scholarly journals A Configurable RO-PUF for Securing Embedded Systems Implemented on Programmable Devices

Electronics ◽  
2021 ◽  
Vol 10 (16) ◽  
pp. 1957
Author(s):  
Macarena C. Martínez-Rodríguez ◽  
Eros Camacho-Ruiz ◽  
Piedad Brox ◽  
Santiago Sánchez-Solano

Improving the security of electronic devices that support innovative critical services (digital administrative services, e-health, e-shopping, and on-line banking) is essential to lay the foundations of a secure digital society. Security schemes based on Physical Unclonable Functions (PUFs) take advantage of intrinsic characteristics of the hardware for the online generation of unique digital identifiers and cryptographic keys that allow to ensure the protection of the devices against counterfeiting and to preserve data privacy. This paper tackles the design of a configurable Ring Oscillator (RO) PUF that encompasses several strategies to provide an efficient solution in terms of area, timing response, and performance. RO-PUF implementation on programmable logic devices is conceived to minimize the use of available resources, while operating speed can be optimized by properly selecting the size of the elements used to obtain the PUF response. The work also describes the interface added to the PUF to facilitate its incorporation as hardware Intellectual Property (IP)-modules into embedded systems. The performance of the RO-PUF is proven with an extensive battery of tests, which are executed to analyze the influence of different test strategies on the PUF quality indexes. The configurability of the proposed RO-PUF allows establishing the most suitable “cost/performance/security-level” trade-off for a certain application.

2021 ◽  
Vol 109 (4) ◽  
pp. 243-260 ◽  
Author(s):  
Yves Wittwer ◽  
Robert Eichler ◽  
Dominik Herrmann ◽  
Andreas Türler

Abstract A new setup named Fast On-line Reaction Apparatus (FORA) is presented which allows for the efficient investigation and optimization of metal carbonyl complex (MCC) formation reactions under various reaction conditions. The setup contains a 252Cf-source producing short-lived Mo, Tc, Ru and Rh isotopes at a rate of a few atoms per second by its 3% spontaneous fission decay branch. Those atoms are transformed within FORA in-situ into volatile metal carbonyl complexes (MCCs) by using CO-containing carrier gases. Here, the design, operation and performance of FORA is discussed, revealing it as a suitable setup for performing single-atom chemistry studies. The influence of various gas-additives, such as CO2, CH4, H2, Ar, O2, H2O and ambient air, on the formation and transport of MCCs was investigated. O2, H2O and air were found to harm the formation and transport of MCCs in FORA, with H2O being the most severe. An exception is Tc, for which about 130 ppmv of H2O caused an increased production and transport of volatile compounds. The other gas-additives were not influencing the formation and transport efficiency of MCCs. Using an older setup called Miss Piggy based on a similar working principle as FORA, it was additionally investigated if gas-additives are mostly affecting the formation or only the transport stability of MCCs. It was found that mostly formation is impacted, as MCCs appear to be much less sensitive to reacting with gas-additives in comparison to the bare Mo, Tc, Ru and Rh atoms.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Tyler J. Adkins ◽  
Bradley S. Gary ◽  
Taraz G. Lee

AbstractIncentives can be used to increase motivation, leading to better learning and performance on skilled motor tasks. Prior work has shown that monetary punishments enhance on-line performance while equivalent monetary rewards enhance off-line skill retention. However, a large body of literature on loss aversion has shown that losses are treated as larger than equivalent gains. The divergence between the effects of punishments and reward on motor learning could be due to perceived differences in incentive value rather than valence per se. We test this hypothesis by manipulating incentive value and valence while participants trained to perform motor sequences. Consistent with our hypothesis, we found that large reward enhanced on-line performance but impaired the ability to retain the level of performance achieved during training. However, we also found that on-line performance was better with reward than punishment and that the effect of increasing incentive value was more linear with reward (small, medium, large) while the effect of value was more binary with punishment (large vs not large). These results suggest that there are differential effects of punishment and reward on motor learning and that these effects of valence are unlikely to be driven by differences in the subjective magnitude of gains and losses.


