Security Upgrade of Existing ISDN Devices by Using Reconfigurable Logic
نویسندگان
چکیده
Integrated Services Digital Network (ISDN) is a de facto worldwide standard for wired digital telephony. Since ISDN was developed in 1984 as a public network it does not support modern sophisticated fraud detection systems. Indeed most current installations of ISDN are incapable of supporting encrypted transmission. Securing user information is therefore normally done outside the ISDN communication environment. In this paper we present our experience in using reconfigurable logic for securing existing ISDN devices against intruders in point to point communication.
منابع مشابه
Security Challenges of Reconfigurable Devices in the Power Grid
Control systems used in the electrical power grid cover large geographic areas with hundreds or thousands of remote sensors and actuators. Software defined radios (SDRs) are a popular wireless alternative for replacing legacy communication devices in power grid control systems. The advantages include a low-cost, extensible communications infrastructure and the ability to reconfigure devices ove...
متن کاملUltra Low Power Symmetric Pass Gate Adiabatic Logic with CNTFET for Secure IoT Applications
With the advent and development of the Internet of Things, new needs arose and more attention was paid to these needs. These needs include: low power consumption, low area consumption, low supply voltage, higher security and so on. Many solutions have been proposed to improve each one of these needs. In this paper, we try to reduce the power consumption and enhance the security by using SPGAL, ...
متن کاملReconfigurable Security: Edge Computing-based Framework for IoT
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications. In this article, we first provide requirements and existing solutions for IoT security. We then introduce a new reconfigurable security framework based on edge computing, which utilizes a near-us...
متن کاملSustainable and Practical Firmware Upgrade for Wireless Access Point Using Password-Based Authentication
Wireless access points (WAPs) are devices that provide Internet connectivity to devices such as desktops, laptops, smartphones, and tablets. Hence, it is important to provide sufficient availability to devices and security for the traffic that is routed by a WAP. However, attackers can decrease the network bandwidth or obtain the traffic including private data such as search histories, login in...
متن کاملREBEL - Reconfigurable Block Encryption Logic
Existing block cipher function designs have tended to deploy the secret bits in a specific and limited way. We generalize the role of the secret as truth tables of Boolean gates in a carefully designed logic schema. Our claims are: these reconfigurable functions are pseudo one-way and pseudo random functions. Such a function family is proposed using reconfigurable gates. Based on this function ...
متن کامل