crossbars.[56] shown in Figure 9, Panel 2. From the figure, it is revealed that
The development of PUFs exploits the random distribution of it is feasible for the diffusive memristors to maintain the original
clusters of metallic Ag ions in the SiO2 matrix. The difference output characteristics even at a significantly higher temperature,
in the switching ability of diffusive memristors is due to the which is beyond the range that an integrated circuit can with-
uneven distribution of Ag ions present at the intersections, stand. Figure 9, Panel 3 shows the binary bitmap following 30
which is performed to construct a distinct binary bitmap. The and 50 challenge cycles with significantly minimal changes to
16-bit PUF proposed is actually a 4  4 crossbar with an area the PUF. Moreover, the endurance limit of the diffusion
of 100  100 nm2. A crossbar is composed of memristor units memristors tends to be more than 106 switching cycles.
embedded at its intersection points. The components of the Assuming that subsequent research will continue to enhance
memristor units include an Ag-doped SiO2 layered in the middle the durability of the diffusive memristor, a significant enhance-
to conduct switching, as well as a top electrode (TE) of 40 nm Au ment in the reliability of the PUF can be expected.[31,99] Future
and a bottom electrode (BE) of 15 nm Au or 2 nm Ti (Figure 9, advancements in engineering materials are also expected to
Panel 1a). The switching features of memristors are comprehen- enhance the reliability of PUFs. For example, the controlled drop
sively applied in this scheme (Figure 9, Panel 1b). of large particles in Ag casting that are embedded through ran-
Furthermore, an inter-class fractional Hamming distance dom dispersal, the reliability of PUFs can be enhanced on the
distribution histogram was demonstrated by Zhang, which basis of diffusive memristors.[56]
was performed through a comparison of bit–bit differences Memristors intensify the uniqueness and reliability of PUFs.
between different 16-bit strings. Using the Gaussian function Moreover, when the memristors are based on the aforemen-
with a center of 0.5068 and variance of 0.0144, the distribution tioned hybrid circuits and electronic PUFs based on silicon tech-
histogram was appropriately expressed. The mean value and nology (e.g., APUF[100,101] and static random access memory

Adv. Intell. Syst. 2021, 3, 2000127 2000127 (10 of 21) © 2020 The Authors. Published by Wiley-VCH GmbH
www.advancedsciencenews.com www.advintellsyst.com

Figure 9. PUFs centered on nanoscale diffusive memristor crossbars: Panel 1. a) Scanning electron microscope image of a 16-bit PUF with an in-built
4  4 diffusive memristor crossbar with an area of 100  100 nm2; b) I–V curves of 80 diffusive memristors in the array; Panel 2. a) Random binary bitmap
composed a 28  16 memristor array; b) Fractional Hamming distance distribution between classes for 16-bit binary mapping; Panel 3. a) Current
statistics of five switchable (1) and five nonswitchable (0) devices at different temperatures; b) Temperature-dependent reliability test of an entire array;
c) Verification of the reliability of memristor crossbars under multiple challenge loops; d) Intraclass Hamming distance calculation results in 50 challenge
cycles. Reproduced with permission.[56] Copyright 2009, The Royal Society of Chemistry.

[SRAM] PUF[102,103]), they can also lower the circuit components, threats and data leakage are prevented. Hence, in contrast to
enhance hardware integration, and actualize self-digitization. the previous PUFs based on nonvolatile memristors, the
Furthermore, the manufacturing processes of the hybrid proposed diffusive memristor PUFs are more secure.[104,105]
memristor–CMOS PUF and PUF based on diffusion are con- However, for the PUF based on the diffusion memristor to
ducted without difficulty. Through further processing, security actualize the self-digitizing procedure, the split method must

Adv. Intell. Syst. 2021, 3, 2000127 2000127 (11 of 21) © 2020 The Authors. Published by Wiley-VCH GmbH
www.advancedsciencenews.com www.advintellsyst.com

be extensively applied; consequently, the selection and calibra- is about to be revoked by the chip designer, the designer simply
tion of the reference resistors based on a considerable number presses the “erase fingerprint” command on the crossbar. Once
of test devices must to be cautiously performed.[105,106] this is performed, the entire cell switches to a LRS. Meanwhile, a
set of fingerprints is externally generated by the device, in con-
3.1.4. Proving the Key Destruction Scheme trast to the correct fingerprint previously stored in the database.
If the results are acceptable, then it is possible to erase the chip
Aside from the replacement of CMOS and actualizing the origi- fingerprint and send it back as a proof of the destruction of the
nal function, a new function that can be actualized by the mem- fingerprint to the chip designer (Figure 10, Panels 1b and 1c).
ristors was developed by researchers. However, CMOS The proposed memristor crossbar is an array of 128  64 cells,
transistors cannot achieve this new function. Power retention which adopts a structure of one resistance switch per transistor;
during a power outage is achieved using a volatile device made thus, a Ta/HfO2/Pt memristor is present at every intersection
of transistors, which is composed of memristors in contrast to point of the crossbar, as shown in Figure 10, Panel 2.
the SRAM. In addition, temperature changes and the external From the proposed chip, the integration of the security, mem-
environment have no significant impact on the characteristics ory, and computing functionalities is demonstrated, which uses
of the memristor. both the in-chip memristor and the off-chip transistor to generate
Based on the memristor crossbars, Jiang et al. proposed a ver- fingerprints and process and store data, respectively. In addition,
ifiable key destruction scheme. This proposed system compares the reliability and uniqueness of the generated fingerprints were
the conductance values of the left and right nodes and generates proven by the researcher. The author compared the fingerprints
a special fingerprint,[69–71] as shown in Figure 10, Panel 1a. generated at similar locations in different areas of the chip.
The off-chip database is used to store the fingerprint generated Within the class, the mean value and variance of the
by the memristor. Whenever the key-based permission of users Hamming distance were measured to be 0.5006 and 0.0452,

Figure 10. Proof of the key destruction scheme: Panel 1. Principle of provable key destruction: a) Schematic for fingerprint extraction by comparing the
conductance values in the LRS between two adjacent memristor cells (differential pairs); b) Security problems of traditional keys; c) The chip stores the
digital key as the resistance value of the memristor. Following the successful extraction of the memristor fingerprint, the removal of the key is proven by
the chip; Panel 2. Array internal structure of memory; Panel 3. Uniqueness and reliability of the memristor array are demonstrated. Reproduced with
permission.[69] Copyright 2018, Springer Nature.

