Security of internet of things nodes: challenges, attacks, and countermeasures
Saved in:
Bibliographic Details
Main Author: Chakraborty, Chinmay 1984- (Author)
Other Authors: Ranjani Rajendran, Sree (Contributor), Rehman, Muhammad Habib ur (Contributor)
Format: Electronic eBook
Language:English
Published: Milton CRC Press LLC 2021
Series:Chapman and Hall/CRC Internet of Things Ser.
Subjects:
Links:https://doi.org/10.1201/9781003127598
https://doi.org/10.1201/9781003127598
Abstract:Intro -- Half Title -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- About the Editors -- 1. Securing Dedicated DSP Co-processors (Hardware IP) using Structural Obfuscation for IoT-oriented Platforms -- 1.1 Introduction -- 1.2 Discussion on Contemporary Structural Obfuscation Approaches used for Securing DSP Hardware/Coprocessor -- 1.2.1 Securing DSP Designs Using Compiler Driven Transformation Based Structural Obfuscation -- 1.2.2 Enhanced Security of DSP Circuits Using Multi-key Based Structural Obfuscation -- 1.2.3 Securing DSP Kernels Using Robust Hologram Based Obfuscation -- Overview -- Demonstration -- 1.2.4 Securing DSP Designs Using HLT Based Structural Obfuscation -- 1.3 Analysis of Case Studies -- 1.3.1 Design Analysis -- 1.3.2 Security Analysis -- 1.4 Conclusion -- References -- 2. Multi-bit True Random Number Generator for IoT Devices using Memristor -- 2.1 Introduction -- 2.2 Background and Related Work -- 2.2.1 TRNGs and Statistical Randomness Testing -- 2.2.2 Memristors and Memristor based TRNGs -- 2.2.3 Related Works -- 2.3 Proposed Multi-bit Random Number Generator -- 2.3.1 TRNG Architecture without Memristor -- 2.3.2 Bit Correlation Effect -- 2.4 Experimental Results -- 2.4.1 Simulation Setup Details -- 2.4.2 Statistical Randomness Testing Results -- 2.4.3 Entropy Calculation -- 2.5 Comparison with Existing Memristor Based TRNGs -- 2.6 Conclusion -- References -- 3. Secured Testing of AES Cryptographic ICs for IoT Devices -- 3.1 Introduction -- 3.2 Cryptography for Security in IoT Devices -- 3.3 Advanced Encryption Standard (AES) Algorithm for Security in IoT Devices -- 3.4 Scan-based Side-channel Attack on AES Cryptographic ICs -- 3.5 Design and Simulation of Scan-inserted AES Crypto Module -- 3.5.1 Design of AES -- 3.5.2 Design and Simulation of Scan-inserted AES Design.
Item Description:Description based on publisher supplied metadata and other sources
Physical Description:1 Online-Ressource (xi, 307 Seiten) Illustrationen, Diagramme
ISBN:9781003127598
9781000421729
DOI:10.1201/9781003127598