1
|
Han Y, Lee S, Lee EK, Yoo H, Jang BC. Strengthening Multi-Factor Authentication Through Physically Unclonable Functions in PVDF-HFP-Phase-Dependent a-IGZO Thin-Film Transistors. Adv Sci (Weinh) 2024:e2309221. [PMID: 38454740 DOI: 10.1002/advs.202309221] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/28/2023] [Revised: 01/14/2024] [Indexed: 03/09/2024]
Abstract
For enhanced security in hardware-based security devices, it is essential to extract various independent characteristics from a single device to generate multiple keys based on specific values. Additionally, the secure destruction of authentication information is crucial for the integrity of the data. Doped amorphous indium gallium zinc oxide (a-IGZO) thin-film transistors (TFTs) using poly(vinylidene fluoride-co-hexafluoropropylene) (PVDF-HFP) induce a dipole doping effect through a phase-transition process, creating physically unclonable function (PUF) devices for secure user information protection. The PUF security key, generated at VGS = 20 V in a 20 × 10 grid, demonstrates uniformity of 42% and inter-Hamming distance (inter-HD) of 49.79% in the β-phase of PVDF-HFP. However, in the γ-phase, the uniformity drops to 22.5%, and inter-HD decreases to 35.74%, indicating potential security key destruction during the phase transition. To enhance security, a multi-factor authentication (MFA) system is integrated, utilizing five security keys extracted from various TFT parameters. The security keys from turn-on voltage (VON ), VGS = 20 V, VGS = 30 V, mobility, and threshold voltage (Vth ) exhibit near-ideal uniformities and inter-HDs, with the highest values of 58% and 51.68%, respectively. The dual security system, combining phase transition and MFA, establishes a robust protection mechanism for privacy-sensitive user information.
Collapse
Affiliation(s)
- Youngmin Han
- Department of Electronic Engineering Gachon University, 1342 Seongnam-daero, Seongnam, 13120, South Korea
| | - Subin Lee
- Department of Electronic Engineering Gachon University, 1342 Seongnam-daero, Seongnam, 13120, South Korea
| | - Eun Kwang Lee
- Department of Chemical Engineering, Pukyong National University, Busan, 48513, South Korea
| | - Hocheon Yoo
- Department of Electronic Engineering Gachon University, 1342 Seongnam-daero, Seongnam, 13120, South Korea
| | - Byung Chul Jang
- School of Electronics Engineering, Kyungpook National University, 80 Daehakro, Bukgu, Daegu, 41566, Republic of Korea
- School of Electronics and Electrical Engineering, Kyungpook National University, 80 Daehakro, Bukgu, Daegu, 41566, Republic of Korea
| |
Collapse
|
2
|
Cruz DB, Almeida JR, Silva JM, Oliveira JL. A Reliable and Secure Method for Sharing Genomic Data. Stud Health Technol Inform 2023; 302:1071-1072. [PMID: 37203584 DOI: 10.3233/shti230350] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 05/20/2023]
Abstract
Genomics has significantly impacted the field of medicine, with advances in DNA sequencing leading to personalized medicine and a deeper understanding of the genomic basis of various diseases. The ability to share genomic data is crucial for advancing this field and developing new approaches to understanding the genome. However, the sensitive nature of this data requires secure methods for protecting it during storage and transfer. In this paper, we present a new tool for the secure encryption and decryption of FASTA files without sharing a common secret and with a reduced number of shared keys between the pairs. Our proposal combines symmetric and asymmetric encryption techniques, including the AES (Advanced Encryption Standard) cypher and RSA (Rivest-Shamir-Adleman). The tool is fast, reliable, and secure, outperforming existing tools in terms of security and ease of use. This makes it a valuable solution for the secure sharing and use of sensitive genomic data, representing a significant advancement in the field of genomics.
