3. Tunneling in Semiconductors

THIS CHAPTER outlines the theory of quantum-mechanical tunneling in semiconductor devices. Different tunneling mechanisms, such as direct-, FOWLER-NORDHEIM, and trap-assisted tunneling are covered. As a first step, the TSU-ESAKI model is derived. This model allows to distinguish between the supply function, which describes the supply of carriers for tunneling, and the transmission coefficient, which characterizes the penetrability of the considered energy barrier. The supply function depends on the energetic distribution of the carriers, an important quantity in semiconductor device modeling. Models which describe the shape of this distribution function are reviewed, namely the MAXWELLian3.1, heated MAXWELLian, and non-MAXWELLian model.

The transmission coefficient can be found by a solution of SCHRÖDINGER's equation in the considered region. The WENTZEL-KRAMERS-BRILLOUIN- and GUNDLACH-methods, which are frequently encountered in the modeling of tunneling current, are shortly reviewed. However, for the proper simulation of transmission through arbitrary barriers, advanced models must be considered. Emphasis is put on the description of linear- and constant-potential transfer-matrix methods as well as on the quantum transmitting boundary method (QTBM).

The TSU-ESAKI tunneling formula finds the tunneling current density by an integration in the energy domain. In the channel of an inverted MOSFET, however, the strong electric field leads to the creation of bound and quasi-bound states. While bound states do not contribute to the tunneling process, tunneling from quasi-bound states can be understood using the concept of finite life times. Different numerical methods to calculate the life time of a quasi-bound state are reviewed.

The chapter continues with the description of trap-assisted tunneling and discusses some of the most frequently used models. Emphasis is put on the adaption of an inelastic trap-assisted tunneling model which incorporates energy loss by phonon emission and does not rely on the common assumptions of constant capture cross-sections.

Finally, a short summary and a comparison of the described methods is given.


Subsections

A. Gehring: Simulation of Tunneling in Semiconductor Devices