RESUMO
The number of sensor nodes in the Internet of Things is growing rapidly, leading to a large volume of data generated at sensory terminals. Frequent data transfer between the sensors and computing units causes severe limitations on the system performance in terms of energy efficiency, speed, and security. To efficiently process a substantial amount of sensory data, a novel computation paradigm that can integrate computing functions into sensor networks should be developed. The in-sensor computing paradigm reduces data transfer and also decreases the high computing complexity by processing data locally. Here, the hardware implementation of the in-sensor computing paradigm at the device and array levels is discussed. The physical mechanisms that lead to unique sensory response characteristics and their corresponding computing functions are illustrated. In particular, bioinspired device characteristics enable the implementation of the functionalities of neuromorphic computation. The integration technology is also discussed and the perspective on the future development of in-sensor computing is provided.
RESUMO
The prevailing transmission of image information over the Internet of Things demands trustworthy cryptography for high security and privacy. State-of-the-art security modules are usually physically separated from the sensory terminals that capture images, which unavoidably exposes image information to various attacks during the transmission process. Here we develop in-sensor cryptography that enables capturing images and producing security keys in the same hardware devices. The generated key inherently binds to the captured images, which gives rise to highly trustworthy cryptography. Using the intrinsic electronic and optoelectronic characteristics of the 256 molybdenum disulfide phototransistor array, we can harvest electronic and optoelectronic binary keys with a physically unclonable function and further upgrade them into multiple-state ternary and double-binary keys, exhibiting high uniformity, uniqueness, randomness, and coding capacity. This in-sensor cryptography enables highly trustworthy image encryption to avoid passive attacks and image authentication to prevent unauthorized editions.