Design of an Enhanced Reconfigurable Chaotic Oscillator using G4FET-NDR Based Discrete Map
Authors:
Md Sakib Hasan,
Aysha S. Shanta,
Partha Sarathi Paul,
Maisha Sadia,
Md Badruddoja Majumder,
Garrett S. Rose
Abstract:
In this paper, a novel chaotic map is introduced usinga voltage controlled negative differential resistance (NDR) circuitcomposed of ann-channel and ap-channel silicon-on-insulator(SOI) four-gate transistor (G4FET). The multiple gates of theG4FET are leveraged to create a discrete chaotic map with threebifurcation parameters. The three tunable parameters are thegain of a transimpedance amplifier (…
▽ More
In this paper, a novel chaotic map is introduced usinga voltage controlled negative differential resistance (NDR) circuitcomposed of ann-channel and ap-channel silicon-on-insulator(SOI) four-gate transistor (G4FET). The multiple gates of theG4FET are leveraged to create a discrete chaotic map with threebifurcation parameters. The three tunable parameters are thegain of a transimpedance amplifier (TIA), top-gate voltage ofn-channel G4FET, and top-gate voltage ofp-channel G4FET. Twomethods are proposed for building chaotic oscillators using thisdiscrete map. The effect of altering bifurcation parameters onchaotic operation is illustrated using bifurcation diagrams andLyapunov exponent. A design methodology for building flexibleand reconfigurable logic gate is outlined and the consequentenhancement in functionality space caused by the existence ofthree independent bifurcation parameters is demonstrated andcompared with previous work.
△ Less
Submitted 1 January, 2021;
originally announced January 2021.
A Secure Back-up and Restore for Resource-Constrained IoT based on Nanotechnology
Authors:
Mesbah Uddin,
Md. Badruddoja Majumder,
Md. Sakib Hasan,
Garrett S. Rose
Abstract:
With the emergence of IoT (Internet of things), huge amounts of sensitive data are being processed and transmitted everyday in edge devices with little to no security. Due to their aggressive power management schemes, it is a common and necessary technique to make a back-up of their program states and other necessary data in a non-volatile memory (NVM) before going to sleep or low power mode. Howe…
▽ More
With the emergence of IoT (Internet of things), huge amounts of sensitive data are being processed and transmitted everyday in edge devices with little to no security. Due to their aggressive power management schemes, it is a common and necessary technique to make a back-up of their program states and other necessary data in a non-volatile memory (NVM) before going to sleep or low power mode. However, this memory is often left unprotected as adding robust security measures tends to be expensive for these resource constrained systems. In this paper, we propose a lightweight security system for NVM during low power mode. This security architecture uses the memristor, an emerging nanoscale device which is used to build hardware security primitives like PUF (physical unclonable function) based encryption-decryption, true random number generators (TRNG), and memory integrity checking. A reliability enhancement technique for this PUF is also proposed which shows how this system would work even with less-than-100\% reliable PUF responses. Together, with all these techniques, we have established a dual layer security protocol (data encryption+integrity check) which provides reasonable security to an embedded processor while being very lightweight in terms of area, power, and computation time. A complete system design is demonstrated with 65$n$m CMOS and emerging memristive technology. With this, we have provided a detailed and accurate estimation of resource overhead. Analysis of the security of the whole system is also provided.
△ Less
Submitted 9 July, 2020;
originally announced July 2020.