Hardware and Software Design for Automotive Security
|
|
|
- Tracy Harris
- 10 years ago
- Views:
Transcription
1 32 IJCSNS International Journal of Computer Science and Network Security, VOL.15 No.9, September 2015 Hardware and Software Design for Automotive Security Gaurav Bansod Faculty of Engineering,Symbiosis Institute Of Technology, Pune,India Summary Nowadays security is a major area of concern. Embedded systems are used in every automotive systems. So, attack from outside network, inside networks, bugs, hacking these are common and major concerns for an automotive security. This paper aims at providing hardware and software solution for security in automotive applications. In this paper we propose a hardware model for encryption as well as a software model that can be used for security, particularly in the Automobile domain. In Automobiles 40 to 50 microcontrollers will communicate over a CAN Bus, this communication can be encrypted, it should allow only authenticate controller to communicate inside as well as outside. In vehicle there are large no of microcontrollers called ECU s which performs specific action depending on information supplied to them by other ECU s inside vehicle or the other clusters who are outside vehicle and try to communicate. This will create a wide gateway for misusing the information and manipulations. In this paper, hardware approach is presented for security build on GRP algorithm consisting of structures of Multiplexers can be called as Hardware Security Model(HSM) and in software approach by creating a gateways and only allowing authenticate controllers to communicate..key words: ECU, Automobile, Security, Hardware, Software. 1. Introduction Today, in vehicular networks large no of digital control units are distributed and their communication is possible over a field buses like CAN, Flex ray, MOST etc. Same information which is transmitted by one node is available with all the nodes present on the bus, proper measures should be taken to receive information correctly for the specific node. Many future applications required very high end security measures for protecting information inside automobile. This generates need for cryptographic algorithms to play an important role in security in automotive domain. Encryption like symmetric, asymmetric, encryption using digital signatures, authenticate controllers [1] these techniques will be useful to provide security from misusing or manipulating a information. In this paper above mentioned software approach is designed in Embedded C and implemented on ARM7 LPC2129 board. Similarly a software algorithm lacks rich encryption standards because of flexibility and issues like predictability. In this paper we had presented a hardware approach which is previously implemented for audio application and now can be implemented for automotive application. In this approach, a discrete structure is made by using multiplexers to do swapping with the help of control words as input to multiplexers. This control words are generated by using GRP algorithm [2] which is best suited for performing permutation and combinations. A structure is formed by using sets of multiplexers which consumes less power and can be implemented in IC form. Separate structures are created for transmitter as well as receiver. This structure provides rich encryption standards as compared to other structures [3] like EMSN, MEMS. Moreover other hardware approaches like deigning a Hardware Security Models (HSM S) [4] is very expensive for manufacture because of inclusion of many structures like counters, algorithms though it provides top encryption standards. In this paper we are proposing a hardware model consisting of sets of 2x1 multiplexers performing permutations on GRP algorithm implemented in FPGA. 2. EVITA Model For implementing a security application in automobiles, EVITA has proposed a hardware security model which is implemented inside automobiles. Most advanced research algorithms like AES, HASH and others are implemented to secure information. These all schemes provide rich encryption standards and it s very difficult to hack the original information. Intruder sources like an owner, service mechanic or any other person who can able to see the information and tries to corrupt it, unable to do so because of these crypto graphic algorithms. HSM s in EVITA model is implemented between sensors and microcontroller, microcontrollers and microcontroller and between microcontroller and infrastructure. These HSM s are light based, medium and heavy based HSM s depending on the crypto graphic engines inside HSM s. This method provides economically feasible approach to implement HSM s. Figure below is from EVITA model [4] Manuscript received September 5, 2015 Manuscript revised September 20, 2015
