Secure Design of Communication Networks

被引:0
|
作者
Sklyarov, Valery [1 ]
Skliarova, Iouliia [1 ]
机构
[1] Univ Aveiro, Dept Elect Telecommun & Informat IEETA, Aveiro, Portugal
来源
2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC) | 2017年
关键词
Fault injection attack; Hardware security; Hamming weight; Communication channels; Reconfigurable hardware; HAMMING WEIGHT COMPARATORS; BINARY VECTORS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper is focused on increasing the security measures against malicious attacks by protecting hardware that exchange data. This is in contrast to studying or improving the existing methods that rely on only securing the data. We consider errors that may appear on a way between transmitting and receiving modules in different microelectronic devices and some of such errors may be injected by potential intruders (attackers). It is shown that although the known methods are sufficient they involve significant hardware resources and delays. We suggest detecting fault injection attacks through computing Hamming weights of each transmitting data combined with additional data created by a pseudo-random generator to be controlled by internal hardware of transmitting and receiving modules. Any generated number is known by the receiving and transmitting modules and it alters the final values of Hamming weights that can only be correctly recognized inside the transmitter/receiver. Our experiments have demonstrated that the proposed supplementary circuits allow the considered problem to be solved and they are very fast and moderate in resources.
引用
收藏
页码:193 / 198
页数:6
相关论文
共 50 条
  • [31] Forward secure communication in wireless sensor networks
    Mauw, Sjouke
    van Vessem, Ivo
    Bos, Bert
    SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS, 2006, 3934 : 32 - 42
  • [32] Secure group communication in wireless sensor networks
    Ghosh, Subhas K.
    Patro, Ranjeet K.
    Raina, Manik
    Thejaswi, Chandrasekhara
    Ganapathy, Viswanath
    INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING 2006, CONFERENCE PROGRAM, 2006, : 525 - +
  • [33] Secure communication:: A new application for active networks
    Günter, M
    Brogle, M
    Braun, T
    NETWORKING - ICN 2001, PART II, PROCEEDINGS, 2001, 2094 : 206 - 216
  • [34] Secure communication design for multi-user peer-to-peer wireless relay networks
    Gong, Xiangwu
    Long, Hang
    Dong, Feihong
    Yin, Hao
    IET COMMUNICATIONS, 2016, 10 (07) : 770 - 777
  • [35] Perfect forward secrecy in VoIP networks through design a lightweight and secure authenticated communication scheme
    Ravanbakhsh, Niloofar
    Mohammadi, Mohadeseh
    Nikooghadam, Morteza
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (09) : 11129 - 11153
  • [36] Perfect forward secrecy in VoIP networks through design a lightweight and secure authenticated communication scheme
    Niloofar Ravanbakhsh
    Mohadeseh Mohammadi
    Morteza Nikooghadam
    Multimedia Tools and Applications, 2019, 78 : 11129 - 11153
  • [37] Secure Transmission Design of RIS Enabled UAV Communication Networks Exploiting Deep Reinforcement Learning
    Dong, Runze
    Wang, Buhong
    Cao, Kunrui
    Tian, Jiwei
    Cheng, Tianhao
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (06) : 8404 - 8419
  • [38] Design of Secure Communication Model for Virtual Environment
    Anand, R.
    Saraswathi, S.
    Sindu, V. R.
    Sandhya, B.
    GLOBAL TRENDS IN COMPUTING AND COMMUNICATION SYSTEMS, PT 1, 2012, 269 : 277 - +
  • [39] Design and Performance of Secure Geocast for Vehicular Communication
    Festag, Andreas
    Papadimitratos, Panagiotis
    Tielert, Tessa
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2010, 59 (05) : 2456 - 2471
  • [40] On the novel chaotic secure communication scheme design
    Wang, B.
    Zhong, S. M.
    Dong, X. C.
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2016, 39 : 108 - 117