Electronics ◽  
2021 ◽  
Vol 10 (5) ◽  
pp. 560
Author(s):  
Andrea Bonci ◽  
Simone Fiori ◽  
Hiroshi Higashi ◽  
Toshihisa Tanaka ◽  
Federica Verdini

The prospect and potentiality of interfacing minds with machines has long captured human imagination. Recent advances in biomedical engineering, computer science, and neuroscience are making brain–computer interfaces a reality, paving the way to restoring and potentially augmenting human physical and mental capabilities. Applications of brain–computer interfaces are being explored in applications as diverse as security, lie detection, alertness monitoring, gaming, education, art, and human cognition augmentation. The present tutorial aims to survey the principal features and challenges of brain–computer interfaces (such as reliable acquisition of brain signals, filtering and processing of the acquired brainwaves, ethical and legal issues related to brain–computer interface (BCI), data privacy, and performance assessment) with special emphasis to biomedical engineering and automation engineering applications. The content of this paper is aimed at students, researchers, and practitioners to glimpse the multifaceted world of brain–computer interfacing.


2019 ◽  
Vol 10 (3) ◽  
pp. 743-766
Author(s):  
Anete Petrusch ◽  
Guilherme Luís Roehe Vaccaro ◽  
Juliane Luchese

Purpose Although discussed for more than 20 years, information about Lean adoption in higher education institutions (HEIs) is scarce, especially in developing countries. This research aims to investigate the degree of Lean thinking adoption on administrative services of Brazilian private HEIs. The results are compared to studies from USA and UK, highlighting the maturity on enablers, principles, tools and performance measures related to Lean. Design/methodology/approach A quantitative survey research was carried out. The instrument is adapted for HEIs from the proposal of Malmbrandt and Åhlström (2013) for Lean services. Cronbach’s alpha and factor analysis were used to validate the adapted instrument. Additional data analysis was based on non-parametric tests. Findings No evidence of broad implementation of Lean thinking in administrative processes of Brazilian private HEIs was found, with the adoption being incipient. The results are convergent to those presented by other studies in the USA and the UK. There is a gap between the existing knowledge about Lean in the academic sphere of the HEIs and its application on their academic processes. Research limitations/implications The effective sample size was of 47, despite contacts being sent to 2,090 institutions. This sample allows exploratory research, although further research is required. Results are adherent to those found in research from other countries. Originality/value The research presents descriptive and exploratory results regarding the adoption of Lean in Brazilian HEIs. No previous similar research was found in the literature.


A novel method to generate ECG feature oriented cryptographic keys is proposed. Due to the advantage of the uniqueness and randomness properties of ECG’s main feature, this feature is achieved. As the production of key depends on four reference- free ECG main features, Low-latency property is obtained. These features are obtained in short time. This process is referred as (SEF)-based cryptographic key production. The SEF has the following features like: 1) identifying the appearance time of ECG’s fiducial values by means of Daubechies wavelet transform to calculate ECG’s main features conversely; 2) A dynamic method is used to denote the best quantity of bits that can be obtained from the main ECG feature, which consists of PR, RR, PP, QT, and ST time periods; 3) Generating cryptographic keys by the ECG features extracted in the method mentioned above and 4) Making the SEF method as strong with cryptographically secure pseudo-random number generators. Fibonacci linear feedback shift register and recent encryption traditional algorithms are executed as the pseudorandom number generator to improve the safety stage of the produced cryptographic keys. This method is executed to 239 subjects’ ECG signals consisting of normal sinus rhythm, arrhythmia, atrial brillation, and myocardial infraction. Normal ECG rhythms have slightly better randomness when compare with the abnormal.The output results proves that the SEF method is faster than the present existing key production methods. It produces higher security level when compared to existing methods


2016 ◽  
Vol 13 (1) ◽  
pp. 204-211
Author(s):  
Baghdad Science Journal

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will be generated by the server. An authentication and key exchange will be based on standard protocol SSL/TLS. Various operating systems from open source and windows will be used. Each operating system uses a different hardware specification. Tools such as tcpdump and jperf will be used to verify and measure the connectivity and performance. OpenVPN in the LAN is based on the type of operating system, portability and straightforward implementation. The bandwidth which is captured in this experiment is influenced by the operating system rather than the memory and capacity of the hard disk. Relationship and interoperability between each peer and server will be discussed. At the same time privacy for the user in the LAN can be introduced with a minimum specification.


Sign in / Sign up

Export Citation Format

Share Document