2 IJCSNS International Journal of Computer Science and Network Security, VOL.15 No.9, September Fig1: EVITA HSM Implementation sorter network [3] which forms a 3 stage symmetry. This architecture is a direct implementation of GRP algorithm which is based suited for doing permutations. This GRP algorithm will generate the code word for a particular arrangement and depending on code words bits will get swapped. Control word generation by GRP algorithm is explained in paper [3] Above figure shows implementation of HSM s in automobiles. Components used are Crypto graphic algorithms like AES, HASH engine, random no generators, counters etc. As light HSM s are implemented between sensors and microcontroller because very less information is transferred between the units. Similarly, medium based HSM s is implemented between microcontrollers, because flow of traffic is more and crucial for synchronization inside system and finally heavy based HSM s which consisting of all crypto graphic engines, counters, random number generator is implemented between microcontroller and infrastructure (Vehicle to Vehicle Communication), because most corrupt form of information, forgery messages, fake information can be expected from outside environment. Fig 2: EVITA HSM ARCHITECTURE 3. Cryptographic hardware model In this proposal, we are proposing a new hardware based cryptographic design which can be implemented for secure communication inside automobiles. This cryptographic hardware model(chm) is based on GRP algorithm [3], which can be replaced with the HSM of EVITA. The algorithms like AES, HASH, are well suited for an application which runs on high volumes of data. Inside automobile, communication is limited to bytes of data. In such a scenario implementing HSM consisting of such cryptographic engines is not feasible economically. CHM provides a architecture which is perfectly used for doing encryption on information which is in bytes moreover provides rich encryption standards and have very low power consumption if implemented in IC form. CHM architecture consisting of discrete sets of multiplexers also known as remodified enhanced merger Fig2:Code word Generation by GRP algorithm Algorithm: To generate GRP imstruction for a specific arrangement INPUT: Arrangement P OUTPUT: Arrangement Q and control bits c for GRP INSTRUCTION Let Pi represent the i(th) MIS in P. (x, y) denotes the operations that combine integer sequence x and y into a longer sequence. Sort(x) is a function that sorts elements in sequence x in increasing order. P can be represented by k MISes (Monotonically Increasing Sequences) as follows: P = (P1, P2, P3,, Pm, Pm+1, Pm+2,Pk-1, Pk) Note that m = k/2, and P1, P2, P3,, Pm is the first half MISes. 1. Generate temporary sequences T1, T2,,Tm: For i = 1, 2,,m-1 Ti = (Pi, Pi+m) If (k is odd) then Tm = Pm else Tm=(Pm, Pk) 2. Generate Q: For i = 1, 2,, m Qi= Sort(Ti) Let Q = (Q1, Q2,Q3,,Qm). 3. Generate control bits c: Q can also be considered as a bit string: Q = (Q1, Q2, Q3,,Qm) = (b0, b1, b2,,bn-1) For j = 0, 1,, n-1 if (bj is in P1, P2, P3,, or Pm) cj = 0 else cj = 1 Above codeword s are generated for specific arrangement In this paper we have considered from A0 to A7.Change in a arrangement of bits will generate a different control word. These codeword s are used for swapping information for a specific arrangement. A change in a bits position will
3 34 IJCSNS International Journal of Computer Science and Network Security, VOL.15 No.9, September 2015 generate different control words and so the information. This architecture consumes less power as compared to other existing algorithm which is implemented for audio applications. The arrangements and swapping method for CHM based on GRP algorithm is shown below Fig 6:Swapping of bits at Trasmitter End Fig 3: CHM Transmitter Architecture Fig 3 shows CHM for transmitter section. Here bits are arranged in a monotonically increasing sequence from A0 to A7 and each bit is associated control word generated from GRP algorithm indicated by C0 to C7 respectively. Bits are swapped according to GRP algorithm based on code word. Logic to do the permutation is explained with the fig.4 So, as shown above final swapped bits will be A7 A2 A6 A0 A1 A5 A4 A3 These encrypted bits is communicated over a CAN Bus for a particular node. As seen from table control words at each stage is different generated by GRP algorithm that increases standard of encryption. Moreover as it is using sets of 2 x 1 multiplexers,power consumption is also less.it requires very less infrastructure which made this structure economically feasible as compared to EVITA model. 