LEADER 03561nam 2200577 450 001 9910484330603321 005 20221007183457.0 010 $a3-030-60769-0 024 7 $a10.1007/978-3-030-60769-2 035 $a(CKB)4100000011728415 035 $a(DE-He213)978-3-030-60769-2 035 $a(MiAaPQ)EBC6462424 035 $a(PPN)253255937 035 $a(EXLCZ)994100000011728415 100 $a20210317d2021 fy 0 101 0 $aeng 135 $aurnn#---mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aAuthentication of embedded devices $etechnologies, protocols and emerging applications /$feditor, Basel Halak 205 $a1st edition 2021. 210 1$aCham, Switzerland :$cSpringer,$d[2021] 210 4$dİ2021 215 $a1 online resource (XV, 188 p. 74 illus., 36 illus. in color.) 311 1 $a3-030-60768-2 327 $aIntroduction -- Integrated Circuit Fingerprinting -- Novel PUF designs for device Identification -- Authentication Protocols: Standards, limitation and research opportunities -- Hardware-based Authentication Protocols for better physical security -- Energy Efficient Authentication Protocols -- Case study 1: Securing Hardware Supply Chain -- Case study 2: GPS spoofing attack detection and survival. 330 $aThis book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications. The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival. Provides deep insight into the security threats undermining existing integrated circuit authentication techniques; Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems; Offers a comprehensive summary of existing authentication protocols and their limitations; Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption; Includes detailed case studies on the emerging applications of IC authentication schemes. 606 $aIntegrated circuits$xVerification 606 $aEmbedded computer systems 606 $aElectronic circuits 606 $aComputer engineering 606 $aComputer organization 606 $aInternet of things 606 $aMicroprocessors 615 0$aIntegrated circuits$xVerification. 615 0$aEmbedded computer systems. 615 0$aElectronic circuits. 615 0$aComputer engineering. 615 0$aComputer organization. 615 0$aInternet of things. 615 0$aMicroprocessors. 676 $a621.3815 702 $aHalak$b Basel 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484330603321 996 $aAuthentication of embedded devices$92844828 997 $aUNINA