Adv. Intell. Syst. 2021, 3, 2000127 2000127 (12 of 21) © 2020 The Authors. Published by Wiley-VCH GmbH
www.advancedsciencenews.com www.advintellsyst.com

respectively. It was verified that the chip generates random fin- pseudo-RNG. The input “seed” is capable of determining the
gerprints. Similarly, for the fingerprints produced at the same pseudo-random value. The “seed” of the pseudo-random number
area of the chip, the average Hamming distance and variance corresponds to the key of the generator and is applied to initialize
were calculated to be 0.1382 and 0.0657, respectively. the internal state. Thus, to internally generate a random number
(Figure 10, Panel 3). sequence, the pseudo-RNG primarily depends on the initial
The aforementioned discussion shows that the scheme of sequence of the artificial injection. Presently, there is a gradual
comparing the resistances of adjacent memristors in the mem- development in CMOS-based RNGs;[107–115] however, they have
ristor crossbars demonstrates strong robustness and high ran- certain limitations. Because the prejudice of 0/1 bias and small
domness of the output key. However, this scheme did not noise amplitudes are recorded in the output sequence, it is nec-
provide a discourse on memristor crossbar consumption. essary to ensure that the signal for the preamplifier circuit is
When compared with a single memristor, greater randomness processed, which was not anticipated during the development
can be produced by memristor arrays in the circuit; however, of this scheme. This inconvenience can be prevented using a ran-
higher integration results in a high rate of power consumption. dom generator produced by the memristor. Meanwhile, the
A reason why the memristor arrays have a high integration is its research considering RNGs based on memristors has been
applicability in portable devices that often have power applied in the field of TRNGs. Hence, a more suitable option
constraints; thus, this represents a significant challenge that uses memristors to create a RNG.
must be solved during the application of memristors arrays The randomness test standard of the National Institute of
with reduced power. Overall, one way of reducing the power Standards and Technology (NIST), which is the international
consumption of memristors is through the reduction of the standard for testing randomness of RNGs, is now considered
bar thickness or substituting it with a highly sensitive material as the evaluation rule based on which various research teams
when subjected to low pressure. were developed. Approximately 15 different methods of assess-
ment are involved in this system. As the TRNG passes more
3.1.5. Conclusion tests, it improves the randomness of the RNG.

Although the model of the PPUF is a public model, an attack is 3.2.1. RNG Based on Diffusion Memristor
limited by the undisclosed boundary conditions and the consid-
erable number of CRPs that extend the period of attack and A RNG for a diffusive memristor was proposed depending on the
ensure that the security performance of the device is enhanced. diffusion dynamics of the metal atom.[99,116,117] The moment the
In contrast to the nano-PUF, the original CMOS circuit is operator removes the external pulse, it causes the memristor to
enhanced by the hybrid memristor–CMOS. The APUF reduces switch to the LRS. The device experiences a random time delay
the number of CRPs and the safety performance. The memristor following the input of the power pulse (Figure 11b). The proba-
is simply applied to the circuit element from the solution of the bility that the Ag particle is discrete from the Ag reservoir is the
diffusion memristor, for instance, nanoscale PUF. This produces basis on which the delay time of memristor switching is deter-
the following benefits: provides significant enhancement in ran- mined. The procedure for diffusion of Ag particles is as follows.
domness and reliability to the circuit, guarantees safety, lowers Prior to the diffusion of Ag particles, the SiO2 forms a conduc-
power consumption rate, and reduces the circuit element. tion channel. Through this conduction channel, it is possible to
The key destruction scheme derived from the PUF demonstrates separate the Ag particles from the reservoir of Ag particles with a
that the applicability of the memristor is not merely limited to random time period. In Figure 11a, the unit of the diffusive
modifying the original PUF but is useful in developing further memristor is shown.
applications in the future. This proposed memristor has a four-layer structure, which is
It is also feasible to incorporate a PUF based on a single mem- different from most three-layered memristors. The diameter of
ristor into an Internet communication protocol. Various session the proposed optical image and geometry of the Ag:SiO2 indi-
keys were generated by altering the input voltage using a voltage cates a 5 μm  5 μm cross-point diffusive memristor. The mem-
pulse–stack pattern. During the procedures performed by the ristor comprises a TE of 20 nm Pt/30 nm Au, BE of 15 nm Pt, and
host and time-triggered protocol session, the session key gener- 15 nm Ag:SiO2 layer in the middle for switching. Furthermore,
ated by the memristor was included to improve the communica- to prevent the deletion of Ag in the course of switching, an Ag
tion security. This represents a suitable course of action that can layer was placed between the top and middle layers. The circuit
be pursued in the future. model that is generally proposed includes a diffusion memristor,
comparator, gate, and counter, as can be observed from
3.2. Memristor for the Application of TRNG Figure 11c. It is not necessary to perform electroforming of
the device; moreover, it also demonstrates a low leakage current
RNGs are extensively used in information security fields, such as (<picoampere), low operating current (<100 nA), reliable thresh-
cipher systems, computer simulations, and communication old voltage (0.5 V), and small scanning duration. In addition, it
security. The random number can be classified into two aspects: is easy to limit or adjust the on/off current as well as the on/off
the TRNG and pseudo-RNG. To generate a random signal, the window (>105). The applied voltage pulse and amplitude to the
conventional TRN predominantly utilizes natural thermal noise, device are of a width of 300 μs and 0.5 V, respectively.
atmospheric noise, or direct amplification of the circuit noise. A delay of a random period of time (130 μs) occurs before
The internal state and input “seed” are included in the reaching the LRS (Ron) once the pulse amplitude (V1) attains

Adv. Intell. Syst. 2021, 3, 2000127 2000127 (13 of 21) © 2020 The Authors. Published by Wiley-VCH GmbH
www.advancedsciencenews.com www.advintellsyst.com

Figure 11. RNG based on diffusion memristor: a) Optical microscope image of a 5 m  5 m Ag:SiO2 junction device; b) Typical pulse switching
characteristics of a diffusion memristor; c) Circuit diagram of RNG based on diffusion memristor.[31] Reproduced with permission.[56] Copyright
2017, Springer Nature.

