The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast. Today, there are many potential threats that are targeted at storage networks, including data modification, destruction and theft, DoS attacks, malware, hardware theft and unauthorized access, among others. In order for a Storage Area Network (SAN)...
Data De-duplication has become a commodity component in data-intensive storage systems. But compared with other traditional storage paradigms, de-duplication system achieves elimination of data duplications or redundancies at the cost of bringing several additional layers or function components into the I/O path, and these additional components are either CPU-intensive or I/O intensive, largely hindering...
Linear-time configurations and RAID have garnered great interest from both analysts and theorists in the last several years. Given the current status of pseudorandom models, cyberneticists obviously desire the study of DHCP, which embodies the extensive principles of machine learning. Based on the game-theoretic methodology and lossless algorithm, it is concluded that the discovered scheme can be...
In recent years, much research has been devoted to the exploration of artificial intelligence; unfortunately, few have explored the improvement of distributed algorithms. Given the current status of electronic symmetries, physicists urgently desire the deployment of the location-identity split, which embodies the natural principles of cryptography. We show that distributed algorithms can be made stochastic,...
A number of large-scale applications require 10 Gbps data transport rates between high-performance computing, storage and file systems, which are connected over wide-area networks. Achieving such capability requires end-to-end optimization of all required hardware and software components including: (i) long haul SONET or 10 GigE connections; (ii) transport protocols such as TCP and UDT, (iii) encryption...
One of the major QoS goals for future battlefield networks (FBN) is to ensure multi-level precedence and preemption (MLPP). Ensuring MLPP is difficult, partly due to the networking architecture for FBN which consists of wired ??red?? network connected by encrypted wireless ??black?? network. The security requirements for FBN do not allow passing information from black to red networks. So when congestion...
It is widely known that TCP's congestion control algorithm can cause it to under-perform when round trip times and error rates are high. Performance Enhancing Proxies (PEPs) can improve performance by breaking end-to-end TCP connections and using a separate, tuned transport protocol to transit 'stressed' links. While PEPs can be tuned to work well when a single pair of PEPs bracket a fixed-rate link,...
The AES algorithm published in 2001 is now the most popular symmetric encryption algorithm. Several implementations have beed proposed but few of them considered the hardware cost and the throughput as a whole. This paper presents an AES core to be capable of both encryption and decryption with three different key lengths: 128-, 192-, and 256-bit. The overall hardware cost was optimized by a very...
Bulk file access is a read access to a large number of files in a file system. Example applications that use bulk file access extensively are anti-virus (AV) scanner, file-level data back-up agent, filesystem defragmentation tool, etc. This paper describes the design, implementation, and evaluation of an optimization to modern file systems that is designed to improve the read efficiency of bulk file...
We present the smallest FPGA implementation of Camellia for 128-bit key length to date. This architecture was designed for low area and low power applications. Through specific optimizations such as shift registers for storing and scheduling key, distributed RAM for storing data, we achieved compact implementation using only 318 slices at a throughput of 18.41 Mbps on the smallest Xilinx Spartan-3...
In this paper we present the design of a novel embedded processor architecture (which we call a mu-core) that makes use of a reconfigurable ALU. This core serves as the basis of custom 2-dimensional array architectures that can be used to accelerate algorithms such as cryptography and image processing. An efficient translation and mapping of instructions from the multi-core grid to the individual...
In this article, we show how the use of a bio-inspired dynamic task replication algorithm, in the context of stream processing, can be used to significantly improve the performance of embedded programs. We also show that this programming methodology, which is not tied to a particular implementation, can also be used as an heuristic for task mapping in the context of embedded multiprocessors systems...
Since its adoption as a new encryption standard by NIST, the Advanced Encryption Standard (AES) has become the default choice for various applications. On the other hand, a straightforward implementation of the AES is vulnerable to different forms of side channel attacks. In this paper, we explore several countermeasure techniques against power analysis attacks. In particular, we present an area optimized...
In this paper, we study the overhead introduced by the advanced encryption standard cipher in the context of wireless LANs, specifically at the medium access control layer, as described in the 802.11 standard developed by the 802.11n task group. We compute the maximum throughput, optimal frame, and fragment sizes which can be achieved in this context and compare them to the optimal values when encryption...
This paper presents a high-throughput GCM VLSI architecture fully compliant to IEEE 802.1ae applications, which can be operated in all modes specified in the standard. Unlike previous works, with the modified parallel GHASH module, the design implements encryption efficiently without knowing the total number of data blocks in advance. Furthermore, a fully subpipelined version of loop-free key expansion...
Given the current status of interactive symmetries, steganographers dubiously desire the study of DNS, which embodies the structured principles of certifiable networking. The relational algorithms and wide-area networks are introduced and described, which has garnered great interest from both security experts and systems engineers. Based on the results from the designed experiment configuration, it...
Multiprocessor platforms are gaining markets as a solution to boost general performance of processor beyond technological limitations that are present in single processors chips, Multi-processor in embedded systems also have a future in particular with applications like SDR(Software Defined Radio) where both high performance and high adaptability are required. Cryptographic algorithms implementation...
Traditionally, network-based intrusion detection systems (NIDS) monitor network traffic for signs of malicious activities. However, with the growing use of virtual private networks (VPNs) that encrypt network traffic, the NIDS can no longer analyse the encrypted data. This essentially negates any protection offered by the NIDS. Although the encrypted traffic can be decrypted at a network gateway for...
In the next years, new hash function candidates will replace the old MD5 and SHA-1 standards and the current SHA-2 family. The hash algorithms RadioGatun and irRUPT are potential successors based on a stream structure, which allows the achievement of high throughputs (particularly with long input messages) with minimal area occupation. In this paper, several hardware architectures of the two above...
Ultra-wideband (UWB) is a new technology that enables wireless connectivity with consistent high data rates across multiple devices, such as high-definition television (HDTV) receivers, PCs, printers and digital cameras, within the digital home, and the office. In this paper, we focus on UWB transmissions where multiple accesses to the channel are coordinated by the IEEE 802.15.3 medium access control...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.