Collapse
Affiliation(s)
- Dinis B Cruz
- DETI/IEETA, LASI, University of Aveiro, Portugal
| | - João R Almeida
- DETI/IEETA, LASI, University of Aveiro, Portugal
- Department of Computation, University of A Coruña, Spain
| | | | | |
Collapse
|
3
|
Hazzazi MM, Attuluri S, Bassfar Z, Joshi K. A Novel Cipher-Based Data Encryption with Galois Field Theory. Sensors (Basel) 2023; 23:3287. [PMID: 36991997 PMCID: PMC10059044 DOI: 10.3390/s23063287] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 02/05/2023] [Revised: 02/26/2023] [Accepted: 03/10/2023] [Indexed: 06/19/2023]
Abstract
Both the act of keeping information secret and the research on how to achieve it are included in the broad category of cryptography. When people refer to "information security," they are referring to the study and use of methods that make data transfers harder to intercept. When we talk about "information security," this is what we have in mind. Using private keys to encrypt and decode messages is a part of this procedure. Because of its vital role in modern information theory, computer security, and engineering, cryptography is now considered to be a branch of both mathematics and computer science. Because of its mathematical properties, the Galois field may be used to encrypt and decode information, making it relevant to the subject of cryptography. The ability to encrypt and decode information is one such use. In this case, the data may be encoded as a Galois vector, and the scrambling process could include the application of mathematical operations that involve an inverse. While this method is unsafe when used on its own, it forms the foundation for secure symmetric algorithms like AES and DES when combined with other bit shuffling methods. A two-by-two encryption matrix is used to protect the two data streams, each of which contains 25 bits of binary information which is included in the proposed work. Each cell in the matrix represents an irreducible polynomial of degree 6. Fine-tuning the values of the bits that make up each of the two 25-bit binary data streams using the Discrete Cosine Transform (DCT) with the Advanced Encryption Standard (AES) Method yields two polynomials of degree 6. Optimization is carried out using the Black Widow Optimization technique is used to tune the key generation in the cryptographic processing. By doing so, we can produce two polynomials of the same degree, which was our original aim. Users may also use cryptography to look for signs of tampering, such as whether a hacker obtained unauthorized access to a patient's medical records and made any changes to them. Cryptography also allows people to look for signs of tampering with data. Indeed, this is another use of cryptography. It also has the added value of allowing users to check for indications of data manipulation. Users may also positively identify faraway people and objects, which is especially useful for verifying a document's authenticity since it lessens the possibility that it was fabricated. The proposed work achieves higher accuracy of 97.24%, higher throughput of 93.47%, and a minimum decryption time of 0.0047 s.
Collapse
Affiliation(s)
- Mohammad Mazyad Hazzazi
- Department of Mathematics, College of Science, King Khalid University, Abha 61413, Saudi Arabia
| | - Sasidhar Attuluri
- Software Developer Applications, 671 E Royal Ln, APT 1074, Irving, TX 75039, USA
| | - Zaid Bassfar
- Department of Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia
| | - Kireet Joshi
- Department of CSE, Graphic Era Deemed to be University, Dehradun 248002, India
| |
Collapse
|
4
|
Abu Al-Atta M, Said KA, Mohamed MA, Raslan W. Physical-Layer Security in Power-Domain NOMA Based on Different Chaotic Maps. Entropy (Basel) 2023; 25:140. [PMID: 36673282 PMCID: PMC9858096 DOI: 10.3390/e25010140] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/17/2022] [Revised: 01/04/2023] [Accepted: 01/06/2023] [Indexed: 06/17/2023]
Abstract
Nonorthogonal multiple access (NOMA) is a relevant technology for realizing the primary goals of next-generation wireless networks, such as high connectivity and stability. Because a rising number of users are becoming connected, user data security has become a critical issue. Many chaotic communication systems have been established to address this important issue via exhibition of affordable physical-layer-security solutions. In this study, we propose a chaotic downlink NOMA (C-DL-NOMA) system over the additive white Gaussian noise and Rayleigh-fading channels to enhance the security of the DL-NOMA system. The proposed algorithm is based on a coherent analog modulation technique that combines various chaotic maps for chaotic masking of encrypted data. On the transmitter, chaotic encryption was used for transmitted data with fixed power-allocation-level control, whereas on the receiver, successive interference-cancellation demodulation was utilized to detect multiple users, after which chaotic decryption was performed. Simulation results were evaluated based on security analyses, such as statistical analysis (histogram and correlation analyses and information entropy), bit-error-rate performance, and achievable-data-rate performance. According to these security analyses and numerical results, the proposed C-DL-NOMA system outperformed traditional unencrypted NOMA systems.
