scholarly journals Enhancing Sensor Network Security with Improved Internal Hardware Design

Sensors ◽  
2019 ◽  
Vol 19 (8) ◽  
pp. 1752 ◽  
Author(s):  
Weizheng Wang ◽  
Zhuo Deng ◽  
Jin Wang

With the rapid development of the Internet-of-Things (IoT), sensors are being widely applied in industry and human life. Sensor networks based on IoT have strong Information transmission and processing capabilities. The security of sensor networks is progressively crucial. Cryptographic algorithms are widely used in sensor networks to guarantee security. Hardware implementations are preferred, since software implementations offer lower throughout and require more computational resources. Cryptographic chips should be tested in a manufacturing process and in the field to ensure their quality. As a widely used design-for-testability (DFT) technique, scan design can enhance the testability of the chips by improving the controllability and observability of the internal flip-flops. However, it may become a backdoor to leaking sensitive information related to the cipher key, and thus, threaten the security of a cryptographic chip. In this paper, a secure scan test architecture was proposed to resist scan-based noninvasive attacks on cryptographic chips with boundary scan design. Firstly, the proposed DFT architecture provides the scan chain reset mechanism by gating a mode-switching detection signal into reset input of scan cells. The contents of scan chains will be erased when the working mode is switched between test mode and functional mode, and thus, it can deter mode-switching based noninvasive attacks. Secondly, loading the secret key into scan chains of cryptographic chips is prohibited in the test mode. As a result, the test-mode-only scan attack can also be thwarted. On the other hand, shift operation under functional mode is disabled to overcome scan attack in the functional mode. The proposed secure scheme ensures the security of cryptographic chips for sensor networks with extremely low area penalty.

Sensors ◽  
2019 ◽  
Vol 19 (20) ◽  
pp. 4598 ◽  
Author(s):  
Wang ◽  
Deng ◽  
Wang ◽  
Sangaiah ◽  
Cai ◽  
...  

Wireless sensor networks (WSN) have deeply influenced the working and living styles of human beings. Information security and privacy for WSN is particularly crucial. Cryptographic algorithms are extensively exploited in WSN applications to ensure the security. They are usually implemented in specific chips to achieve high data throughout with less computational resources. Cryptographic hardware should be rigidly tested to guarantee the correctness of encryption operation. Scan design improves significantly the test quality of chips and thus is widely used in semiconductor industry. Nevertheless, scan design provides a backdoor for attackers to deduce the cipher key of a cryptographic core. To protect the security of the cryptographic system we first present a secure scan architecture, in which an automatic test control circuitry is inserted to isolate the cipher key in test mode and clear the sensitive information at mode switching. Then, the weaknesses of this architecture are analyzed and an enhanced scheme using concept of test authorization is proposed. If the correct authorization key is applied within the specific time, the normal test can be performed. Otherwise, only secure scan test can be performed. The enhanced scan scheme ensures the security of cryptographic chips while remaining the advantages of scan design.


2005 ◽  
Vol 1 (3-4) ◽  
pp. 345-354 ◽  
Author(s):  
Dibyendu Chakrabarti ◽  
Subhamoy Maitra ◽  
Bimal Roy

Key pre-distribution is an important area of research in Distributed Sensor Networks (DSN). Two sensor nodes are considered connected for secure communication if they share one or more common secret key(s). It is important to analyse the largest subset of nodes in a DSN where each node is connected to every other node in that subset (i.e., the largest clique). This parameter (largest clique size) is important in terms of resiliency and capability towards efficient distributed computing in a DSN. In this paper, we concentrate on the schemes where the key pre-distribution strategies are based on transversal design and study the largest clique sizes. We show that merging of blocks to construct a node provides larger clique sizes than considering a block itself as a node in a transversal design.


2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Yan Gao ◽  
Wenfen Liu

With the rapid development and application of medical sensor networks, the security has become a big challenge to be resolved. Trust mechanism as a method of “soft security” has been proposed to guarantee the network security. Trust models to compute the trustworthiness of single node and each path are constructed, respectively, in this paper. For the trust relationship between nodes, trust value in every interval is quantified based on Bayesian inference. A node estimates the parameters of prior distribution by using the collected recommendation information and obtains the posterior distribution combined with direct interactions. Further, the weights of trust values are allocated through using the ordered weighted vector twice and overall trust degree is represented. With the associated properties of Tsallis entropy, the definition of path Tsallis entropy is put forward, which can comprehensively measure the uncertainty of each path. Then a method to calculate the credibility of each path is derived. The simulation results show that the proposed models can correctly reflect the dynamic of node behavior, quickly identify the malicious attacks, and effectively avoid such path containing low-trust nodes so as to enhance the robustness.


