A One Zener Diode One Memristor Crossbar Architecture For A Write-Time-Based PUF

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

A One Zener Diode, One Memristor Crossbar

Architecture for a Write-Time-Based PUF


Timothy Potteiger and William H. Robinson
Security and Fault Tolerance (SAF-T) Research Group
Department of Electrical Engineering and Computer Science
Vanderbilt University, Nashville, TN, USA

Abstract - With the rise of emerging technologies, distribution in the response. For this reason, a 1ZD1M CBA
nanoelectronics are seen as potential solutions for can be used as a solution, since it can allow for accurate
various security primitives. Memristors are of interest, reads from memory cells to ensure uniformity in the
as they are believed to offer benefits for use as a Physical response values. Such an approach has been motivated by
Unclonable Function (PUF), since their non-linear the use of a 1ZD1M CBA for ReRAM devices [4], [5]. This
behavior is inefficient to model in large quantities. A method is believed to be practical; the Zener diode and the
write-time-based PUF has been suggested in the form of memristor simulated in this work have a feature size on the
a memristor array to avoid the sneak path problem. To order of tens of nanometers, which would allow for a
amend this approach, a one Zener diode, one memristor 1ZD1M CBA to be on the same order of magnitude for size
crossbar architecture may be used. Such an architecture compared to a memristor crossbar. As for feasibility, the
can virtually eliminate sneak paths in crossbars up to a Zener diode is inorganic. For fabrication, inorganic Zener
size that is limited by the saturation current of the Zener diodes can be created using simple means, such as vapor
diode. This approach allows uniformity and uniqueness deposition and printing, that would allow for both mass
among the crossbar, similar to a SRAM-based PUF, production and incorporation into memristor crossbars [6].
where the uniformity in the response is derived from the The paper is organized as follows. Section II discusses
uniformity of the memory cells. Ultimately, this memristor technology and its use as physically unclonable
approach is meant as a beneficial contribution to the functions. Section III discusses the write-time-based
novel and relatively new technique of creating a random algorithm. Section IV provides the simulation methodology.
bit distribution among an array of memristors, as it Results are discussed in Section V. Finally, Section VI
allows the same technique to be used on a crossbar to summarizes the paper.
offer an improvement in terms of bits per area.
II. MEMRISTORS AS A PHYSICAL UNCLONABLE FUNCTION
I. INTRODUCTION
Memristors are one of the core nanotechnologies being
Physical unclonable functions (PUFs) can depend studied for the advancement of secure and efficient systems.
strongly on the impurities of the components that comprise This potential stems from a large set of traits that are
them to generate a random bit distribution among the desirable for such purposes that include non-volatility,
response bits that is unpredictable [1]. In the case of one power efficiency, and scalability [7]. The basic principle of
specific SRAM PUF, the impurities of the SRAM are used the memristor is its memory resistance, or the ability for its
to generate a random bit distribution among the memory instantaneous resistance at any moment in time to be
cells. A challenge is applied to the SRAM in the form of dependent on the previous history of the applied voltage.
memory locations, and the response comprises the values at Thus, if an electric potential is removed from the memristor,
those locations [2]. The idea is that if there is a random then it will maintain its instantaneous resistance because its
distribution among the values in the memory cells, then voltage history will remain the same. This is from where the
using those values as bits in the response will form a non-volatile characteristic emerges and allows the concept
random distribution. In this work, a write-time-based of states to be established [7].
algorithm is used to generate a random distribution among a With memristors, there are at least two prominent states.
one Zener diode, one memristor (1ZD1M) crossbar These are: (1) a high resistive state (HRS) and (2) a low
architecture (CBA) to create a PUF synonymous to the resistive state (LRS). The HRS occurs when the memristor
SRAM PUF. is off, and a positive pulse is applied to the device for a
PUFs must exhibit three primary traits. Those traits are required amount of time. The memristance in this state is
uniformity, uniqueness, and reliability [3]. The need for a classified as Moff. The LRS occurs when the memristor is on,
one diode, one memristor crossbar architecture arises and a negative pulse is applied to the device for a required
because of a phenomonen noted as a sneak path that occurs amount of time. The memristance in this state is classified
in memristor crossbars. The sneak path reduces the ability to as Mon [7].
perform accurate reads and can compromise the essential The core memristor-based security primitive is the
trait of uniformity, which is defined as a random bit physical unclonable function. PUFs can operate as a means

