Authentication of Embedded Devices

Authentication of Embedded Devices

Basel Halak

80,65 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2022
ISBN:
9783030607715
80,65 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications.The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival.Provides deep insight into the security threats undermining existing integrated circuit authentication techniques;Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems;Offers a comprehensive summary of existing authentication protocols and their limitations;Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption;Includes detailed case studies on the emerging applications of IC authentication schemes.

Artículos relacionados

  • Video Surveillance Techniques and Technologies
    Vesna Zeljkovic
    Security video surveillance systems, such as homeland security and national defense, rely on specific mathematical algorithms in order to run effectively. It is essential for these parameters to be understood in order to design and create a successful system. Video Surveillance Techniques and Technologies presents empirical research and acquired experience on the original solut...
  • Swarm Intelligence for Electric and Electronic Engineering
    With growing developments in artificial intelligence and focus on swarm behaviors; algorithms have been utilized in solving a variety of problems in the field of engineering. This approach has been specifically suited to face the challenges in electric and electronic engineering. Swarm Intelligence for Electric and Electronic Engineering provides an exchange of knowledge on the...
  • Multirate Systems
    Gordana Jovanovic-Dolecek
    ...
  • Advanced Instrument Engineering
    Lay-Ekuakille
    Measurement technologies and instrumentation have a multidisciplinary impact in the field of applied sciences. These engineering technologies are necessary in processing information required for renewable energy, biotechnology, power quality, and nanotechnology. Advanced Instrument Engineering: Measurement, Calibration, and Design presents theoretical and practical aspects on t...
  • Linear Systems Theory
    João P. Hespanha
    A fully updated textbook on linear systems theoryLinear systems theory is the cornerstone of control theory and a well-established discipline that focuses on linear differential equations from the perspective of control and estimation. This updated second edition of Linear Systems Theory covers the subject’s key topics in a unique lecture-style format, making the book easy to ...
  • Instrument Transformers
    P.K. Pattanaik
    "Instrument Transformers" serves as an indispensable guide for electrical engineers and professionals navigating the complexities of measuring high-voltage currents and potentials. In the realm of electrical engineering, direct measurement of voltages and currents in the "kilo" or "mega" range presents significant challenges, not only due to the sheer magnitude of these values ...
    Disponible

    39,10 €

Otros libros del autor

  • Machine Learning for Embedded System Security
    Basel Halak
    This book comprehensively covers the state-of-the-art security applications of machine learning techniques.  The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design...
    Disponible

    123,59 €

  • Machine Learning for Embedded System Security
    Basel Halak
    This book comprehensively covers the state-of-the-art security applications of machine learning techniques.  The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design...
  • Hardware Supply Chain Security
    Basel Halak
    This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new  type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets...
    Disponible

    111,49 €

  • Hardware Supply Chain Security
    Basel Halak
    This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new  type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets...
  • Authentication of Embedded Devices
    Basel Halak
    This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications.The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Co...
  • Ageing of Integrated Circuits
    Basel Halak
    This book provides comprehensive coverage of the latest research into integrated circuits’ ageing, explaining the causes of this phenomenon, describing its effects on electronic systems, and providing mitigation techniques to build ageing-resilient circuits.   ...
    Disponible

    111,52 €