Collapse
Affiliation(s)
- Mariam Abu Al-Atta
- Electronics and Communications Department, Faculty of Engineering, Delta University for Science and Technology, Gamsaa 35712, Egypt
| | - Karim A. Said
- Electronics and Communication Engineering Department, Faculty of Engineering, Mansoura University, Mansoura 35516, Egypt
| | - Mohamed A. Mohamed
- Electronics and Communication Engineering Department, Faculty of Engineering, Mansoura University, Mansoura 35516, Egypt
| | - Walid Raslan
- Electronics and Communications Department, Faculty of Engineering, Delta University for Science and Technology, Gamsaa 35712, Egypt
| |
Collapse
|
5
|
Garg D, Rani S, Herencsar N, Verma S, Wozniak M, Ijaz MF. Hybrid Technique for Cyber-Physical Security in Cloud-Based Smart Industries. Sensors (Basel) 2022; 22:s22124630. [PMID: 35746411 PMCID: PMC9228625 DOI: 10.3390/s22124630] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/26/2022] [Revised: 06/10/2022] [Accepted: 06/15/2022] [Indexed: 12/04/2022]
Abstract
New technologies and trends in industries have opened up ways for distributed establishment of Cyber-Physical Systems (CPSs) for smart industries. CPSs are largely based upon Internet of Things (IoT) because of data storage on cloud servers which poses many constraints due to the heterogeneous nature of devices involved in communication. Among other challenges, security is the most daunting challenge that contributes, at least in part, to the impeded momentum of the CPS realization. Designers assume that CPSs are themselves protected as they cannot be accessed from external networks. However, these days, CPSs have combined parts of the cyber world and also the physical layer. Therefore, cyber security problems are large for commercial CPSs because the systems move with one another and conjointly with physical surroundings, i.e., Complex Industrial Applications (CIA). Therefore, in this paper, a novel data security algorithm Dynamic Hybrid Secured Encryption Technique (DHSE) is proposed based on the hybrid encryption scheme of Advanced Encryption Standard (AES), Identity-Based Encryption (IBE) and Attribute-Based Encryption (ABE). The proposed algorithm divides the data into three categories, i.e., less sensitive, mid-sensitive and high sensitive. The data is distributed by forming the named-data packets (NDPs) via labelling the names. One can choose the number of rounds depending on the actual size of a key; it is necessary to perform a minimum of 10 rounds for 128-bit keys in DHSE. The average encryption time taken by AES (Advanced Encryption Standard), IBE (Identity-based encryption) and ABE (Attribute-Based Encryption) is 3.25 ms, 2.18 ms and 2.39 ms, respectively. Whereas the average time taken by the DHSE encryption algorithm is 2.07 ms which is very much less when compared to other algorithms. Similarly, the average decryption times taken by AES, IBE and ABE are 1.77 ms, 1.09 ms and 1.20 ms and the average times taken by the DHSE decryption algorithms are 1.07 ms, which is very much less when compared to other algorithms. The analysis shows that the framework is well designed and provides confidentiality of data with minimum encryption and decryption time. Therefore, the proposed approach is well suited for CPS-IoT.
