Lightweight Hardware Security and Physically Unclonable Functions: Improving Security of Constrained IoT Devices

Author:   Kasem Khalil ,  Haytham Idriss ,  Tarek Idriss ,  Magdy Bayoumi
Publisher:   Springer International Publishing AG
ISBN:  

9783031763304


Pages:   152
Publication Date:   08 January 2026
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $211.17 Quantity:  
Add to Cart

Share |

Lightweight Hardware Security and Physically Unclonable Functions: Improving Security of Constrained IoT Devices


Overview

This book discusses the design and evaluation of Physically Unclonable Functions (PUFs) that are suitable for securing highly energy constrained devices, while at the same time classifying the many applications and devices that would benefit from various PUF designs. The authors provide a comprehensive study of the various approaches that are used to mitigate PUFs’ shortcomings, while at the same time highlighting those that are most efficient. Coverage also includes state-of-the-art approaches to designing PUFs with high resilience to machine learning attacks and hardware implementation of area-efficient and high performing PUF architectures. The authors also classify different IoT applications and devices, depending on their security needs and limitations, offering a new perspective on how different PUF designs fit in the overall scope of IoT security.

Full Product Details

Author:   Kasem Khalil ,  Haytham Idriss ,  Tarek Idriss ,  Magdy Bayoumi
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
ISBN:  

9783031763304


ISBN 10:   3031763300
Pages:   152
Publication Date:   08 January 2026
Audience:   Adult education ,  Further / Higher Education
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Chapter 1 Introduction and Background.- Chapter 2 Exploring Classic Security Attacks and Hardware Intricacies.- Chapter 3 Hardware Security Challenges.- Chapter 4 Security in Resource-Constrained IoT Devices.- Chapter 5 Physically Unclonable Functions.- Chapter 6 PUF: Security Threats.- Chapter 7 PUF Performance Testing and Evaluation.- Chapter 8 Improving the PUF’s Reliability.- Chapter 9 The Right Fit to your Device and Application.- Chapter 10 Advanced PUF designs.- Chapter 11 Lightweight PUF Protocols.

Reviews

Author Information

Dr. Kasem Khalil is an assistant professor in the Department of Electrical and Computer Engineering, University of Mississippi. Haytham Idriss is an Assistant Professor in the Department of Computer Science, at the Purdue University Fort Wayne. Tarek Idriss is an Associate Professor in the Department of Computer Science, at Western Washington University. Dr. Magdy A. Bayoumi is Director of The Center for Advanced Computer Studies (CACS), and Department Head of the Computer Science Department at the University of Louisiana at Lafayette (UL Lafayette). He is also the Z.L. Loflin Eminent Scholar Endowed Chair Professor in Computer Science.

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

RGFEB26

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List