Authorized licensed use limited to: KIT Library. Downloaded on September 20,2023 at 12:28:37 UTC from IEEE Xplore. Restrictions apply.
of authentication [8]. With a memristive PUF, there may be Zener diode. This is because the shortest sneak path consists
a crossbar of memristors or a single array of memristors. For of three memory cells. When the read voltage exceeds three
a crossbar memristor PUF, there are nano-arrays of times the turn-on voltage of the Zener diode, a sneak path
memristors. A challenge is applied to the nano-arrays, and a may be enabled. When the adequate conditions of the read
response is generated in a repeatable manner. In other voltage are satisfied, each sneak path then becomes
words, there are unique challenge response pairs [8]. equivalent to the Zener diode’s reverse saturation current.
The challenge-response mapping has to satisfy three
important constraints. It has to satisfy uniqueness, IV. SIMULATION METHODOLOGY
reliability, and uniformity [3]. Uniqueness implies that the In order to ensure that the analysis led to realistic results,
challenge-response mapping is unique to each PUF. parameters are chosen that were used in previous literature.
Reliability implies that the challenge-response pairs can be Note that a majority of the following parameters apply to a
generated in a repeatable manner. Lastly, uniformity implies write operation via the memristor state transition expression
that there should ideally be 50 percent ones and 50 percent in Equation 1. The following parameters are chosen: a LRS
zeros in the response string. of 121 kOhms, a HRS of 121 MOhms, a mean diameter of
III. A WRITE-TIME-BASED ALGORITHM FOR A CROSSBAR 50 nm, a diameter variance of 5 percent and 10 percent, Vth
ARCHITECTURE of 1.2 V, and a E0 of 25 MV/m [10]. A reasonable µ is
calculated using the equation including the mobility for
For the purposes of this paper, the PUF model will small electric fields [11]. The frequency of escape attempt is
encompass a write-time-based algorithm in order to achieve 1013 Hz, while a periodicity of 2.068 nm and activation
a random bit distribution among the memristor cells. This energy of 0.778 eV are assumed. These values are used to
method works by first setting all of the memristors to a HRS calculate the mobility for small electric fields [12].
through the application of a voltage (Vw) of negative polarity The next matter of importance is to identify just how
with a greater magnitude than a threshold voltage (Vth). This prominent the sneak path problem is during a read operation
is necessary in order for the memristors to change their and how large a memristor crossbar has to be for this
resistive values. Otherwise, the memristance will remain problem to emerge. During a read operation, a voltage is
stagnant, and the memristor will act as a linear resistor. applied to the row of the memory cell of interest, and a load
The next step is done by applying a voltage (Vw) of resistor is connected to the column of the memory cell of
positive polarity with a greater magnitude than a threshold interest. In this case, the read voltage and load resistance
voltage (Vth) across all of the memristors for a minimum used are 1 V and 1 kOhm respectively. When the memory
write-time. The minimum write-time is the amount of time cell of interest is in a HRS, the voltage across the load
needed for a memristor of the expected diameter to resistor is supposed to be smaller than it would be if the
transition from the HRS to the LRS. Choosing this memory cell of interest is in a LRS. This is the mechanism
particular write-time leads to half of the memristors for distinguishing a logic 0 and vice versa. A read operation
transitioning to a LRS. The remaining memristors will be in may be compromised when a worst-case scenario for
a near HRS. reading a cell with a HRS leads to a larger load voltage than
The write-time-based algorithm can be successful at a worst-case scenario for reading a cell with a LRS.
generating a random bit distribution within the memristor A worst-case scenario for a crossbar would usually be
crossbar so long as the columns are grounded. It is during where every cell besides the cell of interest is in the opposite
the read operation that sneak paths appear as a problem. state of the cell of interest. Yet, it is known that this is not a
When sneak paths occur during the read operation, the possible scenario, as the write operation leads to a high bit
randomness is reduced because of false reads. The result is entropy. Hence, the worst-case scenario would occur when
that the uniformity of the PUF is compromised. all of the cells in the same row and same column are in the
The sneak path problem is defined as the occurance of opposite state of the cell of interest. The remaining cells are
the current branhing off of from the desired path. This in appropriate states to ensure a 50% bit ratio.
phenomenon is inherent to memristor crossbars. For this Following the evaluation of a read operation in a
reason, the original write-time-based memristor PUF memristive crossbar, the next step is to evaluate the read
algorithm was comprised of an array of memristors as functionality for the 1ZD1M CBA. The read function is
opposed to a crossbar [9]. To allow for accurate reads and performed the same way as with the memristor crossbar.
ensure uniformity with a crossbar, the use of a one Zener The only difference is the number of elements in each cell
diode, one memristor cell layout is proposed. A Zener diode and the sneak path. A read from a cell is modeled using the
is used as opposed to a traditional diode; it allows for a circuit model in Figure 1, where Iread goes to a load resistor.
current of either a positive or negative polarity to flow, Vread is 1 V, Rline is 3.356 ohms, and Ron is 500 ohms. The
which can allow for a transition to a LRS from a HRS and load across the resistor determines the bit value.
vice versa during a write operation. For a read operation, a
1ZD1M CBA virtually eliminates sneak paths provided that
the read voltage exceeds the turn-on voltage of the Zener
diode and is less than three times the turn-on voltage of the

