Statistical trend analysis of physically unclonable functions : an approach via text mining

Author(s)
    • Zolfaghari, Behrouz
Bibliographic Information

Statistical trend analysis of physically unclonable functions : an approach via text mining

Behrouz Zolfaghari, Khodakhast Bibak, Takeshi Koshiba, Hamid R. Nemati, Pinaki Mitra

CRC Press, 2021

Search this Book/Journal
Note

Includes bibliographical references and index

Summary: "Physically Unclonable Functions (PUFs) translate unavoidable variations in certain parameters of materials, waves, or devices into random and unique signals. They have found many applications in the Internet of Things (IoT), authentication systems, FPGA industry, several other areas in communications and related technologies, and many commercial products. Statistical Trend Analysis of Physically Unclonable Functions first presents a review on cryptographic hardware and hardware-assisted cryptography. The review highlights PUF as a mega trend in research on cryptographic hardware design. Afterwards, the authors present a combined survey and research work on PUFs using a systematic approach. As part of the survey aspect, a state-of-the-art analysis is presented as well as a taxonomy on PUFs, a life cycle, and an established ecosystem for the technology. In another part of the survey, the evolutionary history of PUFs is examined, and strategies for further research in this area are suggested"-- Provide

Description and Table of Contents

Description

Physically Unclonable Functions (PUFs) translate unavoidable variations in certain parameters of materials, waves, or devices into random and unique signals. They have found many applications in the Internet of Things (IoT), authentication systems, FPGA industry, several other areas in communications and related technologies, and many commercial products. Statistical Trend Analysis of Physically Unclonable Functions first presents a review on cryptographic hardware and hardware-assisted cryptography. The review highlights PUF as a mega trend in research on cryptographic hardware design. Afterwards, the authors present a combined survey and research work on PUFs using a systematic approach. As part of the survey aspect, a state-of-the-art analysis is presented as well as a taxonomy on PUFs, a life cycle, and an established ecosystem for the technology. In another part of the survey, the evolutionary history of PUFs is examined, and strategies for further research in this area are suggested. In the research side, this book presents a novel approach for trend analysis that can be applied to any technology or research area. In this method, a text mining tool is used which extracts 1020 keywords from the titles of the sample papers. Then, a classifying tool classifies the keywords into 295 meaningful research topics. The popularity of each topic is then numerically measured and analyzed over the course of time through a statistical analysis on the number of research papers related to the topic as well as the number of their citations. The authors identify the most popular topics in four different domains; over the history of PUFs, during the recent years, in top conferences, and in top journals. The results are used to present an evolution study as well as a trend analysis and develop a roadmap for future research in this area. This method gives an automatic popularity-based statistical trend analysis which eliminates the need for passing personal judgments about the direction of trends, and provides concrete evidence to the future direction of research on PUFs. Another advantage of this method is the possibility of studying a whole lot of existing research works (more than 700 in this book). This book will appeal to researchers in text mining, cryptography, hardware security, and IoT.

Table of Contents

Introduction Cryptographic Hardware and Hardware-Assisted Cryptography 2.1 Existing Surveys 2.2 Design 2.2.1 Cryptographic Primitives 2.2.2 Cryptographic Hardware 2.2.3 Hardware-Assisted Ciphers 2.2.4 Automatic Design and Synthesis 2.2.5 Design Objectives 2.3 Implementation 2.3.1 Prototyping 2.3.2 Implementation Technologies 2.3.3 Implementation Goals and Challenges 2.4 Evaluation 2.4.1 Security Evaluation 2.4.2 Simulation and Performance Benchmarking PUFs in Industry, Education Programs, and Books 3.1 Historical Background 3.2 PUF in Industry 3.3 PUF in Education Programs 3.4 PUF in Books Preliminary Discussions 4.1 Related Works: A Survey on Surveys 4.2 Motivations 4.3 Methodology 4.4 Work Space The classification Tree and Popularities 5.1 First Level Classification and Life Cycle 5.2 Design 5.2.1 Modeling 5.2.2 Design Objectives 5.2.3 Component Design 5.2.4 Post-Process, Expansion, Standardization and Alternatives 5.3 Implementation 5.4 Operation 5.4.1 Ecosystem 5.4.2 Interfaces 5.5 Evaluation and Production Trend Analysis 6.1 Top Topics 6.1.1 The Most Popular Topics during the History 6.1.2 The Most Popular Topics in Top Conferences 6.1.3 Popular Topics in Top Journals 6.1.4 Popular Topics in Recent Years 6.2 Evolution Study Future Roadmap 7.1 Trends 7.2 Conclusions and Further Works References Index

by "Nielsen BookData"

Details
Page Top