Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nathan R. McDonald is active.

Publication


Featured researches published by Nathan R. McDonald.


international conference on computer aided design | 2013

A write-time based memristive PUF for hardware security applications

Garrett S. Rose; Nathan R. McDonald; Lok-Kwong Yan; Bryant T. Wysocki

Hardware security has emerged as an important field of study aimed at mitigating issues such as piracy, counterfeiting, and side channel attacks. One popular solution for such hardware security attacks are physical unclonable functions (PUF) which provide a hardware specific unique signature or identification. The uniqueness of a PUF depends on intrinsic process variations within individual integrated circuits. As process variations become more prevalent due to technology scaling into the nanometer regime, novel nanoelectronic technologies such as memristors become viable options for improved security in emerging integrated circuits. In this paper, we describe a novel memristive PUF (M-PUF) architecture that utilizes variations in the write-time of a memristor as an entropy source. The results presented show strong statistical performance for the M-PUF in terms of uniqueness, uniformity, and bit-aliasing. Additionally, nanoscale M-PUFs are shown to exhibit reduced area utilization as compared to CMOS counterparts.


international symposium on nanoscale architectures | 2010

Compact method for modeling and simulation of memristor devices: ion conductor chalcogenide-based memristor devices

Robinson E. Pino; James W. Bohl; Nathan R. McDonald; Bryant T. Wysocki; Peter J. Rozwood; Kristy A. Campbell; Antonio S. Oblea; Achyut Timilsina

A compact model and simulation methodology for chalcogenide based memristor devices is proposed. From a microprocessor design view point, it is important to be able to simulate large numbers of devices within the integrated circuit architecture in order to speed up reliably the development process. Ideally, device models would accurately describe the characteristic device behavior and would be represented by single-valued equations without requiring the need for recursive or numerically intensive solutions. With this in mind, we have developed an empirical chalcogenide compact memristor model that accurately describes all regions of operations of memristor devices employing single-valued equations.


Proceedings of the IEEE | 2015

Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications

Jeyavijayan Rajendran; Ramesh Karri; James Bradley Wendt; Miodrag Potkonjak; Nathan R. McDonald; Garrett S. Rose; Bryant T. Wysocki

Information security has emerged as an important system and application metric. Classical security solutions use algorithmic mechanisms that address a small subset of emerging security requirements, often at high-energy and performance overhead. Further, emerging side-channel and physical attacks can compromise classical security solutions. Hardware security solutions overcome many of these limitations with less energy and performance overhead. Nanoelectronics-based hardware security preserves these advantages while enabling conceptually new security primitives and applications. This tutorial paper shows how one can develop hardware security primitives by exploiting the unique characteristics such as complex device and system models, bidirectional operation, and nonvolatility of emerging nanoelectronic devices. This paper then explains the security capabilities of several emerging nanoelectronic devices: memristors, resistive random-access memory, contact-resistive random-access memory, phase change memories, spin torque-transfer random-access memory, orthogonal spin transfer random access memory, graphene, carbon nanotubes, silicon nanowire field-effect transistors, and nanoelectronic mechanical switches. Further, the paper describes hardware security primitives for authentication, key generation, data encryption, device identification, digital forensics, tamper detection, and thwarting reverse engineering. Finally, the paper summarizes the outstanding challenges in using emerging nanoelectronic devices for security.


international symposium on nanoscale architectures | 2013

Foundations of memristor based PUF architectures

Garrett S. Rose; Nathan R. McDonald; Lok-Kwong Yan; Bryant T. Wysocki; Karen Xu

Hardware security has emerged as an important field of study aimed at mitigating issues such as piracy, counterfeiting, and side channel attacks. One popular solution for such hardware security attacks are physical unclonable functions (PUF) which provide a hardware specific unique signature or identification. The uniqueness of a PUF depends on intrinsic process variations within individual integrated circuits. As process variations become more prevalent due to technology scaling into the nanometer regime, novel nanoelectronic technologies such as memristors become viable options for improved security in emerging integrated circuits. In this paper, we provide an overview of memristor-based PUF structures and circuits that illustrate the potential for nanoelectronic hardware security solutions.


Applied Physics Letters | 2013

A compact modeling of TiO2-TiO2–x memristor

Lu Zhang; Zhijie Chen; Jianhua Yang; Bryant T. Wysocki; Nathan R. McDonald; Yiran Chen

We developed a SPICE-compatible compact model of TiO2-TiO2– x memristors based on classic ion transportation theory. Our model is shown to simulate important dynamic memristive properties like real-time memristance switching, which are critical in memristor-based analog circuit designs. The model, as well as its analytical approximation, is validated with the experimentally obtained data from real devices. Minor deviations of our model from the measured data are also analyzed and discussed.


asia and south pacific design automation conference | 2013

Hardware security strategies exploiting nanoelectronic circuits

Garrett S. Rose; Jeyavijayan Rajendran; Nathan R. McDonald; Ramesh Karri; Miodrag Potkonjak; Bryant T. Wysocki