2
Authorized licensed use limited to: KIT Library. Downloaded on September 20,2023 at 12:28:37 UTC from IEEE Xplore. Restrictions apply.
Load Voltage to Represent Logic Value (mV)
Worst Case Load Voltage During Read to
Represent Logic Low and High in
Memory Cell of Interest With Respect to Crossbar Size
20

15

10

Figure 1: Schematic of a memory cell during read, where N is the number


of rows [4] 0
0 10 20 30 40 50 60

Number of Cells in Crossbar


For the write simulation, the write voltage is 2 V, and the
Worst case load voltage to represent logic high
read voltage is 1 V. The memristor’s response during the Worst case load voltage to represent logic low
write operation is calculated using Equations 1 and 2 along Fit curve for logic low load voltage (R squared = .9927)
with the parameters in order to arrive at a differential Fit curve for logic high load voltage (R squared = .9820)

equation for the voltage across the memristor (Equation 3).


Figure 2: Graph of the voltage across load resistor while reading from a cell
with a memristor is a LRS (solid) and HRS (dashed). These are worst-case
( ) √ ( ( )) ( ) (1) scenarios where all of the points under the blue curve represent a 0 and all
of the points under the black curve represent a 1. After a size of 25, there is
a region of intersection for assigning a 1 bit and a 0 bit that could lead to
aliasing.
( ) ∫ (2)
Equation 6 is used to calculate the current through the
( ∫ ( ) ( ) )
( ) ( ) (( ) √ ) load resistor using Figure 1. The equation was modeled in
Simulink for a read operation. The Simulink read operation
( ∫ ( ) ( ) ) simulation successfully showed that a cell in a HRS was
( √ ) (3) read as a logic 0, and a cell in a LRS was read as a logic 1.
The memristance itself is the term that is multiplied by
(Vw-Vth). For the Zener diode, the linear model of the Zener ( ( ) ( ) ( )
diode is used with a size of 10 nm, a Vth of 0.5 V, Ron of 500 ( ) ) (6)
ohm and a saturation current of 1 nA [4]. Also, a line From Equation 6, the voltage across the load resistor
resistance of 3.356 ohms is used. Various size crossbars are while reading from either a HRS cell or a LRS cell can be
tested for 1000 iterations at each size to observe the mean computed for various crossbar sizes. Both situations are
and variance of the percentage of each bit. In addition, the graphed in Figure 3, showing that the voltage across the
uniqueness and uniformity are calculated using Equations 4 load resistor during a read operation for either reading a
and 5 at each of the sizes to ensure there is a convergence to logic 1 or reading a logic 0 begin to converge when the
the ideal value of 0.5 for each. In Equation 4, k is the scale of the crossbar is about 10,000 cells. This is the point
number of responses taken into account, R is a response, n is where distinguishing between a logic 1 and a logic 0
the number of bits per response, and HD is the Hamming becomes difficult. This point of convergence has been
distance. In Equation 5, n is the number of bits in a response shown to be related to the Zener diode saturation current,
and r is a bit in a response. and a larger-sized crossbar has been shown to be possible
with a smaller saturation current [4].
( )
∑ ∑ (4)
( )

∑ (5)

V. RESULTS AND DISCUSSION


The sneak path problem exhibits signs of possible bit
aliasing during the read operation for crossbars as small as
25 cells (Figure 2). Note that the limiting scenario on the
size of the crossbar appears to be the case of attempting to
read a memory cell that is in a HRS while the memory cells
in the same column and same row are in a LRS.

