Introduction.- Integrated Circuit Fingerprinting.- Novel PUF designs for device Identification.- Authentication Protocols: Standards, limitation and research opportunities.- Hardware-based Authentication Protocols for better physical security.- Energy Efficient Authentication Protocols.- Case study 1: Securing Hardware Supply Chain.- Case study 2: GPS spoofing attack detection and survival.