A Self-Oscillated Organic Synapse for In-Memory Two-Factor Authentication

被引:5
|
作者
Liu, Shuzhi [1 ,2 ]
Zhong, Xiaolong [1 ]
Li, Yuxuan [2 ]
Guo, Bingjie [2 ]
He, Zhilong [2 ]
Wu, Zhixin [1 ]
Liu, Sixian [1 ]
Guo, Yanbo [1 ]
Shi, Xiaoling [1 ]
Chen, Weilin [1 ]
Duan, Hongxiao [1 ]
Zeng, Jianmin [1 ]
Liu, Gang [1 ,2 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Dept Micro Nano Elect, Shanghai 200240, Peoples R China
[2] Shanghai Jiao Tong Univ, Sch Chem & Chem Engn, Shanghai 200240, Peoples R China
关键词
in-memory asymmetric encryption; in-memory two-factor authentication; organic synapse; self-oscillated characteristic; NETWORK; RECOGNITION; STATE;
D O I
10.1002/advs.202401080
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Entering the era of AI 2.0, bio-inspired target recognition facilitates life. However, target recognition may suffer from some risks when the target is hijacked. Therefore, it is significantly important to provide an encryption process prior to neuromorphic computing. In this work, enlightened from time-varied synaptic rule, an in-memory asymmetric encryption as pre-authentication is utilized with subsequent convolutional neural network (ConvNet) for target recognition, achieving in-memory two-factor authentication (IM-2FA). The unipolar self-oscillated synaptic behavior is adopted to function as in-memory asymmetric encryption, which can greatly decrease the complexity of the peripheral circuit compared to bipolar stimulation. Results show that without passing the encryption process with suitable weights at the correct time, the ConvNet for target recognition will not work properly with an extremely low accuracy lower than 0.86%, thus effectively blocking out the potential risks of involuntary access. When a set of correct weights is evolved at a suitable time, a recognition rate as high as 99.82% can be implemented for target recognition, which verifies the effectiveness of the IM-2FA strategy. In-memory two-factor authentication (IM-2FA) is implemented to enhance the security of artificial neural networks. Upon successful completion of the initial authentication, where a set of accurate weights is verified, subsequent target recognition is authorized with an impressive recognition rate of 99.82%. However, in cases where incorrect weights are provided for neuromorphic computing, access is denied. image
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Leveraging autobiographical memory for two-factor online authentication
    Al-Ameen, Mahdi Nasrullah
    Haque, S. M. Taiabul
    Wright, Matthew
    INFORMATION AND COMPUTER SECURITY, 2016, 24 (04) : 386 - 399
  • [2] TWO-FACTOR AUTHENTICATION SYSTEM
    Tsymzhitov, Gonchik
    Zudilova, Tatiana
    Voituk, Tatiana
    INFORMATICS, GEOINFORMATICS AND REMOTE SENSING CONFERENCE PROCEEDINGS, SGEM 2016, VOL I, 2016, : 505 - 512
  • [3] On the Usability of Two-Factor Authentication
    Wang, Ding
    Wang, Ping
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 141 - 150
  • [4] On the Security of a Two-Factor Authentication Scheme
    Catuogno, Luigi
    Galdi, Clemente
    INFORMATION SECURITY THEORY AND PRACTICES: SECURITY AND PRIVACY OF PERVASIVE SYSTEMS AND SMART DEVICES, 2010, 6033 : 245 - +
  • [5] Two-factor authentication for the Bitcoin protocol
    Christopher Mann
    Daniel Loebenberger
    International Journal of Information Security, 2017, 16 : 213 - 226
  • [6] The Case for Mobile Two-Factor Authentication
    DeFigueiredo, Dimitri
    IEEE SECURITY & PRIVACY, 2011, 9 (05) : 81 - 85
  • [7] Two-factor authentication for the Bitcoin protocol
    Mann, Christopher
    Loebenberger, Daniel
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (02) : 213 - 226
  • [8] On the (In)Security of Mobile Two-Factor Authentication
    Dmitrienko, Alexandra
    Liebchen, Christopher
    Rossow, Christian
    Sadeghi, Ahmad-Reza
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 365 - 383
  • [9] Two-Factor Authentication for the Bitcoin Protocol
    Mann, Christopher
    Loebenberger, Daniel
    SECURITY AND TRUST MANAGEMENT (STM 2015), 2015, 9331 : 155 - 171
  • [10] The Trouble with SMS Two-Factor Authentication
    Kugler, Logan
    COMMUNICATIONS OF THE ACM, 2019, 62 (06) : 14 - 14