Authentication of embedded devices : technologies, protocols and emerging applications / Basel Halak, editor.
2021
TK7874.58
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Authentication of embedded devices : technologies, protocols and emerging applications / Basel Halak, editor.
ISBN
9783030607692 (electronic bk.)
3030607690 (electronic bk.)
9783030607685
3030607682
3030607690 (electronic bk.)
9783030607685
3030607682
Published
Cham : Springer, [2021]
Language
English
Description
1 online resource (xv, 188 pages) : illustrations (some color)
Item Number
10.1007/978-3-030-60769-2 doi
Call Number
TK7874.58
Dewey Decimal Classification
621.3815
Summary
This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications. The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival. Provides deep insight into the security threats undermining existing integrated circuit authentication techniques; Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems; Offers a comprehensive summary of existing authentication protocols and their limitations; Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption; Includes detailed case studies on the emerging applications of IC authentication schemes.
Note
Includes index.
Access Note
Access limited to authorized users.
Digital File Characteristics
text file
PDF
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed March 12, 2021).
Added Author
Available in Other Form
Print version: 3030607682
Linked Resources
Record Appears in
Table of Contents
Introduction
Integrated Circuit Fingerprinting
Novel PUF designs for device Identification
Authentication Protocols: Standards, limitation and research opportunities
Hardware-based Authentication Protocols for better physical security
Energy Efficient Authentication Protocols
Case study 1: Securing Hardware Supply Chain
Case study 2: GPS spoofing attack detection and survival.
Integrated Circuit Fingerprinting
Novel PUF designs for device Identification
Authentication Protocols: Standards, limitation and research opportunities
Hardware-based Authentication Protocols for better physical security
Energy Efficient Authentication Protocols
Case study 1: Securing Hardware Supply Chain
Case study 2: GPS spoofing attack detection and survival.