Trusted Computing for Embedded Systems by Bernard CandaeleTrusted Computing for Embedded Systems by Bernard Candaele

Trusted Computing for Embedded Systems

byBernard CandaeleEditorDimitrios Soudris, Iraklis Anagnostopoulos

Hardcover | December 29, 2014

Pricing and Purchase Info

$194.06 online 
$234.95 list price save 17%
Earn 970 plum® points

Prices and offers may vary in store


In stock online

Ships free on orders over $25

Not available in stores


This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc.
Title:Trusted Computing for Embedded SystemsFormat:HardcoverDimensions:299 pagesPublished:December 29, 2014Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:331909419X

ISBN - 13:9783319094199

Look for similar items by category:


Table of Contents

Part I Introduction.- Programming Interfaces for the TPM.- Part II Application-Use cases.- Chapter 2: ARM TrustZone.- Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges.- Authentication and mutual authentication.- Low power Wireless Sensor Networks: Secure applications and remote distribution of FW updates with key management on WSN.- Part III Building blocks.- Physically Unclonable Function: Principle, design and characterization of the Loop PUF.- Physically Unclonable Function: Design of a silicon arbiter-PUF on
CMOS 65 nm.- Secure Key Generator using a Loop-PUF.- Fault Sensitivity Analysis at Design Time.- Information Theoretic Comparison of Side-channel Distinguishers.- Part III Advanced Galileo Positioning technologies.- Wireless Sensor Networks: Routing protocol for critical infrastructure protection.- Wireless Sensor Networks: Virtual platform for performance
analysis and attack simulation.- Heap management for trusted operating environments.- IP-XACT extensions for cryptographic IP.