Collapse
Affiliation(s)
- Deepak Garg
- Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura 140401, Punjab, India; (D.G.); (S.R.)
| | - Shalli Rani
- Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura 140401, Punjab, India; (D.G.); (S.R.)
| | - Norbert Herencsar
- Department of Telecommunications, Faculty of Electrical Engineering and Communication, Brno University of Technology, Technicka 12, 616 00 Brno, Czech Republic;
| | - Sahil Verma
- Department of Computer Science and Engineering, Chandigarh University, Mohali 140055, Punjab, India;
| | - Marcin Wozniak
- Faculty of Applied Mathematics, Silesian University of Technology, 44-100 Gliwice, Poland
- Correspondence: (M.W.); (M.F.I.)
| | - Muhammad Fazal Ijaz
- Department of Intelligent Mechatronics Engineering, Sejong University, Seoul 05006, Korea
- Correspondence: (M.W.); (M.F.I.)
| |
Collapse
|
6
|
Kanwal S, Inam S, Othman MTB, Waqar A, Ibrahim M, Nawaz F, Nawaz Z, Hamam H. An Effective Color Image Encryption Based on Henon Map, Tent Chaotic Map, and Orthogonal Matrices. Sensors (Basel) 2022; 22:4359. [PMID: 35746137 DOI: 10.3390/s22124359] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/21/2022] [Revised: 04/04/2022] [Accepted: 04/20/2022] [Indexed: 02/05/2023]
Abstract
In the last decade, the communication of images through the internet has increased. Due to the growing demands for data transfer through images, protection of data and safe communication is very important. For this purpose, many encryption techniques have been designed and developed. New and secured encryption schemes based on chaos theory have introduced methods for secure as well as fast communication. A modified image encryption process is proposed in this work with chaotic maps and orthogonal matrix in Hill cipher. Image encryption involves three phases. In the first phase, a chaotic Henon map is used for permuting the digital image. In the second phase, a Hill cipher is used whose encryption key is generated by an orthogonal matrix which further is produced from the equation of the plane. In the third phase, a sequence is generated by a chaotic tent map which is later XORed. Chaotic maps play an important role in the encryption process. To deal with the issues of fast and highly secured image processing, the prominent properties of non-periodical movement and non-convergence of chaotic theory play an important role. The proposed scheme is resistant to different attacks on the cipher image. Different tests have been applied to evaluate the proposed technique. The results of the tests such as key space analysis, key sensitivity analysis, and information entropy, histogram correlation of the adjacent pixels, number of pixel change rate (NPCR), peak signal to noise ratio (PSNR), and unified average changing intensity (UCAI) showed that our proposed scheme is an efficient encryption technique. The proposed approach is also compared with some state-of-the-art image encryption techniques. In the view of statistical analysis, we claim that our proposed encryption algorithm is secured.
Collapse
|
7
|
Gupta R, Pachauri R, Singh AK. Image Encryption Method Using New Concept of Compound Blood Transfusion Rule with Multiple Chaotic Maps. Curr Med Imaging 2020; 16:1034-1043. [PMID: 33081664 DOI: 10.2174/1573405615666190101110751] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/11/2018] [Revised: 11/20/2018] [Accepted: 12/13/2018] [Indexed: 11/22/2022]
Abstract
INTRODUCTION With the advancement in internet technology, a large amount of information in the form of data and image is transferred from one end to the other. The information may be military, defense, medical, etc. which should be kept confidential by providing security. OBJECTIVE The aim of this article will be to provide security to the image. This is achieved by applying the image encryption method which converts the original information into an unreadable format. METHODS This work explores an efficient way of image encryption using a chaotic logistic function. A set of two chaotic logistic functions and 256 bit long external secret key are employed to enhance the security in the encrypted images. The initial condition of first logistic function has been obtained by providing the suitable weights to all bits of the secret key. The initial condition of second logistic function has been derived from the first chaotic logistic function. In this proposed algorithm, ten different operations are used to encrypt the pixel of an image. The outcome of the second logistic map decides the operation to be used in the encryption of the particular image pixel. RESULTS Various statistical parameters like NPCR, UACI and information entropy were calculated. CONCLUSION Results show that the proposed algorithm provides an image encryption method with better security and efficiency for all real-time applications such as medical images.
