Security of internet of things nodes: challenges, attacks, and countermeasures
Intro -- Half Title -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- About the Editors -- 1. Securing Dedicated DSP Co-processors (Hardware IP) using Structural Obfuscation for IoT-oriented Platforms -- 1.1 Introduction -- 1.2 Discussion on Contemporary Structural Obfuscation...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Milton
CRC Press LLC
2021
|
Schriftenreihe: | Chapman and Hall/CRC Internet of Things Ser.
|
Schlagworte: | |
Online-Zugang: | DE-739 Volltext |
Zusammenfassung: | Intro -- Half Title -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- About the Editors -- 1. Securing Dedicated DSP Co-processors (Hardware IP) using Structural Obfuscation for IoT-oriented Platforms -- 1.1 Introduction -- 1.2 Discussion on Contemporary Structural Obfuscation Approaches used for Securing DSP Hardware/Coprocessor -- 1.2.1 Securing DSP Designs Using Compiler Driven Transformation Based Structural Obfuscation -- 1.2.2 Enhanced Security of DSP Circuits Using Multi-key Based Structural Obfuscation -- 1.2.3 Securing DSP Kernels Using Robust Hologram Based Obfuscation -- Overview -- Demonstration -- 1.2.4 Securing DSP Designs Using HLT Based Structural Obfuscation -- 1.3 Analysis of Case Studies -- 1.3.1 Design Analysis -- 1.3.2 Security Analysis -- 1.4 Conclusion -- References -- 2. Multi-bit True Random Number Generator for IoT Devices using Memristor -- 2.1 Introduction -- 2.2 Background and Related Work -- 2.2.1 TRNGs and Statistical Randomness Testing -- 2.2.2 Memristors and Memristor based TRNGs -- 2.2.3 Related Works -- 2.3 Proposed Multi-bit Random Number Generator -- 2.3.1 TRNG Architecture without Memristor -- 2.3.2 Bit Correlation Effect -- 2.4 Experimental Results -- 2.4.1 Simulation Setup Details -- 2.4.2 Statistical Randomness Testing Results -- 2.4.3 Entropy Calculation -- 2.5 Comparison with Existing Memristor Based TRNGs -- 2.6 Conclusion -- References -- 3. Secured Testing of AES Cryptographic ICs for IoT Devices -- 3.1 Introduction -- 3.2 Cryptography for Security in IoT Devices -- 3.3 Advanced Encryption Standard (AES) Algorithm for Security in IoT Devices -- 3.4 Scan-based Side-channel Attack on AES Cryptographic ICs -- 3.5 Design and Simulation of Scan-inserted AES Crypto Module -- 3.5.1 Design of AES -- 3.5.2 Design and Simulation of Scan-inserted AES Design. |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (xi, 307 Seiten) Illustrationen, Diagramme |
ISBN: | 9781003127598 9781000421729 |
DOI: | 10.1201/9781003127598 |
Internformat
MARC
LEADER | 00000nam a22000001c 4500 | ||
---|---|---|---|
001 | BV048889158 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 230404s2021 xx a||| o|||| 00||| eng d | ||
020 | |a 9781003127598 |9 978-1-00-312759-8 | ||
020 | |a 9781000421729 |9 978-1-00-042172-9 | ||
024 | 7 | |a 10.1201/9781003127598 |2 doi | |
035 | |a (OCoLC)1376404208 | ||
035 | |a (DE-599)KEP067172563 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Chakraborty, Chinmay |d 1984- |e Verfasser |0 (DE-588)1224634535 |4 aut | |
245 | 1 | 0 | |a Security of internet of things nodes |b challenges, attacks, and countermeasures |
264 | 1 | |a Milton |b CRC Press LLC |c 2021 | |
300 | |a 1 Online-Ressource (xi, 307 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Chapman and Hall/CRC Internet of Things Ser. | |
