Security Enhancement of Remote FPGA Devices By a Low Cost Embedded Network Processor

2013 ◽  
Vol 9 (2) ◽  
pp. 36-48
Author(s):  
Qutaiba Ali ◽  
Sahar Lazim

The incredible growth of FPGA capabilities in recent years and the new included features have made them more and more attractive for numerous embedded systems. There is however an important shortcoming concerning security of data and design. Data security implies the protection of the FPGA application in the sense that the data inside the circuit and the data transferred to/from the peripheral circuits during the communication are protected. This paper suggests a new method to support the security of any FPGA platform using network processor technology. Low cost IP2022 UBICOM network processor was used as a security shield in front of any FPGA device. It was supplied with the necessary security methods such as AES ciphering engine, SHA-1, HMAC and an embedded firewall to provide confidentiality, integrity, authenticity, and packets filtering features.

2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


Author(s):  
Segi Lee ◽  
Sugil Lee ◽  
Jongeun Lee ◽  
Jong-Moon Choi ◽  
Do-Wan Kwon ◽  
...  

Sensors ◽  
2020 ◽  
Vol 20 (19) ◽  
pp. 5697
Author(s):  
Chang Sun ◽  
Shihong Yue ◽  
Qi Li ◽  
Huaxiang Wang

Component fraction (CF) is one of the most important parameters in multiple-phase flow. Due to the complexity of the solid–liquid two-phase flow, the CF estimation remains unsolved both in scientific research and industrial application for a long time. Electrical resistance tomography (ERT) is an advanced type of conductivity detection technique due to its low-cost, fast-response, non-invasive, and non-radiation characteristics. However, when the existing ERT method is used to measure the CF value in solid–liquid two-phase flow in dredging engineering, there are at least three problems: (1) the dependence of reference distribution whose CF value is zero; (2) the size of the detected objects may be too small to be found by ERT; and (3) there is no efficient way to estimate the effect of artifacts in ERT. In this paper, we proposed a method based on the clustering technique, where a fast-fuzzy clustering algorithm is used to partition the ERT image to three clusters that respond to liquid, solid phases, and their mixtures and artifacts, respectively. The clustering algorithm does not need any reference distribution in the CF estimation. In the case of small solid objects or artifacts, the CF value remains effectively computed by prior information. To validate the new method, a group of typical CF estimations in dredging engineering were implemented. Results show that the new method can effectively overcome the limitations of the existing method, and can provide a practical and more accurate way for CF estimation.


Author(s):  
Chunguang Bu ◽  
Xiang Wang ◽  
Chi Zhang ◽  
Jizhong Liu ◽  
Xiaodong Wang ◽  
...  

Webology ◽  
2021 ◽  
Vol 18 (Special Issue 04) ◽  
pp. 733-751
Author(s):  
D.M. Sheeba

Internet of Things enables many industries to connect to end customers and provide seamless products and services delivery. Due to easy access to network, availability of devices, penetration of IoT services exponentially Growing. Meanwhile, Ensuring the Data Security and Integrity of devices connected to network is paramount. In this work, we bring the efficient way of implementing Secure Algorithm for low powered devices and enhancing the encryption and decryption process. In addition to the data security, to enhance node integrity with less power, Authenticator and intermediate network manager introduced which will acts as a firewall and manager of data flow. To demonstrate the approach, same is implemented using low cost Arduino Uno, Raspberry Pi boards. Arduino Uno used to demonstrate low powered encryption process using EDIA Algorithm and raspberry pi used as nodal manager to manage the integrity of nodes in a low-powered environment. Data Security and Integrity is ensured by the way of enhanced Algorithm and Integrity through BlockChain and results are provided and discussed. Finally result and future enhancement are explained.


1997 ◽  
Vol 33 (01) ◽  
pp. 65-72 ◽  
Author(s):  
J. T. Korva ◽  
G. A. Forbes

A technique for leaf area measurement utilizing water spray as an inexpensive substitute for electronic equipment was developed and tested with leaves of potato (Solanum tuberosum L.). The leaf areas measured by the spray method were highly correlated with those measured by an electronic area meter. Measurements of leaf area obtained by the spray method were significantly more highly correlated with those obtained by the area meter than were the measurements of dry weights. The main advantages of the new method are precision, accuracy and immediate results at a low cost.


Advertising is a broad concept; in this book, the authors have presented a precise look at its practical domains. Modern advertising has become low-cost with fast access to target users, transferring a persuasive concept to customers and getting a positive behavioral reaction. The last part of their definition is indicative of a new method of advertising, which goes a step further than other methods. A positive reaction embedded in an advertising function comes from advertisers’ use of new communicational practices to transfer and receive messages. The emergence and application of new technology necessitates using the appropriate tools. In this chapter, the authors first define these new tools (strategies). Then, they discuss the differences between online and traditional advertising strategies, and offer an integrated model of Internet advertising strategies. Finally, the authors introduce different kinds of appropriate Internet advertising strategies. The purpose of this chapter is to focus on online advertising strategies and provide a fundamental understanding of their relationship to marketing practices. They examine why firms must use online advertising strategies and give some examples of how online advertising strategies can help companies make sound marketing decisions.


Sign in / Sign up

Export Citation Format

Share Document