2021 ◽  
Author(s):  
Fatima Comartova ◽  
Andrey Pomazanskiy ◽  
Elena Nikitina ◽  
Saria Nanba ◽  
Timur Mel'nik ◽  
...  

The rapid development of modern biomedicine creates both hopes for solving global problems of humanity, and risks associated with the enormous potential of its impact on human nature. In this regard, the processes of development and application of biomedical technologies need timely and adequate legal regulation that defines the boundaries of biotechnological intervention in human life. This publication is devoted to the theoretical development of general legal approaches to the essence, content, social orientation and the main industry features of the regulation of relations in the field of biomedicine, which would allow to form a special legal regulation in this area. For researchers, teachers, postgraduates, students, practicing lawyers, employees of public authorities.


Processes ◽  
2019 ◽  
Vol 7 (2) ◽  
pp. 89 ◽  
Author(s):  
Tan Van Nguyen ◽  
Cheolkeun Ha

With the rapid development of computer science and information and communication technology (ICT), increasingly intelligent, and complex systems have been applied to industries as well as human life. Fault-tolerant control (FTC) has, therefore, become one of the most important topics attracting attention from both engineers and researchers to maintain system performances when faults occur. The ultimate goal of this study was to develop a sensor fault-tolerant control (SFTC) to enhance the robust position tracking control of a class of electro-hydraulic actuators called mini motion packages (MMPs), which are widely used for applications requiring large force-displacement ratios. First, a mathematical model of the MMP system is presented, which is then applied in the position control process of the MMP system. Here, a well-known proportional, integrated and derivative (PID) control algorithm is employed to ensure the positional response to the reference position. Second, an unknown input observer (UIO) is designed to estimate the state vector and sensor faults using a linear matrix inequality (LMI) optimization algorithm. Then an SFTC is used to deal with sensor faults of the MMP system. The SFTC is formed of the fault detection and the fault compensation with the goal of determining the location, time of occurrence, and magnitude of the faults in the fault signal compensation process. Finally, numerical simulations were run to demonstrate the superior performance of the proposed approach compared to traditional tracking control.


Connectivity ◽  
2020 ◽  
Vol 148 (6) ◽  
Author(s):  
K. A. Fedosiva ◽  
◽  
I. M. Sribna

The article is devoted to the analysis of the Ukrainian market for the spread of cloud technologies, an overview of growth dynamics, application segments and identifies leading companies that offer services using cloud computing. According to the unanimous forecasts of the world’s leading consulting companies, the rapid improvement and spread of cloud computing is now one of the key trends that in the next 5-8 years will significantly affect the global development of not only the IT industry but also business, finance, public administration, medicine, education and many other areas of human life. Prospects for the rapid development of cloud services in Ukraine encourage more careful consideration of the experience of their application in more «mature» markets and identify the main benefits and risks of these technologies in local conditions. People perceive the cloud as a platform only for storage and computing. However, there are many other opportunities that cloud technologies offer with cloud computing. Currently, cloud computing technologies are becoming increasingly popular. The advantages of this technology are obvious: economy, speed, elasticity, versatility of access. In the future, their use will create a powerful information and telecommunications system, which will be a technological solution for the construction and development of new infrastructure in the country. The world’s largest IT vendors (Microsoft, Amazon, Google and others) somehow implement cloud computing services, providing a wide range of opportunities for users. Thus, cloud computing is software and hardware that is available to the user via the Internet (or local network) in the form of a service that allows you to use a user-friendly web interface for remote access to dedicated resources (computing resources, programs and data). Thus, cloud computing is the next stage of information development of mankind.


Sensors ◽  
2021 ◽  
Vol 21 (20) ◽  
pp. 6743
Author(s):  
Vasiliki Kelli ◽  
Vasileios Argyriou ◽  
Thomas Lagkas ◽  
George Fragulis ◽  
Elisavet Grigoriou ◽  
...  