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | 3 | |a Intro -- Half Title -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- About the Editors -- 1. Securing Dedicated DSP Co-processors (Hardware IP) using Structural Obfuscation for IoT-oriented Platforms -- 1.1 Introduction -- 1.2 Discussion on Contemporary Structural Obfuscation Approaches used for Securing DSP Hardware/Coprocessor -- 1.2.1 Securing DSP Designs Using Compiler Driven Transformation Based Structural Obfuscation -- 1.2.2 Enhanced Security of DSP Circuits Using Multi-key Based Structural Obfuscation -- 1.2.3 Securing DSP Kernels Using Robust Hologram Based Obfuscation -- Overview -- Demonstration -- 1.2.4 Securing DSP Designs Using HLT Based Structural Obfuscation -- 1.3 Analysis of Case Studies -- 1.3.1 Design Analysis -- 1.3.2 Security Analysis -- 1.4 Conclusion -- References -- 2. Multi-bit True Random Number Generator for IoT Devices using Memristor -- 2.1 Introduction -- 2.2 Background and Related Work -- 2.2.1 TRNGs and Statistical Randomness Testing -- 2.2.2 Memristors and Memristor based TRNGs -- 2.2.3 Related Works -- 2.3 Proposed Multi-bit Random Number Generator -- 2.3.1 TRNG Architecture without Memristor -- 2.3.2 Bit Correlation Effect -- 2.4 Experimental Results -- 2.4.1 Simulation Setup Details -- 2.4.2 Statistical Randomness Testing Results -- 2.4.3 Entropy Calculation -- 2.5 Comparison with Existing Memristor Based TRNGs -- 2.6 Conclusion -- References -- 3. Secured Testing of AES Cryptographic ICs for IoT Devices -- 3.1 Introduction -- 3.2 Cryptography for Security in IoT Devices -- 3.3 Advanced Encryption Standard (AES) Algorithm for Security in IoT Devices -- 3.4 Scan-based Side-channel Attack on AES Cryptographic ICs -- 3.5 Design and Simulation of Scan-inserted AES Crypto Module -- 3.5.1 Design of AES -- 3.5.2 Design and Simulation of Scan-inserted AES Design. | |
650 | 0 | 7 | |a Internet der Dinge |0 (DE-588)7713781-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
653 | 0 | |a Electronic books | |
689 | 0 | 0 | |a Internet der Dinge |0 (DE-588)7713781-4 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Ranjani Rajendran, Sree |4 ctb | |
700 | 1 | |a Rehman, Muhammad Habib ur |0 (DE-588)1223880656 |4 ctb | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-0-367-65049-0 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-0-367-65051-3 |
856 | 4 | 0 | |u https://doi.org/10.1201/9781003127598 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-30-PQE | ||
912 | |a ZDB-7-CSC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034153761 | |
966 | e | |u https://doi.org/10.1201/9781003127598 |l DE-739 |p ZDB-7-CSC |q UPA_PDA_CSC_Kauf2022 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818330299122057216 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Chakraborty, Chinmay 1984- |
author2 | Ranjani Rajendran, Sree Rehman, Muhammad Habib ur |
author2_role | ctb ctb |
author2_variant | r s r rs rsr m h u r mhu mhur |
author_GND | (DE-588)1224634535 (DE-588)1223880656 |
author_facet | Chakraborty, Chinmay 1984- Ranjani Rajendran, Sree Rehman, Muhammad Habib ur |
author_role | aut |
author_sort | Chakraborty, Chinmay 1984- |
author_variant | c c cc |
building | Verbundindex |
bvnumber | BV048889158 |
collection | ZDB-30-PQE ZDB-7-CSC |
ctrlnum | (OCoLC)1376404208 (DE-599)KEP067172563 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1201/9781003127598 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a22000001c 4500</leader><controlfield tag="001">BV048889158</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230404s2021 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003127598</subfield><subfield code="9">978-1-00-312759-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000421729</subfield><subfield code="9">978-1-00-042172-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/9781003127598</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1376404208</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP067172563</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Chakraborty, Chinmay</subfield><subfield code="d">1984-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1224634535</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security of internet of things nodes</subfield><subfield code="b">challenges, attacks, and countermeasures</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Milton</subfield><subfield code="b">CRC Press LLC</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xi, 307 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Chapman and Hall/CRC Internet of Things Ser.