Abstract
Human fingerprints are randomly created during fetal activity in the womb, resulting in unique and physically irreproducible fingerprint patterns that are applicable as a biological cryptographic primitive. Similarly, stochastically knitted single-walled carbon nanotube (SWNT) network surfaces exhibit inherently random and unique electrical characteristics that can be exploited as a physical unclonable function (PUF) in the authentication. In this study, filamentous M13 bacteriophages are used as a biological gluing template to create a random SWNT network surface with mechanical flexibility, with electrical properties determined by random variation during fabrication. The resistance profile between two adjacent electrodes was mapped for these M13-mediated SWNT network surfaces, with the results demonstrating a unique resistance profile for each M13-SWNT device, similar to that of human fingerprints. Randomness and uniqueness measures were evaluated as respectively 50.5% and 50% using generated challenge–response pairs. Min-entropy for unpredictability evaluation of the M13-SWNT based PUFs resulted in 0.98. Our results showed that M13-SWNT random network exhibits cryptographic characteristics when used in a bio-inspired PUF device.
Similar content being viewed by others
Introduction
The semiconductor industry has offered various security systems, but traditional security methodologies still face tremendous threats from sophisticated attacks1,2,3. To protect against these attacks, physical unclonable functions (PUFs) employ the inherent physical characteristics of electrical devices arising from fabrication variations4. These characteristics vary randomly and are unduplicable, as they result from inherent structural variations. Diverse PUF implementations have been proposed based on optical devices, RFID, FPGA, integrated circuits, memory devices, organic electronics, and carbon nanotubes (CNTs)5,6,7,8,9,10,11,12,13,14. CNT-based PUFs have attracted significant attention for wearable applications owing to their flexibility and printable characteristic11,12. Prior studies have been conducted on the implementation of CNT-based PUFs1,14. These PUFs exploit an analog resistance network using a random conducting path formed by dispersed CNTs during the fabrication10. This analog resistance network has desirable inherent randomness for PUF fabrication. Moreover, CNT-based PUFs also have sufficient tolerance to ultraviolet light and radiation, increasing their reliability in various fields1. In this study, M13 phages were employed as a biological glue layer to apply single-walled carbon nanotubes (SWNTs) to a M13 nanomesh13,15 and implement a unique CNT-based PUF device (M13-SWNT). The SWNTs provide large effective surface areas, forming percolating structures, and provide efficient interfacing with ionic systems (electrochemical, biological, and biochemical), mechanical flexibility, and optical transparency characteristics13. The M13 phage, as a biological glue material, is strongly bound to the SWNTs to assemble the conductive nanomesh15. Consequently, the M13-SWNT surface arrangement is formed randomly from inevitable fabrication variations, and this inherent feature enables PUF device implementation in cryptographic key generation.
Materials and methods
Device characteristics
Fabrication variation makes it physically impossible to duplicate security chips and, therefore, is essential for PUF device implementation. The M13-SWNT film was fabricated through hydrodynamic assembly process as previous published13. The SWNT (purchased from Nanointegris Inc.) has the diameter varying from 1.2 to 1.7 nm with the mean diameter of 1.4 nm and the length distributed from 100 nm to 4 um with the average ~ 1 um. The hydrodynamic assembly method used for M13-SWNT-based PUF devices has been reported to increase fabrication variation. Briefly, SWNTs dispersed in a sodium cholate solution were mixed with a genetically engineered M13 bacteriophage. This M13 bacteriophage was used because of its filamentous nature and strong binding affinity for SWNTs, resulting from a specific peptide sequence on its body surface (p8 peptide). A mixture of SWNTs and an M13 bacteriophage solution, based on a 4:1 molar ratio of SWNT to M13 bacteriophage, was dialyzed against DI water. Through the hydrodynamic assembly method, M13 works as a biological glue to facilitate the large area of SWNT film13. An M13-SWNT-conductive network film formed around the inner wall of the dialysis membrane via a hydrodynamic assembly process because of concentration polarization. Because this phenomenon is not exactly the same in the entire area, M13-SWNT film has a locally different resistance. These random networks apparently formed as a result of non-reproducible variables such as wrinkles and curvature of the membrane. Au dot contacts of 10 × 10 were deposited by thermal evaporation and the diameter of the Au contact was 300 um with the center-to-center distance of 650 um. During the fabrication a randomly distributed surface is developed on the M13-SWNT substrate, forming resistance networks between the two electrodes (Fig. 1). M13-SWNT-based PUF devices fabricated in the same batch exhibit unique resistance networks. Similar to human fingerprints, these resistance values produce characteristic electric response patterns for the M13-SWNT-devices.
