Towards a Secure and Reliable System

نویسندگان

  • Michele Portolan
  • Régis Leveugle
چکیده

In this article we describe a system based on a 32-bit processor, Leon, complete with security features offered by a specific cryptographic AES IP. Hardening is done not only on the principal hardware components but on the operating system as well, with attention for possible interaction between the different levels. The cryptographic IP is protected too to offer good resistance against, for example, fault-based attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Framework for Secure Routing in VANET

Vehicular Ad-Hoc Networks can enhance road safety and enable drivers to avoid different threats. Safety applications, mobile commerce, and other information services are among different available services that are affected by dynamic topology, vehicle’s speed and node misbehaving. Dynamic topology makes the route unstable and unreliable. So, improving the throughput and performance of VANET thr...

متن کامل

An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things

Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...

متن کامل

Anti-Synchronization of Complex Chaotic T-System Via Optimal Adaptive Sliding-Mode and Its Application In Secure Communication

In this paper, an optimal adaptive sliding mode controller is proposed for anti-synchronization of two identical hyperchaotic systems. We use hyperchaotic complex T-system for master and slave systems with unknown parameters in the slave system. To construct the optimal adaptive sliding mode controller, first a simple sliding surface is designed. Then, the optimal adaptive sliding mode controll...

متن کامل

A Review on Intrusion Detection System Based Data Mining Techniques

1,2 PG Scholar, Department of CSE & IT, Madhav Institute of Technology and Science, Gwalior, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract In today’s scenario to maintain the security of network system is important. We need a secure and safe network system towards intruders attack. Intru...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005