4. Cryptographic Receiver Structure Similarly with GRP algorithm receiver structure is developed based on control words and sets of multiplexers. Main concept of GRP algorithm is to sort based on concentrating 1 s on left hand side as explained in fig 7 Fig 4: Control Logic Arrangement of bits and their respective gropups are formed according to GRP algorithm[3]. A7 to A0 are grouped as (A7,A3), (A6,A2), (A5,A1) and (A4,A0). According to arrangement shown above in fig3 bits are swapped based on control words. Fig 6 shows its implementation Fig 5:Code words with Respective bits This control words are formed for a particular arrangement by GRP algorithm and birs are swapped in respective group and based on logic explained in fig.4 Fig 7: CHM Receiver Structure CHM receiver structure uses less no of multiplexers, so power consumption would be more less and it can be implemented at any receiver node. Bits swapping and arrangement is shown below
4 IJCSNS International Journal of Computer Science and Network Security, VOL.15 No.9, September Fig 8:Swapping of Bits at Receiver end Swapped bits are A7 A6 A5 A4 A3 A2 A1 A0 From above arrangement at receiver end, we can able to retrieve the original information which is transmitted. This reciver structure can be implemented for every receiving node inside automobiles. 5. CHM for Security As compared to EVITA HSM structure, CHM structure would be economically viable and as par with the encryption standards. CHM model based on GRP algorithm is implemented on FPGA and as it is a hardwired implementation, it could be difficult for intruder or for extruder to tamper the information. As hardware structures are always having edge over software structure in terms of speed, security but lags on cost. This CHM provides a midway solution for providing security in automobiles by making security solution economically viable without losing much on encryption standards.chm model is implemented for 8 bits of data can be extended for 16bit and for any arrangement. This would add more encryption inside system such that few blocks consisting of GRP of particular arrangement and few of other, which make system more resistive and unpredictable. As GRP algorithm is highly studied and best for doing permutations, its implementation on FPGA gives an edge over other existing algorithms. This GRP algorithm is written in Verilog and implemented on Xilinx FPGA board. Power is calculated by using XPower tool of Xilinx and same can be implemented in RTL complier of Cadence tool.chm power calculation with Xpower tool is shown in fig 6 that is implemented for transmitter section which is coming around 77mW. So receiver section would be also 77mW approximately. Fig 9:Power calculation by XPower Tool Above fig shows power consumption by this algorithm is very less as compared to other existing algorithm. Detailed comparative study is discussed in paper [3]For above structure power consumption turn out is 154mW which is very less. This paper proposes a first type of cryptographic algorithm which can be implemented for automotive security application. This CHM can be implemented between sensors and controller between controllers and between controllers and infrastructure thus replacing HSM s of EVITA model. As discussed in paper [3], this GRP structure provides fastest solution with lesser delays. 6. Secure approach by creating Gateways To ensure security, models can be created by using gateways to authenticate controllers, messages inside automobiles as mentioned in paper [1].To authenticate controller for participation in communication over CAN bus, we should authenticate it to avoid any tampering of information or misuse. Various measures have been taken by using digital signatures, symmetric and asymmetric encryption to secure information [1]. In this paper we have implemented gateways for authenticating controllers. Keys for respective controllers are stored in a gateway and before initiating any communication over a bus first controller has to passes through gateways to authenticate itself. This will prevent an entry of any unauthorized controller to an automobile environment. Above method for authenticating a controller is written in Embedded C and implemented on ARM7 LPC2129 board. The gateways would be having all original keys from OEM s. This can be further encrypted using symmetric and asymmetric encryption by using concept of public key and private key. Figure below shows snapshot of environment where gateways are created by using Embedded C.