the threshold voltage (0.5 V). However, the memristor returns simple circuit structure consisting of simply a single memristor,
to the HRS (Roff ) within a random time duration of 100 μs once six transistors, and a trigger, as shown in Figure 12a.[31] In the
the voltage (V1) returns to a voltage below 0.3 V. The counter circuit unit, the Pt electrode is connected to the applied voltage
accuracy is controlled by the local clock at 100 μs. The memristor and the bottom Pt electrode is grounded. The two layers of TiO2
relaxes back to the HRS (Roff ) when the voltage (V1) value is compressed in the middle represent a vertically stacked memris-
below 0.3 V. The local clock controls the accuracy of the counter. tor. Figure 12b shows that the upper and lower layers of the TiO2
Both the output logic level and the specific applied voltage Vref are nondoped with inductance and oxygen vacancy, indicating
were compared. The output of the counter generates the period at high conductivity. The oxygen layer is pressurized into an
which a logical high level is attained by both the local clock and upward movement to the upper layer of the nondoped TiO2 layer
V3, which are random numbers. The random numbers gener- when the researcher inputs a positive voltage in the top Pt elec-
ated are binary sequence bits, which after being subjected to trode. This will subsequently bring about a reduction in the resis-
the NIST randomness test, can be used without further tor value of resistance to the Ron state. Assuming that there is a
processing. negative bias in the top Pt electrode, it will pressure the oxygen
The TRNG based on the diffusive memristor has the capacity vacancy to migrate back toward the original lower doped TiO2
to reduce power consumption because it can shut off automati- layer. Furthermore, an enhancement in the memristors occurred
cally and not engage in the reset procedure, which is in contrast in the Roff state. Because the memristor has a random resistance
to the TRNGs centered on CMOS. Due to the intrinsic random- value and a relationship with the pulse voltage amplitude and
ness of the diffusive memristor, the circuit complexity is lowered. program width of the input, the lognormal probability density
The circuit can be easily incorporated in a small area with high function is approximately the same as the Ron and Roff distribu-
integration and compatibility with the CMOS process due to the tions of the steady-state resistance.[54]
diffusion memristor. However, it is still possible to enhance the Figure 12c shows the proposed overall circuit structure in the
equipment in several ways. With respect to the bit rate, with a scheme. The author conducts modularization of the circuit. To
higher base, there will be an increase in power consumption control the reading mode and on/off switch programming, the
as the clock signal frequency increases. Hence, it is feasible to external DC power supply is denoted by Vdc_r, Vdc_on, and Vdc_off.
integrate the diffusion memristor along with the linear feedback The signal that controls the detection of the memristor status
shift register to ensure that the bit rate is enhanced without by the read mode is denoted as V_read. The memristors are
increasing the consumption of power. In addition, one of the programmed to the ON and OFF states by Vp_on and Vp_off.
methods taken into consideration is parallel working of several The memristor state is also known as the offset voltage that
diffusion memristors. While considering the circuit area, three regulates the generated output bits using a multiple TRNG
vertically stacked devices can be applied to reduce the circuit area. (MTRNG), which is designated by Vd. To adjust Vd, which is used
for generating bits, Vg is applied. The clock signal is otherwise
known as Clk, which is regulated by the data acquisition of the D
3.2.2. TRNG Based on Oxygen Vacancy Transformation flip-flop.
Furthermore, the alternating voltages of Vp_on and Vp_off, and
The circuits of the conventional TRNGs have thermal noise intro- the amplitude and width of the input programming voltage are
duced into them. From the Brownian motion of electrons, controlled by the scheme. The memristors are programmed to
changes in the conductor temperature generate thermal noise. intensify the resistance change, thereby generating a random
However, the implementation of programming has no signifi- bitstream. Nevertheless, the bitstream randomness achieved
cant effect on the offset output bitstream. Deflection is prevented through this method remains undeveloped. Hence, the scheme
by the scheme presented later, and changing the input voltage was upgraded to ensure that the entropy of the output bitstream
can provide adjustment to the twisted bitstream. Other signifi- is enhanced. To form the two-branch MTRNG design, the D flip-
cant features of the system include low power consumption, high flop in the periphery is included, adopting the output bitstream
sampling rate, and high integration. This design scheme has a of two circuit structures, such as two inputs of the XOR gate, and

Adv. Intell. Syst. 2021, 3, 2000127 2000127 (14 of 21) © 2020 The Authors. Published by Wiley-VCH GmbH
www.advancedsciencenews.com www.advintellsyst.com

Figure 12. TRNG based on oxygen vacancy transformation: a) One of the circuit branches of the multiple random number generator (MTRNG) scheme;
b) Structure of a TiO2 memristor; c) Scheme of the enhanced two-branch MTRNG design. Reproduced with permission.[31] Copyright 2015, the Royal
Society of Chemistry.

subsequently passing the D flip-flop. Even though the structure of this electronic noise include defects in the charge tunneling
enhances the randomness of the output bitstream, it increases layer and the interface defects in the polysilicon channel.[67]
the circuit complexity. Therefore, the coordination of the When voltage is input, a defect is produced in the nanoscale tran-
three D triggers is now considered a relatively complex issue. sistor through the generated electric field. This will subsequently
In addition, the sampling rate design of this scheme underscores enable the semiconductor to generate a sudden change signal
its capability to accomplish the least power consumption of that denotes the essential attribute of the memristor.
31.1 GHz when the sampling rate is high. The only disadvantage
of this scheme is the failure of the developed RNG to pass the 3.2.3. Conclusion
NIST randomness assessment. Thus, it is impossible to evaluate
the randomness of TRNG through a unified standard, thereby The three-layer structure is broken by the TRNG-based diffusion
bringing into focus the security of the generated random num- memristor; moreover, to achieve higher randomness, we
bers. However, in contrast to the conventional TRNG, the device attempted to apply a four-layer structure. Thus, the TRNG based
is composed of a nonelaborate structure, small area, high fre- on diffusion material has the following advantages over the
quency, low consumption, and flexible configuration. The future TRNG centered on oxygen vacancy changes, including high-
development of TRNGs is highlighted by improvements in these temperature resistance, high reliability, small area, and high
areas. While comparing with the scheme of diffusion memris- integration. The TRNG based on oxygen vacancy changes has
tors, it is readily observed that both designs prevent the complex- a complicated process, albeit a simple principle of increasing
ity of high circuits by applying relatively basic circuit randomness by repeatedly passing two single outputs through
components. While considering the sampling rate, under the D flip-flops. During the NIST assessments, out of the earlier
condition of a high sampling rate, low power consumption is shortlisted series of RNG layouts, the RNG centered on the dif-
observed for TRNG based on oxygen vacancy transformation. fusion memristor was observed to have the highest performance.
However, in terms of randomness, the comparison clearly favors The Ag:SiO2 switching delays the random time and generates
a RNG based on the spread memristors. The aforementioned random numbers by utilizing the diffusion dynamics of metal
basic principle exploits electronic noise. In this context, examples atoms. The migration of the oxygen vacancy in the memristor

Adv. Intell. Syst. 2021, 3, 2000127 2000127 (15 of 21) © 2020 The Authors. Published by Wiley-VCH GmbH
www.advancedsciencenews.com www.advintellsyst.com

