LitMy.ru - литература в один клик

Lightweight Hardware Security and Physically Unclonable Functions

  • Добавил: literator
  • Дата: Вчера, 21:00
  • Комментариев: 0
Название: Lightweight Hardware Security and Physically Unclonable Functions: Improving Security of Constrained IoT Devices
Автор: Kasem Khalil, Haytham Idriss, Tarek Idriss, Magdy Bayoumi
Издательство: Springer
Год: 2025
Страниц: 160
Язык: английский
Формат: pdf (true), epub
Размер: 39.0 MB

This book discusses the design and evaluation of Physically Unclonable Functions (PUFs) that are suitable for securing highly energy constrained devices, while at the same time classifying the many applications and devices that would benefit from various PUF designs. The authors provide a comprehensive study of the various approaches that are used to mitigate PUFs’ shortcomings, while at the same time highlighting those that are most efficient. Coverage also includes state-of-the-art approaches to designing PUFs with high resilience to Machine Learning attacks and hardware implementation of area-efficient and high performing PUF architectures. The authors also classify different IoT applications and devices, depending on their security needs and limitations, offering a new perspective on how different PUF designs fit in the overall scope of IoT security.

This book is a comprehensive exploration of the emerging field of lightweight hardware security with a focus on Physically Unclonable Functions (PUFs). PUFs represent a new class of hardware security primitives that leverage inherent manufacturing variations in silicon to provide unique, unpredictable responses to external challenges. Unlike conventional cryptographic methods, PUFs do not require key storage, making them highly attractive for constrained environments where space, power, and security are critical concerns. This book is structured to provide a detailed understanding of the security landscape for resource-constrained devices and the role of PUFs in enhancing security. The early chapters introduce the reader to the fundamental security challenges of IoT devices, particularly Radio Frequency Identification (RFID) systems, which are some of the most constrained yet widely used components in IoT networks. From the vulnerabilities and architectural constraints of these systems, the discussion shifts to how lightweight security protocols can mitigate risks but still face limitations against sophisticated attackers. The core of this book delves into the design, implementation, and application of PUFs, highlighting their potential as a lightweight security solution that does not rely on traditional key management.

The chapters explore various types of PUFs, their operational principles, and the metrics that define their effectiveness, such as inter-chip and intra-chip Hamming distances. It provides a detailed evaluation of PUF performance metrics and introduces advanced designs and lightweight security protocols tailored for resource-constrained environments. The book also differentiates between strong and weak PUFs, each suitable for different security applications. It provides a guideline for choosing the most suitable design for each application, from device authentication to secure key generation. PUFs are not without their challenges. Managing challenge-response pairs, ensuring reliable operation under varying conditions, and protecting against modeling attacks are crucial areas of research. This book discusses these challenges and offers insights into current strategies and future directions in the field. This book aims to serve as a valuable resource for researchers, engineers, and practitioners working in the field of hardware security. It combines theoretical foundations with practical insights, offering readers a balanced perspective on the opportunities and challenges of integrating PUFs into real-world security solutions.

- Classifies Physically Unclonable designs and their hardware implementations based on application needs
- Explores advanced PUF techniques and protocols to enhance security for end nodes and edge devices
- Presents state-of-the-art techniques and protocols to enhance the security and effectiveness of PUF devices

Contents:


Скачать Lightweight Hardware Security and Physically Unclonable Functions












[related-news] [/related-news]
Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.