5 36 IJCSNS International Journal of Computer Science and Network Security, VOL.15 No.9, September 2015 authenticate controller and their respective messages through UART. Fig 12:UART o/p only allowing authnteticate controllers Above figure shows participation in communication of only authenticate controller and their respective messages.so in this scenario gateway has rejected other 7 controllers as their key from OEM does not match. Only 3 controllers with id s 111, 456 and 567 will participate in communication and their messages 7,8, and 9 respctively are communicated to destination node. Algorithm: Fig 10:Creating Gateway in Keil Uvision4 1. Create a Gateway which can store all ID d from OEM s 2. Once any controller wants to communicate pass it through Gateways. 3. Using comparison algorithm, authenticate a controller 4. Respective contoller can send a message to respective node 5. This authenticate controller information can be send to other terminals by using UART. 6. Can include symmetric and assymetric encryption for guarding information Above algorithm is implemented and dumped on ARM7 LPC2129 board. Further in this algorithm encryption standards can be increased by using symmetric and assymetric cryptographic algorithms Fig 11: Simulated in Uvision 4 Above alogrithm is simulated by using Keil Uvision 4 and results are attached below showing only participation of 7. Results and Discussions Cryptographic Hardware Model (CHM) provides the unique way of securing communication in automobiles. As compared to EVITA HSM, CHM is economically feasible to implement in a system. Moreover GRP algorithm which is a core part of CHM gives very low power consumption as compared to other existing algorithm. This CHM structure can be implemented in ASIC form and at n no of nodes inside automobile. We can further extend this by putting symmetric and asymmetric encryption to achieve rich encryption standards. Moreover similar gateways can be created and implemented to avoid fake messages from external environment. This model is implemented and simulated on FPGA while method by creating Gateways is written in embedded C by using KEIL and implemented on ARM7 LPC2129 board. These methods can be simulated on vehicle infrastructure. 8. Future Work This paper can be implemented for announcement security also. In announcement security model, a person in a car will send a message to other cars in network regarding status on traffic, valuable information regarding accidents etc. this message needs to be authenticated because person may give fake message. A system can be implemented which can only accept messages if particular message is endorsed by n no of vehicles. As mentioned in [8], we can fix a particular threshold, if a particular message crosses particular threshold then can be considered as a authenticate message and allows to communicate with system. This structure with all modifications which includes implementing symmetric and asymmetric encryption, creating gateways can be simulated and implemented in vehicle system security. This whole
6 IJCSNS International Journal of Computer Science and Network Security, VOL.15 No.9, September structure can be implemented with cadence tool generating structural layout and can be fabricated as ASIC. Telecommunication Department. His research area includes Embedded systems, Securiy in Automobiles, Cryptography and VLSI design. He is member of IETE. Acknowledgement The author would like to thank Symbiosis Institute of Technology for providing all the tools and support required to carry out this project successfully. References [1] Marko Wolf, Andre Weimerskirch, and Christof Paar Clerk Maxwell, Secure in Vehicle Communication, Embedded Security In Cars, Securing current and future Automotive applications, Springer Journal [2] Gaurav Bansod, Audio Subword Sorter unit On Merger Sorter Network For Secure Communication,IEEE international conference on cotrol system computing and Engineering(ICCSCE 2111), Penang, Malaysia [3] Karthigaikumar P, Baskaran K, Hardware Implementation of Low Power Audio Sub word Sorter Unit for High Security Transmission International Journal of Computer and Electrical Engineering, Vol. 1, No. 2, June [4] Marko wolf, The EVITA hardware security Model, Seventh research programme of european comitee, July 2008,P.NO.34 [5] EVITA: E-safety vehicle intrusion protected applications [6] M.Wolf: "Security Engineering for Vehicular IT Systems Improving Trustworthiness and Dependability of Automotive IT Applications", Vieweg+Teubner-Verlag, [7] Designing Security Automotive Hardware- the EVITA project- Marko Wolf escrypt GMBH, Embedded Security, CAST Workshop Mobile Security for Intelligent Cars Darmstadt, Germany, August 27th, 2009 [8] Vanesa Daza, Josep Domingo-Ferrer, Senior Member, IEEE, Francesc Sebé, and Alexandre Viejo, Trustworthy privacy preserving car generated announcements in Vehicular adhoc networks, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58, NO. 4, MAY 2009 [9] R.R. Brooks, S. Sander, Juan Deng, and Joachim Taiber, Automobile security concern IEEE Vehicular technological Magazine, June [10] Apvrille, Ludovic, El Khayari, Rachid, Henniger, Olaf, Roudier, Yves, Schweppe, Hendrik, Seudié, Hervé, Weyl, Benjamin, Wolf, Marko, Secure Automotive on board Electronics network architecture,evita- Esafety vehicle intrusion protected applications. Gaurav Vijay Bansod received his Btech from Nagpur university, India and Mtech degree in embedded Systems from Jawaharlal Nehru Technological University, Hyderabad, India in 2006 and 2008 respectively. He is working in Symbiosis Institute of Technology, Pune as an Assistant Professor in Electronics &
EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications
EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé
Hardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
Vehicular Security Hardware The Security for Vehicular Security Mechanisms
escrypt GmbH Embedded Security Systemhaus für eingebettete Sicherheit Vehicular Security Hardware The Security for Vehicular Security Mechanisms Marko Wolf, escrypt GmbH Embedded Security Embedded Security
Vehicular On-board Security: EVITA Project
C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security
Security in Vehicle Networks
Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28 Introduction Vector Consulting Services supports clients worldwide in improving their product development
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
Secure Key Management A Key Feature for Modern Vehicle Electronics
13AE-0069 Secure Key Management A Key Feature for Modern Vehicle Electronics Christian Schleiffer, Marko Wolf, André Weimerskirch, and Lars Wolleschensky ESCRYPT Copyright 2012 SAE International ABSTRACT
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
NEXT GENERATION OF AUTOMOTIVE SECURITY: SECURE HARDWARE AND SECURE OPEN PLATFORMS
NEXT GENERATION OF AUTOMOTIVE SECURITY: SECURE HARDWARE AND SECURE OPEN PLATFORMS André Groll, Jan Holle University of Siegen, Institute for Data Communications Systems {andre.groll,jan.holle}@uni-siegen.de
SHE Secure Hardware Extension
SHE Secure Hardware Extension Data Security for Automotive Embedded Systems Workshop on Cryptography and Embedded Security Embedded World @ Nuremberg, February 2012 Content Data Security - What does it
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
A Study of New Trends in Blowfish Algorithm
A Study of New Trends in Blowfish Algorithm Gurjeevan Singh*, Ashwani Kumar**, K. S. Sandha*** *(Department of ECE, Shaheed Bhagat Singh College of Engg. & Tech. (Polywing), Ferozepur-152004) **(Department
SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC
SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC Ferozepur, Punjab, India Email: 1 [email protected], 2 [email protected]
Safety and security related features in AUTOSAR
Safety and security related features in Dr. Stefan Bunzel Spokesperson (Continental) Co-Authors: S. Fürst, Dr. J. Wagenhuber (BMW), Dr. F. Stappert (Continental) Automotive - Safety & Security 2010 22
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
IJESRT. [Padama, 2(5): May, 2013] ISSN: 2277-9655
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Design and Verification of VLSI Based AES Crypto Core Processor Using Verilog HDL Dr.K.Padama Priya *1, N. Deepthi Priya 2 *1,2
Bus Data Acquisition and Remote Monitoring System Using Gsm & Can
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 8, Issue 3 (Nov. - Dec. 2013), PP 88-92 Bus Data Acquisition and Remote Monitoring System
Embedding Trust into Cars Secure Software Delivery and Installation
Embedding Trust into Cars Secure Software Delivery and Installation André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security, Bochum, Germany Third Workshop
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0020 ISSN (Online): 2279-0039 International
Implementation of Full -Parallelism AES Encryption and Decryption
Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
Monitoring Data Integrity while using TPA in Cloud Environment
Monitoring Data Integrity while using TPA in Cloud Environment Jaspreet Kaur, Jasmeet Singh Abstract Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service
Certificate Revocation Management in VANET
Certificate Revocation Management in VANET Ghassan Samara Department of Computer Science, Faculty of Science and Information Technology, Zarqa University Zarqa, Jordan. [email protected] ABSTRACT Vehicular
Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis
Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis Andreas Fuchs and Roland Rieke {andreas.fuchs,roland.rieke}@sit.fraunhofer.de Fraunhofer Institute for
Certificate Authorities and Public Keys. How they work and 10+ ways to hack them.