is regulated by the second RNG so that the changes that occur in discovered, which are presented subsequently. First, a mirror
the resistance value can initiate the bitstream, and further symmetry can be observed in the attractor of the chaotic system
increase the bitstream output randomness of the digital circuit the moment there is a switch in the polarity of the memristor
devices. (Figure 13, Panel 2). A comprehensive discussion is provided
on the specific mathematical model.[122] Second, as changes
occur in the memristor parameters, it impacts the chaos degree
3.3. Chaotic Circuit Based on Memristor Is Used for
of a system by either suppressing or enhancing it to various
Information Encryption
degrees. Thus, artificial intervention in a chaotic system can
be conducted through controlled nonlinear devices, such as
The term chaotic system implies a form of stochastic behavior
memristors. A significant proportion of the chaotic circuits based
initiated by a deterministic nonlinear system that cannot be read-
on memristors are constructed based on the differential equa-
ily and comprehensively predicted.[118] In the state system of
tions of nonlinear systems; subsequently, through the adjust-
arrangements, after the equilibrium, periodic, and quasi-periodic
ment of the number of components based on the circuits
states, the fourth state is occupied by the chaotic system. Chaotic
proposed by Chua, a new circuit structure model was proposed.
systems generally have high sensitivity to the initial state and
Then, the parameters of the circuit were adjusted. The new sys-
parameters. When small differences in parameters are observed
tem dynamics were confirmed to exhibit independence, as
in the chaotic state, the system will be subjected to significant
revealed from the numerical simulation, bifurcation diagram,
changes.[119] Furthermore, for any chaotic circuit, the phase dia-
and Lyapunov spectrum analysis. Eventually, the effectiveness
gram assumes a singular attractor. However, the chaotic system is
of the new type of circuit structure was proven using images,
asymmetrical, as observed from the signal amplitude and dura-
along with the analysis of the correlation between adjacent pixels
tion. Thus, it is feasible to incorporate the signal generated by
and the core sensitivity using an image histogram. To evaluate
a chaotic circuit into the carrier wave to accomplish a chaotic
the image encryption ability of a chaotic system, an essential sta-
secure communication.[120] The chaotic secure communication
tistical feature to consider is the correlation of adjacent pixels.
is centered on synchronization. The actualization of a chaotic sys-
tem can be attained under weak signal coupling if both the trans- covðx,yÞ
mitter and the receiver in the communication system are identical. ρx,y ¼ qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
pffiffiffiffiffiffiffiffiffiffi (2)
Identical signal outputs are generated by the receiver and transmit- DðxÞ DðyÞ
ter. To encrypt the signal, it is concealed through the chaotic signal
of the carrier, which transmits a mixed signal of the chaotic carrier Here, the pixel values of the two adjacent pixels in the image
and information to the receiver. An attacker cannot easily decrypt are denoted as x and y. The covariance is mathematically repre-
it because it requires a transmitter and receiver with identical sented as cov(x, y), i.e.,
structural parameters to achieve a chaotic synchronization.
Through this approach, the security risks associated with algo- 1X N
covðx, yÞ ¼ ½x  EðxÞ½yi  EðyÞ (3)
rithm encryption can be prevented by hardware encryption. N i¼1 i
For chaotic signals to occur, chaotic circuits must be generated
because chaotic circuits are fundamentally constructed using where E(x) is the expected value of the pixel, D(x) is the variance
complex mathematical models of differential equations. of the pixels. Thus
Conventional circuits require more components to construct
differential equations. The differential equation is fitted by the 1X N
EðxÞ ¼ x (4)
nonlinear property of the memristor, which ensures that the N i¼1 i
original chaotic circuit is simplified and enables the construction
of a differential equation to attain the chaotic state. Hence, cha- and
otic circuits can be readily constructed using a single memristor.
In 1963, the Lorentz system was established and was the first 1X N
DðxÞ ¼ ½x  EðxÞ2 (5)
model to simulate weather changes to reveal complex chaotic N i¼1 i
dynamics.[121] Subsequently, the memristor was successfully
integrated into the system by Chua. The type of circuit developed Subsequently, we present a comparison between several cha-
by Chua is a classical resistance–inductance–capacitance chaotic otic circuits. In 2016, two memristor models of continuous
circuit. Its structural components include two capacitors, one smooth fifth-order hyperchaos was developed.[123] Using the ref-
inductor, a single resistor, and one memristor (Figure 13, erenced mathematical model,[52] the several parameters, namely
Panel 1). From this circuit, the fundamental dynamic character- image encryption, image spectrum graph, correlation between
istics and characteristics of the memristor are revealed.[124] adjacent pixels, were compared by Wang et al. In addition, to con-
The gradual development of the chaotic circuit centered on struct chaotic circuits, several models were proposed. For
the memristor occurred when the chaotic circuit based on the instance, memristor chaotic systems can achieve finite-time syn-
memristor was adjudged to be achievable. chronization through adequate control.[125] From the application
A chaotic circuit was proposed by Wu et al., which was inte- of this algorithm, it can be noted that it is not necessary for the
grated with a heart-shaped attractor, and a comprehensive study sender to transmit the key to the receiver; consequently, the inter-
on how memristors control and regulate the chaotic system was ception and cracking of the key is prevented, which leads to secu-
conducted.[122] The attributes of the chaotic circuit were rity system enhancement. Thus, this system incorporates the

Adv. Intell. Syst. 2021, 3, 2000127 2000127 (16 of 21) © 2020 The Authors. Published by Wiley-VCH GmbH
www.advancedsciencenews.com www.advintellsyst.com

Figure 13. Chaotic circuit based on memristors: Panel 1. Circuit proposed by Chua for chaos generation; Panel 2. Y–Z planar phase diagram with heart-
shaped attractor chaotic circuit when g is changed and a, b, c, d, e are set as a ¼ 12, b ¼ 2.2, c ¼ 0.1, d ¼ 22, e ¼ 0.5; Reproduced with permission.[122]
Copyright 2016, Elsevier. Panel 3. a) Original and encrypted images; b) Histogram representation of both the original and encrypted images; c) Diagram
of adjacent pixel correlation at the levels of the original and encrypted images; Reproduced with permission.[52] Copyright 2018, Elsevier. Panel 4.
a) Original and encrypted images; b) Histogram representation of both the original and encrypted images; c) Correlation diagram of adjacent pixels
at the levels of the original and encrypted images. Reproduced with permission.[123] Copyright 2016, AIP Publishing.

characteristic that the initial state of the memristor significantly assess the correlation of the chaotic circuit security, with the
impacts the chaotic system. The fuzzy control vector of the circuit exception of adjacent pixel points correlation (Table 7).
proposed by Chua was deduced by Lin et al.,[126] who proposed a Moreover, similar to memristor-based PUF, the memristor-
synchronization method of fuzzy modeling and provided a veri- based chaotic image processing generally does not exceed the
fication of the effectiveness of the chaotic synchronization simulation stage, which has not yet been accomplished in actual
method. However, no suitable method has been discovered to engineering.[87]

Adv. Intell. Syst. 2021, 3, 2000127 2000127 (17 of 21) © 2020 The Authors. Published by Wiley-VCH GmbH
www.advancedsciencenews.com www.advintellsyst.com

Table 7. Comparison between the correlation coefficients before and after is affected by the extreme external temperature changes and
chaotic circuit encryption. continuous voltage cycles. 2) Optimization is still necessary
for parameters such as circuit power consumption, stability,
Direction Correlation coefficient Correlation coefficient and frequency despite the tendency of the TRNG memristor
in ref. [52] in ref. [123] application to provide a high degree of integrated circuit area.
Horizonal direction 0.0032 0.0132 3) To serve as the memristor, several chaotic circuits replaced
Vertical direction 0.0004 0.0016 the conventional CMOS tube, which necessitates significant
innovation in the circuit design, whose implementation is cur-
Diagonal direction 0.0016 0.0056
rently not feasible.

