A Memristor Crossbar-Based XNOR-Net Architecture for Image Recognition
Received: 27 April 2025 | Revised: 9 June 2025 | Accepted: 15 June 2025 | Online: 11 July 2025
Corresponding author: Son Ngoc Truong
Abstract
XNOR-Net, employing the exclusive-NOR operation, has demonstrated a considerable enhancement in inference speed and a reduction in memory requirements for parameter storage. The hardware implementation of XNOR-Net has recently attracted much interest. This study proposes a memristor crossbar architecture to implement XNOR-Net for image recognition. The proposed memristor crossbar-based XNOR-Net consists of an input layer with 784 neurons, two hidden layers, each containing 500 neurons, and an output layer with 10 neurons for 10-digit recognition of MNIST images. The XNOR layer was implemented using a single memristor crossbar along with a constant current-generating circuit. This approach reduces the number of memristors by half, hence alleviating area and power overhead. In particular, in the output layer, all columns are fed into a Winner-Take-All (WTA) circuit to identify the column with the largest current. Therefore, the circuit that generates constant current can be excluded without affecting performance. In this way, the additional circuit can be removed, leading to a reduction in power consumption and area of the neuromorphic circuit. The memristor crossbar-based XNOR-Net showed a recognition rate of 94% on the MNIST dataset, producing correct outputs for input digits 0-9. The proposed memristor crossbar-based XNOR-Net demonstrates the potential for implementing memristor array-based deep network architectures in resource-constrained devices, especially in embedded and edge computing systems.
Keywords:
XNOR-Net, memristor crossbar circuit , neuromorphic computing systemDownloads
References
K. M. Ahmed, R. Shams, F. H. Khan, and M. Á. Luque-Nieto, "Securing Underwater Wireless Sensor Networks: A Review of Attacks and Mitigation Techniques," IEEE Access, vol. 12, pp. 161096–161133, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3490498
S. Jennings et al., "Aquatic food security: insights into challenges and solutions from an analysis of interactions between fisheries, aquaculture, food safety, human health, fish and human welfare, economy and environment," Fish and Fisheries, vol. 17, no. 4, pp. 893–938, 2016. DOI: https://doi.org/10.1111/faf.12152
J. Gladju, B. S. Kamalam, and A. Kanagaraj, "Applications of data mining and machine learning framework in aquaculture and fisheries: A review," Smart Agricultural Technology, vol. 2, Dec. 2022, Art. no. 100061. DOI: https://doi.org/10.1016/j.atech.2022.100061
V. Rao and K. V. Prema, "A review on lightweight cryptography for Internet-of-Things based applications," Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 9, pp. 8835–8857, Sep. 2021. DOI: https://doi.org/10.1007/s12652-020-02672-x
V. A. Thakor, M. A. Razzaque, and M. R. A. Khandaker, "Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities," IEEE Access, vol. 9, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3052867
Amrita, C. P. Ekwueme, I. H. Adam, and A. Dwivedi, "Lightweight Cryptography for Internet of Things: A Review," EAI Endorsed Transactions on Internet of Things, vol. 10, Mar. 2024. DOI: https://doi.org/10.4108/eetiot.5565
J. Soto-Cruz, E. Ruiz-Ibarra, J. Vázquez-Castillo, A. Espinoza-Ruiz, A. Castillo-Atoche, and J. Mass-Sanchez, "A Survey of Efficient Lightweight Cryptography for Power-Constrained Microcontrollers," Technologies, vol. 13, no. 1, Dec. 2024, Art. no. 3. DOI: https://doi.org/10.3390/technologies13010003
S. Aqeel, A. S. Khan, I. A. Abbasi, F. Algarni, and D. Grzonka, "Enhancing IoT security with a DNA-based lightweight cryptography system," Scientific Reports, vol. 15, no. 1, Apr. 2025, Art. no. 13367. DOI: https://doi.org/10.1038/s41598-025-96292-0
A. M. Rasheed and R. M. S. Kumar, "Lightweight Cryptographic Algorithms for Medical IoT Devices using Combined Transformation and Expansion (CTE) and Dynamic Chaotic System," International Journal of Advanced Computer Science and Applications, vol. 15, no. 4, 2024. DOI: https://doi.org/10.14569/IJACSA.2024.0150472
J. Khalid, "Lightweight Cryptography Algorithms for Internet of Things Enabled Networks. A Comparative Study," International Journal of Innovations in Science & Technology, vol. 6, no. 4, pp. 2124–2139, Dec. 2024.
