Books > Computing & IT > Computer communications & networking > Network security
|
Buy Now
Physically Unclonable Functions (PUFs) - Applications, Models, and Future Directions (Paperback)
Loot Price: R856
Discovery Miles 8 560
|
|
Physically Unclonable Functions (PUFs) - Applications, Models, and Future Directions (Paperback)
Series: Synthesis Lectures on Information Security, Privacy, and Trust
Expected to ship within 10 - 15 working days
|
Today, embedded systems are used in many security-critical
applications, from access control, electronic tickets, sensors, and
smart devices (e.g., wearables) to automotive applications and
critical infrastructures. These systems are increasingly used to
produce and process both security-critical and privacy-sensitive
data, which bear many security and privacy risks. Establishing
trust in the underlying devices and making them resistant to
software and hardware attacks is a fundamental requirement in many
applications and a challenging, yet unsolved, task. Solutions
solely based on software can never ensure their own integrity and
trustworthiness while resource-constraints and economic factors
often prevent the integration of sophisticated security hardware
and cryptographic co-processors. In this context, Physically
Unclonable Functions (PUFs) are an emerging and promising
technology to establish trust in embedded systems with minimal
hardware requirements. This book explores the design of trusted
embedded systems based on PUFs. Specifically, it focuses on the
integration of PUFs into secure and efficient cryptographic
protocols that are suitable for a variety of embedded systems. It
exemplarily discusses how PUFs can be integrated into lightweight
device authentication and attestation schemes, which are popular
and highly relevant applications of PUFs in practice. For the
integration of PUFs into secure cryptographic systems, it is
essential to have a clear view of their properties. This book gives
an overview of different approaches to evaluate the properties of
PUF implementations and presents the results of a large scale
security analysis of different PUF types implemented in
application-specific integrated circuits (ASICs). To analyze the
security of PUF-based schemes as is common in modern cryptography,
it is necessary to have a security framework for PUFs and PUF-based
systems. In this book, we give a flavor of the formal modeling of
PUFs that is in its beginning and that is still undergoing further
refinement in current research. The objective of this book is to
provide a comprehensive overview of the current state of secure
PUF-based cryptographic system design and the related challenges
and limitations. Table of Contents: Preface / Introduction / Basics
of Physically Unclonable Functions / Attacks on PUFs and PUF-based
Systems / Advanced PUF Concepts / PUF Implementations and
Evaluation / PUF-based Cryptographic Protocols / Security Model for
PUF-based Systems / Conclusion / Terms and Abbreviations /
Bibliography / Authors' Biographies
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.