Collapse
Affiliation(s)
- Ranu Gupta
- Department of Electronics and Communication, Jaypee University of Engineering and Technology, Raghogarh, Guna
(M.P.) 473226, India,Department of Electronics and Communication, Thapar Institute of Engineering and Technology University, Patiala, 147004, India
| | - Rahul Pachauri
- Department of Electronics and Communication, Thapar Institute of Engineering and Technology University, Patiala, 147004, India
| | - Ashutosh Kumar Singh
- Department of Electronics and Communication, Jaypee University of Engineering and Technology, Raghogarh, Guna
(M.P.) 473226, India
| |
Collapse
|
8
|
Jia L, Zhang B, Xu J, Zhu T, Chen R, Zhou F. Chameleon Luminophore for Erasable Encrypted and Decrypted Devices: From Dual-Channel, Programmable, Smart Sensory Lanthanide Hydrogel to Logic Devices. ACS Appl Mater Interfaces 2020; 12:19955-19964. [PMID: 32252519 DOI: 10.1021/acsami.0c03219] [Citation(s) in RCA: 20] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Abstract
With the rapid development of the data security technology, increasing attention has been paid to programmable memory materials with desirable security. However, most conventional memory devices only have a single switchable color state. In this research, a kind of pH-responsive Chameleon luminescent sensor (Lap@Eu-OFX, Lap = laponite, OFX = ofloxacin) based on lanthanide doping has been fabricated, which can realize highly contrast, dynamically controlled full-color display by changing the pH value of the solution. The advanced programmable security inks, including the green and red luminescent inks, have been prepared and used to protect confidential information. More interestingly, triethylamine and hydrochloric acid are selected as encryption and decryption reagents, which can repeatedly switch the emission color of important data. Hence, the high-tech security inks show great potential in data coding, multiencryption, and decryption under UV light. Furthermore, the designed dual-channel memory device, Lap@Eu-OFX@CS (CS = Chitosan), enables reversible synchronous switching of sol-gel and emission color when converting from acid to base conditions. This can be dynamically monitored by a subsequent logic gate system and can be converted and stored into binary values. This work provides an effective approach for the design and promising application of information encryptor, smart monitor, and circuit controllers.
Collapse
Affiliation(s)
- Lei Jia
- College of Chemistry and Chemical Engineering, Henan Polytechnic University, Jiaozuo, Henan 454000, P. R. China
| | - Beibei Zhang
- College of Chemistry and Chemical Engineering, Henan Polytechnic University, Jiaozuo, Henan 454000, P. R. China
| | - Jun Xu
- College of Chemistry and Chemical Engineering, Henan Polytechnic University, Jiaozuo, Henan 454000, P. R. China
| | - Tinghui Zhu
- College of Chemistry and Chemical Engineering, Henan Polytechnic University, Jiaozuo, Henan 454000, P. R. China
| | - Rujie Chen
- College of Chemistry and Chemical Engineering, Henan Polytechnic University, Jiaozuo, Henan 454000, P. R. China
| | - Feng Zhou
- State Key Laboratory of Solid Lubrication, Lanzhou Institute of Chemical Physics, Chinese Academy of Sciences, Lanzhou 730000, P. R. China
| |
Collapse
|
9
|
ElKamchouchi DH, Mohamed HG, Moussa KH. A Bijective Image Encryption System Based on Hybrid Chaotic Map Diffusion and DNA Confusion. Entropy (Basel) 2020; 22:E180. [PMID: 33285955 DOI: 10.3390/e22020180] [Citation(s) in RCA: 15] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/31/2019] [Revised: 01/26/2020] [Accepted: 02/02/2020] [Indexed: 11/17/2022]
Abstract
Modern multimedia communications technology requirements have raised security standards, which allows for enormous development in security standards. This article presents an innovative symmetric cryptosystem that depends on the hybrid chaotic Lorenz diffusion stage and DNA confusion stage. It involves two identical encryption and decryption algorithms, which simplifies the implementation of transmitting and receiving schemes of images securely as a bijective system. Both schemes utilize two distinctive non-consecutive chaotic diffusion stages and one DNA scrambling stage in between. The generation of the coded secret bit stream employs a hybrid chaotic system, which is employed to encrypt or decrypt the transmitted image and is utilized in the diffusion process to dissipate the redundancy in the original transmitted image statistics. The transmitted image is divided into eight scrambled matrices according to the position of the pixel in every splitting matrix. Each binary matrix is converted using a different conversion rule in the Watson–Crick rules. The DNA confusion stage is applied to increase the complexity of the correlation between the transmitted image and the utilized key. These stages allow the proposed image encryption scheme to be more robust against chosen/known plaintext attacks, differential attacks, cipher image attacks, and information entropy. The system was revealed to be more sensitive against minimal change in the generated secret key. The analysis proves that the system has superior statistical properties, bulkier key space, better plain text sensitivity, and improved key sensitivity compared with former schemes.
