Remotely Managed Logic Built-In Self-Test for Secure M2M Communications
نویسندگان
چکیده
A rapid growth of Machine-to-Machine (M2M) communications is expected in the coming years. M2M applications create new challenges for in-field testing since they typically operate in environments where human supervision is difficult or impossible. In addition, M2M networks may be significant in size. We propose to automate Logic Built-In Self-Test (LBIST) by using a centralized test management system which can test all end-point M2M devices in the same network. Such a method makes possible transferring some of the LBIST functionality from the devices under test to the test management system. This is important for M2M devices which have very limited computing resources and commonly are battery-powered. In addition, the presented method provides protection against both random and malicious faults including some types of hardware Trojans.
منابع مشابه
Self-management of Machine-to-Machine communications: a bi-layered approach
Machine-to-Machine (M2M) communications comprise a large number of intelligent devices sharing information and making cooperative decisions without any human intervention. To support M2M requirements and applications which are in perpetual evolution, many standards are designed, updated and rendered obsolete. Among these, arises from The European Telecommunications Standards Institute (ETSI) a ...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملSelf-management of machine-to-machine communications: a multi-models approach
Machine-to-Machine (M2M) paradigm apply to systems composed by numerous devices sharing information and making cooperative decisions with little or no human intervention. The M2M standard defined by the European Telecommunications Standards Institute (ETSI) is the only one providing an end-to-end view of the global M2M architecture. Noticeably, it furnishes a standardised framework for inter-op...
متن کاملMachine-to-Machine Communications and Security Solution in Cellular Systems
This paper introduces an efficient machine-to-machine (M2M) communication model based on 4G cellular systems. M2M terminals are capable of establishing Ad Hoc clusters wherever they are close enough. It is also possible to extend the cellular coverage for M2M terminals through multi-hop Ad Hoc connections. The M2M terminal structure is proposed accordingly to meet the mass production and securi...
متن کاملM2M Security Technology of CPS Based on Blockchains
As the core of intelligent manufacturing, CPS has serious security issues, especially for the communication security of its terminal M2M. In this paper, blockchain technology is introduced to address such a security problem of communications between different types of machines in CPS. According to the principles of blockchain technology, we design a blockchain for secure M2M communications. As ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2015 شماره
صفحات -
تاریخ انتشار 2015