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Intro -- Half Title -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- About the Editors -- 1. Securing Dedicated DSP Co-processors (Hardware IP) using Structural Obfuscation for IoT-oriented Platforms -- 1.1 Introduction -- 1.2 Discussion on Contemporary Structural Obfuscation Approaches used for Securing DSP Hardware/Coprocessor -- 1.2.1 Securing DSP Designs Using Compiler Driven Transformation Based Structural Obfuscation -- 1.2.2 Enhanced Security of DSP Circuits Using Multi-key Based Structural Obfuscation -- 1.2.3 Securing DSP Kernels Using Robust Hologram Based Obfuscation -- Overview -- Demonstration -- 1.2.4 Securing DSP Designs Using HLT Based Structural Obfuscation -- 1.3 Analysis of Case Studies -- 1.3.1 Design Analysis -- 1.3.2 Security Analysis -- 1.4 Conclusion -- References -- 2. Multi-bit True Random Number Generator for IoT Devices using Memristor -- 2.1 Introduction -- 2.2 Background and Related Work -- 2.2.1 TRNGs and Statistical Randomness Testing -- 2.2.2 Memristors and Memristor based TRNGs -- 2.2.3 Related Works -- 2.3 Proposed Multi-bit Random Number Generator -- 2.3.1 TRNG Architecture without Memristor -- 2.3.2 Bit Correlation Effect -- 2.4 Experimental Results -- 2.4.1 Simulation Setup Details -- 2.4.2 Statistical Randomness Testing Results -- 2.4.3 Entropy Calculation -- 2.5 Comparison with Existing Memristor Based TRNGs -- 2.6 Conclusion -- References -- 3. Secured Testing of AES Cryptographic ICs for IoT Devices -- 3.1 Introduction -- 3.2 Cryptography for Security in IoT Devices -- 3.3 Advanced Encryption Standard (AES) Algorithm for Security in IoT Devices -- 3.4 Scan-based Side-channel Attack on AES Cryptographic ICs -- 3.5 Design and Simulation of Scan-inserted AES Crypto Module -- 3.5.1 Design of AES -- 3.5.2 Design and Simulation of Scan-inserted AES Design.</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electronic books</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ranjani Rajendran, Sree</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rehman, Muhammad Habib ur</subfield><subfield code="0">(DE-588)1223880656</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-0-367-65049-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-0-367-65051-3</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1201/9781003127598</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-7-CSC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034153761</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/9781003127598</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-7-CSC</subfield><subfield code="q">UPA_PDA_CSC_Kauf2022</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048889158 |
illustrated | Illustrated |
index_date | 2024-07-03T21:47:59Z |
indexdate | 2024-12-13T13:01:44Z |
institution | BVB |
isbn | 9781003127598 9781000421729 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034153761 |
oclc_num | 1376404208 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | 1 Online-Ressource (xi, 307 Seiten) Illustrationen, Diagramme |
psigel | ZDB-30-PQE ZDB-7-CSC ZDB-7-CSC UPA_PDA_CSC_Kauf2022 |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | CRC Press LLC |
record_format | marc |
series2 | Chapman and Hall/CRC Internet of Things Ser. |
