Physical Security
Recently Published Documents





2022 ◽  
Jeevun Sandher

Higher rates of income inequality are correlated with lower average well-being across different domains (such as health, financial security, friendship etc.) across nations. It is unclear, however, whether this pattern is driven by income differences between people or if places also play a role. In this paper, I test this by constructing a Se- nian Capability Index of well-being and then testing the relative role of personal and place-based prosperity on its domains using linked individual-area data. I find that while personal income has the strongest link to well-being domains, places also also have a significant, non-uniform, association as well. These effects differ between the labour market and neighbourhood level spatial scales. Local labour market prosperity gives its residents higher potential incomes and is associated with greater financial se- curity and more friends. Moving to a more prosperous labour market also indirectly improves well-being by increasing potential incomes. Neighbourhood prosperity is as- sociated with greater overall well-being, physical security, and a lower probability of death. These results suggest that policies aimed at improving personal and place-based characteristics are needed to create a “good life” for all citizens.

Takuji Miki ◽  
Makoto Nagata

Abstract Cryptographic ICs on edge devices for internet-of-things (IoT) applications are exposed to an adversary and threatened by malicious side channel analysis. On-chip analog monitoring by sensor circuits embedded inside the chips is one of the possible countermeasures against such attacks. An on-chip monitor circuit consisting of a successive approximation register (SAR) analog-to-digital converter (ADC) and an input buffer acquires a wideband signal, which enables to detects an irregular noise due to an active fault injection and a passive side channel leakage analysis. In this paper, several countermeasures against security attacks utilizing wideband on-chip monitors are reviewed. Each technique is implemented on a prototype chip, and the measurement results prove they can effectively detect and diagnose the security attacks.

Xing Yang ◽  
Lei Shu ◽  
Ye Liu ◽  
Gerhard Petrus Hancke ◽  
Mohamed Amine Ferrag ◽  

2022 ◽  
Vol 136 ◽  
pp. 103589
Luigi Coppolino ◽  
Salvatore D’Antonio ◽  
Vincenzo Giuliano ◽  
Giovanni Mazzeo ◽  
Luigi Romano

Sensors ◽  
2021 ◽  
Vol 21 (24) ◽  
pp. 8451
Dmitry Levshun ◽  
Andrey Chechulin ◽  
Igor Kotenko

This paper describes an original methodology for the design of microcontroller-based physical security systems and its application for the system of mobile robots. The novelty of the proposed methodology lies in combining various design algorithms on the basis of abstract and detailed system representations. The suggested design approach, which is based on the methodology, is modular and extensible, takes into account the security of the physical layer of the system, works with the abstract system representation and is looking for a trade-off between the security of the final solution and the resources expended on it. Moreover, unlike existing solutions, the methodology has a strong focus on security. It is aimed at ensuring the protection of the system against attacks at the design stage, considers security components as an integral part of the system and checks if the system can be designed in accordance with given requirements and limitations. An experimental evaluation of the methodology was conducted with help of its software implementation that consists of Python script, PostgreSQL database, Tkinter interface and available for download on our GitHub. As a use case, the system of mobile robots for perimeter monitoring was chosen. During the experimental evaluation, the design time was measured depending on the parameters of the attacker against which system security must be ensured. Moreover, the software implementation of the methodology was analyzed in compliance with requirements and compared with analogues. The advantages and disadvantages of the methodology as well as future work directions are indicated.

2021 ◽  
Vijay Mookonil

Abstract Objective The objective of this paper is to provide a general understanding and awareness of the physical security requirement in Oil & Gas Industry, explore various Physical security solutions and how the same is different from Network Security and highlight its importance followed by explaining how same can be achieved in industrial environment by implementing different layers of security measures.

2021 ◽  
Vol 6 (2) ◽  
pp. 94-102
Muslih Muslih ◽  
Abdussalam Abdussalam ◽  
Elkaf Rahmawan Pramudya

The main purpose of using cryptography is to provide the following four basic information security services. One of the purposes of cryptography is secrecy. Confidentiality is the fundamental security service provided by cryptography. This is a security service that stores information from unauthorized persons. Confidentiality can be achieved through a variety of ways ranging from physical security to the use of mathematical algorithms for data encryption. Vernam cipher is a stream cipher where the original data or plain with 8x8 block operation. Experimental results prove that RC4 can perform encryption and decryption with a fast execution process. In this study used a processor with 8GB of RAM. The encryption result of the text used yields the average encryption time and decryption average of 2 second.

2021 ◽  
Vol 9 (12) ◽  
pp. 1384
Iosif Progoulakis ◽  
Paul Rohmeyer ◽  
Nikitas Nikitakos

The integration of IT, OT, and human factor elements in maritime assets is critical for their efficient and safe operation and performance. This integration defines cyber physical systems and involves a number of IT and OT components, systems, and functions that involve multiple and diverse communication paths that are technologically and operationally evolving along with credible cyber security threats. These cyber security threats and risks as well as a number of known security breach scenarios are described in this paper to highlight the evolution of cyber physical systems in the maritime domain and their emerging cyber vulnerabilities. Current industry and governmental standards and directives related to cyber security in the maritime domain attempt to enforce the regulatory compliance and reinforce asset cyber security integrity for optimum and safe performance with limited focus, however, in the existing OT infrastructure and systems. The use of outside-of-the-maritime industry security risk assessment tools and processes, such the API STD 780 Security Risk Assessment (SRA) and the Bow Tie Analysis methodologies, can assist the asset owner to assess its IT and OT infrastructure for cyber and physical security vulnerabilities and allocate proper mitigation measures assuming their similarities to ICS infrastructure. The application of cyber security controls deriving from the adaptation of the NIST CSF and the MITRE ATT&CK Threat Model can further increase the cyber security integrity of maritime assets, assuming they are periodically evaluated for their effectiveness and applicability. Finally, the improvement in communication among stakeholders, the increase in operational and technical cyber and physical security resiliency, and the increase in operational cyber security awareness would be further increased for maritime assets by the convergence of the distinct physical and cyber security functions as well as onshore- and offshore-based cyber infrastructure of maritime companies and asset owners.

Sign in / Sign up

Export Citation Format

Share Document