Certificate Authorities and Public Keys How they work and 10+ ways to hack them. -- FoxGuard Solutions Www.FoxGuardSolutions.com [email protected] Version.05 9/2012 1 Certificate Use Overview
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
An Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
The implementation and performance/cost/power analysis of the network security accelerator on SoC applications
The implementation and performance/cost/power analysis of the network security accelerator on SoC applications Ruei-Ting Gu [email protected] Kuo-Huang Chung [email protected]
AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
How To Design A Code Lock System With A Status Display On A Cell Phone And A Password Code On A Smart Phone
ISSN (e): 2250 3005 Vol, 04 Issue, 7 July 2014 International Journal of Computational Engineering Research (IJCER) Enhanced Wireless Security System With Digital code lock using RF &GSM Technology 1 E.Supraja,
FPGA Implementation of an Advanced Traffic Light Controller using Verilog HDL
FPGA Implementation of an Advanced Traffic Light Controller using Verilog HDL B. Dilip, Y. Alekhya, P. Divya Bharathi Abstract Traffic lights are the signaling devices used to manage traffic on multi-way
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices
An On-chip Security Monitoring Solution For System Clock For Low Cost Devices
An On-chip Security Monitoring Solution For System Clock For Low Cost Devices Frank Vater Innovations for High Performance Microelectronics Im Technologiepark 25 15236 Frankfurt (Oder), Germany [email protected]
A New Security Mechanism for Vehicular Communication Networks
A New Security Mechanism for Vehicular Communication Networks Ghassan Samara Department of Computer Science, Faculty of Science and Information Technology, Zarqa University Zarqa, Jordan. [email protected]
Side Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
Fighting product clones through digital signatures
Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover
Security in ST : From Company to Products
Security in ST : From Company to Products July 2015 Thierry FENSCH Innovation, Collaboration and Efficiency Director Grenoble Site A global semiconductor leader 2014 revenues of $7.40B Who we are 2 Approximately
The relevance of cyber-security to functional safety of connected and automated vehicles
The relevance of cyber-security to functional safety of connected and automated vehicles André Weimerskirch University of Michigan Transportation Research Institute (UMTRI) February 12, 2014 Introduction
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology
VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL
Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL 1 N. Radhika, 2 Obili Ramesh, 3 Priyadarshini, 3 Asst.Profosser, 1,2 M.Tech ( Digital Systems & Computer Electronics), 1,2,3,
LIN (Local Interconnect Network):
LIN (Local Interconnect Network): History: LIN (Local Interconnect Network) was developed as cost-effective alternate to CAN protocol. In 1998 a group of companies including Volvo, Motorola, Audi, BMW,
HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY
HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY Amanjot Kaur 1, Manisha Bhardwaj 2 1 MTech Student, Computer Science Department, LPU, Jalandhar, Punjab, India, [email protected] 2 Assistant Professor,
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in
Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip
Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip Ms Lavanya Thunuguntla 1, Saritha Sapa 2 1 Associate Professor, Department of ECE, HITAM, Telangana
Making model-based development a reality: The development of NEC Electronics' automotive system development environment in conjunction with MATLAB
The V850 Integrated Development Environment in Conjunction with MAT...iles and More / Web Magazine -Innovation Channel- / NEC Electronics Volume 53 (Feb 22, 2006) The V850 Integrated Development Environment
Practice Questions. CS161 Computer Security, Fall 2008
Practice Questions CS161 Computer Security, Fall 2008 Name Email address Score % / 100 % Please do not forget to fill up your name, email in the box in the midterm exam you can skip this here. These practice
NXP & Security Innovation Encryption for ARM MCUs
NXP & Security Innovation Encryption for ARM MCUs Presenters Gene Carter- International Product Manager, NXP Semiconductors Gene is responsible for marketing of the ARM7 and Cortex-M3 microcontrollers.