spelling | Chakraborty, Chinmay 1984- Verfasser (DE-588)1224634535 aut Security of internet of things nodes challenges, attacks, and countermeasures Milton CRC Press LLC 2021 1 Online-Ressource (xi, 307 Seiten) Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier Chapman and Hall/CRC Internet of Things Ser. Description based on publisher supplied metadata and other sources Intro -- Half Title -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- About the Editors -- 1. Securing Dedicated DSP Co-processors (Hardware IP) using Structural Obfuscation for IoT-oriented Platforms -- 1.1 Introduction -- 1.2 Discussion on Contemporary Structural Obfuscation Approaches used for Securing DSP Hardware/Coprocessor -- 1.2.1 Securing DSP Designs Using Compiler Driven Transformation Based Structural Obfuscation -- 1.2.2 Enhanced Security of DSP Circuits Using Multi-key Based Structural Obfuscation -- 1.2.3 Securing DSP Kernels Using Robust Hologram Based Obfuscation -- Overview -- Demonstration -- 1.2.4 Securing DSP Designs Using HLT Based Structural Obfuscation -- 1.3 Analysis of Case Studies -- 1.3.1 Design Analysis -- 1.3.2 Security Analysis -- 1.4 Conclusion -- References -- 2. Multi-bit True Random Number Generator for IoT Devices using Memristor -- 2.1 Introduction -- 2.2 Background and Related Work -- 2.2.1 TRNGs and Statistical Randomness Testing -- 2.2.2 Memristors and Memristor based TRNGs -- 2.2.3 Related Works -- 2.3 Proposed Multi-bit Random Number Generator -- 2.3.1 TRNG Architecture without Memristor -- 2.3.2 Bit Correlation Effect -- 2.4 Experimental Results -- 2.4.1 Simulation Setup Details -- 2.4.2 Statistical Randomness Testing Results -- 2.4.3 Entropy Calculation -- 2.5 Comparison with Existing Memristor Based TRNGs -- 2.6 Conclusion -- References -- 3. Secured Testing of AES Cryptographic ICs for IoT Devices -- 3.1 Introduction -- 3.2 Cryptography for Security in IoT Devices -- 3.3 Advanced Encryption Standard (AES) Algorithm for Security in IoT Devices -- 3.4 Scan-based Side-channel Attack on AES Cryptographic ICs -- 3.5 Design and Simulation of Scan-inserted AES Crypto Module -- 3.5.1 Design of AES -- 3.5.2 Design and Simulation of Scan-inserted AES Design. Internet der Dinge (DE-588)7713781-4 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Electronic books Internet der Dinge (DE-588)7713781-4 s Computersicherheit (DE-588)4274324-2 s DE-604 Ranjani Rajendran, Sree ctb Rehman, Muhammad Habib ur (DE-588)1223880656 ctb Erscheint auch als Druck-Ausgabe, Hardcover 978-0-367-65049-0 Erscheint auch als Druck-Ausgabe, Paperback 978-0-367-65051-3 https://doi.org/10.1201/9781003127598 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Chakraborty, Chinmay 1984- Security of internet of things nodes challenges, attacks, and countermeasures Internet der Dinge (DE-588)7713781-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)7713781-4 (DE-588)4274324-2 |
title | Security of internet of things nodes challenges, attacks, and countermeasures |
title_auth | Security of internet of things nodes challenges, attacks, and countermeasures |
title_exact_search | Security of internet of things nodes challenges, attacks, and countermeasures |
title_exact_search_txtP | Security of internet of things nodes challenges, attacks, and countermeasures |
title_full | Security of internet of things nodes challenges, attacks, and countermeasures |
title_fullStr | Security of internet of things nodes challenges, attacks, and countermeasures |
title_full_unstemmed | Security of internet of things nodes challenges, attacks, and countermeasures |
title_short | Security of internet of things nodes |
title_sort | security of internet of things nodes challenges attacks and countermeasures |
title_sub | challenges, attacks, and countermeasures |
topic | Internet der Dinge (DE-588)7713781-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Internet der Dinge Computersicherheit |
url | https://doi.org/10.1201/9781003127598 |
work_keys_str_mv | AT chakrabortychinmay securityofinternetofthingsnodeschallengesattacksandcountermeasures AT ranjanirajendransree securityofinternetofthingsnodeschallengesattacksandcountermeasures AT rehmanmuhammadhabibur securityofinternetofthingsnodeschallengesattacksandcountermeasures |