Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
P2M‐based security model: security enhancement using combined PUF and PRNG models for authenticating consumer electronic devices
by
Wortman, Paul
, Tehranipoor, Fatemeh
, Chandy, John
, Yan, Wei
in
Automation
/ Communication
/ Consumer electronics
/ Design
/ Embedded systems
/ Internet of Things
/ Random access memory
2018
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
P2M‐based security model: security enhancement using combined PUF and PRNG models for authenticating consumer electronic devices
by
Wortman, Paul
, Tehranipoor, Fatemeh
, Chandy, John
, Yan, Wei
in
Automation
/ Communication
/ Consumer electronics
/ Design
/ Embedded systems
/ Internet of Things
/ Random access memory
2018
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
P2M‐based security model: security enhancement using combined PUF and PRNG models for authenticating consumer electronic devices
by
Wortman, Paul
, Tehranipoor, Fatemeh
, Chandy, John
, Yan, Wei
in
Automation
/ Communication
/ Consumer electronics
/ Design
/ Embedded systems
/ Internet of Things
/ Random access memory
2018
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
P2M‐based security model: security enhancement using combined PUF and PRNG models for authenticating consumer electronic devices
Journal Article
P2M‐based security model: security enhancement using combined PUF and PRNG models for authenticating consumer electronic devices
2018
Request Book From Autostore
and Choose the Collection Method
Overview
Continued growth and development in the consumer electronic market have greatly increased in the realm of home automation. With this swelling in smart, Internet‐connected consumer electronics, there is a need to ensure the safe and secure use of these products. So how does one authenticate each product in a large connected environment? How can the authors minimise counterfeiting, cloning, and the presence of Trojans in customer electronics? In this study, they explore their method of using various physically unclonable functions (PUFs) as a potential seed for a pseudorandom number generators (PRNGs) element. These can then be used to authenticate consumer electronic devices or protect communication over a large interconnected network. The advantage of this work is that their method increases the difficulty of attackers to learn patterns of the seed of each PRNG while optimising PUF‐based constraints in different consumer electronic domains. Through this work they enhance the function of PRNGs, increasing the difficulty of attackers’ ability to model security systems, as well as present a lightweight and efficient solution to the growing security concerns. By making the PRNG more difficult to model, malicious actors are less able to overcome their proposed security enhancement leading to a safe and secure environment.
Publisher
John Wiley & Sons, Inc
Subject
This website uses cookies to ensure you get the best experience on our website.