Resistance distributions were investigated by applying a voltage pulse of 0.5 V/100 ns to measure the read current of 90 cells for three different M13-SWNT-based PUFs fabricated in the same batch. Figure 2 represents the variations in the measured resistance. The resistance values of the M13-SWNT-based PUFs exhibit random patterns due to cell-to-cell variation, which indicates the likeliness of duplicating these PUFs. The following section (results and discussion) will analyze these random patterns using quantitative methods. Moreover, the significant resistance variation in the M13-SWNT material can improve authentication characteristics.
Challenge–response pair (CRP) generation method
The PUF, as a cryptographic primitive, should respond to paired challenges with prearranged outputs, together referred to as challenge–response pairs (CRP). The response bit, 0 or 1, is generated by comparing the currents of the two cells selected by the challenge (Fig. 3). This CRP generation method predicts the response-bit generation mechanism more difficult than using CRP generation with a predefined reference cell because the possible cell combinations become much larger. Furthermore, it may help the response bits avoid a bias to 0 or 1, even when the current values of the cells follow a biased distribution within a specific window. Thus, the total possible combinations are \(\left( {\begin{array}{*{20}c} {\text{m}} \\ 2 \\ \end{array} } \right)^{{\text{n}}}\), where m is the number of cells in a PUF device, and n is the bit length of the response string.
Schematic of CRP generation algorithm. When a request for CRP generation arrives, a challenge (C) is generated that comprises two particular cells from a specific PUF device and a response length (R). Comparing the currents of the first and second selected cells produces a bit represented by 0 or 1. Concatenating each bit into the response bits, the CRP is completed as a response of \(n\) bits.
Results and Discussion
Min-entropy
Min-entropy is the most conservative way to measure the unpredictability of a set of outcomes and is evaluated by the responses as follows16:
where \({\text{H}}_{{{\text{min}}}}\) denotes the min-entropy of the samples, and \({\text{P}}_{{{\text{max}}}}\) maximum probability of 0 or 1 at each position of the response to the challenges.
If Pmax is close to 0.5, then the min-entropy leads to an ideal value of 1. The response patterns from the PUF with a min-entropy close to 1 become almost unpredictable. All the fabricated M13-SWNT-based PUFs had a desirably high min-entropy of 0.98, regardless of the individual PUF cell distribution, demonstrating the unpredictability of their responses.
Randomness and uniqueness evaluation
Randomness evaluates the unpredictability of the responses and is obtained by measuring the number of ‘1 s’ or ‘0 s’ in the response string17. An ideal PUF should have randomness of 50%, which contributes to strong tolerance against brute-force attacks. Uniqueness represents how different responses are expected to be when the same challenge is applied to different PUFs17. It is evaluated by measuring the hamming-distance between responses of different PUFs to the same challenge, and an ideal PUF should have a uniqueness of 50%. The randomness was measured by applying 10,000 different challenges and extracting the 240-bit responses from each PUF. The uniqueness was also evaluated by applying the same challenges 10,000 times to the three PUFs and obtaining the 240-bit responses. The randomness of the M13-SWNT-based PUFs results was 50%, 50.5%, and 51%, all of which are close to the ideal value of 50%, as shown in Fig. 4a. Moreover, the uniqueness of PUFs also tended to the ideal value of 50%, as shown in Fig. 4b.
