نتایج جستجو برای: physical security

تعداد نتایج: 830792  

Journal: :TIIS 2012
Dong Chen Guiran Chang

In this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems. First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed for building secure Cyber-Physical Systems. Then, a secure archite...

2013
Fabio Pasqualetti Florian Dörfler Francesco Bullo

Cyber-physical systems integrate physical processes, computational resources, and communication capabilities. Cyber-physical systems have permeated modern society becoming prevalent in many domains including energy production, health care, and telecommunications. Examples of cyber-physical systems include sensor networks, industrial automation systems , and critical infrastructures such as tran...

2004
P. Tuyls B. Skoric

We propose a general theoretical framework to analyze the security of Physical Uncloneable Functions (PUFs). We apply the framework to Optical PUFs. In particular we present a derivation, based on the physics governing multiple scattering processes, of the number of independent challengeresponse pairs supported by a PUF. We find that the number of independent challenge-response pairs is proport...

2015
Y. Ozan Basciftci C. Emre Koksal Alexei Ashikhmin

We consider a single-cell downlink massive MIMO communication in the presence of an adversary capable of jamming and eavesdropping simultaneously. We show that massive MIMO communication is naturally resilient to no training-phase jamming attack in which the adversary jams only the data communication and eavesdrops both the data communication and the training. Specifically, we show that the sec...

Journal: :Computers & Electrical Engineering 2015
Gabriele Lenzini Sjouke Mauw Samir Ouchani

Recent initiatives that evaluate the security of physical systems with objects as assets and people as agents –here called Socio-Technical Physical Systems– have limitations: their agent behaviour is too simple, they just estimate feasibility and not the likelihood of attacks, or they do estimate likelihood but on explicitly provided attacks only. We propose a model that can detect and quantify...

2017
Aakarsh Rao Nadir Carreón Roman Lysecky

2011
Ilya Kizhvatov

This thesis deals with physical attacks on implementations of cryptographic algorithms and countermeasures against these attacks. Physical attacks exploit properties of an implementation such as leakage through physically observable parameters (side-channel analysis) or susceptibility to errors (fault analysis) to recover secret cryptographic keys. In the absence of adequate countermeasures suc...

Human behaviors and activities of individuals are created in urban spaces, and cultural and social relationships are formed in these spaces. Considering the main source of insecurity among citizens in the cities and the important factors such as the physical form of the city, urban structures and the shape of buildings in this case, the purpose of the study is to measure the effect of the sense...

2001
Jian Ren Tongtong Li

Served as one of the most widely used wireless airlink interface, CDMA has been identified as a major technique for 3G wireless communications. The current IS-95 CDMA provides a near-satisfactory security solution to voice centric wireless communications, since generally each voice conversation only lasts a very short period of time. However, the security features provided by IS-95 CDMA are far...

2009
Demijan Klinc Jeongseok Ha Steven W. McLaughlin João Barros Byung-Jae Kwak

This paper presents a coding scheme for the Gaussian wiretap channel based on low-density parity-check (LDPC) codes. The messages are transmitted over punctured bits to hide data from eavesdroppers. It is shown that this method is asymptotically effective in the sense that it yields a BER very close to 0.5 for an eavesdropper whose SNR is lower than the threshold SNRE , even if the eavesdropper...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید