Hardware Security at the Edge: A Discussion of Hardware Security Challenges and Tradeoffs Under Resource Constraints with Selected Example Primitives

Loading...
Thumbnail Image
Author(s)
Ellis, Zachary
Editor(s)
Associated Organization(s)
Series
Supplementary to:
Abstract
The explosion of smart devices into all realms of day-to-day life has been of great benefit to humanity allowing the measurement and control of many parts of the everyday in an automated fashion. Consumers can now choose to monitor parts of their home or collect data on their body to stay more informed on their health and spending. This unprecedented era of personalized data also poses a great security challenge for individuals and corporations to keep this potentially sensitive data secure. Many of these new devices operate in mobile or otherwise low power settings and are at a constraint for resources maximizing accuracy and communication speed. This work aims to address the impact of added security measures to these devices on a hardware level, quantifying the area, power, and speed impacts of added security with two example hardware primitives that may be used in edge devices now and in the future.
Sponsor
Date
2023-12-13
Extent
Resource Type
Text
Resource Subtype
Thesis
Rights Statement
Rights URI