- ホーム
- > 洋書
- > ドイツ書
- > Mathematics, Sciences & Technology
- > Technology
- > electronics, electrical engineering, telecommunications
Full Description
This book discusses the design and evaluation of Physically Unclonable Functions (PUFs) that are suitable for securing highly energy constrained devices, while at the same time classifying the many applications and devices that would benefit from various PUF designs. The authors provide a comprehensive study of the various approaches that are used to mitigate PUFs' shortcomings, while at the same time highlighting those that are most efficient. Coverage also includes state-of-the-art approaches to designing PUFs with high resilience to machine learning attacks and hardware implementation of area-efficient and high performing PUF architectures. The authors also classify different IoT applications and devices, depending on their security needs and limitations, offering a new perspective on how different PUF designs fit in the overall scope of IoT security.
Contents
Chapter 1 Introduction and Background.- Chapter 2 Exploring Classic Security Attacks and Hardware Intricacies.- Chapter 3 Hardware Security Challenges.- Chapter 4 Security in Resource-Constrained IoT Devices.- Chapter 5 Physically Unclonable Functions.- Chapter 6 PUF: Security Threats.- Chapter 7 PUF Performance Testing and Evaluation.- Chapter 8 Improving the PUF's Reliability.- Chapter 9 The Right Fit to your Device and Application.- Chapter 10 Advanced PUF designs.- Chapter 11 Lightweight PUF Protocols.