4. Future Outlook 5. Conclusion


Memristor applications in hardware security have significant This review discussed the implementation of memristors in
potential, but still face several challenges. The advantage of hardware security, in addition to research properties, methods,
memristor crossbars is that the crossbar density and output principles, and progress. The different schemes of PUF, RNG,
key randomness of a memristor is higher and strong. and chaotic circuit were compared. The innovation of memris-
Assuming all the components of the circuit are substituted with tors in hardware safety was classified into two aspects: the
memristors, the circuit can be more innovative and have higher application of a single memristor to a circuit and the complete
randomness. Therefore, memristor crossbars are suitable for replacement of a circuit with a memristor crossbar. The advan-
schemes that significantly increase the number of CRPs. The tages and disadvantages of the two innovation directions are
drawbacks are as follows. First because the resistance value of analyzed. Furthermore, an evaluation index of the safety-related
memristors is nonlinear, the circuit principle and circuit model performance of chaotic circuits is urgently required to compare
construction are more complex, which is harmful to the shorten- the performance of different chaotic circuits and promote the
ing development cycle. Second, the memristor crossbar always development of memristors in chaotic systems.
has a hidden current; consequently, it is difficult for the devices
to have different logical states. Third, if we assume that the read/
write current of one memristor is controlled by the researchers, Acknowledgements
then crosstalk is readily established, thereby limiting the parallel This work was supported by the National Key R&D Plan (2017YFB0405400
output of memristors. The properties of memristors cause the and 2016YFB0402700), the National Natural Science Foundation of
first problem and cannot be changed at present. The memristor China (61774175, 61674146, 61634006 and 61875140), the Key
crossbars or CMOS–memristor hybrid circuits can only be Program of Natural Science Foundation of Beijing (4181001), the
Opened Fund of the State Key Laboratory of Integrated Optoelectronics
selected according to different scheme requirements. To solve (No.IOSKL2017KF12), and Young and Middle-aged Talents Program of
the second type of problem, there is a requirement to reasonably the State Ethnic Affairs Commission (2019).
apply and set the input voltage pulse along with the logical state
voltage. The third problem is more challenging because of the
structural limitation of the array itself. Conflict of Interest
Meanwhile, diffused memristors can achieve higher integra-
The authors declare no conflict of interest.
tion and lower power consumption than the CMOS–memristor
circuits. An increasing number of schemes are selecting diffu-
sion memristors in the PUFs and RNGs used in their designs.
Diffusion memristors have significant potential. In the future, Keywords
chaotic circuits can also be exploited by diffusion memristors
chaotic circuits, hardware security, memristors, physical unclonable
to enhance the encryption performance of chaotic systems. functions, random number generators
The evaluation index of hardware safety devices must be
improved. The judgment indicators of the horizontal analysis, Received: June 10, 2020
PUFs, and TRNGs are more accurate; therefore, to accurately Revised: September 10, 2020
compute the uniqueness and reliability of PUFs, numerical Published online: October 29, 2020
formulas can be used. The randomness of the generated random
numbers denotes the major criterion of the RNG, which can be
determined through the NIST pass rate. The image encryption [1] C. Konstantinou, M. Maniatakos, F. Saqib, S. Hu, J. Plusquellic, Y. Jin,
in 20th IEEE European Test Symp, IEEE, Cluj-Napoca 2015, pp. 1–8.
effect cannot be accurately determined through the chaotic cir-
[2] S. Park, M. Vosguerichian, Z. Bao, Nanoscale 2013, 5, 1727.
cuit because it lacks an accurate judgment index for the process.
[3] W. Zeng, L. Shu, Q. Li, S. Chen, F. Wang, X.-M. Tao, Adv. Mater. 2014,
Based on a data comparison of each scheme, another approach to 26, 5310.
ascertain the degree of chaos is by determining the correlation [4] B. Chen, F. M. J. Willems, IEEE Internet Things J. 2019, 6, 435.
between adjacent pixels before and after image encryption is pro- [5] Y. Lu, L. D. Xu, IEEE Internet Things J. 2019, 6, 2103.
posed. Even though TRNG, PUF, and chaotic circuits all have [6] Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, D. Qiu, Wirel. Netw. 2014,
benefits in terms of memristor applications, they are still con- 20, 2481.
fronted with the following problems. 1) The state maintenance [7] P. McDaniel, S. McLaughlin, IEEE Secur. Priv. Mag. 2009, 7, 75.

Adv. Intell. Syst. 2021, 3, 2000127 2000127 (18 of 21) © 2020 The Authors. Published by Wiley-VCH GmbH
www.advancedsciencenews.com www.advintellsyst.com

