Custom cover image
Custom cover image

Lightweight Hardware Security and Physically Unclonable Functions : Improving Security of Constrained IoT Devices / by Kasem Khalil, Haytham Idriss, Tarek Idriss, Magdy Bayoumi

By: Contributor(s): Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Publisher: Cham : Springer Nature Switzerland, 2025Publisher: Cham : Imprint: Springer, 2025Edition: 1st ed. 2025Description: 1 Online-Ressource(XIV, 152 p. 83 illus., 47 illus. in color.)ISBN:
  • 9783031763281
Subject(s): Additional physical formats: 9783031763274 | 9783031763298 | 9783031763304 | Erscheint auch als: 9783031763274 Druck-Ausgabe | Erscheint auch als: 9783031763298 Druck-Ausgabe | Erscheint auch als: 9783031763304 Druck-AusgabeDDC classification:
  • 621.3815 23
DOI: DOI: 10.1007/978-3-031-76328-1Online resources: Summary: Chapter 1 Introduction and Background -- Chapter 2 Exploring Classic Security Attacks and Hardware Intricacies -- Chapter 3 Hardware Security Challenges -- Chapter 4 Security in Resource-Constrained IoT Devices -- Chapter 5 Physically Unclonable Functions -- Chapter 6 PUF: Security Threats -- Chapter 7 PUF Performance Testing and Evaluation -- Chapter 8 Improving the PUF’s Reliability -- Chapter 9 The Right Fit to your Device and Application -- Chapter 10 Advanced PUF designs -- Chapter 11 Lightweight PUF Protocols.Summary: This book discusses the design and evaluation of Physically Unclonable Functions (PUFs) that are suitable for securing highly energy constrained devices, while at the same time classifying the many applications and devices that would benefit from various PUF designs. The authors provide a comprehensive study of the various approaches that are used to mitigate PUFs’ shortcomings, while at the same time highlighting those that are most efficient. Coverage also includes state-of-the-art approaches to designing PUFs with high resilience to machine learning attacks and hardware implementation of area-efficient and high performing PUF architectures. The authors also classify different IoT applications and devices, depending on their security needs and limitations, offering a new perspective on how different PUF designs fit in the overall scope of IoT security. Classifies Physically Unclonable designs and their hardware implementations based on application needs; Explores advanced PUF techniques and protocols to enhance security for end nodes and edge devices; Presents state-of-the-art techniques and protocols to enhance the security and effectiveness of PUF devices.PPN: PPN: 1914538951Package identifier: Produktsigel: ZDB-2-SEB | ZDB-2-ENG | ZDB-2-SXE
No physical items for this record