Authentication of embedded devices: technologies, protocols and emerging applications
This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications.The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham, Switzerland
Springer
[2021]
|
Schlagworte: | |
Zusammenfassung: | This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications.The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival.- Provides deep insight into the security threats undermining existing integrated circuit authentication techniques;- Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems;- Offers a comprehensive summary of existing authentication protocols and their limitations;- Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption;- Includes detailed case studies on the emerging applications of IC authentication schemes |
Beschreibung: | Introduction.- Integrated Circuit Fingerprinting.- Novel PUF designs for device Identification.- Authentication Protocols: Standards, limitation and research opportunities.- Hardware-based Authentication Protocols for better physical security.- Energy Efficient Authentication Protocols.- Case study 1: Securing Hardware Supply Chain.- Case study 2: GPS spoofing attack detection and survival. |
Beschreibung: | xv, 188 Seiten Illustrationen, Diagramme 477 grams |
ISBN: | 9783030607685 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV047128422 | ||
003 | DE-604 | ||
005 | 20210302 | ||
007 | t | ||
008 | 210205s2021 a||| |||| 00||| eng d | ||
020 | |a 9783030607685 |c hbk |9 978-3-030-60768-5 | ||
024 | 3 | |a 9783030607685 | |
035 | |a (OCoLC)1240398237 | ||
035 | |a (DE-599)BVBBV047128422 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-29T | ||
245 | 1 | 0 | |a Authentication of embedded devices |b technologies, protocols and emerging applications |c Basel Halak, editor |
264 | 1 | |a Cham, Switzerland |b Springer |c [2021] | |
300 | |a xv, 188 Seiten |b Illustrationen, Diagramme |c 477 grams | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Introduction.- Integrated Circuit Fingerprinting.- Novel PUF designs for device Identification.- Authentication Protocols: Standards, limitation and research opportunities.- Hardware-based Authentication Protocols for better physical security.- Energy Efficient Authentication Protocols.- Case study 1: Securing Hardware Supply Chain.- Case study 2: GPS spoofing attack detection and survival. | ||
520 | |a This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications.The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival.- Provides deep insight into the security threats undermining existing integrated circuit authentication techniques;- Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems;- Offers a comprehensive summary of existing authentication protocols and their limitations;- Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption;- Includes detailed case studies on the emerging applications of IC authentication schemes | ||
650 | 4 | |a Electronic circuits | |
650 | 4 | |a Computer engineering | |
650 | 4 | |a Internet of things | |
650 | 4 | |a Embedded computer systems | |
650 | 4 | |a Microprocessors | |
650 | 4 | |a Engineering | |
653 | |a Hardcover, Softcover / Technik/Elektronik, Elektrotechnik, Nachrichtentechnik | ||
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
700 | 1 | |a Halak, Basel |0 (DE-588)119831396X |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-030-60769-2 |
999 | |a oai:aleph.bib-bvb.de:BVB01-032534607 |
Datensatz im Suchindex
_version_ | 1804182178456666112 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Halak, Basel |
author2_role | edt |
author2_variant | b h bh |
author_GND | (DE-588)119831396X |
author_facet | Halak, Basel |
building | Verbundindex |
bvnumber | BV047128422 |
ctrlnum | (OCoLC)1240398237 (DE-599)BVBBV047128422 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03142nam a2200397 c 4500</leader><controlfield tag="001">BV047128422</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210302 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">210205s2021 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030607685</subfield><subfield code="c">hbk</subfield><subfield code="9">978-3-030-60768-5</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783030607685</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1240398237</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047128422</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Authentication of embedded devices</subfield><subfield code="b">technologies, protocols and emerging applications</subfield><subfield code="c">Basel Halak, editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham, Switzerland</subfield><subfield code="b">Springer</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xv, 188 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield><subfield code="c">477 grams</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Introduction.- Integrated Circuit Fingerprinting.- Novel PUF designs for device Identification.- Authentication Protocols: Standards, limitation and research opportunities.