scholarly journals Performance Analysis of Secure Elements for IoT

IoT ◽  
2021 ◽  
Vol 3 (1) ◽  
pp. 1-28
Author(s):  
Mario Noseda ◽  
Lea Zimmerli ◽  
Tobias Schläpfer ◽  
Andreas Rüst

New protocol stacks provide wireless IPv6 connectivity down to low power embedded IoT devices. From a security point of view, this leads to high exposure of such IoT devices. Consequently, even though they are highly resource-constrained, these IoT devices need to fulfil similar security requirements as conventional computers. The challenge is to leverage well-known cybersecurity techniques for such devices without dramatically increasing power consumption (and therefore reducing battery lifetime) or the cost regarding memory sizes and required processor performance. Various semiconductor vendors have introduced dedicated hardware devices, so-called secure elements that address these cryptographic challenges. Secure elements provide tamper-resistant memory and hardware-accelerated cryptographic computation support. Moreover, they can be used for mutual authentication with peers, ensuring data integrity and confidentiality, and various other security-related use cases. Nevertheless, publicly available performance figures on energy consumption and execution times are scarce. This paper introduces the concept of secure elements and provides a measurement setup for selected individual cryptographic primitives and a DTLS handshake over CoAPs in a realistic use case. Consequently, the paper presents quantitative results for the performance of five secure elements. Based on these results, we discuss the characteristics of the individual secure elements and supply developers with the information needed to select a suitable secure element for a specific application.

Author(s):  
P.M. Pershukevich ◽  
I.P. Pershukevich ◽  

Agricultural production is considered as a social ecological and economic system (SEES). The purpose of the research is to study the social subsystem of SEES from the point of view of its formation. The social structures of the village (which are the individual with his physical, social and spiritual needs, the family and the village as components of a whole) form the way of life of the peasants. The social subsystem has a significant reverse effect, “pressure” on the ecosystem and the state. The degree of development of the individual in rural areas is characterized by the level of development of its needs, motivational complex, potential, including labor, and its orientation. The labor potential of an employee is formed by the characteristics of a person that determine their capabilities in the course of work, and depends on their education, natural data, life experience, and upbringing. Labor potential includes the following components: health, morality, creativity, activity, organization, education, professionalism, working time resources. Human labor can be regulated and innovative (creative). As a rule, the cost of regulated labor increases the cost, but does not create surplus value. It is formed by innovative work as a result of the manifestation of creative abilities of a person.


Sensors ◽  
2020 ◽  
Vol 20 (5) ◽  
pp. 1366 ◽  
Author(s):  
Liang Xiao ◽  
He Xu ◽  
Feng Zhu ◽  
Ruchuan Wang ◽  
Peng Li

With the rapid development of the Internet of Things and the popularization of 5G communication technology, the security of resource-constrained IoT devices such as Radio Frequency Identification (RFID)-based applications have received extensive attention. In traditional RFID systems, the communication channel between the tag and the reader is vulnerable to various threats, including denial of service, spoofing, and desynchronization. Thus, the confidentiality and integrity of the transmitted data cannot be guaranteed. In order to solve these security problems, in this paper, we propose a new RFID authentication protocol based on a lightweight block cipher algorithm, SKINNY, (short for LRSAS). Security analysis shows that the LRSAS protocol guarantees mutual authentication and is resistant to various attacks, such as desynchronization attacks, replay attacks, and tracing attacks. Performance evaluations show that the proposed solution is suitable for low-cost tags while meeting security requirements. This protocol reaches a balance between security requirements and costs.


Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 607
Author(s):  
Mayuresh Sunil Pardeshi ◽  
Ruey-Kai Sheu ◽  
Shyan-Ming Yuan

Authentication is essential for the prevention of various types of attacks in fog/edge computing. Therefore, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices’ vulnerability, as there have been several years of growing concerns regarding their security. Therefore, a novel model is designed that is stronger and effective against any kind of unauthorized attack, as IoT devices’ vulnerability is on the rise due to the mass production of IoT devices (embedded processors, camera, sensors, etc.), which ignore the basic security requirements (passwords, secure communication), making them vulnerable and easily accessible. Furthermore, crackable passwords indicate that the security measures taken are insufficient. As per the recent studies, several applications regarding its requirements are the IoT distributed denial of service attack (IDDOS), micro-cloud, secure university, Secure Industry 4.0, secure government, secure country, etc. The problem statement is formulated as the “design and implementation of dynamically interconnecting fog servers and edge devices using the mode-based hash chain for secure mutual authentication protocol”, which is stated to be an NP-complete problem. The hash-chain fog/edge implementation using timestamps, mode-based hash chaining, the zero-knowledge proof property, a distributed database/blockchain, and cryptography techniques can be utilized to establish the connection of smart devices in large numbers securely. The hash-chain fog/edge uses blockchain for identity management only, which is used to store the public keys in distributed ledger form, and all these keys are immutable. In addition, it has no overhead and is highly secure as it performs fewer calculations and requires minimum infrastructure. Therefore, we designed the hash-chain fog/edge (HCFE) protocol, which provides a novel mutual authentication scheme for effective session key agreement (using ZKP properties) with secure protocol communications. The experiment outcomes proved that the hash-chain fog/edge is more efficient at interconnecting various devices and competed favorably in the benchmark comparison.


2018 ◽  
pp. 43-49
Author(s):  
Yuriy Pozdnyakov ◽  
Maria Lapishko

Introduction. Some requirements for determining the value of a trademark of regulatory accounting and independent valuation bases are substantially controversial. This fact creates a normative and legal collision between them. This leads to the high relevance of the problem of coordination of these requirements. Purpose. The article aims to investigate the influence of the revealed contradictions of regulatory accounting requirements and independent evaluation of the determination of a trademark value on the validity of the choice of valuation methodological approaches and procedures; search and justify the possible ways to overcome the identified collision; determine the value of the trademark of normative and legal accounting; offer solutions that make it possible to avoid uncertainties caused by the presence of contradictions established in the study; substantiate the choice of appropriate valuation of methodological approaches and specification of the peculiarities of performance of valuation procedures. Method (methodology). The general methodological basis of the study is to conduct a comparative analysis of the individual provisions of the normative accounting and independent valuation with the subsequent discovery of the existing contradictions and the synthesis of useful practical conclusions about the possibilities of contradictions coordination. Results. The list of costs that can be taken in to account when applying the cost approach to the value of a trademark has been analysed and specified. It has been revealed that these types of expenses from the point of view of the current legislative and normative and legal frame work of accounting are not considered as intangible assets. However, the fact of their implementation increases the value of trademarks that relate to intangible assets in terms of both regulatory bases under the investigation. It has been proposed to take into account expenses that indirectly relate to the trademark in its value only in part, using a lowering factor that is less than one. The appropriateness of the use of cost (property) methodological approach in assessing the market value of trademarks has been reasoned and theoretically grounded. It has been done as we can observe the normative and legal collision between the normative bases under investigation while applying methodical approaches.


2021 ◽  
Vol 1 (24) ◽  
pp. 52-57
Author(s):  
Alexei S. Bokarev ◽  
◽  
Yulia V. Tkachuk ◽  

The article considers M. Stepanova's cycle of poems «Spolia» (2015) from the point of view of the relationship between the author and the hero, whose outlooks are clearly getting closer at the non-classical stage of poetics development. The authors analyse the artistic strategy where «I», being the subject of the utterence, delegates the right to speak and/or the right to make judgements to the «other», «connecting» to the «other» for the sake of self-expression. Spolia is based on the complex of meanings connected with the author's consciousness, directed towards the author, but not autonomous in relation to the subject: replication (usually not marked graphically) and «alien» intention (understood as value expression directed at the protagonist) are the most popular forms of speech production in the cycle. The author's powers are thus limited to recording judgements addressed to the heroine and critically interpreting Stepanova's texts (the poet's works must be read as meta-lyrics), and to organizing the space for dialogue. The «voices» of both classical and modern artists (from A. Griboyedov and P. Tchaikovsky to Ven. Yerofeyev and G. Dashevsky) are included in the subjective sphere of «Spolia» as inseparable but not merging with the author's voice. When the purpose of the intertext comes down to expanding the boundaries of the personality, which is no longer understood as a «center», but as a «radius» of the artistic world, it is natural to disregard the individual biography of the writer. The poet's «passport» name, according to Stepanova, is a «synonym» for the epicenter of pain: unity with the world is only bought at the cost of suffering, which opens up to the author the possibility of «no-self-speaking», rare in poetry