Hardware security has emerged as an important field of study aimed at mitigating issues such as piracy, counterfeiting, and side channel attacks. One popular solution for such hardware security attacks are physical unclonable functions (PUF) which provide a hardware specific unique signature or identification. The uniqueness of a PUF depends on intrinsic process variations within individual integrated circuits. As process variations become more prevalent due to technology scaling into the nanometer regime, novel nanoelectronic technologies such as memristors become viable options for improved security in emerging integrated circuits. In this paper, we provide an overview of memristor based PUF structures and circuits that illustrate the potential for nanoelectronic hardware security solutions.


international symposium on neural networks | 2010

Analysis of dynamic linear and non-linear memristor device models for emerging neuromorphic computing hardware design

Nathan R. McDonald; Robinson E. Pino; Peter J. Rozwood; Bryant T. Wysocki

The value memristor devices offer to the neuromorphic computing hardware design community rests on the ability to provide effective device models that can enable large scale integrated computing architecture application simulations. Therefore, it is imperative to develop practical, functional device models of minimum mathematical complexity for fast, reliable, and accurate computing architecture technology design and simulation. To this end, various device models have been proposed in the literature seeking to characterize the physical electronic and time domain behavioral properties of memristor devices. In this work, we analyze some promising and practical non-quasi-static linear and non-linear memristor device models for neuromorphic circuit design and computing architecture simulation.


ACM Journal on Emerging Technologies in Computing Systems | 2015

Spike-Time-Dependent Encoding for Neuromorphic Processors

Chenyuan Zhao; Bryant T. Wysocki; Yifang Liu; Clare Thiem; Nathan R. McDonald; Yang Yi

This article presents our research towards developing novel and fundamental methodologies for data representation using spike-timing-dependent encoding. Time encoding efficiently maps a signals amplitude information into a spike time sequence that represents the input data and offers perfect recovery for band-limited stimuli. In this article, we pattern the neural activities across multiple timescales and encode the sensory information using time-dependent temporal scales. The spike encoding methodologies for autonomous classification of time-series signatures are explored using near-chaotic reservoir computing. The proposed spiking neuron is compact, low power, and robust. A hardware implementation of these results is expected to produce an agile hardware implementation of time encoding as a signal conditioner for dynamical neural processor designs.


Network Science and Cybersecurity | 2014

Nanoelectronics and Hardware Security

Garrett S. Rose; Dhireesha Kudithipudi; Ganesh Khedkar; Nathan R. McDonald; Bryant T. Wysocki; Lok-Kwong Yan

In recent years, the field of nanoelectronics has yielded several nanoscale device families that exhibit the high device densities and energy-efficient operation required for emerging integrated circuit applications. For example, the memristor (or “memory resistor”) is a two-terminal nanoelectronic switch particularly well suited for applications such as high-density reconfigurable computing and neuromorphic hardware. In addition to increased device densities and energy-efficient operation, nanoelectronic systems are also subject to a high degree of variability, often seen as a negative for conventional circuit designs. However, in terms of implementing certain security primitives, variability is a feature that can be harnessed to improve security and trust in integrated circuits. The focus of this chapter is the utilization of nanoelectronic hardware for improved hardware security in emerging nanoelectronic and hybrid CMOS-nanoelectronic processors. Specifically, features such as variability and low power dissipation can be harnessed for side-channel attack mitigation, improved encryption/decryption and anti-tamper design. Furthermore, the novel behavior of nanoelectronic devices can be harnessed for novel computer architectures that are naturally immune to many conventional cyber attacks. For example, chaos computing utilizes chaotic oscillators in the hardware implementation of a computing system such that operations are inherently chaotic and thus difficult to decipher.


IEEE Transactions on Multi-Scale Computing Systems | 2016

Energy Efficient Spiking Temporal Encoder Design for Neuromorphic Computing Systems

Chenyuan Zhao; Bryant T. Wysocki; Clare Thiem; Nathan R. McDonald; Jialing Li; Lingjia Liu; Yang Yi

Neuromorphic computing hardware has undergone a rapid development and progress in the past few years. One of the key components in neuromorphic computing systems is the neural encoder which transforms sensory information into spike trains. In this paper, both rate encoding and temporal encoding schemes are discussed. Two novel temporal encoding schemes, parallel and iteration, are presented. The power consumption of the encoder has been significantly reduced by combing the iteration encoding and low sampling rate in advanced complementary metal-oxide semiconductor (CMOS) nano-technology. Both the simulation and measurement results show the accuracy and efficiency of the proposed encoding circuits. The proposed iteration encoder has immediate applicability as a general purpose input encoder for a reservoir computing system.

Collaboration


Dive into the Nathan R. McDonald's collaboration.

Top Co-Authors

Avatar

Bryant T. Wysocki

Air Force Research Laboratory

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Clare Thiem

Air Force Research Laboratory

View shared research outputs
Top Co-Authors

Avatar

James W. Bohl

Air Force Research Laboratory

View shared research outputs
Top Co-Authors

Avatar

Jeyavijayan Rajendran

University of Texas at Dallas

View shared research outputs
Top Co-Authors

Avatar

Lok-Kwong Yan

Air Force Research Laboratory

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nathaniel C. Cady

State University of New York System

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

S.M. Bishop

State University of New York System

View shared research outputs
Researchain Logo
Decentralizing Knowledge