Collapse
|
10
|
Mohamed HG, ElKamchouchi DH, Moussa KH. A Novel Color Image Encryption Algorithm Based on Hyperchaotic Maps and Mitochondrial DNA Sequences. Entropy (Basel) 2020; 22:E158. [PMID: 33285933 DOI: 10.3390/e22020158] [Citation(s) in RCA: 20] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/04/2020] [Revised: 01/25/2020] [Accepted: 01/27/2020] [Indexed: 11/29/2022]
Abstract
Multimedia encryption innovation is one of the primary ways of securely and privately guaranteeing the security of media transmission. There are many advantages when utilizing the attributes of chaos, for example, arbitrariness, consistency, ergodicity, and initial condition affectability, for any covert multimedia transmission. Additionally, many more benefits can be introduced with the exceptional space compliance, unique information, and processing capability of real mitochondrial deoxyribonucleic acid (mtDNA). In this article, color image encryption employs a confusion process based on a hybrid chaotic map, first to split each channel of color images into n-clusters; then to create global shuffling over the whole image; and finally, to apply intrapixel shuffling in each cluster, which results in very disordered pixels in the encrypted image. Then, it utilizes the rationale of human mitochondrial genome mtDNA to diffuse the previously confused pixel values. Hypothetical examination and trial results demonstrate that the anticipated scheme exhibits outstanding encryption, as well as successfully opposes chosen/known plain text, statistical, and differential attacks.
Collapse
|
11
|
Belhassen J, Zalevsky Z, Karsenty A. Optical Polarization Sensitive Ultra-Fast Switching and Photo-Electrical Device. Nanomaterials (Basel) 2019; 9:E1743. [PMID: 31817888 PMCID: PMC6956343 DOI: 10.3390/nano9121743] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/30/2019] [Revised: 12/02/2019] [Accepted: 12/03/2019] [Indexed: 11/16/2022]
Abstract
Ultra-fast electrical switches activated with an optical-polarized light trigger, also called photo-polarized activated electrical switches, are presented. A set of new transistor circuits is switched by light from above, illuminating deep V-grooves, whose angle is sensitive to the polarization of the incident. Thus, this application may serve for encryption/decryption devices since the strongest electrical responsivity is only obtained for very specific spatial polarization directions of the illumination beam. When this V-groove is sufficiently narrow, the device mainly responds to one polarization and not to the other. In such a way, electrons are generated only for one specific polarization. While the nature of the data remains electronic, the modulation control is optic, creating a photo-induced current depending on the polarization direction. This coupled device acts as a polarization modulator as well as an intensity modulator. The article focuses on the integration of several devices in different configurations of circuitry: dual, triple, and multi-element. Case studies of several adjacent devices are presented with varying critical variables, such as the V-groove aperture dimensions. Analytical models and complementary numerical analyses are presented for the future smooth integration into Complementary Metal-Oxide-Semiconductor (CMOS) technology.
