000 03745nam a22005295i 4500
001 978-3-030-60769-2
003 DE-He213
005 20220801220134.0
007 cr nn 008mamaa
008 210122s2021 sz | s |||| 0|eng d
020 _a9783030607692
_9978-3-030-60769-2
024 7 _a10.1007/978-3-030-60769-2
_2doi
050 4 _aTK7867-7867.5
072 7 _aTJFC
_2bicssc
072 7 _aTEC008010
_2bisacsh
072 7 _aTJFC
_2thema
082 0 4 _a621.3815
_223
245 1 0 _aAuthentication of Embedded Devices
_h[electronic resource] :
_bTechnologies, Protocols and Emerging Applications /
_cedited by Basel Halak.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aXV, 188 p. 74 illus., 36 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aIntroduction -- Integrated Circuit Fingerprinting -- Novel PUF designs for device Identification -- Authentication Protocols: Standards, limitation and research opportunities -- Hardware-based Authentication Protocols for better physical security -- Energy Efficient Authentication Protocols -- Case study 1: Securing Hardware Supply Chain -- Case study 2: GPS spoofing attack detection and survival.
520 _aThis book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications. The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival. Provides deep insight into the security threats undermining existing integrated circuit authentication techniques; Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems; Offers a comprehensive summary of existing authentication protocols and their limitations; Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption; Includes detailed case studies on the emerging applications of IC authentication schemes.
650 0 _aElectronic circuits.
_919581
650 0 _aCooperating objects (Computer systems).
_96195
650 0 _aMicroprocessors.
_948567
650 0 _aComputer architecture.
_93513
650 1 4 _aElectronic Circuits and Systems.
_948568
650 2 4 _aCyber-Physical Systems.
_932475
650 2 4 _aProcessor Architectures.
_948569
700 1 _aHalak, Basel.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_948570
710 2 _aSpringerLink (Online service)
_948571
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030607685
776 0 8 _iPrinted edition:
_z9783030607708
776 0 8 _iPrinted edition:
_z9783030607715
856 4 0 _uhttps://doi.org/10.1007/978-3-030-60769-2
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c78245
_d78245