Secure Design of Communication Networks

被引:0
|
作者
Sklyarov, Valery [1 ]
Skliarova, Iouliia [1 ]
机构
[1] Univ Aveiro, Dept Elect Telecommun & Informat IEETA, Aveiro, Portugal
来源
2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC) | 2017年
关键词
Fault injection attack; Hardware security; Hamming weight; Communication channels; Reconfigurable hardware; HAMMING WEIGHT COMPARATORS; BINARY VECTORS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper is focused on increasing the security measures against malicious attacks by protecting hardware that exchange data. This is in contrast to studying or improving the existing methods that rely on only securing the data. We consider errors that may appear on a way between transmitting and receiving modules in different microelectronic devices and some of such errors may be injected by potential intruders (attackers). It is shown that although the known methods are sufficient they involve significant hardware resources and delays. We suggest detecting fault injection attacks through computing Hamming weights of each transmitting data combined with additional data created by a pseudo-random generator to be controlled by internal hardware of transmitting and receiving modules. Any generated number is known by the receiving and transmitting modules and it alters the final values of Hamming weights that can only be correctly recognized inside the transmitter/receiver. Our experiments have demonstrated that the proposed supplementary circuits allow the considered problem to be solved and they are very fast and moderate in resources.
引用
收藏
页码:193 / 198
页数:6
相关论文
共 50 条
  • [21] Secure Communication for Underwater Acoustic Sensor Networks
    Han, Guangjie
    Jiang, Jinfang
    Sun, Ning
    Shu, Lei
    IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (08) : 54 - 60
  • [22] Saddle policies for secure routing in communication networks
    Bohacek, S
    Hespanha, JP
    Obraczka, K
    PROCEEDINGS OF THE 41ST IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-4, 2002, : 1416 - 1421
  • [23] Secure Communication in Massive MIMO Relay Networks
    Amarasuriya, Gayan
    Schaefer, Rafael F.
    Poor, H. Vincent
    2016 IEEE 17TH INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS (SPAWC), 2016,
  • [24] Secure Communication For Internet Payment In Heterogeneous Networks
    Abdellaoui, Refka
    Pasquet, Marc
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 1085 - 1092
  • [25] On Secure Communication over Wireless Erasure Networks
    Mills, Andrew
    Smith, Brian
    Clancy, T. Charles
    Soljanin, Emina
    Vishwanath, Sriram
    2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 161 - +
  • [26] Secure Reliable Group Communication for Tactical Networks
    Refaei, M. Tamer
    Bush, Jeffrey
    2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, : 1195 - 1200
  • [27] Communication Services for Secure Building Automation Networks
    Granzer, Wolfgang
    Kastner, Wolfgang
    IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE 2010), 2010, : 3380 - 3385
  • [28] Secure Communication in Millimeter Wave Relaying Networks
    Ma, Ruiqian
    Yang, Weiwei
    Sun, Xiaoli
    Tao, Liwei
    Zhang, Tao
    IEEE ACCESS, 2019, 7 : 31218 - 31232
  • [29] Secure group communication in wireless mesh networks
    Dong, Jing
    Ackermann, Kurt
    Nita-Rotaru, Cristina
    AD HOC NETWORKS, 2009, 7 (08) : 1563 - 1576
  • [30] Secure communication trees in Ad hoc networks
    Nikodem, Jan
    Nikodem, Maciej
    ECBS 2007: 14TH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS: RAISING EXPECTATIONS OF COMPUTER-BASES SYSTEMS, 2007, : 413 - +