Hardware security and test: Friends or enemies?

2014 ◽  
Vol 56 (4) ◽  
Author(s):  
Ilia Polian

AbstractHardware security is a relatively new scientific discipline which focuses on adversarial threats to hardware components of complex systems and infrastructures, including manipulation, unauthorized access to confidential data, and intellectual property theft. State-of-the-art test methods can contribute to detection and elimination of security threats but also may introduce new vulnerabilities. This article will explain this dichotomy and outline current research challenges.

2021 ◽  
Vol 16 (2) ◽  
pp. 111-135
Author(s):  
Emilio M. Sanfilippo

Information entities are used in ontologies to represent engineering technical specifications, health records, pictures or librarian data about, e.g., narrative fictions, among others. The literature in applied ontology lacks a comparison of the state of the art, and foundational questions on the nature of information entities remain open for research. The purpose of the paper is twofold. First, to compare existing ontologies with both each other and theories proposed in philosophy, semiotics, librarianship, and literary studies in order to understand how the ontologies conceive and model information entities. Second, to discuss some open research challenges that can lead to principled approaches for the treatment of information entities, possibly by getting into account the variety of information entity types found in the literature.


2020 ◽  
Vol 2020 ◽  
pp. 1-16
Author(s):  
Ijaz Ahmad Awan ◽  
Muhammad Shiraz ◽  
Muhammad Usman Hashmi ◽  
Qaisar Shaheen ◽  
Rizwan Akhtar ◽  
...  

The tremendous growth of computational clouds has attracted and enabled intensive computation on resource-constrained client devices. Predominantly, smart mobiles are enabled to deploy data and computational intensive applications by leveraging on the demand service model of remote data centres. However, outsourcing personal and confidential data to the remote data servers is challenging for the reason of new issues involved in data privacy and security. Therefore, the traditional advanced encryption standard (AES) algorithm needs to be enhanced in order to cope with the emerging security threats in the cloud environment. This research presents a framework with key features including enhanced security and owner’s data privacy. It modifies the 128 AES algorithm to increase the speed of the encryption process, 1000 blocks per second, by the double round key feature. However, traditionally, there is a single round key with 800 blocks per second. The proposed algorithm involves less power consumption, better load balancing, and enhanced trust and resource management on the network. The proposed framework includes deployment of AES with 16, 32, 64, and 128 plain text bytes. Simulation results are visualized in a way that depicts suitability of the algorithm while achieving particular quality attributes. Results show that the proposed framework minimizes energy consumption by 14.43%, network usage by 11.53%, and delay by 15.67%. Hence, the proposed framework enhances security, minimizes resource utilization, and reduces delay while deploying services of computational clouds.


1973 ◽  
Vol 18 (3) ◽  
pp. 175-183 ◽  
Author(s):  
Nathan B. Epstein ◽  
Duane S. Bishop

In summary, it can be said that progress is being made in the field, but slowly. The ‘art’ is vigorous, vital and exciting. The ranks of family therapists are swelling and they are coming from backgrounds of different theoretical persuasions and with varying degrees of sophistication in their training and education. This mélange does lead to excitement and turbulence but often detracts from the necessary rigour that a scientific discipline must develop in order to reach maturity. Systems theory allows for easy conceptualization of one another's behaviour in the system, and permits a much clearer understanding of the therapeutic process based upon it, in contrast to therapeutic approaches based on other models. The authors found negotiation to be therapeutically effective when made explicit. In addition they place the focus on the ‘here and now’ and encourage the increased labeling by family members of interactions (affective and behavioural) and their effects (affective and behavioural), according to the Family Categories Schema previously referred to. Efforts are directed especially towards dealing with the current resistances to problem solutions. Epstein et al. have reported on an ongoing program of research which attempts to examine the process and outcome of family therapy (7,10,21,22,25,26). What is needed now is a more rigorous approach to research and the development of a necessary theoretical base in order that a more systematic and scientific approach can be developed for treating families.


2018 ◽  
Vol 2 (1) ◽  
pp. e83 ◽  
Author(s):  
Mithun Mukherjee ◽  
Jaime Lloret ◽  
Yunrong Lv

Electronics ◽  
2021 ◽  
Vol 10 (16) ◽  
pp. 1987
Author(s):  
Md. Selim Hossain ◽  
Md. Habibur Rahman ◽  
Md. Sazzadur Rahman ◽  
A. S. M. Sanwar Hosen ◽  
Changho Seo ◽  
...  

In this work, we examine the privacy and safety issues of Internet of Things (IoT)-based Precision Agriculture (PA), which could lead to the problem that industry is currently experiencing as a result of Intellectual Property Theft (IPT). Increasing IoT-based information flow in PA will make a system less secure if a proper security mechanism is not ensured. Shortly, IoT will transform everyday lives with its applications. Intellectual Property (IP) is another important concept of an intelligent farming system. If the IP of a wise farming system leaks, it damages all intellectual ideas like cultivation patterns, plant variety rights, and IoT generated information of IoT-based PA. Thus, we proposed an IoT enabled SDN gateway regulatory system that ensures control of a foreign device without having access to sensitive farm information. Most of the farm uses its devices without the use of its integrated management and memory unit. An SDN-based structure to solve IP theft in precision farming has been proposed. In our proposed concept, a control system integrates with the cloud server, which is called the control hub. This hub will carry out the overall PA monitoring system. By hiring the farm devices in the agricultural system, these devices must be tailored according to our systems. Therefore, our proposed PA is a management system for all controllable inputs. The overall goal is to increase the probability of profit and reduce the likelihood of IPT. It does not only give more information but also improves information securely by enhancing the overall performance of PA. Our proposed PA architecture has been measured based on the throughput, round trip time, jitter, packet error rate, and the cumulative distribution function. Our achieved results reduced around (1.66–6.46)% compared to the previous research. In the future, blockchain will be integrated with this proposed architecture for further implementation.


Author(s):  
Rafal Cupek ◽  
Marek Drewniak ◽  
Marcin Fojcik ◽  
Erik Kyrkjebø ◽  
Jerry Chun-Wei Lin ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document