Seamless Bio Electronic Devices

Life has always played by its own set of molecular rules. From the biochemistry behind the first cells, evolution has constructed wonders like hard bone, rough bark and plant enzymes that harvest light to make food.

But our tools for manipulating life, to treat disease, repair damaged tissue and replace lost limbs, come from the nonliving realm: metals, plastics and the like. 

Though these save and preserve lives, our synthetic treatments are rooted in a chemical language ill-suited to our organic elegance. Implanted electrodes scar, wires overheat and our bodies struggle against ill-fitting pumps, pipes or valves.

A solution lies in bridging this gap where artificial meets biological, harnessing biological rules to exchange information between the biochemistry of our bodies and the chemistry of our devices. In a paper published in Scientific Reports, engineers at the University of Washington (UW) unveiled peptides, small proteins which carry out countless essential tasks in our cells, that can provide just such a link.

The team, led by Professor Mehmet Sarikaya in the Departments of Materials Science & Engineering, shows how a genetically engineered peptide can assemble into nanowires atop 2-D, solid surfaces that are just a single layer of atoms thick. 

These nanowire assemblages are critical because the peptides relay information across the bio/nano interface through molecular recognition, the same principles that underlie biochemical interactions such as an antibody binding to its specific antigen or protein binding to DNA.

Since this communication is two-way, with peptides understanding the “language” of technology and vice versa, their approach essentially enables a coherent bio-electronic interface.

“Bridging this divide would be the key to building the genetically engineered biomolecular solid-state devices of the future,” said Sarikaya, who is also a professor of chemical engineering and oral health sciences.

To Sarikaya, the biochemical “language” of life is a logical emulation. “Nature must constantly make materials to do many of the same tasks we seek,” he said.

The UW team wants to find genetically engineered peptides with specific chemical and structural properties. They sought out a peptide that could interact with materials such as gold, titanium and even a mineral in bone and teeth. These could all form the basis of future biomedical and electro-optical devices. 

Their ideal peptide should also change the physical properties of synthetic materials and respond to that change. That way, it would transmit “information” from the synthetic material to other biomolecules, bridging the chemical divide between biology and technology.

In exploring the properties of 80 genetically selected peptides, which are not found in nature but have the same chemical components of all proteins, they discovered that one showed promising interactions with the semimetal graphene. Sarikaya said, “These could serve as the metals or semiconductors of the future.”

“In a way, we’re at the flood gates,” said Sarikaya. “Now we need to explore the basic properties of this bridge and how we can modify it to permit the flow of ‘information’ from electronic and photonic devices to biological systems.”

University of Washington:             Biometric Security: From A Selfie To the Way You Walk:

 

« The Digital Transformation Of The Humanitarian Sector
Russia Waging Cyberwar On Ukraine »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Threatpost

Threatpost

Threatpost, is an independent news site which is a leading source of information about IT and business security.

Cyber adAPT

Cyber adAPT

Cyber adAPT offers a leading network threat detection platform (NTD) to the enterprise and ODM/OEM markets.

Zimperium

Zimperium

Zimperium offers enterprise class protection for mobile devices against the next generation of advanced mobile attacks.

Operational Center for Information Systems Security (COSSI)

Operational Center for Information Systems Security (COSSI)

COSSI is responsible for the detection and mitigation of cyber attacks directed at French Government information systems.

Sensible Vision

Sensible Vision

SensibleVision helps organizations transparently protect data and prevent costly security breaches by constantly verifying the identities of people who use computers or mobile devices.

Signal Sciences

Signal Sciences

Signal Sciences Web Protection Platform (WPP) provides comprehensive threat protection and security visibility for web applications, microservices, and APIs on any platform.

Computest

Computest

Computest security testing services include Mobile app security, Vulnerability assessments, Attack & penetration testing, Security awareness training, Network security assessments.

SK IT Cyber Security

SK IT Cyber Security

SK IT provide services and solutions for cybersecurity and advanced information system engineering.

Fraugster

Fraugster

Fraugster provides the most precise anti-fraud solution for e-commerce businesses.

Carbonite

Carbonite

Carbonite offers all the tools necessary for protecting data from the most common forms of data loss, including ransomware, accidental deletions, hardware failures and natural disasters.

Hut Six Security

Hut Six Security

Train, test and track your Information Security culture through information security awareness training and customised phishing simulation campaigns.

Enet 1 Group1

Enet 1 Group1

Enet 1 Group audits, assesses, recommends, and delivers tested solutions for the ever-increasing threats to your critical systems and digital assets

Anthony Timbers LLC

Anthony Timbers LLC

Anthony Timbers is a cybersecurity consulting and penetration testing firm providing services to the Federal and Commercial sectors nationwide.

Appsian Security

Appsian Security

Appsian provides powerful solutions that help organizations take control of their business critical data and financial transactions.

Saporo

Saporo

Saporo helps organizations increase their cyber-resistance. Continuously map your attack surface and get the recommendations you need to make your organization more resistant to attacks.

Infinipoint

Infinipoint

Infinipoint pioneers the first Device-Identity-as-a-Service (DIaaS) solution, addressing Zero Trust device access and enabling enterprises of all sizes to automate cyber hygiene.