Security of internet of things nodes: challenges, attacks, and countermeasures

Intro -- Half Title -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- About the Editors -- 1. Securing Dedicated DSP Co-processors (Hardware IP) using Structural Obfuscation for IoT-oriented Platforms -- 1.1 Introduction -- 1.2 Discussion on Contemporary Structural Obfuscation...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Chakraborty, Chinmay 1984- (VerfasserIn)
Weitere Verfasser: Ranjani Rajendran, Sree (MitwirkendeR), Rehman, Muhammad Habib ur (MitwirkendeR)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Milton CRC Press LLC 2021
Schriftenreihe:Chapman and Hall/CRC Internet of Things Ser.
Schlagworte:
Online-Zugang:DE-739
Volltext
Zusammenfassung:Intro -- Half Title -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- About the Editors -- 1. Securing Dedicated DSP Co-processors (Hardware IP) using Structural Obfuscation for IoT-oriented Platforms -- 1.1 Introduction -- 1.2 Discussion on Contemporary Structural Obfuscation Approaches used for Securing DSP Hardware/Coprocessor -- 1.2.1 Securing DSP Designs Using Compiler Driven Transformation Based Structural Obfuscation -- 1.2.2 Enhanced Security of DSP Circuits Using Multi-key Based Structural Obfuscation -- 1.2.3 Securing DSP Kernels Using Robust Hologram Based Obfuscation -- Overview -- Demonstration -- 1.2.4 Securing DSP Designs Using HLT Based Structural Obfuscation -- 1.3 Analysis of Case Studies -- 1.3.1 Design Analysis -- 1.3.2 Security Analysis -- 1.4 Conclusion -- References -- 2. Multi-bit True Random Number Generator for IoT Devices using Memristor -- 2.1 Introduction -- 2.2 Background and Related Work -- 2.2.1 TRNGs and Statistical Randomness Testing -- 2.2.2 Memristors and Memristor based TRNGs -- 2.2.3 Related Works -- 2.3 Proposed Multi-bit Random Number Generator -- 2.3.1 TRNG Architecture without Memristor -- 2.3.2 Bit Correlation Effect -- 2.4 Experimental Results -- 2.4.1 Simulation Setup Details -- 2.4.2 Statistical Randomness Testing Results -- 2.4.3 Entropy Calculation -- 2.5 Comparison with Existing Memristor Based TRNGs -- 2.6 Conclusion -- References -- 3. Secured Testing of AES Cryptographic ICs for IoT Devices -- 3.1 Introduction -- 3.2 Cryptography for Security in IoT Devices -- 3.3 Advanced Encryption Standard (AES) Algorithm for Security in IoT Devices -- 3.4 Scan-based Side-channel Attack on AES Cryptographic ICs -- 3.5 Design and Simulation of Scan-inserted AES Crypto Module -- 3.5.1 Design of AES -- 3.5.2 Design and Simulation of Scan-inserted AES Design.
Beschreibung:Description based on publisher supplied metadata and other sources
Beschreibung:1 Online-Ressource (xi, 307 Seiten) Illustrationen, Diagramme
ISBN:9781003127598
9781000421729
DOI:10.1201/9781003127598

Es ist kein Print-Exemplar vorhanden.

Fernleihe Bestellen Achtung: Nicht im THWS-Bestand! Volltext öffnen