Collapse
Affiliation(s)
- Jérémy Belhassen
- Grenoble Institute of Technology (Grenoble INP), Photonics and Semiconductors Section, Grenoble-Alpes University (UGA), 38400 Saint-Martin-d’Hères, France;
- Advanced Laboratory of Electro-Optics (ALEO), Department of Applied Physics/Electro-Optics Engineering, Faculty of Engineering, Lev Academic Center, Jerusalem 9116001, Israel
| | - Zeev Zalevsky
- Faculty of Engineering, Bar-Ilan University, Ramat Gan 52900, Israel;
- The Nanotechnology Center, Bar-Ilan University, Ramat Gan 52900, Israel
| | - Avi Karsenty
- Advanced Laboratory of Electro-Optics (ALEO), Department of Applied Physics/Electro-Optics Engineering, Faculty of Engineering, Lev Academic Center, Jerusalem 9116001, Israel
- The Nanotechnology Center for Education and Research, Lev Academic Center, Jerusalem 911600, Israel
| |
Collapse
|
12
|
Abstract
Tissue factor (TF) is a transmembrane cofactor that binds and promotes the catalytic activity of factor (F) VIIa. The TF/VIIa complex activates FX by limited proteolysis to initiate blood coagulation and helps provide the thrombin burst that is important for a stable thrombus. TF is present both in the extravascular compartment, where it functions as a hemostatic envelope, and the intravascular compartment, where it contributes to thrombus formation, particularly when endothelial disruption is minimal. The regulation of its cofactor function appears to differ in the two compartments. Intravascular TF derives predominately from leucocytes, with either monocytes or neutrophils implicated in different models of thrombosis. This TF exists mostly in a non-coagulant or cryptic form and acute events lead to local decryption of TF and FX activation. A variety of experimental observations imply that decryption of leucocyte surface TF involves both a dithiol/disulfide switch and exposure of phosphatidylserine. The dithiol/disulfide switch appears to involve the Cys186-Cys209 disulfide bond in the membrane-proximal domain of TF, although this has not been demonstrated in vivo. Activation of a purinergic receptor or complement has recently been observed to decrypt TF on myeloid cells and a dithiol/disulfide switch and the oxidoreductase, protein disulfide isomerase, have been implicated in both systems. The molecular mechanism of action of protein disulfide isomerase in TF encryption/decryption, though, remains to be determined.
Collapse
Affiliation(s)
- V M Chen
- Lowy Cancer Research Centre and Prince of Wales Clinical School, University of New South Wales, Sydney, NSW, Australia
| | | |
Collapse
|
13
|
Abstract
Tissue factor (TF) is a transmembrane glycoprotein and an essential component of the factor VIIa-TF enzymatic complex that triggers activation of the coagulation cascade. Formation of TF-FVIIa complexes on cell surfaces not only trigger the coagulation cascade but also transduce cell signaling via activation of protease-activated receptors. Tissue factor is expressed constitutively on cell surfaces of a variety of extravascular cell types, including fibroblasts and pericytes in and surrounding blood vessel walls and epithelial cells, but is generally absent on cells that come into contact with blood directly. However, TF expression could be induced in some blood cells, such as monocytes and endothelial cells, following an injury or pathological stimuli. Tissue factor is essential for hemostasis, but aberrant expression of TF leads to thrombosis. Therefore, a proper regulation of TF activity is critical for the maintenance of hemostatic balance and health in general. TF-FVIIa coagulant activity at the cell surface is influenced not only by TF protein expression levels but also independently by a variety of mechanisms, including alterations in membrane phospholipid composition and cholesterol content, thiol-dependent modifications of TF allosteric disulfide bonds, and other post-translational modifications of TF. In this article, we critically review the key literature on mechanisms by which TF coagulant activity is regulated at the cell surface in the absence of changes in TF protein levels with specific emphasis on recently published data and provide the authors' perspective on the subject.
Collapse
Affiliation(s)
- L V M Rao
- Department of Cellular and Molecular Biology, Center for Biomedical Research, The University of Texas Health Science Center, Tyler, TX, USA
| | | |
Collapse
|