Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption Challenges

被引:3
|
作者
Nyako, Kwame [1 ]
Devkota, Suman [1 ]
Li, Frank [1 ]
Borra, Vamsi [1 ]
机构
[1] Youngstown State Univ, Rayen Sch Engn, Elect & Comp Engn Program, Youngstown, OH 44555 USA
关键词
counterfeit; detection; trust; microelectronics; COUNTERFEIT INTEGRATED-CIRCUITS; AUTHENTICATION;
D O I
10.3390/electronics12224618
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The field of microelectronics has experienced extensive integration into various aspects of our everyday lives, evident via its utilization across a wide range of devices such as cellphones, airplanes, computers, wristwatches, and other similar technologies. Microelectronics are vital to the healthcare and defense industries, making them vulnerable to counterfeit products. Currently, the complicated global microelectronics supply chain involves the production of varied components in multiple places, resulting in tremendous risk. In this scenario, it is possible for hostile or adversarial actors to exploit the situation by intentionally introducing counterfeit components. This hostile behavior could steal data or use these components as remote kill switches. To address these problems, enormous resources are being committed to research, innovation, and development to build trust in microelectronics. This research study provides a thorough analysis of the taxonomy associated with prominent attack, detection, and avoidance models in the realm of counterfeit microelectronics. This research aims to improve our understanding of dependable microelectronics. Prevention strategies like Physical Unclonable Functions (PUFs) and machine learning (ML), and detection methods like aging-based fingerprints are reviewed in this study. Finally, we underscore the significance of interdisciplinary cooperation, commitment to norms, and proactive methods.
引用
收藏
页数:22
相关论文
共 50 条
  • [31] Building trust: A systematic review of the drivers and barriers of agricultural data sharing
    Sullivan, Clare S.
    Gemtou, Marilena
    Anastasiou, Evangelos
    Fountas, Spyros
    SMART AGRICULTURAL TECHNOLOGY, 2024, 8
  • [32] Factors Affecting Trust and Acceptance for Blockchain Adoption in Digital Payment Systems: A Systematic Review
    Norbu, Tenzin
    Park, Joo Yeon
    Wong, Kok Wai
    Cui, Hui
    FUTURE INTERNET, 2024, 16 (03)
  • [33] Data Quality and Trust: Review of Challenges and Opportunities for Data Sharing in IoT
    Byabazaire, John
    O'Hare, Gregory
    Delaney, Declan
    ELECTRONICS, 2020, 9 (12) : 1 - 22
  • [34] Multimedia Tampering Detection: A Comprehensive Review of Available Techniques and Solutions
    Tripathi, Gautami
    Ahad, Mohd Abdul
    Haq, Zeeshan Ali
    ADVANCES IN BIOINFORMATICS, MULTIMEDIA, AND ELECTRONICS CIRCUITS AND SIGNALS, 2020, 1064 : 223 - 235
  • [35] A Comprehensive Review of Unmanned Aerial Vehicle Attacks and Neutralization Techniques
    Chamola, Vinay
    Kotesh, Pavan
    Agarwal, Aayush
    Naren
    Gupta, Navneet
    Guizani, Mohsen
    AD HOC NETWORKS, 2021, 111 (111)
  • [36] Ventricular Fibrillation Prediction and Detection: A Comprehensive Review of Modern Techniques
    Fira, Monica
    Costin, Hariton-Nicolae
    Goraș, Liviu
    Applied Sciences (Switzerland), 2024, 14 (23):
  • [37] Trust Evaluation Techniques for 6G Networks: A Comprehensive Survey with Fuzzy Algorithm Approach
    Taleghani, Elmira Saeedi
    Valencia, Ronald Ivan Maldonado
    Orozco, Ana Lucila Sandoval
    Villalba, Luis Javier Garcia
    ELECTRONICS, 2024, 13 (15)
  • [39] Advancements in mechanical characterization techniques and environmental effects on bi-material interfaces in microelectronics: a literature review
    Ferreira, Renato A.
    Akhavan-Safar, Alireza
    Carbas, Ricardo J. C.
    Marques, Eduardo A. S.
    Karunamurthy, Bala
    da Silva, Lucas F. M.
    JOURNAL OF ADHESION, 2025, 101 (02) : 413 - 445
  • [40] A detailed study on trust management techniques for security and privacy in IoT: challenges, trends, and research directions
    Tyagi, Himani
    Kumar, Rajendra
    Pandey, Santosh Kr
    HIGH-CONFIDENCE COMPUTING, 2023, 3 (02):