[8] M. Kayaalp, N. Abu-Ghazaleh, D. Ponomarev, A. Jaleel, in Proc. 53rd [42] D. Li, B. Wu, X. Zhu, J. Wang, B. Ryu, W. D. Lu, W. Lu, X. Liang, ACS
Annual Design Automation Conf. – DAC 16, ACM Press, Austin, TX Nano 2018, 12, 9240.
2016, pp. 1–6. [43] Y. Dai, Z. Pan, F. Wang, X. Li, AIP Adv. 2016, 6, 085209.
[9] R. Vanathi, SP. Chokkalingam, Int. J. Pure Appl. Math. 2018, 8. [44] M. Pešić, S. Slesazeck, T. Schenk, U. Schroeder, T. Mikolajick, Phys.
[10] P. Amish, V. B. Vaghela, Procedia Comput. Sci. 2016, 79, 700. Status Solidi A 2016, 213, 270.
[11] A. Patel, N. Patel, R. Patel, in Fifth Int. Conf. on Communication [45] H. Abunahla, B. Mohammad, M. A. Jaoude, M. Al-Qutayri, in IEEE Int.
Systems and Network Technologies IEEE, Gwalior 2015, pp. 674–678. Symp. Circuits and Systems IEEE, Baltimore, MD 2017, pp. 1–4.
[12] R. Singh, J. Singh, R. Singh, Mob. Inf. Syst. 2016, 2016, 1. [46] S. H. Jo, K.-H. Kim, W. Lu, Nano Lett. 2009, 9, 870.
[13] B. Khaleghi, A. Ahari, H. Asadi, S. Bayat-Sarmadi, IEEE Embed. Syst. [47] S. H. Jo, W. Lu, Nano Lett. 2008, 8, 392.
Lett. 2015, 7, 46. [48] J. Mathew, R. S. Chakraborty, D. P. Sahoo, Y. Yang, D. K. Pradhan,
[14] S. Mal-Sarkar, R. Karam, S. Narasimhan, A. Ghosh, A. Krishna, ACM Syst. 2015, 14, 1.
S. Bhunia, IEEE Trans. Multi-Scale Comput. Syst. 2016, 2, 186. [49] G. S. Rose, N. Mcdonald, L. K. Yan, B. Wysocki, K. Xu, in IEEE/ACM
[15] C. Basile, D. Canavese, L. Regano, P. Falcarin, B. D. Sutter, J. Syst. International Symposium on Nanoscale Architectures, IEEE, Brooklyn,
Softw. 2019, 150, 3. MA 2013, pp. 52–57.
[16] D. Irani, M. Balduzzi, D. Balzarotti, E. Kirda, C. Pu, Detection of [50] P. Koeberl, A. R. Sadeghi, Design, Automation & Test in Europe
Intrusions and Malware, and Vulnerability Assessment (Eds: T. Holz, Conference & Exhibition IEEE, Grenoble 2013, pp. 428–431.
H. Bos), Springer, Berlin, Heidelberg, 2011, pp. 55–74. [51] A. L. Fitch, D. Yu, H. H. C. Iu, V. Sreeram, Int. J. Bifurc. Chaos 2012, 22,
[17] S. Saeed, N. Mahendran, A. Zulehner, R. Wille, R. Karri, IEEE Int. Conf. 1250133.
Computer Design IEEE, Boston, MA 2017, pp. 537–540. [52] B. Wang, F. C. Zou, J. Cheng, Optik 2018, 154, 538.
[18] D. B. Strukov, G. S. Snider, D. R. Stewart, R. S. Williams, Nature 2008, [53] D. C. Viet, J. Eng. Sci. Technol. Rev. 2015, 8, 205.
453, 80. [54] W. Yi, F. Perner, M. S. Qureshi, H. Abdalla, M. D. Pickett, J. J. Yang,
[19] L. Chua, IEEE Trans. Circuit Theory 1971, 18, 507. M.-X. M. Zhang, G. Medeiros-Ribeiro, R. S. Williams, Appl. Phys.
[20] M. Schulz, Nature 1999, 399, 729. 2011, 102, 973.
[21] Ana, Aizcorbe, Samuel, Kortum, Scand. J. of Economics 2005. pp. 603 [55] J. Rajendran, G. S. Rose, R. Karri, M. Potkonjak, in IEEE Computer
[22] D. R. Stewart, D. A. A. Ohlberg, P. A. Beck, Y. Chen, R. S. Williams, Society Annual Symposium on VLSI, IEEE, Amherst, MA 2012, pp.
J. O. Jeppesen, K. A. Nielsen, J. F. Stoddart, Nano Lett. 2004, 4, 133. 84–87.
[23] J. Yuan, J. Lou, Nat. Nanotechnol. 2015, 10, 389. [56] R. Zhang, H. Jiang, Z. R. Wang, P. Lin, Y. Zhuo, D. Holcomb,
[24] H. Abunahla, B. Mohammad, D. Homouz, C. J. Okelly, IEEE Trans. D. H. Zhang, J. J. Yang, Q. Xia, Nanoscale 2018, 10, 2721.
Circuits Syst. Regul. Pap. 2016, 63, 2139. [57] H. Nili, G. C. Adam, B. Hoskins, M. Prezioso, J. Kim,
[25] Z. Zhou, F. Xiu, T. Jiang, J. Xu, J. Chen, J. Liu, W. Huang, J. Mater. M. R. Mahmoodi, F. M. Bayat, O. Kavehei, D. B. Strukov, Nat.
Chem. C 2019, 7, 10764. Electron. 2018, 1, 197.
[26] X. Yan, Q. Zhao, A. P. Chen, J. Zhao, Z. Zhou, J. Wang, H. Wang, [58] O. Krestinskaya, O. Otaniyozov, A. P. James, in Int. Conf. on Artificial
L. Zhang, X. Li, Z. Xiao, K. Wang, C. Qin, G. Wang, Y. Pei, H. Li, Intelligence Circuits and Systems, IEEE, Hsinchu 2019, pp. 274–275.
D. Ren, J. Chen, Q. Liu, Small 2019, 15, 1901423. [59] P. Pouyan, E. Amat, A. Rubio, in 5th European Workshop on CMOS
[27] Q. A. Vu, H. Kim, V. L. Nguyen, U. Y. Won, S. Adhikari, K. Kim, Variability, IEEE, Palma de Mallorca 2014, pp. 1–6.
Y. H. Lee, W. J. Yu, Adv. Mater. 2017, 29, 1703363. [60] K. M. Kim, J. J. Yang, J. P. Strachan, E. M. Grafals, N. Ge,
[28] S. Yin, Z. Luo, Q. Li, C. Xiong, Y. Liu, R. Singh, F. Zeng, Y. Zhong, N. D. Melendez, Z. Li, R. S. Williams, Sci. Rep. 2016, 6, 20085.
X. Zhang, Phys. Status Solidi A 2019, 216, 1900104. [61] D. Niu, Y. Chen, X. Cong, X. Yuan, IEEE Design Automation
[29] H. Yang, M. Xiao, Y. Cui, L. Pan, K. Zhao, Z. Wei, Sci. China Inf. Sci. Conf. 2010.
2019, 62, 220404. [62] A. Dozortsev, I. Goldshtein, S. Kvatinsky, Int. J. Circuit Theory Appl.
[30] X. Yan, K. Wang, J. Zhao, Z. Zhou, H. Wang, J. Wang, L. Zhang, X. Li, 2018, 46, 122.
Z. Xiao, Q. Zhao, Y. Pei, G. Wang, C. Qin, H. Li, J. Lou, Q. Liu, [63] P. M. P. Raj, M. P. Srinivasan, S. Kundu, IETE J. Res. 2019, 1.
P. Zhou, Small 2019, 15, 1900107. [64] S. Pal, S. Bose, W.-H. Ki, A. Islam, IEEE J. Electron Devices Soc. 2019,
[31] Y. Wang, W. Wen, H. Li, M. Hu, in Proc. 25th Ed. Gt. Lakes Symp. VLSI, 7, 701.
ACM Press, Pittsburgh, PA 2015, pp. 271–276. [65] B. Chen, Y. Lu, B. Gao, Y. H. Fu, F. F. Zhang, P. Huang, Y. S. Chen,
[32] A. Al-Shidaifat, S. Chakrabartty, S. Kumar, S. Acharjee, H. Song, L. F. Liu, X. Y. Liu, J. F. Kang, Y. Y. Wang, Z. Fang, H. Y. Yu, X. Li,
Micromachines 2020, 11, 89. X. P. Wang, N. Singh, G. Q. Lo, D. L. Kwong, in Int. Electron Devices
[33] Xue Qiang, Wang Yu-Chen, Wei Xian-Hua, Elsivier. 2019. Meeting, IEEE, Washington, DC, 2011, pp. 12.3.1–12.3.4.
[34] F. Cai, J. M. Correll, S. H. Lee, Y. Lim, V. Bothra, Z. Zhang, [66] V. Ravi, S. R. S. Prabaharan, AEU – Int. J. Electron. Commun. 2018,
M. P. Flynn, W. D. Lu, Nat. Electron. 2019, 2, 290. 94, 392.
[35] K.-T. T. Cheng, D. B. Strukov, ACM. 2012, 8, 33. [67] K. K. Hung, P. K. Ko, C. Hu, Y. C. Cheng, IEEE Electron Device Lett.
[36] C.-H. Huang, J.-S. Huang, C.-C. Lai, H.-W. Huang, S.-J. Lin, 1990, 11, 90.
Y.-L. Chueh, ACS Appl. Mater. Interfaces 2013, 5, 6017. [68] W. Cai, F. Ellinger, R. Tetzlaff, T. Schmidt, ArXiv11052668 Cond-Mat
[37] H. Abunahla, M. A. Jaoude, C. J. O’Kelly, Y. Halawani, M. Al-Qutayri, 2011.
S. F. Al-Sarawi, B. Mohammad, Microelectron. Eng. 2018, 185–186, 35. [69] H. Jiang, C. Li, R. Zhang, P. Yan, P. Lin, Y. Li, J. J. Yang, D. Holcomb,
[38] Z. Wang, M. Yin, T. Zhang, Y. Cai, Y. Wang, Y. Yang, RSC Nanoscale. Q. Xia, Nat. Electron. 2018, 1, 548.
2016, 8. [70] W. Xiong, J. Szefer, Nat. Electron. 2018, 1, 527.
[39] D. Liu, H. Cheng, X. Zhu, G. Wang, N. Wang, ACS Appl. Mater. [71] Trust in tech, Nat. Electron. 2018, 1, 521https://doi.org/10.1038/
Interfaces 2013, 5, 11258. s41928-018-0159-0.
[40] Y. Shen, L. Liang, S. Zhang, D. Huang, J. Zhang, S. Xu, C. Liang, [72] H. Rady, H. Hossam, M. S. Saied, H. Mostafa, in 62nd Int. Midwest
W. Xu, Nanoscale 2018, 10, 1622. Symp. on Circuits and Systems, IEEE, Dallas, TX 2019, pp. 231–234.
[41] J. Y. Chen, C.-W. Huang, C.-H. Chiu, Y.-T. Huang, W.-W. Wu, [73] G. W. Burr, R. M. Shelby, A. Sebastian, S. Kim, S. Kim, S. Sidler,
Adv. Mater. 2015, 27, 5028. K. Virwani, M. Ishii, P. Narayanan, A. Fumarola, L. L. Sanches,