3
Authorized licensed use limited to: KIT Library. Downloaded on September 20,2023 at 12:28:37 UTC from IEEE Xplore. Restrictions apply.
previous work, a crossbar of diodes has led to a read out of
Figure 3: Graph of the voltage across load resistor while reading from a cell about 100 bits/s [13]. A PUF greater than 10,000 bits in
with a memristor is a LRS (solid) and HRS (dashed). The points on the
such a case would not be ideal with that time constraint. In
blue curve represent a logic 1, and the points on the green curve represent a
logic 0. The convergence can cause difficulty in distinguishing between a summary, the write-time-based PUF on the 1ZD1M CBA
logic 0 and a logic 1. can be used to create uniformity and uniqueness among the
crossbar, which does allow it to be used in a PUF
The write operation is shown in Figure 4 that enables the synonymous to the SRAM based PUF, provided that the
memristor to transition from a HRS to a LRS. The dramatic challenge-response pairs can be generated in a repeatable
rate of change towards the end of the transition is an manner.
important trait when considering the write-time-based
algorithm. It ensures that if a memristor is not in a LRS, REFERENCES
then there will be a high chance that the memristor will [1] C. Herder, M. D. Yu, F. Koushanfar, and S. Devadas, “Physical
exhibit a resistance that is on the same order of magnitude unclonable functions and applications: A tutorial,” Proc. IEEE,
as its HRS. vol. 102, no. 8, pp. 1126–1141, 2014.
[2] J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, “Physical
In Figure 5, the uniformity is shown to converge to the Unclonable Functions and Public-Key Crypto for FPGA IP
optimal value of 50%. In addition, uniqueness is also shown Protection,” 2007 Int. Conf. F. Program. Log. Appl., pp. 189–
to be approximately the optimal value of 50%. 195, 2007.
[3] A. Chen, “Utilizing the Variability of Resistive Random Access
Memory to Implement Reconfigurable Physical Unclonable
Functions,” vol. 36, no. 2, pp. 138–140, 2015.
[4] Y. Li, B. Long, S. Mandal, W. Chen, and R. Jha, “Understanding
the impact of diode parameters on sneak current in 1Diode
1ReRAM crossbar architectures,” Proc. 2013 IEEE/ACM Int.
Symp. Nanoscale Archit. NANOARCH 2013, pp. 64–69, 2013.
[5] Y. Li, L. Fu, C. Tao, X. Jiang, and P. Sun, “Feasibility study of
using a Zener diode as the selection device for bipolar RRAM
and,” J. Appl. Phys. D, vol. 025103, 2014.
[6] K. Leo, “Organic Zener Diode, Electronic Circuit, and Method
for Operating an Organic Zener Diode,” 2012.
[7] J. Rajendran, R. Karri, J. Wendt, and B. Wysocki,
“Nanoelectronic Solutions for Hardware Security,” Asian South
Pacific Des. Autom. Conf., pp. 1–9, 2013.
[8] J. B. Wendt and M. Potkonjak, “The bidirectional polyomino
partitioned PPUF as a hardware security primitive,” 2013 IEEE
Figure 4: Memristor transition from a HRS to a LRS Glob. Conf. Signal Inf. Process. Glob. 2013 - Proc., no. i, pp.
257–260, 2013.
[9] G. S. Rose, N. McDonald, L. K. Yan, and B. Wysocki, “A write-
Uniformity and Uniqueness time based memristive PUF for hardware security applications,”
51.5
IEEE/ACM Int. Conf. Comput. Des. Dig. Tech. Pap. ICCAD, pp.
Uniformity Percent 830–833, 2013.
51.0 Uniqueness Percent [10] G. S. Rose, N. McDonald, L. K. Yan, B. Wysocki, and K. Xu,
“Foundations of memristor based PUF architectures,” Proc. 2013
50.5 IEEE/ACM Int. Symp. Nanoscale Archit. NANOARCH 2013, pp.
Percent

52–57, 2013.
50.0 [11] G. S. Rose, J. Rajendran, H. Manem, R. Karri, and R. E. Pino,
“Leveraging memristive systems in the construction of digital
49.5
logic circuits,” Proc. IEEE, vol. 100, pp. 2033–2049, 2012.
49.0
[12] D. B. Strukov and R. S. Williams, “Exponential ionic drift: Fast
switching and low volatility of thin-film memristors,” Appl. Phys.
48.5
A Mater. Sci. Process., vol. 94, pp. 515–519, 2009.
0 20 40 60 80 100 120 140 160
[13] O. Kavehei and C. Hosung, “mrPUF: A Memristive Device based
Physical Unclonable Function,” CoRR, 2013.
Number of Cells in Crossbar

Figure 5: Graph of uniformity (solid) and uniqueness (dashed) in relation to


the number of cells in the crossbar

VI. SUMMARY
The 1ZD1M CBA is shown via simulation to be
functional. During the write function, the memristor still
exhibits a necessary drop-off closer to a LRS, and the read
function can accurately distinguish between a cell that is in
a HRS and LRS in a crossbar of the size of 10,000 memory
cells. This is fitting as the diode may be a limiting
component in terms of scalability during read operations. In

4
Authorized licensed use limited to: KIT Library. Downloaded on September 20,2023 at 12:28:37 UTC from IEEE Xplore. Restrictions apply.

You might also like