000 | a | ||
---|---|---|---|
999 |
_c30295 _d30295 |
||
008 | 210701b xxu||||| |||| 00| 0 eng d | ||
020 | _a9783030607685 | ||
082 |
_a621.3815 _bHAL |
||
100 | _aHalak, Basel ed. | ||
245 | _aAuthentication of embedded devices : technologies, protocols and emerging applications | ||
260 |
_bSpringer, _c2021 _aSwitzerland : |
||
300 |
_axv, 188 p. ; _bill. (some col.), _c25 cm |
||
365 |
_b79.99 _cEUR _d92.90 |
||
504 | _aIncludes index. | ||
520 | _aThis book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications. The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival. Provides deep insight into the security threats undermining existing integrated circuit authentication techniques; Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems; Offers a comprehensive summary of existing authentication protocols and their limitations; Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption; Includes detailed case studies on the emerging applications of IC authentication schemes. | ||
650 | _aElectronic circuits | ||
650 | _aEmbedded computer systems | ||
650 | _aIntegrated circuit Verification | ||
650 | _aMicroprocessors | ||
650 | _aInternet of things | ||
650 | _aASSURE | ||
650 | _aBlockchain | ||
650 | _aCounterfeiting | ||
650 | _a Cryptographic Key Generation | ||
650 | _aDiffie Hellman (ECDH) Experimental Analysis Method | ||
650 | _aDiffie Hellman (ECDH) Experimental Analysis Method | ||
650 | _aGlobal Positioning System (GPS) | ||
650 | _aIC fingerprinting | ||
650 | _aKey Agreement Protocol | ||
650 | _a Memristor device | ||
650 | _aPhysically unclonable functions (PUFs) | ||
650 | _a Secret sharing | ||
650 | _aUnreliable data transport | ||
650 | _aZolertia zoul RE-mote device | ||
942 |
_2ddc _cBK |