Benutzerdefiniertes Cover
Benutzerdefiniertes Cover
Normale Ansicht MARC-Ansicht ISBD

Lightweight Hardware Security and Physically Unclonable Functions : Improving Security of Constrained IoT Devices / by Kasem Khalil, Haytham Idriss, Tarek Idriss, Magdy Bayoumi

Von: Mitwirkende(r): Resource type: Ressourcentyp: Buch (Online)Buch (Online)Sprache: Englisch Verlag: Cham : Springer Nature Switzerland, 2025Verlag: Cham : Imprint: Springer, 2025Auflage: 1st ed. 2025Beschreibung: 1 Online-Ressource(XIV, 152 p. 83 illus., 47 illus. in color.)ISBN:
  • 9783031763281
Schlagwörter: Andere physische Formen: 9783031763274 | 9783031763298 | 9783031763304 | Erscheint auch als: 9783031763274 Druck-Ausgabe | Erscheint auch als: 9783031763298 Druck-Ausgabe | Erscheint auch als: 9783031763304 Druck-AusgabeDDC-Klassifikation:
  • 621.3815 23
DOI: DOI: 10.1007/978-3-031-76328-1Online-Ressourcen: Zusammenfassung: Chapter 1 Introduction and Background -- Chapter 2 Exploring Classic Security Attacks and Hardware Intricacies -- Chapter 3 Hardware Security Challenges -- Chapter 4 Security in Resource-Constrained IoT Devices -- Chapter 5 Physically Unclonable Functions -- Chapter 6 PUF: Security Threats -- Chapter 7 PUF Performance Testing and Evaluation -- Chapter 8 Improving the PUF’s Reliability -- Chapter 9 The Right Fit to your Device and Application -- Chapter 10 Advanced PUF designs -- Chapter 11 Lightweight PUF Protocols.Zusammenfassung: This book discusses the design and evaluation of Physically Unclonable Functions (PUFs) that are suitable for securing highly energy constrained devices, while at the same time classifying the many applications and devices that would benefit from various PUF designs. The authors provide a comprehensive study of the various approaches that are used to mitigate PUFs’ shortcomings, while at the same time highlighting those that are most efficient. Coverage also includes state-of-the-art approaches to designing PUFs with high resilience to machine learning attacks and hardware implementation of area-efficient and high performing PUF architectures. The authors also classify different IoT applications and devices, depending on their security needs and limitations, offering a new perspective on how different PUF designs fit in the overall scope of IoT security. Classifies Physically Unclonable designs and their hardware implementations based on application needs; Explores advanced PUF techniques and protocols to enhance security for end nodes and edge devices; Presents state-of-the-art techniques and protocols to enhance the security and effectiveness of PUF devices.PPN: PPN: 1914538951Package identifier: Produktsigel: ZDB-2-SEB | ZDB-2-ENG | ZDB-2-SXE
Dieser Titel hat keine Exemplare