The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents polymorphic logic gates for hardware security using giant spin Hall effect (GSHE) devices in which electron spin is the information token. Compared to existing CMOS (charge-based) IP protection and camouflaging security techniques, the proposed GSHE logic offers significant reduction in implementation area as well as power dissipation. Based on the Monte-Carlo simulation of stochastic...
We propose a new method of controlling IoT devices based on data transmission using available cloud storage services. Besides avoiding technical difficulties like NAT (Network Address Translation) traversal, this method has significant advantages including minimum economic cost, security services, general applicability, and convenient user experience. We demonstrate this method in a prototype experiment...
The current IPsec gateway integrates many functions of IPsec operation, tunnel management and forwarding decision, which makes the IPsec gateway complicated in maintenance and deployment. The problem of maintaining such devices prevents IPsec VPN from applying widely. The emergence of SDN provides an innovative way to decouple the control plane and data plane. In this paper, a Software-Defined IPsec...
The number of connected devices is increasing exponentially, which has made the job of managing and securing networks more complex and demanding than ever before. In this paper, we present a novel service-based solution for securing edge networks that are poorly managed and do not offer adequate security and management features. Our proposed system includes a smart gateway Securebox offering advanced...
With the miniaturization of devices and development of network infrastructure, the use of Machine-to-Machine (M2M) or Internet of Things (IoT) services are becoming widespread. The arrival of M2M/IoT raises many questions such as how to suit the current computer security standard to IoT devices, how to accommodate the huge number of IoT devices, and how to meet the heterogonous requirements from a...
The Internet of Things (IoT) devices have become popular in diverse domains such as e-Health, e-Home, e-Commerce, and e-Trafficking, etc. With increased deployment of IoT devices in the real world, they can be, and in some cases, already are subject to malicious attacks to compromise the security and privacy of the IoT devices. While a number of researchers have explored such security challenges and...
In applications such as nuclear power plant, space and military, safety critical systems play an important role, where security is one of the crucial design parameters. Similar to software Trojans (virus), Hardware Trojans (HT) are raising security concerns in recent years. HTs are malicious additions or modifications to existing circuit elements which are implemented either as always on or triggered...
The emergence of Internet of Things and the availability of inexpensive sensor devices and platforms capable of wireless communications enable a wide range of applications such as intelligent home and building automation, mobile healthcare, smart logistics, distributed monitoring, smart grids, energy management, asset tracking to name a few. These devices are expected to employ Constrained Application...
Managing a heterogeneous “outer edge” network is complex and error prone. It is typically performed by non-technical users. Effective HAN configuration may be hampered by a poor understanding of HAN service requirements. A challenge is to deploy and maintain meaningful and error-free heterogeneous HAN configurations. This paper explores an integrated solution to address the following requirements:...
The concept of transition from IPv4/IPv6 network is currently being extensively studied to gain high level compatibility for easy, independent deployment ofIPv6. The transition between IPv4 and IPv6 internet will be a very long process as they are completely incompatible two protocols. IPv6 offers various features including Larger addressing capacity and capabilities, QoS control, encryption and decryption,...
With the growing demands for computer network communication, it becomes increasingly important to secure the data flow path. The existing research related to security mechanisms only focuses on securing the flow of information in the communication networks. There is a lack of work on improving the performance of networks to meet quality of service (QoS) constrains for various applications. The security...
This paper presents principles and results of dynamic testing of an SRAM-based FPGA using time- resolved fault injection with a pulsed laser. The synchronization setup and experimental procedure are detailed. Fault injection results obtained with a DES crypto-core application implemented on a Xilinx Virtex II are discussed.
Multi-core SoC created great opportunities to increase overall system performance while keeping the power in check but also created many design challenges that designers must now overcome. The challenge of doubling performance every two years used to drive superscalar design with more functional units running concurrently or deeper pipeline racing for highest frequency at the cost of higher power...
Ensuring that IP Security (IPSec) gateway meets its performance expectations is one of the most important objectives that IPSec gateway development team must face with. Only suitable validation approach may prove that IPSec gateway throughput is correct, Security Associationspsila adding/removing time is acceptable, IPSec gateway is capable of processing huge number of flows and IPSec rekeying works...
Anti-virus applications play an important role in today's Internet communication security. Virus scanning is usually performed on email, Web and file transfer traffic flows at intranet security gateways. The performance of popular anti-virus applications relies on the pattern matching algorithms implemented in these security devices. The growth of network bandwidth and the increase of virus signatures...
Video-streaming can now be offered on third-generation (3G) mobile networks. Most research efforts have focused on video download. This paper presents a detailed study of challenges faced for successfully deploying applications requiring life video upload. Both subjective and objective qualities as well as the effects of mobility are analyzed on real 3G networks. Consequently, video profiles are identified...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.