2019 ◽  
pp. 22-29
Author(s):  
Н. В. Фрадкіна

The purpose and tasks of the work are to analyze the contemporary Ukrainian mass culture in terms of its value and humanistic components, as well as the importance of cultural studies and Ukrainian studies in educational disciplines for the formation of a holistic worldview of modern youth.Analysis of research and publications. Scientists repeatedly turned to the problems of the role of spirituality in the formation of society and its culture. This problem is highlighted in the publications by O. Losev, V. Lytvyn, D. Likhachev, S. Avierintsev, M. Zakovych, I. Stepanenko and E. Kostyshyn.Experts see the main negative impact of mass culture on the quality approach, which determines mass culture through the market, because mass culture, from our point of view, is everything that is sold and used in mass demand.One of the most interesting studies on this issue was the work by the representatives of Frankfurt School M. Horkheimer and T. Adorno «Dialectics of Enlightenment» (1947), devoted to a detailed analysis of mass culture. Propaganda at all socio-cultural levels in the form is similar in both totalitarian and democratic countries. It is connected, according to the authors, with the direction of European enlightenment. The tendency to unify people is a manifestation of the influence of mass culture, from cinema to pop. Mass culture is a phenomenon whose existence is associated with commerce (accumulation in any form – this is the main feature of education), in general, the fact that it exists in this form is related to the direction of the history of civilization.Modern mass culture, with its externally attractive and easily assimilated ideas and symbols, appealing to the trends of modern fashion, becomes a standard of prestigious consumption, does not require intense reflection, allows you to relax, distract, not teach, but entertains, preaches hedonism as the main spiritual value. And as a consequence, there are socio-cultural risks: an active rejection of other people, which leads to the formation of indifference; cruelty as a character trait; increase of violent and mercenary crime; increase in the number of alcohol and drug addicts; anti-patriotism; indifference to the values of the family and as a result of social orphanhood and prostitution.Conclusions, perspectives of research. Thus, we can conclude that modern Ukrainian education is predominantly formed by the values of mass culture. Namely, according to the «Dialectic» by Horkheimer and Adorno, «semi-enlightenment becomes an objective spirit» of our modern society.It is concluded that only high-quality education can create the opposite of the onset of mass culture and the destruction of spirituality in our society. It is proved that only by realizing the importance of cultivating disciplines in the educational process and the spiritual upbringing of the nation, through educational reforms, humanitarian knowledge will gradually return to student audiences.Formation of youth occurs under the influence of social environment, culture, education and self-education. The optimal combination of these factors determines both the process of socialization itself and how successful it will be. In this context, one can see the leading role of education and upbringing. It turns out that the main task of modern education is to spread its influence on the development of spiritual culture of the individual, which eventually becomes a solid foundation for the formation of the individual. Such a subject requires both philosophical and humanitarian approaches in further integrated interdisciplinary research, since the availability of such research will provide the theoretical foundation for truly modern educational and personal development.


The article focuses on the problem of the lack of objective evaluation of space-planning arrangement of buildings as a creative approach of the architect to the performing of functional tasks by the object. It is proposed to create a methodology for assessing the functional of space-planning solutions of buildings on the basis of numerical simulation of functional processes using the theory of human flows. There is a description of the prospects of using this method, which makes it possible to increase the coefficient of compactness, materials and works saving, more efficient use of space, reduce the cost of the life cycle of the building, save human forces and time to implement the functional of the building. The necessary initial data for modeling on the example of shopping and shopping-entertainment centers are considered. There are three main tasks for algorithmization of the functional of shopping centers. The conclusion is made about necessity of development of a method for objective assessment of buildings from the point of view of ergonomics of space-planning decisions based on the study of human behavior in buildings of different purposes.


