000 | 03745nam a22005295i 4500 | ||
---|---|---|---|
001 | 978-3-030-60769-2 | ||
003 | DE-He213 | ||
005 | 20220801220134.0 | ||
007 | cr nn 008mamaa | ||
008 | 210122s2021 sz | s |||| 0|eng d | ||
020 |
_a9783030607692 _9978-3-030-60769-2 |
||
024 | 7 |
_a10.1007/978-3-030-60769-2 _2doi |
|
050 | 4 | _aTK7867-7867.5 | |
072 | 7 |
_aTJFC _2bicssc |
|
072 | 7 |
_aTEC008010 _2bisacsh |
|
072 | 7 |
_aTJFC _2thema |
|
082 | 0 | 4 |
_a621.3815 _223 |
245 | 1 | 0 |
_aAuthentication of Embedded Devices _h[electronic resource] : _bTechnologies, Protocols and Emerging Applications / _cedited by Basel Halak. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2021. |
|
300 |
_aXV, 188 p. 74 illus., 36 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aIntroduction -- Integrated Circuit Fingerprinting -- Novel PUF designs for device Identification -- Authentication Protocols: Standards, limitation and research opportunities -- Hardware-based Authentication Protocols for better physical security -- Energy Efficient Authentication Protocols -- Case study 1: Securing Hardware Supply Chain -- Case study 2: GPS spoofing attack detection and survival. | |
520 | _aThis book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications. The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival. Provides deep insight into the security threats undermining existing integrated circuit authentication techniques; Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems; Offers a comprehensive summary of existing authentication protocols and their limitations; Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption; Includes detailed case studies on the emerging applications of IC authentication schemes. | ||
650 | 0 |
_aElectronic circuits. _919581 |
|
650 | 0 |
_aCooperating objects (Computer systems). _96195 |
|
650 | 0 |
_aMicroprocessors. _948567 |
|
650 | 0 |
_aComputer architecture. _93513 |
|
650 | 1 | 4 |
_aElectronic Circuits and Systems. _948568 |
650 | 2 | 4 |
_aCyber-Physical Systems. _932475 |
650 | 2 | 4 |
_aProcessor Architectures. _948569 |
700 | 1 |
_aHalak, Basel. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _948570 |
|
710 | 2 |
_aSpringerLink (Online service) _948571 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030607685 |
776 | 0 | 8 |
_iPrinted edition: _z9783030607708 |
776 | 0 | 8 |
_iPrinted edition: _z9783030607715 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-60769-2 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c78245 _d78245 |