LEADER 05040nam 22007455 450 001 9910299845903321 005 20200706093144.0 010 $a3-319-09420-3 024 7 $a10.1007/978-3-319-09420-5 035 $a(CKB)3710000000315940 035 $a(EBL)1965190 035 $a(SSID)ssj0001408159 035 $a(PQKBManifestationID)11856273 035 $a(PQKBTitleCode)TC0001408159 035 $a(PQKBWorkID)11346326 035 $a(PQKB)10379558 035 $a(DE-He213)978-3-319-09420-5 035 $a(MiAaPQ)EBC1965190 035 $a(PPN)183148142 035 $a(EXLCZ)993710000000315940 100 $a20141211d2015 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aTrusted Computing for Embedded Systems /$fedited by Bernard Candaele, Dimitrios Soudris, Iraklis Anagnostopoulos 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (315 p.) 300 $aDescription based upon print version of record. 311 $a3-319-09419-X 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aPart I Introduction -- Programming Interfaces for the TPM -- Part II Application-Use cases -- Chapter 2: ARM TrustZone -- Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges -- Authentication and mutual authentication -- Low power Wireless Sensor Networks: Secure applications and remote distribution of FW updates with key management on WSN -- Part III Building blocks -- Physically Unclonable Function: Principle, design and characterization of the Loop PUF -- Physically Unclonable Function: Design of a silicon arbiter-PUF on CMOS 65 nm -- Secure Key Generator using a Loop-PUF -- Fault Sensitivity Analysis at Design Time -- Information Theoretic Comparison of Side-channel Distinguishers -- Part III Advanced Galileo Positioning technologies -- Wireless Sensor Networks: Routing protocol for critical infrastructure protection -- Wireless Sensor Networks: Virtual platform for performance analysis and attack simulation -- Heap management for trusted operating environments -- IP-XACT extensions for cryptographic IP. 330 $aThis book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. ·         Enables readers to address a variety of security threats to embedded hardware and software; ·         Describes design of secure wireless sensor networks, to address secure authentication of trusted portable devices for embedded systems; ·         Presents secure solutions for the design of smart-grid applications and their deployment in large-scale networked and systems.  . 606 $aElectronic circuits 606 $aMicroprocessors 606 $aElectronics 606 $aMicroelectronics 606 $aComputer security 606 $aCircuits and Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/T24068 606 $aProcessor Architectures$3https://scigraph.springernature.com/ontologies/product-market-codes/I13014 606 $aElectronics and Microelectronics, Instrumentation$3https://scigraph.springernature.com/ontologies/product-market-codes/T24027 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aElectronic circuits. 615 0$aMicroprocessors. 615 0$aElectronics. 615 0$aMicroelectronics. 615 0$aComputer security. 615 14$aCircuits and Systems. 615 24$aProcessor Architectures. 615 24$aElectronics and Microelectronics, Instrumentation. 615 24$aSystems and Data Security. 676 $a004.1 676 $a005.8 676 $a620 676 $a621.381 676 $a621.3815 702 $aCandaele$b Bernard$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSoudris$b Dimitrios$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAnagnostopoulos$b Iraklis$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910299845903321 996 $aTrusted Computing for Embedded Systems$91412953 997 $aUNINA