Design and SOPC-Based Realization of a Video Chaotic Secure Communication Scheme

2018 ◽  
Vol 28 (13) ◽  
pp. 1850160 ◽  
Author(s):  
Ping Chen ◽  
Simin Yu ◽  
Baoju Chen ◽  
Liangshan Xiao ◽  
Jinhu Lü

This paper proposes a new approach for hardware realization based on a system with programmable chip (SOPC) technology. The main feature of the SOPC-based scheme is that it can make full use of both FPGA and ARM, where the FPGA is used for video capturing, displaying, encrypting and decrypting, the ARM is adopted for TCP/IP protocol, Ethernet sending and receiving. SOPC technology gives full play to the advantages of both FPGA and ARM that complement each other, leading to better real-time performance and is more convenient for hardware realization. In addition, some results of security analysis are also given. Hardware realization results verify the feasibility and effectiveness of the proposed SOPC-based approach.

Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 647
Author(s):  
Bin Ma ◽  
Shichun Yang ◽  
Zheng Zuo ◽  
Bosong Zou ◽  
Yaoguang Cao ◽  
...  

The rapid development of intelligent networked vehicles (ICVs) has brought many positive effects. Unfortunately, connecting to the outside exposes ICVs to security threats. Using secure protocols is an important approach to protect ICVs from hacker attacks and has become a hot research area for vehicle security. However, most of the previous studies were carried out on V2X networks, while those on in-vehicle networks (IVNs) did not involve Ethernet. To this end, oriented to the new IVNs based on Ethernet, we designed an efficient secure scheme, including an authentication scheme using the Scalable Service-Oriented Middleware over IP (SOME/IP) protocol and a secure communication scheme modifying the payload field of the original SOME/IP data frame. The security analysis shows that the designed authentication scheme can provide mutual identity authentication for communicating parties and ensure the confidentiality of the issued temporary session key; the designed authentication and secure communication scheme can resist the common malicious attacks conjointly. The performance experiments based on embedded devices show that the additional overhead introduced by the secure scheme is very limited. The secure scheme proposed in this article can promote the popularization of the SOME/IP protocol in IVNs and contribute to the secure communication of IVNs.


2020 ◽  
Vol 30 (05) ◽  
pp. 2050075
Author(s):  
Baoju Chen ◽  
Simin Yu ◽  
Ping Chen ◽  
Liangshan Xiao ◽  
Jinhu Lü

In this paper, a Virtex-7-based video chaotic secure communication scheme is investigated. First, the network sending and receiving controller Intellectual Property (IP) cores are designed. Next, the chaotic encryption and decryption IP cores are implemented using fixed-point algorithm, pipeline operation, and state machine control. Thus, video capturing, video displaying, network sending, network receiving, chaotic encrypting, and chaotic decrypting can be achieved via IP core integration design. An improved 7D chaotic stream cipher algorithm for resisting divide-and-conquer attack is then designed and realized on a Virtex-7 high-end FPGA platform. Hardware experimental results are also given to verify the feasibility of the scheme.


2005 ◽  
Vol 342 (4) ◽  
pp. 305-308 ◽  
Author(s):  
Changchun Hua ◽  
Bo Yang ◽  
Gaoxiang Ouyang ◽  
Xinping Guan

SIMULATION ◽  
2021 ◽  
pp. 003754972098686
Author(s):  
Jinchao Chen ◽  
Chenglie Du ◽  
Pengcheng Han ◽  
Xiaoyan Du

Simulation has been widely adopted as a support tool for the validation and experimentation of distributed systems. It allows different devices and applications to be evaluated and analyzed without requiring the actual presence of those machines. Although the simulation plays an important role in investigating and evaluating the behaviors of devices, it results in a serious simulator building problem as the distributed systems become more and more complicated and dynamically data driven. Most of the existing simulators are designed and developed to target a specific type of application, lacking the capabilities to be a configurable and standardized tool for researchers. To solve the adaptability and reusability problems of simulators, this paper proposes a new approach to design and implement a configurable real-time digital simulator for hardware devices that are connected via data buses in distributed systems. First, the proposed simulator uses a logic automaton to simulate the activities of a real device, and generates the incentive data for tested equipment according to the predefined XML-based files. Then with a virtual bus, the simulator can receive, handle, and send data in various network environments, improving the flexibility and adaptability of a simulator design. Experimental results show that the proposed simulator has a high real-time performance, and can meet the increasing requirements of modern simulations of distributed systems.


2021 ◽  
Vol 31 (03) ◽  
pp. 2150045
Author(s):  
Baoju Chen ◽  
Simin Yu ◽  
Zeqing Zhang ◽  
David Day-Uei Li ◽  
Jinhu Lü

In this paper, a chaotic duplex H.264-codec-based secure video communication scheme is designed and its smartphone implementation is also carried out. First, an improved self-synchronous chaotic stream cipher algorithm equipped with a sinusoidal modulation, a multiplication, a modulo operation and a round down operation (SCSCA-SMMR) is developed. Using the sinusoidal modulation and multiplication, the improved algorithm can resist the divide-and-conquer attack by traversing multiple nonzero component initial conditions (DCA-TMNCIC). Meanwhile, also by means of the round down operation and modulo operation, on the premise that the DCA-TMNCIC does not work, the original keys cannot be further deciphered only by the known-plaintext attack, the chosen-plaintext attack and the chosen-ciphertext attack, respectively. Then, the Android low-level multimedia support infrastructure MediaCodec class is used to access low-level media encoder/decoder components and the H.264 hardware encoding/decoding is performed on real-time videos, so the chaotic video encryption and decryption can be realized in real-time by smartphones. Security analysis and smartphone experimental results verify the effectiveness of the proposed method.


2008 ◽  
Vol 372 (33) ◽  
pp. 5442-5447 ◽  
Author(s):  
Yonghui Sun ◽  
Jinde Cao ◽  
Gang Feng

Sign in / Sign up

Export Citation Format

Share Document