I. El Gaabouri, M. Senhadji, and M. Belkasmi, "A Survey on Lightweight Cryptography Approach For IoT Devices Security," in 2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS), Bandung, Indonesia, Mar. 2022, pp. 1–8. DOI: https://doi.org/10.1109/NISS55057.2022.10085144
I. Makarenko, S. Semushin, S. Suhai, S. M. Ahsan Kazmi, A. Oracevic, and R. Hussain, "A Comparative Analysis of Cryptographic Algorithms in the Internet of Things," in 2020 International Scientific and Technical Conference Modern Computer Network Technologies (MoNeTeC), Oct. 2020, pp. 1–8. DOI: https://doi.org/10.1109/MoNeTeC49726.2020.9258156
S. Maitra and K. Yelamarthi, "Rapidly Deployable IoT Architecture with Data Security: Implementation and Experimental Evaluation," Sensors, vol. 19, no. 11, Jan. 2019. DOI: https://doi.org/10.3390/s19112484
V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar, "A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures," IEEE Access, vol. 7, pp. 82721–82743, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2924045
P. Velmurugan, K. Senthil kumar, S. S. Sridhar, and E. Gotham, "An advanced and effective encryption methodology used for modern IoT security," Materials Today: Proceedings, vol. 81, pp. 389–394, Jan. 2023. DOI: https://doi.org/10.1016/j.matpr.2021.03.424
B. Li, Y. Feng, Z. Xiong, W. Yang, and G. Liu, "Research on AI security enhanced encryption algorithm of autonomous IoT systems," Information Sciences, vol. 575, pp. 379–398, Oct. 2021. DOI: https://doi.org/10.1016/j.ins.2021.06.016
M. A. Khan, M. T. Quasim, N. S. Alghamdi, and M. Y. Khan, "A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data," IEEE Access, vol. 8, pp. 52018–52027, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.2980739
P. Satyanarayana, N. Sriramdas, B. Madhavi, A. M, N. V. Phani Sai Kumar, and V. Gokula Krishnan, "Enhancement of Security in IoT Using Modified AES Algorithm for IoT Applications," in 2023 International Conference on Sustainable Communication Networks and Application (ICSCNA), Theni, India, Nov. 2023, pp. 380–386. DOI: https://doi.org/10.1109/ICSCNA58489.2023.10370606
B. V. Sundaram, M. Ramnath, M. Prasanth, and V. J. Sundaram, "Encryption and hash based security in Internet of Things," in 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN), Chennai, India, Mar. 2015, pp. 1–6. DOI: https://doi.org/10.1109/ICSCN.2015.7219926
J. Cecílio, A. Oliveira de Sá, and A. Souto, "Software-Based Security Framework for Edge and Mobile IoT," Ada Lett., vol. 44, no. 1, pp. 95–99, Sep. 2024. DOI: https://doi.org/10.1145/3706601.3706618
M. Jahangir, M. J. Lee, B. H. Kwan, T. Kamal, T. Y. Chai, and W. S. Loh, "Improved Layered Architecture: Integration of IoT with Blockchain for Increased Security and Scalability," in 2024 5th International Conference on Artificial Intelligence and Data Sciences (AiDAS), Bangkok, Thailand, Sep. 2024, pp. 1–7. DOI: https://doi.org/10.1109/AiDAS63860.2024.10730319
I. Al-Hejri, F. Azzedin, S. Almuhammadi, and M. Eltoweissy, "Lightweight Secure and Scalable Scheme for Data Transmission in the Internet of Things," Arabian Journal for Science and Engineering, vol. 49, no. 9, pp. 12919–12934, Sep. 2024. DOI: https://doi.org/10.1007/s13369-024-08884-z
N. Garcia, E. Hammad, and A. Farraj, "Soft-Trust Based Architecture for NextG IIoT/IoET Security, Authentication and Authorization," in 2023 IEEE Texas Power and Energy Conference (TPEC, Feb. 2023, pp. 1–6. DOI: https://doi.org/10.1109/TPEC56611.2023.10078555
A. H. Al-Omari, "Lightweight Dynamic Crypto Algorithm for Next Internet Generation," Engineering, Technology & Applied Science Research, vol. 9, no. 3, pp. 4203–4208, Jun. 2019. DOI: https://doi.org/10.48084/etasr.2743
V. Srivatsan and V. Pathari, "Design and Development of a Simulation Environment for IoT Devices," in 2022 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES), Thiruvananthapuram, India, Mar. 2022, pp. 207–211. DOI: https://doi.org/10.1109/SPICES52834.2022.9774116
Downloads
How to Cite
License
Copyright (c) 2025 Minh Le, Son Ngoc Truong

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