Environment variations
The PUF device is required to behave reliably by reproducing the same responses even under environmental variations. In particular, the M13-SWNT-based PUFs with a flexible substrate are easily exposed to physical and temperature variations, and these changes often cause a bit flip in the response electrical outputs. However, when the electrical changes can be linearly correlated with environmental variation, the corresponding relationship between resistance and environmental variation can be used to minimize the possibility of bit flips, in a process referred to as error correction18. Therefore, our study investigated the dependencies of resistance on bending and temperature variation. When the M13-SWNT-based PUF was subjected to bending, resistance increased, with respect to strain, (Fig. 5a). Moreover, a temperature increase from 25 to 50 °C linearly decreased the resistance, indicated by increased current flow shown (Fig. 5b). Based on the linear correlation of resistance with these environmental variables the bit errors induced by environmental change can be suppressed via a compensation algorithm.
Conclusion
A single-walled carbon nanotube (SWNT) network surface was implemented for a PUF application using a M13 bacteriophage layer as a biological glue material through a simple hydrodynamic assembly process. This process can naturally form random SWNT connections between the two electrodes through inherent fabrication variations. The random connection variations lead to a random and unique resistance distribution for each M13-SWNT device. Individual cells in the M13-SWNT device were defined by the resistance between two adjacent electrodes. These randomly distributed and unique resistance values were then used to generate the challenge–response pairs (CRPs) for a cryptographic primitive. To evaluate the M13-SWNT-based PUF devices, the randomness, uniqueness, and min-entropy were determined for the given CRPs. In addition, resistance was found to have a linear correlation with environmentally induced temperature and strain changes. These relationships can be used to compensate for resistance change, and thus minimize the bit errors. We successfully demonstrated the cryptographic properties of M13-SWNT and its robustness to environmental variation when used as a biomimetic PUF device.
Data availability
The datasets generated and/or analyzed during the current study are not publicly available due to follows the intellectual-property protection guidelines in KIST as a national research institute, but are available from the corresponding author on reasonable request.
References
Moon, D.-I. et al. Physically unclonable function by an all-printed carbon nanotube network. ACS Appl. Electron. Mater. 1, 1162–1168. https://doi.org/10.1021/acsaelm.9b00166 (2019).
Leest, V. V. D., Maes, R., Schrijen, G.-J. & Tuyls, P. Hardware intrinsic security to protect value in the mobile market. In ISSE, 2014. Securing Electronic Business Processes 188–198 (Springer, Berlin, 2014).
Weber, R. H. Internet of Things-New security and privacy challenges. Comput. Law Sec. Rev. 26, 23–30. https://doi.org/10.1016/j.clsr.2009.11.008 (2010).
Tehranipoor, M. & Wang, C. Introduction to Hardware Security and Trust (Springer Science and Business Media, Berlin, 2011).
Dolev, S., Krzywiecki, Ł, Panwar, N. & Segal, M. Optical PUF for non-forwardable vehicle authentication. Comput. Commun. 93, 52–67. https://doi.org/10.1016/j.comcom.2016.05.016 (2016).
Gassend, B., Clarke, D., Van Dijk, M., Devadas, S. Silicon physical random functions, in: Proceedings of the 9th ACM Conference on Computer and Communications Security 148–160 (2002).
Sadeghi, A.-R. & Naccache, D. Towards Hardware-Intrinsic Security (Springer, Berlin, 2010).
Bolotnyy, L., Robins, G. Physically unclonable function-based security and privacy in RFID systems, in Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom’07), 211–220 (IEEE Publications, 2007).
Hong, S. & Myung, S. Nanotube electronics: A flexible approach to mobility. Nat. Nanotechnol. 2, 207–208. https://doi.org/10.1038/nnano.2007.89 (2007).