- Hardware-based Authentication Protocols for better physical security.- Energy Efficient Authentication Protocols.- Case study 1: Securing Hardware Supply Chain.- Case study 2: GPS spoofing attack detection and survival.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications.The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival.- Provides deep insight into the security threats undermining existing integrated circuit authentication techniques;- Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems;- Offers a comprehensive summary of existing authentication protocols and their limitations;- Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption;- Includes detailed case studies on the emerging applications of IC authentication schemes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic circuits</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet of things</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Embedded computer systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microprocessors</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hardcover, Softcover / Technik/Elektronik, Elektrotechnik, Nachrichtentechnik</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Halak, Basel</subfield><subfield code="0">(DE-588)119831396X</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-030-60769-2</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032534607</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV047128422 |
illustrated | Illustrated |
index_date | 2024-07-03T16:31:33Z |
indexdate | 2024-07-10T09:03:25Z |
institution | BVB |
isbn | 9783030607685 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032534607 |
oclc_num | 1240398237 |
open_access_boolean | |
owner | DE-29T |
owner_facet | DE-29T |
physical | xv, 188 Seiten Illustrationen, Diagramme 477 grams |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Springer |
record_format | marc |
spelling | Authentication of embedded devices technologies, protocols and emerging applications Basel Halak, editor Cham, Switzerland Springer [2021] xv, 188 Seiten Illustrationen, Diagramme 477 grams txt rdacontent n rdamedia nc rdacarrier Introduction.- Integrated Circuit Fingerprinting.- Novel PUF designs for device Identification.- Authentication Protocols: Standards, limitation and research opportunities.- Hardware-based Authentication Protocols for better physical security.- Energy Efficient Authentication Protocols.- Case study 1: Securing Hardware Supply Chain.- Case study 2: GPS spoofing attack detection and survival. This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications.The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival.- Provides deep insight into the security threats undermining existing integrated circuit authentication techniques;- Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems;- Offers a comprehensive summary of existing authentication protocols and their limitations;- Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption;- Includes detailed case studies on the emerging applications of IC authentication schemes Electronic circuits Computer engineering Internet of things Embedded computer systems Microprocessors Engineering Hardcover, Softcover / Technik/Elektronik, Elektrotechnik, Nachrichtentechnik (DE-588)4143413-4 Aufsatzsammlung gnd-content Halak, Basel (DE-588)119831396X edt Erscheint auch als Online-Ausgabe 978-3-030-60769-2 |
spellingShingle | Authentication of embedded devices technologies, protocols and emerging applications Electronic circuits Computer engineering Internet of things Embedded computer systems Microprocessors Engineering |
subject_GND | (DE-588)4143413-4 |
title | Authentication of embedded devices technologies, protocols and emerging applications |
title_auth | Authentication of embedded devices technologies, protocols and emerging applications |
title_exact_search | Authentication of embedded devices technologies, protocols and emerging applications |
title_exact_search_txtP | Authentication of embedded devices technologies, protocols and emerging applications |
title_full | Authentication of embedded devices technologies, protocols and emerging applications Basel Halak, editor |
title_fullStr | Authentication of embedded devices technologies, protocols and emerging applications Basel Halak, editor |
title_full_unstemmed | Authentication of embedded devices technologies, protocols and emerging applications Basel Halak, editor |
title_short | Authentication of embedded devices |
title_sort | authentication of embedded devices technologies protocols and emerging applications |
title_sub | technologies, protocols and emerging applications |
topic | Electronic circuits Computer engineering Internet of things Embedded computer systems Microprocessors Engineering |
topic_facet | Electronic circuits Computer engineering Internet of things Embedded computer systems Microprocessors Engineering Aufsatzsammlung |
work_keys_str_mv | AT halakbasel authenticationofembeddeddevicestechnologiesprotocolsandemergingapplications |