Securing Binarized Neural Networks via PUF-Based Key Management in Memristive Crossbar Arrays

被引:0
|
作者
Rajendran, Gokulnath [1 ]
Basak, Debajit [2 ]
Deb, Suman [1 ]
Chattopadhyay, Anupam [1 ]
机构
[1] Nanyang Technol Univ, Coll Comp & Data Sci, Singapore 639798, Singapore
[2] Atom Semicond, Hong Kong, Peoples R China
基金
新加坡国家研究基金会;
关键词
Mathematical models; Security; Artificial neural networks; Accuracy; Computer architecture; Standards; Runtime; Binary neural networks; crossbar; memristor; physical unclonable function (PUF); security; weights;
D O I
10.1109/LES.2024.3422294
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Binarized neural networks (BNNs) are a subset of deep neural networks proposed to consume less computational resources with a smaller energy budget. Recent studies showed that memristor-based in-memory computing architectures can be constructed to accelerate BNNs, with better performance compared to traditional CMOS technologies. The memristor nonvolatility utilized for in-memory computing poses a notable threat to theft attacks in the presence of adversaries with physical access. This motivates us to introduce two novel protection methodologies to safeguard the model parameters of BNNs in the memristive crossbar. We propose to take advantage of physical unclonable functions (PUFs), which can be implemented using memristor-based crossbars for protecting BNN. This feature provides superior security compared to the traditional stored-key-based schemes. We provide circuit-level hardware designs to implement our methodologies with negligible additional overhead compared to an unprotected design and detailed supporting analysis to validate our security claims.
引用
收藏
页码:30 / 33
页数:4
相关论文
共 45 条
  • [21] A New PUF-Based Protocol for Mutual Authentication and Key Agreement Between Three Layers of Entities in Cloud-Based IoMT Networks
    Modarres, Amir Masoud Aminian
    Anzabi-Nezhad, Nima S.
    Zare, Maryam
    IEEE ACCESS, 2024, 12 : 21807 - 21824
  • [22] A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks
    Hakeem, Shimaa A. Abdel
    Abd El-Kader, Sherine M.
    Kim, HyungWon
    SENSORS, 2021, 21 (17)
  • [23] Wafer-scale integration of two-dimensional materials in high-density memristive crossbar arrays for artificial neural networks
    Chen, Shaochuan
    Mahmoodi, Mohammad Reza
    Shi, Yuanyuan
    Mahata, Chandreswar
    Yuan, Bin
    Liang, Xianhu
    Wen, Chao
    Hui, Fei
    Akinwande, Deji
    Strukov, Dmitri B.
    Lanza, Mario
    NATURE ELECTRONICS, 2020, 3 (10) : 638 - 645
  • [24] Wafer-scale integration of two-dimensional materials in high-density memristive crossbar arrays for artificial neural networks
    Shaochuan Chen
    Mohammad Reza Mahmoodi
    Yuanyuan Shi
    Chandreswar Mahata
    Bin Yuan
    Xianhu Liang
    Chao Wen
    Fei Hui
    Deji Akinwande
    Dmitri B. Strukov
    Mario Lanza
    Nature Electronics, 2020, 3 : 638 - 645
  • [25] A Secure User Anonymity-Preserving Biometrics and PUF-Based Multiserver Authentication Scheme With Key Agreement in 5G Networks
    Xu, Deqin
    Bian, Weixin
    Li, Qingde
    Xie, Dong
    Zhao, Jun
    Hu, Yao
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (05): : 5170 - 5184
  • [26] Proposal, analysis and demonstration of Analog/Digital-mixed Neural Networks based on memristive device arrays
    Marukame, Takao
    Nomura, Kumiko
    Matusmoto, Mari
    Takaya, Satoshi
    Nishi, Yoshifumi
    2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
  • [27] Cipher key management based on neural networks and facial biometrics feature
    Zhang, Xiang-De
    Tang, Qing-Song
    Lu, Xiao-Jun
    Zhu, He-Gui
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2009, 30 (06): : 817 - 820
  • [28] Exponential synchronization of memristive delayed neural networks via event-based impulsive control method
    Liu, Dan
    Ye, Dan
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2020, 357 (07): : 4437 - 4457
  • [29] DIST-LEACH: A DETERMINISTIC KEY MANAGEMENT SCHEME FOR SECURING CLUSTER-BASED SENSOR NETWORKS
    Barad, Jaydeep
    Kadhiwala, Bintu
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY RESEARCH (ICAETR), 2014,
  • [30] Synchronization analysis of fractional delayed memristive neural networks via event-based hybrid impulsive controllers
    Wang, Huiyu
    Liu, Shutang
    Wu, Xiang
    NEUROCOMPUTING, 2023, 528 : 75 - 83