Remotely Managed Logic Built-In Self-Test for Secure M2M Communications

نویسندگان

  • Elena Dubrova
  • Mats Näslund
  • Gunnar Carlsson
  • John Fornehed
  • Ben J. M. Smeets
چکیده

A rapid growth of Machine-to-Machine (M2M) communications is expected in the coming years. M2M applications create new challenges for in-field testing since they typically operate in environments where human supervision is difficult or impossible. In addition, M2M networks may be significant in size. We propose to automate Logic Built-In Self-Test (LBIST) by using a centralized test management system which can test all end-point M2M devices in the same network. Such a method makes possible transferring some of the LBIST functionality from the devices under test to the test management system. This is important for M2M devices which have very limited computing resources and commonly are battery-powered. In addition, the presented method provides protection against both random and malicious faults including some types of hardware Trojans.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Self-management of Machine-to-Machine communications: a bi-layered approach

Machine-to-Machine (M2M) communications comprise a large number of intelligent devices sharing information and making cooperative decisions without any human intervention. To support M2M requirements and applications which are in perpetual evolution, many standards are designed, updated and rendered obsolete. Among these, arises from The European Telecommunications Standards Institute (ETSI) a ...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Self-management of machine-to-machine communications: a multi-models approach

Machine-to-Machine (M2M) paradigm apply to systems composed by numerous devices sharing information and making cooperative decisions with little or no human intervention. The M2M standard defined by the European Telecommunications Standards Institute (ETSI) is the only one providing an end-to-end view of the global M2M architecture. Noticeably, it furnishes a standardised framework for inter-op...

متن کامل

Machine-to-Machine Communications and Security Solution in Cellular Systems

This paper introduces an efficient machine-to-machine (M2M) communication model based on 4G cellular systems. M2M terminals are capable of establishing Ad Hoc clusters wherever they are close enough. It is also possible to extend the cellular coverage for M2M terminals through multi-hop Ad Hoc connections. The M2M terminal structure is proposed accordingly to meet the mass production and securi...

متن کامل

M2M Security Technology of CPS Based on Blockchains

As the core of intelligent manufacturing, CPS has serious security issues, especially for the communication security of its terminal M2M. In this paper, blockchain technology is introduced to address such a security problem of communications between different types of machines in CPS. According to the principles of blockchain technology, we design a blockchain for secure M2M communications. As ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2015  شماره 

صفحات  -

تاریخ انتشار 2015