2020 ◽  
Vol 29 (4) ◽  
pp. 556-563
Author(s):  
Adam Burley

This is a personal and reflective piece written from a clinician's point of view on the influence that the developing awareness around the consequences of childhood adversity has had upon the discussions, thinking and practice across the areas in which they are working. It seeks to argue that the increased understanding and recognition of the potential impact of early adversity can not only enhance and deepen the understanding of an individual's difficulties, but can serve to inform how services respond in a way that takes account of this. It suggests that the research and literature on childhood adversity can offer a route map away from a model of mental health that focuses predominantly on the individual as the sole source of interest.


Author(s):  
Vitaly Lobas ◽  
◽  
Elena Petryaeva ◽  

The article deals with modern mechanisms for managing social protection of the population by the state and the private sector. From the point of view of forms of state regulation of the sphere of social protection, system indicators usually include the state and dynamics of growth in the standard of living of the population, material goods, services and social guarantees for the poorly provided segments of the population. The main indicator among the above is the state of the consumer market, as one of the main factors in the development of the state. Priority areas of public administration with the use of various forms of social security have been identified. It should be emphasized that, despite the legislative conflicts that exist today in Ukraine, mandatory indexation of the cost of living is established, which is associated with inflation. Various scientists note that although the definition of the cost of living index has a well-established methodology, there are quite a lot of regional features in the structure of consumption. All this is due to restrictions that are included in the consumer basket of goods and different levels of socio-economic development of regions. The analysis of the establishment and periodic review of the minimum consumer budgets of the subsistence minimum and wages of the working population and the need to form state insurance funds for unforeseen circumstances is carried out. Considering in this context the levers of state management of social guarantees of the population, we drew attention to the crisis periods that are associated with the market transformation of the regional economy. In these conditions, there is a need to develop and implement new mechanisms and clusters in the system of socio-economic relations. The components of the mechanisms ofstate regulation ofsocial guarantees of the population are proposed. The deepening of market relations in the process of reforming the system of social protection of the population should be aimed at social well-being.


Author(s):  
Pavlo Rodionov ◽  
◽  
Anna Ploskonos ◽  
Lesya Gavrutenko ◽  
◽  
...  

The paper analyzes the factors that affect the amount of effort required to create a mobile application and its cost. It is established that the main factors of influence are the design of the application, its functionality, the type of mobile platform, the availability and level of testing and support, as well as the individual characteristics of the developer. Based on the analysis of information sources, the main methods and approaches to forecasting the cost of software products are identified, which include the COCOMO model, Price-to-win method, expert evaluation, algorithmic methods and the method of analogies. It is proposed to consider the method of analogies as a tool that allows you to make predictions about the cost of resources required for the successful implementation of IT projects based on the experience of similar projects. It is proved that the advantages of this method are the simplicity of its implementation and the clarity of the results obtained, which follows from the practical orientation of this tool. Among the limitations of the method of analogy is the mandatory need for reliable data relating to similar projects, as well as the difficulty of taking into account unspecified indicators. Taking into account the mentioned limitations of the method of analogies and on the basis of the analysis of scientific sources the possible directions of its optimization are determined. Thus, among the ways to improve the effectiveness of this method are those aimed at optimizing the project selection process, the data for which are used as a basis for forecasting. Attempts to improve the method of analogies by including parameters that were previously ignored by this technique seem promising. This in turn can lead to an expansion of the scope of the method of analogies and increase the accuracy of forecasts. As prospects for further research, the need to continue research in the field of optimization of the method of analogies with the subsequent practical verification of theoretical positions on the data of real projects.


Sign in / Sign up

Export Citation Format

Share Document