Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption Challenges

被引:3
|
作者
Nyako, Kwame [1 ]
Devkota, Suman [1 ]
Li, Frank [1 ]
Borra, Vamsi [1 ]
机构
[1] Youngstown State Univ, Rayen Sch Engn, Elect & Comp Engn Program, Youngstown, OH 44555 USA
关键词
counterfeit; detection; trust; microelectronics; COUNTERFEIT INTEGRATED-CIRCUITS; AUTHENTICATION;
D O I
10.3390/electronics12224618
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The field of microelectronics has experienced extensive integration into various aspects of our everyday lives, evident via its utilization across a wide range of devices such as cellphones, airplanes, computers, wristwatches, and other similar technologies. Microelectronics are vital to the healthcare and defense industries, making them vulnerable to counterfeit products. Currently, the complicated global microelectronics supply chain involves the production of varied components in multiple places, resulting in tremendous risk. In this scenario, it is possible for hostile or adversarial actors to exploit the situation by intentionally introducing counterfeit components. This hostile behavior could steal data or use these components as remote kill switches. To address these problems, enormous resources are being committed to research, innovation, and development to build trust in microelectronics. This research study provides a thorough analysis of the taxonomy associated with prominent attack, detection, and avoidance models in the realm of counterfeit microelectronics. This research aims to improve our understanding of dependable microelectronics. Prevention strategies like Physical Unclonable Functions (PUFs) and machine learning (ML), and detection methods like aging-based fingerprints are reviewed in this study. Finally, we underscore the significance of interdisciplinary cooperation, commitment to norms, and proactive methods.
引用
收藏
页数:22
相关论文
共 50 条
  • [41] Artificial Intelligence in Healthcare: Review, Ethics, Trust Challenges & Future Research Directions
    Kumar, Pranjal
    Chauhan, Siddhartha
    Awasthi, Lalit Kumar
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2023, 120
  • [42] Unraveling the complexity of Stenotrophomonas maltophilia - a comprehensive review of current knowledge
    Niemiec, Bartosz
    Olesinski, Bruno
    Szymanski, Mateusz
    Cendrowska-Pinkosz, Monika
    POSTEPY HIGIENY I MEDYCYNY DOSWIADCZALNEJ, 2024, 78 (01): : 103 - 110
  • [43] Futility Disputes: A Review of the Literature and Proposed Model for Dispute Navigation Through Trust Building
    Leland, Brian D.
    Torke, Alexia M.
    Wocial, Lucia D.
    Helft, Paul R.
    JOURNAL OF INTENSIVE CARE MEDICINE, 2017, 32 (09) : 523 - 527
  • [44] Trust management technique in wireless sensor networks: challenges and issues for reliable communication: a review
    V. R. Sarma Dhulipala
    N. Karthik
    CSI Transactions on ICT, 2017, 5 (3) : 281 - 294
  • [45] Community engagement and building trust to resolve ethical challenges during humanitarian crises: experience from the CAGED study
    Getnet Yimer
    Wondwossen Gebreyes
    Arie Havelaar
    Jemal Yousuf
    Sarah McKune
    Abdulmuen Mohammed
    Dónal O’Mathúna
    Conflict and Health, 14
  • [46] Community engagement and building trust to resolve ethical challenges during humanitarian crises: experience from the CAGED study
    Yimer, Getnet
    Gebreyes, Wondwossen
    Havelaar, Arie
    Yousuf, Jemal
    McKune, Sarah
    Mohammed, Abdulmuen
    O'Mathuna, Donal
    CONFLICT AND HEALTH, 2020, 14 (01)
  • [47] Unveiling the core of IoT: comprehensive review on data security challenges and mitigation strategies
    Kaur, Kawalpreet
    Kaur, Amanpreet
    Gulzar, Yonis
    Gandhi, Vidhyotma
    FRONTIERS IN COMPUTER SCIENCE, 2024, 6
  • [48] Security in IoMT-driven smart healthcare: A comprehensive review and open challenges
    Garg, Neha
    Wazid, Mohammad
    Singh, Jaskaran
    Singh, D. P.
    Das, Ashok Kumar
    SECURITY AND PRIVACY, 2022, 5 (05):
  • [49] A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-Based Approaches
    Muzammal, Syeda M.
    Murugesan, Raja Kumar
    Jhanjhi, N. Z.
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) : 4186 - 4210
  • [50] The essential position of trust in the technology acceptance model: a comprehensive review and bibliometric analysis in management studies
    Asif, Muhammad
    Sarwar, Farhan
    JOURNAL OF MODELLING IN MANAGEMENT, 2025,