The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With Ethernet as an ubiquitous technology also emerging in industrial networks, security is becoming one of the most important aspects. Whereas IT-networks together with their security features in the office domain are subject of a dynamic change, networks in the industrial environment have a long operational time and therefore are more vulnerable to unauthorized access due to outdated hard- and software...
Clock synchronization is a necessary feature in in-vehicle time- and safety-critical networks. The reason is that exact timing information has to be maintained in nodes, for instance for time stamps of messages that are important for safety-critical functions. A common time base has to be established at start-up time before time-sensitive data handling can begin. In vehicular applications, this clock...
In this paper an experimental test setup for the signal-strength based distance estimation of passive radio-frequency identification (RFID) tags is proposed. The system shall use freely available ultra high frequency (UHF) tags, and shall require no modifications of the tags or the communication protocol. A test setup based on a software defined radio (SDR) system is implemented. However, first measurements...
The efficiency of cryptographic algorithms when implemented in reconfigurable hardware is mainly determined by the fact of how the underlying finite field arithmetic operations are realized. Especially the field multiplication operation is crucial to the efficiency of a design, since it is the core operation of many cryptographic algorithms. This paper deals with the FPGA implementation of a Montgomery...
State-of-the-art implementations of modern embedded computing platforms nowadays often feature reconfigurable components and/or programmable cores. Since these systems are more often connected to a larger network well-thought-out security mechanisms have to be put in place. In order to protect the assets of a (networked) system several security objectives have to be met. By including support for cryptographic...
Maintaining the mobility of tomorrow's society is one of the most important challenges for the future. Since fossil fuels are limited, replacement energy sources, novel drive-systems and intermodal transportation concepts have to be researched. Currently, the “battery powered electric power-train” is one of the most promising technologies in the process of finding replacements for convential vehicle...
In the last couple of years, it has become obvious that embedded systems are integral parts of our every day lives. This omnipresence as well as the wireless nature of many embedded applications give rise to the need for sophisticated security and privacy preserving mechanisms. Trusted Computing is a promising new approach for computer security in which a system should be permanently in a well-defined...
It is amazing how accustomed we have grown to the ubiquitous threats in our every day computing lives. By now the design flaws in hardware components, as well as software applications and operating systems, are well known and can easily be exploited if an injection vector is found. Furthermore, there is a movement in the embedded sector to shift away from proprietary software and hardware components...
In present complex Embedded World, a large number of devices are based on embedded ×86 systems. The presence of ×86 architecture not only increases the complexity of the system but also makes the system a bit vulnerable. To overcome this weakness of embedded systems an intermediate hardware based solution is considered to be the best approach. The initiation of this work has been adapted from the...
Within the last few years attacks against IT systems have reached an alarming number. Since these systems are applied in more and more application fields the arising financial damage is tremendous. The Trusted Computing (TC) approach of the Trusted Computing Group (TCG) should ensure that a system is permanently in a well-defined and trustworthy state. However the TCG only defines the components necessary...
Since it is possible to use x86 based modules in embedded projects, the complexity of the Embedded World has increased dramatically. This paper describes the results of our current research work, which is aimed at helping the OEM customer of embedded modules, as well as the developers, to track down errors. The paper shows it is possible to monitor the electric power consumption of an embedded module...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.