Fr. 135.00

Trusted Computing for Embedded Systems

English · Paperback / Softback

Shipping usually within 6 to 7 weeks

Description

Read more

This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc.
· Enables readers to address a variety of security threats to embedded hardware and software;
· Describes design of secure wireless sensor networks, to address secure authentication of trusted portable devices for embedded systems;
· Presents secure solutions for the design of smart-grid applications and their deployment in large-scale networked and systems.


List of contents

Part I Introduction.- Programming Interfaces for the TPM.- Part II Application-Use cases.- Chapter 2: ARM TrustZone.- Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges.- Authentication and mutual authentication.- Low power Wireless Sensor Networks: Secure applications and remote distribution of FW updates with key management on WSN.- Part III Building blocks.- Physically Unclonable Function: Principle, design and characterization of the Loop PUF.- Physically Unclonable Function: Design of a silicon arbiter-PUF on
CMOS 65 nm.- Secure Key Generator using a Loop-PUF.- Fault Sensitivity Analysis at Design Time.- Information Theoretic Comparison of Side-channel Distinguishers.- Part III Advanced Galileo Positioning technologies.- Wireless Sensor Networks: Routing protocol for critical infrastructure protection.- Wireless Sensor Networks: Virtual platform for performance
analysis and attack simulation.- Heap management for trusted operating environments.- IP-XACT extensions for cryptographic IP.

Summary

This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc.·         Enables readers to address a variety of security threats to embedded hardware and software;·         Describes design of secure wireless sensor networks, to address secure authentication of trusted portable devices for embedded systems;·         Presents secure solutions for the design of smart-grid applications and their deployment in large-scale networked and systems. 

Product details

Assisted by Iraklis Anagnostopoulos (Editor), Bernard Candaele (Editor), Dimitrio Soudris (Editor), Dimitrios Soudris (Editor)
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 01.01.2016
 
EAN 9783319362793
ISBN 978-3-31-936279-3
No. of pages 299
Dimensions 156 mm x 236 mm x 14 mm
Weight 559 g
Illustrations XXVI, 299 p. 151 illus., 102 illus. in color.
Subjects Natural sciences, medicine, IT, technology > Technology > Electronics, electrical engineering, communications engineering

B, Microprocessors, engineering, Systems and Data Security, Data and Information Security, Circuits and Systems, Electronics, Microelectronics, Electronics and Microelectronics, Instrumentation, Network Security, Computer security, Electronics engineering, Electronic circuits, Electronic Circuits and Systems, Computer architecture & logic design, Processor Architectures

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.