Wendt, J. B., Potkonjak, M. Nanotechnology-based trusted remote sensing, in Sensors, Institute of Electrical and Electronics Engineers 1213–1216 (IEEE Publications, 2011).
Li, D., Lai, W. Y., Zhang, Y. Z. & Huang, W. Printable transparent conductive films for flexible electronics. Adv. Mater. https://doi.org/10.1002/adma.201704738 (2018).
Ling, Y. et al. A printable CNT-based FM passive wireless sensor tag on a flexible substrate with enhanced sensitivity. IEEE Sens. J. 14, 1193–1197. https://doi.org/10.1109/JSEN.2013.2281197 (2013).
Lee, K. Y. et al. Hydrodynamic assembly of conductive nanomesh of single-walled carbon nanotubes using biological glue. Adv. Mater. 27, 922–928. https://doi.org/10.1002/adma.201404483 (2015).
Hu, Z. et al. Physically unclonable cryptographic primitives using self-assembled carbon nanotubes. Nat. Nanotechnol. 11, 559–565. https://doi.org/10.1038/nnano.2016.1 (2016).
Lee, H., Lee, B. P. & Messersmith, P. B. A reversible wet/dry adhesive inspired by mussels and geckos. Nature 448, 338–341. https://doi.org/10.1038/nature05968 (2007).
Turan, M. S., Barker, E., Kelsey, J., McKay, K., Baish, M., Boyle, M. NIST, SP 800–90B: Recommendation for the entropy sources used for random bit generation, in Tech. Rep, National Institute for Standards and Technology (2018).
Sembiring, R. L., Pahlevi, R. R., Sukarno, P. Randomness, uniqueness, and steadiness evaluation of physical Unclonable functions, in 2021 9th International Conference on Information and Communication Technology (ICoICT) 429–433 (IEEE Publications, 2021).
Lee, G. S., Kim, G.-H., Kwak, K., Jeong, D. S. & Ju, H. Enhanced reconfigurable physical Unclonable function based on stochastic nature of multilevel cell RRAM. IEEE Trans. Electron Devices. 66, 1717–1721. https://doi.org/10.1109/TED.2019.2898455 (2019).
Acknowledgements
J.-S. Jeong and G. S. Lee contributed equally to this work. K.-Y. Lee and H. Ju are corresponding authors. This study was supported and funded by the Korean National Police Agency (KNPA)-(PR08-04-000-21), the Ministry of Culture, Sports and Tourism (MCST) and Korea Creative Content Agency (KOCCA)-(CR202104002), the National Research and Development Program through the National Research Foundation of Korea (NRF), the Ministry of Science and ICT (2019M3F3A1A02071509 and 2020M3F3A2A01081635) and KIST institutional program (2E31551, 2E31541).
Author information
Authors and Affiliations
Contributions
J.-S.J.: Data curation, Investigation, Formal analysis, Software, Writing – original draft, Writing – review and editing, Visualization, G.S.L.: Data curation, Investigation, Writing – original draft, T.-E. P: Methodology, Writing – review and editing, K.-Y.L.: Investigation, Methodology, Visualization, Writing – review and editing, H.J.: Project administration, Conceptualization, Supervision, Formal analysis, Visualization, Validation, Writing – original draft, Writing – review and editing.
Corresponding authors
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Jeong, JS., Lee, G.S., Park, TE. et al. Bio-inspired electronic fingerprint PUF device with single-walled carbon nanotube network surface mediated by M13 bacteriophage template. Sci Rep 12, 20096 (2022). https://doi.org/10.1038/s41598-022-24658-9
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-022-24658-9
This article is cited by
-
Security primitives for memoryless IoT devices based on Physical Unclonable Functions and True Random Number Generators
Scientific Reports (2024)
-
Voxelated opto-physically unclonable functions via irreplicable wrinkles
Light: Science & Applications (2023)