Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption Challenges

被引:3
|
作者
Nyako, Kwame [1 ]
Devkota, Suman [1 ]
Li, Frank [1 ]
Borra, Vamsi [1 ]
机构
[1] Youngstown State Univ, Rayen Sch Engn, Elect & Comp Engn Program, Youngstown, OH 44555 USA
关键词
counterfeit; detection; trust; microelectronics; COUNTERFEIT INTEGRATED-CIRCUITS; AUTHENTICATION;
D O I
10.3390/electronics12224618
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The field of microelectronics has experienced extensive integration into various aspects of our everyday lives, evident via its utilization across a wide range of devices such as cellphones, airplanes, computers, wristwatches, and other similar technologies. Microelectronics are vital to the healthcare and defense industries, making them vulnerable to counterfeit products. Currently, the complicated global microelectronics supply chain involves the production of varied components in multiple places, resulting in tremendous risk. In this scenario, it is possible for hostile or adversarial actors to exploit the situation by intentionally introducing counterfeit components. This hostile behavior could steal data or use these components as remote kill switches. To address these problems, enormous resources are being committed to research, innovation, and development to build trust in microelectronics. This research study provides a thorough analysis of the taxonomy associated with prominent attack, detection, and avoidance models in the realm of counterfeit microelectronics. This research aims to improve our understanding of dependable microelectronics. Prevention strategies like Physical Unclonable Functions (PUFs) and machine learning (ML), and detection methods like aging-based fingerprints are reviewed in this study. Finally, we underscore the significance of interdisciplinary cooperation, commitment to norms, and proactive methods.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] A review of digital watermarking techniques: Current trends, challenges and opportunities
    Singh, Balkar
    Kasana, Geeta
    WEB INTELLIGENCE, 2024, 22 (04)
  • [2] Building Trust in Cloud: Service Certification Challenges and Approaches
    Polash, Fahad
    Shiva, Sajjan
    2015 9TH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS CISIS 2015, 2015, : 187 - 191
  • [3] Building Trust in E-Government Adoption through an Intermediary Channel
    Al-Sobhi, Faris
    Weerakkody, Vishanth
    El-Haddadeh, Ramzi
    INTERNATIONAL JOURNAL OF ELECTRONIC GOVERNMENT RESEARCH, 2012, 8 (02) : 91 - 106
  • [4] Building Consumer Trust to Improve Internet of Things (IoT) Technology Adoption
    AlHogail, Areej
    AlShahrani, Mona
    ADVANCES IN NEUROERGONOMICS AND COGNITIVE ENGINEERING, 2019, 775 : 325 - 334
  • [5] Confucian values, trust, and family farm adoption of green control techniques
    Lili Yu
    Chen Chen
    Yang Gao
    Environmental Science and Pollution Research, 2020, 27 : 35099 - 35111
  • [6] Confucian values, trust, and family farm adoption of green control techniques
    Yu, Lili
    Chen, Chen
    Gao, Yang
    ENVIRONMENTAL SCIENCE AND POLLUTION RESEARCH, 2020, 27 (28) : 35099 - 35111
  • [7] The Role of Trust in E-Government Adoption: A Literature Review
    Akkaya, Cigdem
    Wolf, Petra
    Krcmar, Helmut
    AMCIS 2010 PROCEEDINGS, 2010,
  • [8] Perceptions and challenges of blockchain adoption in tourism industry: a study on trust, privacy and security
    Bolivar, Manuel Pedro Rodriguez
    Sepe, Fabiana
    Nanu, Luana
    Roberto, Fabiana
    JOURNAL OF HOSPITALITY AND TOURISM TECHNOLOGY, 2025, 16 (03) : 429 - 449
  • [9] Trust is essential: Identifying trust building techniques from youth providers across the service array
    Valenti, Michael
    Celedonia, Karen L.
    Wall-Parker, April
    Strickler, Amy
    CHILDREN AND YOUTH SERVICES REVIEW, 2020, 117
  • [10] Building trust in the sharing economy: Current approaches and future considerations
    Raisanen, Jaana
    Ojala, Arto
    Tuovinen, Tero
    JOURNAL OF CLEANER PRODUCTION, 2021, 279