Internet of Things (IoT) is a concept adopted in nearly every aspect of human life, leading to an explosive utilization of intelligent devices. Notably, such solutions are especially integrated in the industrial sector, to allow the remote monitoring and control of critical infrastructure. Such global integration of IoT solutions has led to an expanded attack surface against IoT-enabled infrastructures. Artificial intelligence and machine learning have demonstrated their ability to resolve issues that would have been impossible or difficult to address otherwise; thus, such solutions are closely associated with securing IoT. Classical collaborative and distributed machine learning approaches are known to compromise sensitive information. In our paper, we demonstrate the creation of a network flow-based Intrusion Detection System (IDS) aiming to protecting critical infrastructures, stemming from the pairing of two machine learning techniques, namely, federated learning and active learning. The former is utilized for privately training models in federation, while the latter is a semi-supervised approach applied for global model adaptation to each of the participant’s traffic. Experimental results indicate that global models perform significantly better for each participant, when locally personalized with just a few active learning queries. Specifically, we demonstrate how the accuracy increase can reach 7.07% in only 10 queries.


2021 ◽  
Author(s):  
Yulia Orlovska ◽  
◽  
Svitlana Mashchenko ◽  

The article is devoted to the analysis of the directions of transformation of scientific methods of economic cognition in the post-industrial period of social development. It has been determined that the objective social reason for the need for methodological changes in economics is the transition to the digital economy. The use of digital technologies in the economic sector creates a situation of virtualization of production, market and monetary relations. The answer of economics is to improve existing and search for new tools of economic knowledge. The following areas of transformation of economic research methods have been identified by the authors: at first, the rapid development of the mathematical apparatus necessary for the study of economic processes has caused a tendency to mathematize economic research. Second, mathematical modeling becomes the leader among the most used economic methods. Mathematical models in economic research are used extremely widely. They are used to find a specific solution to economic problem, and to conduct an experimental test of the chosen solution, and to forecast trends in the further development of a large economic system or a private enterprise. The third trend is digital technologies, which allow conducting analytical research, tracking any changes in the environment, timely and flexible response to market needs. An example is Data Mining technology, which is a set of different methods of searching and analyzing data to find new, non-trivial, practically useful and interpretable knowledge needed to make decisions in various spheres of human life. Finally, the latest trend is the borrowing of methodological tools from other sciences, both the exact and the humanities. Only under the condition of a multidimensional study of economic reality, it is possible to obtain adequate to reality knowledge. These trends reveal the mathematization of economic methods, the dominant role of modeling in economic cognition, digitalization of economic research and at the same time are the most obvious signs of the transformational state of science during the transition of society to post-industrial level.


Author(s):  
Rachid Rimani ◽  
Naima Hadj Said ◽  
Adda Ali Pacha ◽  
Ozen Ozer

<span>Nowadays, with the advences in ICT and rapid development of mobile internet; media information shared on the various communication networks requires the existence of adequate security measures. Cryptography becoming an effective way to meet these requirements and for maintain the confidentiality. However, communicating with encrypted messages requires secret key exchange, which is a part of a complex protocol. In this paper, we propose a new method for exchanging key based on Diffie-Hellman protocol and image registration with fast fourier transform, the principle of this method consists to concealing the key in a set of transformed images. Therefore, image registration allows finding transformations between images, which become a tool for recovering the key by the receiver.</span>


2020 ◽  
Vol 22 (4) ◽  
pp. 220-227
Author(s):  
V. I. Odin

The concept of a student scientific circle as a form of tutor training is presented. The history of the circle movement in Russian universities of imperial Russia is analyzed, starting with the circle organized by Professor Schwartz in 1781 and continued in the Soviet Union. The data on the state support of students research work in the post-war period, including state documents of title and measures of financial support, are presented. The traditional student scientific circle is a circle of those wishing to educate themselves in addition to the planned curriculum, by conducting their own research and publishing the results. As a result, an activity-level specialist is formed from a graduate of the circle. In contrast to the traditional one, the tutor-type training circle forms the circle member as a future specialist not only at the activity level, but also at the project and, preferably, conceptual levels. Methodologically, the task of a tutor-type training circle is not only to teach the circle members the practical skills of conducting scientific research, but, first of all, in personalized work to achieve anthropological goals, to create a reasonable, creative, effective personality who can create, plan and design. In the conditions of the rapid development of modern science, the construction of the future is proceeding at a rapid pace and is associated with the active implementation of the results of scientific experiments in all aspects of human life, which requires active suppression of everyday consciousness. At the same time, due to the risk of a landslide dehumanization, the circle member, as a scientist, needs to lay down humanitarian values that define the individual as a person who shares the ideals of goodness and justice. Thus, the student scientific circle is a system in which a new generation of honest and effective scientists and high class specialists is formed under the guidance of a tutor.


Sign in / Sign up

Export Citation Format

Share Document