Authentication of Embedded Devices : Technologies, Protocols and Emerging Applications

個数:

Authentication of Embedded Devices : Technologies, Protocols and Emerging Applications

  • オンデマンド(OD/POD)版です。キャンセルは承れません。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 188 p.
  • 言語 ENG
  • 商品コード 9783030607715

Full Description

This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications.

The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival.

Provides deep insight into the security threats undermining existing integrated circuit authentication techniques;
Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems;
Offers a comprehensive summary of existing authentication protocols and their limitations;
Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption;
Includes detailed case studies on the emerging applications of IC authentication schemes.

Contents

Introduction.- Integrated Circuit Fingerprinting.- Novel PUF designs for device Identification.- Authentication Protocols: Standards, limitation and research opportunities.- Hardware-based Authentication Protocols for better physical security.- Energy Efficient Authentication Protocols.- Case study 1: Securing Hardware Supply Chain.- Case study 2: GPS spoofing attack detection and survival.

最近チェックした商品