Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption Challenges

The field of microelectronics has experienced extensive integration into various aspects of our everyday lives, evident via its utilization across a wide range of devices such as cellphones, airplanes, computers, wristwatches, and other similar technologies. Microelectronics are vital to the healthc...

Full description

Bibliographic Details
Main Authors: Kwame Nyako, Suman Devkota, Frank Li, Vamsi Borra
Format: Article
Language:English
Published: MDPI AG 2023-11-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/12/22/4618
_version_ 1797459458120482816
author Kwame Nyako
Suman Devkota
Frank Li
Vamsi Borra
author_facet Kwame Nyako
Suman Devkota
Frank Li
Vamsi Borra
author_sort Kwame Nyako
collection DOAJ
description The field of microelectronics has experienced extensive integration into various aspects of our everyday lives, evident via its utilization across a wide range of devices such as cellphones, airplanes, computers, wristwatches, and other similar technologies. Microelectronics are vital to the healthcare and defense industries, making them vulnerable to counterfeit products. Currently, the complicated global microelectronics supply chain involves the production of varied components in multiple places, resulting in tremendous risk. In this scenario, it is possible for hostile or adversarial actors to exploit the situation by intentionally introducing counterfeit components. This hostile behavior could steal data or use these components as remote kill switches. To address these problems, enormous resources are being committed to research, innovation, and development to build trust in microelectronics. This research study provides a thorough analysis of the taxonomy associated with prominent attack, detection, and avoidance models in the realm of counterfeit microelectronics. This research aims to improve our understanding of dependable microelectronics. Prevention strategies like Physical Unclonable Functions (PUFs) and machine learning (ML), and detection methods like aging-based fingerprints are reviewed in this study. Finally, we underscore the significance of interdisciplinary cooperation, commitment to norms, and proactive methods.
first_indexed 2024-03-09T16:52:41Z
format Article
id doaj.art-51407853b47343bebc6da1fd16e8d445
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-09T16:52:41Z
publishDate 2023-11-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-51407853b47343bebc6da1fd16e8d4452023-11-24T14:39:17ZengMDPI AGElectronics2079-92922023-11-011222461810.3390/electronics12224618Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption ChallengesKwame Nyako0Suman Devkota1Frank Li2Vamsi Borra3Electrical and Computer Engineering Program, Rayen School of Engineering, Youngstown State University, Youngstown, OH 44555, USAElectrical and Computer Engineering Program, Rayen School of Engineering, Youngstown State University, Youngstown, OH 44555, USAElectrical and Computer Engineering Program, Rayen School of Engineering, Youngstown State University, Youngstown, OH 44555, USAElectrical and Computer Engineering Program, Rayen School of Engineering, Youngstown State University, Youngstown, OH 44555, USAThe field of microelectronics has experienced extensive integration into various aspects of our everyday lives, evident via its utilization across a wide range of devices such as cellphones, airplanes, computers, wristwatches, and other similar technologies. Microelectronics are vital to the healthcare and defense industries, making them vulnerable to counterfeit products. Currently, the complicated global microelectronics supply chain involves the production of varied components in multiple places, resulting in tremendous risk. In this scenario, it is possible for hostile or adversarial actors to exploit the situation by intentionally introducing counterfeit components. This hostile behavior could steal data or use these components as remote kill switches. To address these problems, enormous resources are being committed to research, innovation, and development to build trust in microelectronics. This research study provides a thorough analysis of the taxonomy associated with prominent attack, detection, and avoidance models in the realm of counterfeit microelectronics. This research aims to improve our understanding of dependable microelectronics. Prevention strategies like Physical Unclonable Functions (PUFs) and machine learning (ML), and detection methods like aging-based fingerprints are reviewed in this study. Finally, we underscore the significance of interdisciplinary cooperation, commitment to norms, and proactive methods.https://www.mdpi.com/2079-9292/12/22/4618counterfeitdetectiontrustmicroelectronics
spellingShingle Kwame Nyako
Suman Devkota
Frank Li
Vamsi Borra
Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption Challenges
Electronics
counterfeit
detection
trust
microelectronics
title Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption Challenges
title_full Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption Challenges
title_fullStr Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption Challenges
title_full_unstemmed Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption Challenges
title_short Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption Challenges
title_sort building trust in microelectronics a comprehensive review of current techniques and adoption challenges
topic counterfeit
detection
trust
microelectronics
url https://www.mdpi.com/2079-9292/12/22/4618
work_keys_str_mv AT kwamenyako buildingtrustinmicroelectronicsacomprehensivereviewofcurrenttechniquesandadoptionchallenges
AT sumandevkota buildingtrustinmicroelectronicsacomprehensivereviewofcurrenttechniquesandadoptionchallenges
AT frankli buildingtrustinmicroelectronicsacomprehensivereviewofcurrenttechniquesandadoptionchallenges
AT vamsiborra buildingtrustinmicroelectronicsacomprehensivereviewofcurrenttechniquesandadoptionchallenges