Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption Challenges
The field of microelectronics has experienced extensive integration into various aspects of our everyday lives, evident via its utilization across a wide range of devices such as cellphones, airplanes, computers, wristwatches, and other similar technologies. Microelectronics are vital to the healthc...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-11-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/12/22/4618 |
_version_ | 1797459458120482816 |
---|---|
author | Kwame Nyako Suman Devkota Frank Li Vamsi Borra |
author_facet | Kwame Nyako Suman Devkota Frank Li Vamsi Borra |
author_sort | Kwame Nyako |
collection | DOAJ |
description | The field of microelectronics has experienced extensive integration into various aspects of our everyday lives, evident via its utilization across a wide range of devices such as cellphones, airplanes, computers, wristwatches, and other similar technologies. Microelectronics are vital to the healthcare and defense industries, making them vulnerable to counterfeit products. Currently, the complicated global microelectronics supply chain involves the production of varied components in multiple places, resulting in tremendous risk. In this scenario, it is possible for hostile or adversarial actors to exploit the situation by intentionally introducing counterfeit components. This hostile behavior could steal data or use these components as remote kill switches. To address these problems, enormous resources are being committed to research, innovation, and development to build trust in microelectronics. This research study provides a thorough analysis of the taxonomy associated with prominent attack, detection, and avoidance models in the realm of counterfeit microelectronics. This research aims to improve our understanding of dependable microelectronics. Prevention strategies like Physical Unclonable Functions (PUFs) and machine learning (ML), and detection methods like aging-based fingerprints are reviewed in this study. Finally, we underscore the significance of interdisciplinary cooperation, commitment to norms, and proactive methods. |
first_indexed | 2024-03-09T16:52:41Z |
format | Article |
id | doaj.art-51407853b47343bebc6da1fd16e8d445 |
institution | Directory Open Access Journal |
issn | 2079-9292 |
language | English |
last_indexed | 2024-03-09T16:52:41Z |
publishDate | 2023-11-01 |
publisher | MDPI AG |
record_format | Article |
series | Electronics |
spelling | doaj.art-51407853b47343bebc6da1fd16e8d4452023-11-24T14:39:17ZengMDPI AGElectronics2079-92922023-11-011222461810.3390/electronics12224618Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption ChallengesKwame Nyako0Suman Devkota1Frank Li2Vamsi Borra3Electrical and Computer Engineering Program, Rayen School of Engineering, Youngstown State University, Youngstown, OH 44555, USAElectrical and Computer Engineering Program, Rayen School of Engineering, Youngstown State University, Youngstown, OH 44555, USAElectrical and Computer Engineering Program, Rayen School of Engineering, Youngstown State University, Youngstown, OH 44555, USAElectrical and Computer Engineering Program, Rayen School of Engineering, Youngstown State University, Youngstown, OH 44555, USAThe field of microelectronics has experienced extensive integration into various aspects of our everyday lives, evident via its utilization across a wide range of devices such as cellphones, airplanes, computers, wristwatches, and other similar technologies. Microelectronics are vital to the healthcare and defense industries, making them vulnerable to counterfeit products. Currently, the complicated global microelectronics supply chain involves the production of varied components in multiple places, resulting in tremendous risk. In this scenario, it is possible for hostile or adversarial actors to exploit the situation by intentionally introducing counterfeit components. This hostile behavior could steal data or use these components as remote kill switches. To address these problems, enormous resources are being committed to research, innovation, and development to build trust in microelectronics. This research study provides a thorough analysis of the taxonomy associated with prominent attack, detection, and avoidance models in the realm of counterfeit microelectronics. This research aims to improve our understanding of dependable microelectronics. Prevention strategies like Physical Unclonable Functions (PUFs) and machine learning (ML), and detection methods like aging-based fingerprints are reviewed in this study. Finally, we underscore the significance of interdisciplinary cooperation, commitment to norms, and proactive methods.https://www.mdpi.com/2079-9292/12/22/4618counterfeitdetectiontrustmicroelectronics |
spellingShingle | Kwame Nyako Suman Devkota Frank Li Vamsi Borra Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption Challenges Electronics counterfeit detection trust microelectronics |
title | Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption Challenges |
title_full | Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption Challenges |
title_fullStr | Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption Challenges |
title_full_unstemmed | Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption Challenges |
title_short | Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption Challenges |
title_sort | building trust in microelectronics a comprehensive review of current techniques and adoption challenges |
topic | counterfeit detection trust microelectronics |
url | https://www.mdpi.com/2079-9292/12/22/4618 |
work_keys_str_mv | AT kwamenyako buildingtrustinmicroelectronicsacomprehensivereviewofcurrenttechniquesandadoptionchallenges AT sumandevkota buildingtrustinmicroelectronicsacomprehensivereviewofcurrenttechniquesandadoptionchallenges AT frankli buildingtrustinmicroelectronicsacomprehensivereviewofcurrenttechniquesandadoptionchallenges AT vamsiborra buildingtrustinmicroelectronicsacomprehensivereviewofcurrenttechniquesandadoptionchallenges |