

The recent research progress of bio-inspired radiative cooling is also presented. We also summarize the various mechanisms of radiative cooling in the biological systems and the optimization of such cooling structures. The biological systems achieve their regulations of radiative cooling through controlling the materials, microstructures and behaviors in the systems, which also provide inspiration for us to explore new radiative cooling materials and devices. First of all, the basic principle of radiative cooling and the radiative cooling within the natural biological systems are introduced in this review. Compared with the traditional active cooling technologies such as absorption-based cooling and compression-based cooling, the radiative cooling offers unique advantages, which are of great significance in environmental protection and energy utilization.

We further demonstrate the feasibility of the physical unclonable functions in two modes: authentication and data encryption.Īs a new type of cooling technology, radiative cooling achieves temperature reduction through spectral regulation.
#COMET MOTH PORTABLE#
Using these properties, we implement a lens-free, optical, and portable physical unclonable function with silk identification cards and study its characteristics and reliability in a systemic manner. The silk-based physical unclonable function has a self-focusing, low-cost, and eco-friendly feature without relying on pre-/post-process for security tag creation. Randomly distributed fibers in silk generate spatially chaotic diffractions, forming self-focused spots on the millimeter scale.

Surprisingly, native silk, which has been commonly utilized in everyday life as textiles, can be applied as a unique tag material, thereby removing the necessary apparatus for optical physical unclonable functions, such as an objective lens or a coherent light source. One emerging method for guaranteeing digital security is to take advantage of a physical unclonable function. For modern security, devices, individuals, and communications require unprecedentedly unique identifiers and cryptographic keys.