Adv. Intell. Syst. 2021, 3, 2000127 2000127 (19 of 21) © 2020 The Authors. Published by Wiley-VCH GmbH
www.advancedsciencenews.com www.advintellsyst.com

I. Boybat, M. Le Gallo, K. Moon, J. Woo, H. Hwang, Y. Leblebici, [98] Y. Pang, B. Gao, B. Lin, H. Qian, H. Wu, Adv. Electron. Mater. 2019,
Adv. Phys. X 2017, 2, 89. 5, 1800872.
[74] S. Choi, S. Jang, J.-H. Moon, J. C. Kim, H. Y. Jeong, P. Jang, K.-J. Lee, [99] Z. Wang, S. Joshi, S. E. Savel’ev, H. Jiang, R. Midya, P. Lin,
G. Wang, NPG Asia Mater. 2018, 10, 1097. M. Hu, N. Ge, J. P. Strachan, Z. Li, Q. Wu, M. Barnell, G.-L. Li,
[75] N. Ge, J. H. Yoon, M. Hu, E. J. Merced-Grafals, N. Davila, H. L. Xin, R. S. Williams, Q. Xia, J. J. Yang, Nat. Mater. 2017,
J. P. Strachan, Z. Li, H. Holder, Q. Xia, R. S. Williams, X. Zhou, 16, 101.
J. J. Yang, Sci. Rep. 2017, 7, 40135. [100] A. Maiti, V. Gunreddy, P. Schaumont, Embedded Systems Design with
[76] C. Li, M. Hu, Y. Li, H. Jiang, N. Ge, E. Montgomery, J. Zhang, FPGAs (Eds: P. Athanas, D. Pnevmatikatos, N. Sklavos), Springer,
W. Song, N. Dávila, C. E. Graves, Z. Li, J. P. Strachan, P. Lin, New York, NY, 2013, pp. 245–267.
Z. Wang, M. Barnell, Q. Wu, R. S. Williams, J. J. Yang, Q. Xia, [101] Y. Hori, T. Yoshida, T. Katashita, A. Satoh, in Int. Conf. on
Nat. Electron. 2018, 1, 52. Reconfigurable Computing and FPGAs, IEEE, Cancun, Mexico,
[77] M. A. Zidan, H. Omran, R. Naous, A. Sultan, H. A. H. Fahmy, 2010, pp. 298–303.
W. D. Lu1, K. N. Salama, Sci. Rep. 2016, 18863. [102] J. Guajardo, S. S. Kumar, G.-J. Schrijen, P. Tuyls, in Cryptographic
[78] M. Payvand, A. Madhavan, M. A. Lastras-Montano, A. Ghofrani, Hardware and Embedded Systems (Eds: P. Paillier, I. Verbauwhede),
J. Rofeh, K.-T. Cheng, D. Strukov, L. Theogarajan, in IEEE Int. Springer Berlin Heidelberg, Berlin, Heidelberg 2007, pp. 63–80.
Symp. on Circuits and Systems, IEEE, Lisbon 2015, pp. 1378–1381. [103] D. E. Holcomb, W. P. Burleson, K. Fu, IEEE Trans. Comput. 2009,
[79] L. Chua, Appl. Phys. 2018, 124, 563. 58, 1198.
[80] R. Schmitt, M. Kubicek, E. Sediva, M. Trassin, M. C. Weber, A. Rossi, [104] A. Chen, IEEE Electron Device Lett. 2015, 36, 138.
H. Hutter, J. Kreisel, M. Fiebig, J. L. M. Rupp, Adv. Funct. Mater. 2019, [105] R. Liu, H. Wu, Y. Pang, H. Qian, S. Yu, IEEE Electron Device Lett.
29, 1804782. 2015, 36, 1380.
[81] C. Li, D. Belkin, Y. Li, P. Yan, M. Hu, N. Ge, H. Jiang, E. Montgomery, [106] L. Gao, P.-Y. Chen, R. Liu, S. Yu, IEEE Trans. Electron Devices 2016,
P. Lin, Z. Wang, W. Song, J. P. Strachan, M. Barnell, Q. Wu, 63, 3109.
R. S. Williams, J. J. Yang, Q. Xia, Nat. Commun. 2018, 9, 2385. [107] K. Yang, D. Fick, M. B. Henry, Y. Lee, D. Blaauw, D. Sylvester, in IEEE
[82] D. J. Kim, H. Lu, S. Ryu, C.-W. Bark, C.-B. Eom, E. Y. Tsymbal, International Solid-State Circuits Conference Digest of Technical Papers,
A. Gruverman, Nano Lett. 2012, 12, 5697. IEEE, San Francisco, CA 2014, pp. 280–281.
[83] E. R. Hsieh, H. W. Wang, C. H. Liu, S. S. Chung, T. P. Chen, [108] S. K. Mathew, S. Srinivasan, M. A. Anders, H. Kaul, S. K. Hsu,
S. A. Huang, T. J. Chen, O. Cheng, in Symp. on VLSI Technology, F. Sheikh, A. Agarwal, S. Satpathy, R. K. Krishnamurthy,
IEEE, Kyoto, Japan, 2019, pp. T118–T119. IEEE J. Solid-State Circuits 2012, 47, 2807.
[84] T. McGrath, I. E. Bagci, Z. M. Wang, U. Roedig, R. J. Young, Appl. [109] F. Pareschi, G. Setti, R. Rovatti, IEEE Trans. Circuits Syst. Regul. Pap.
Phys. Rev. 2019, 6, 011303. 2010, 57, 3124.
[85] J. Miao, M. Li, S. Roy, B. Yu, in IEEE Trans. Computer-Aided Design of [110] M. J. Bellido, A. J. Acosta, M. Valencia, A. Barriga, J. L. Huertas,
Integrated Circuits and Systems, ACM Press, Austin, TX 2016, pp. 1–8. Electron. Lett. 1992, 28, 617.
[86] J. Miao, M. Li, S. Roy, Y. Ma, B. Yu, IEEE Trans. Comput.-Aided Des. [111] C. Tokunaga, D. Blaauw, T. Mudge, IEEE J. Solid-State Circuits 2008,
Integr. Circuits Syst. 2018, 37, 927. 43, 78.
[87] M. T. Arafin, C. Dunbar, G. Qu, N. McDonald, L. Yan, in Sixteenth Int. [112] C. S. Petrie and J. A. Connelly, IEEE Trans. Circuits Syst. I:
Symp. on Quality Electronic Design, IEEE, Santa Clara, CA 2015, Fundamental Theory Appl. 2000, 47, 615.
pp. 440–447. [113] R. Barnett, G. Balachandran, S. Lazar, B. Kramer, G. Konnail,
[88] G. S. Rose, C. A. Meade, in Proc. of the 52nd Annual Design S. Rajasekhar, V. Drobny, in IEEE Int. Solid-State Circuits Conf.
Automation Conf. on - DAC ’15, ACM Press, San Francisco, CA, Digest of Technical Papers, IEEE, Francisco, CA 2007, pp. 582–623.
2015, pp. 1–6. [114] J. Holleman, S. Bridges, B. P. Otis, C. Diorio, IEEE J. Solid-State
[89] B. Habib, K. Gaj, J.-P. Kaps, in 2013 Euromicro Conf. on Digital System Circuits, 2008, 43, 1324.
Design, IEEE, Los Alamitos, CA, USA, 2013, pp. 697–704. [115] S. Srinivasan, S. Mathew, V. Erraguntla, R. Krishnamurthy,
[90] J. T. H. Loong, N. A. N. Hashim, M. S. Hamid, F. A. Hamid, in Int. 22nd Int. Conf. on VLSI Design, IEEE, New Delhi 2009, pp. 301–306.
Conf. on Semiconductor Electronics, IEEE, Kuala Lumpur, 2016, [116] R. Midya, Z. Wang, J. Zhang, S. E. Savel’ev, C. Li, M. Rao, M. H. Jang,
pp. 304–307. S. Joshi, H. Jiang, P. Lin, K. Norris, N. Ge, Q. Wu, M. Barnell, Z. Li,
[91] U. Chatterjee, R. S. Chakraborty, J. Mathew, D. K. Pradhan, in 29th Int. H. L. Xin, R. S. Williams, Q. Xia, J. J. Yang, Adv. Mater. 2017, 29,
Conf. on VLSI Design and 2016 15th Int. Conf. on Embedded Systems, 1604457.
IEEE, Kolkata 2016, pp. 535–540. [117] H. Jiang, D. Belkin, S. E. Savel’ev, S. Lin, Z. Wang, Y. Li, S. Joshi,
[92] F. Amsaad, T. Houqe, M. Niamat, in IEEE 58th International Midwest R. Midya, C. Li, M. Rao, M. Barnell, Q. Wu, J. J. Yang, Q. Xia,
Symposium on Circuits and Systems, IEEE, Fort Collins, CO 2015. Nat. Commun. 2017, 8, 882.
[93] S. R. Sahoo, S. Kumar, K. Mahapatra, in 19th Int. Symp. on VLSI [118] J. Singer, Y.-Z. Wang, H. H. Bau, Phys. Rev. Lett. 1991, 66, 1123.
Design and Test, IEEE, Ahmedabad 2015, pp. 1–2. [119] T. Shinbrot, C. Grebogi, J. A. Yorke, E. Ott, Nature 1993, 363, 411.
[94] J. H. Loong Teo, N. A. Noor Hashim, A. Ghazali, F. A. Hamid, Bull. [120] C. W. Wu, L. O. Chua, Int. J. Bifurc. Chaos 1993, 03, 1619.
Electr. Eng. Inform. 2019, 8, 74. [121] E. N Lorenz, J. Atmospheric Sci. 1963, 20, 130.
[95] G. E. Suh, S. Devadas, 44th ACM/IEEE Design Automation Conf., IEEE, [122] J. Wu, L. Wang, G. Chen, S. Duan, Chaos Solitons Fractals 2016,
San Diego, CA, 2007, pp. 9–14. 92, 20.
[96] J. H. Loong Teo, N. A. Nor Hashim, A. Ghazali, F. Azlee Hamid, [123] Z. Wang, F. Min, E. Wang, AIP Adv. 2016, 6, 095316.
Indones. J. Electr. Eng. Comput. Sci. 2019, 13, 892. [124] L. O. Chua, AEO 1992, 46, 8.
[97] N. Beckmann, M. Potkonjak, in Inf. Hiding (Eds: S. Katzenbeisser, [125] L. Wang, T. Dong, M.-F. Ge, Appl. Math. Comput. 2019, 347, 293.
A.-R. Sadeghi), Springer, Berlin, Heidelberg 2009, pp. 206–220. [126] T.-C. Lin, F.-Y. Huang, Z. Du, Y.-C. Lin, Int. J. Fuzzy Syst. 2015, 17, 206.

Adv. Intell. Syst. 2021, 3, 2000127 2000127 (20 of 21) © 2020 The Authors. Published by Wiley-VCH GmbH
www.advancedsciencenews.com www.advintellsyst.com

Shiya Lv was born in Fujian, China, in 1999. She is an undergraduate student at the Department of
Electronic Information Engineering, Minzu University of China, Beijing, China. Her current research
interests include application of memristor in hardware security and biosensor.

Jian Liu received his PhD degree in physics from The University of Birmingham, Birmingham, United
Kingdom, in 1998. Since 2005, he is a full professor in Institute of Semiconductors, Chinese Academy of
Sciences, Beijing, China. His current research interests include semiconductor optoelectronic detectors,
THz image and metamaterials.

Zhaoxin Geng received his PhD degree from Institute of Electronics, Chinese Academy of Sciences, in
2007. Presently, he is a professor in School of Information Engineering, Minzu University of China. His
current research focuses on the micro/nanofluidic, biosensor and applications of nanoplasmonics,
localized surface plasmon resonance, terahertz modulator, and metamaterials.

Adv. Intell. Syst. 2021, 3, 2000127 2000127 (21 of 21) © 2020 The Authors. Published by Wiley-VCH GmbH

You might also like