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Raghavendra Reddy D 1, G Kumara Swamy 2
Car Accident Detection, Communication And Tracking Using ARM7 Controller Raghavendra Reddy D 1, G Kumara Swamy 2 1 PG Scholar, Dept of ECE, Malla Reddy Engineering College (Autonomous), Hyderabad, India.
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
Secure Large-Scale Bingo
Secure Large-Scale Bingo Antoni Martínez-Ballesté, Francesc Sebé and Josep Domingo-Ferrer Universitat Rovira i Virgili, Dept. of Computer Engineering and Maths, Av. Països Catalans 26, E-43007 Tarragona,
An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture
435 An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture Balamurugan.V School of Computing Science and Engineering, VIT University Chennai Campus, 600127, Tamilnadu, India. Abstract
Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET s
Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET s Ghassan Samara, Sureswaran Ramadas National Advanced IPv6 Center, Universiti Sains Malaysia Penang, Malaysia [email protected],
Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
In-Vehicle Networking
In-Vehicle Networking SAE Network classification Class A networks Low Speed (
Embedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
Hardware Security for Trustworthy C2X Applications Marko Wolf
Hardware Security for Trustworthy C2X Applications Marko Wolf C2C-CC/CAMP Harmonization Workshop, Wolfsburg, Germany, 15.3.2012 Outline 1. Three General Reasons for Automotive Hardware Security Modules
SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE
SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE Manoj S. Rewatkar 1 and Shital A. Raut 2 1,2 Department of Computer Science and Engineering, Visvesvaraya National Institute of Technology, Nagpur,
A Layered Signcryption Model for Secure Cloud System Communication
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1086
Journal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS K.B.Chandradeep Department of Centre for Educational Technology, IIT Kharagpur, Kharagpur, India [email protected] ABSTRACT This paper
SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS
SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS Ayesha Tabassum 1 1 Assistant Professor, Department of Computer Science and Engineering, DCET, Osmania University, Telangana, India Abstract
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Implementation and Design of AES S-Box on FPGA
International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 232-9364, ISSN (Print): 232-9356 Volume 3 Issue ǁ Jan. 25 ǁ PP.9-4 Implementation and Design of AES S-Box on FPGA Chandrasekhar
Software Development for Multiple OEMs Using Tool Configured Middleware for CAN Communication
01PC-422 Software Development for Multiple OEMs Using Tool Configured Middleware for CAN Communication Pascal Jost IAS, University of Stuttgart, Germany Stephan Hoffmann Vector CANtech Inc., USA Copyright
Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006
Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006 Introduction: Fixity, in preservation terms, means that the digital object
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
Keywords Web Service, security, DES, cryptography.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Provide the
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Automotive and Industrial Data Security
André Weimerskirch Cybersecurity for Cyber-Physical Systems Workshop April 23-24, 2012 Overview Introduction and Motivation Risk analysis Current and future security solutions Conclusions Communication
Data Integrity by Aes Algorithm ISSN 2319-9725
Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)
HASH CODE BASED SECURITY IN CLOUD COMPUTING
ABSTRACT HASH CODE BASED SECURITY IN CLOUD COMPUTING Kaleem Ur Rehman M.Tech student (CSE), College of Engineering, TMU Moradabad (India) The Hash functions describe as a phenomenon of information security
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
IoT Security Concerns and Renesas Synergy Solutions
IoT Security Concerns and Renesas Synergy Solutions Simon Moore CTO - Secure Thingz Ltd Agenda Introduction to Secure.Thingz. The Relentless Attack on the Internet of Things Building protection with Renesas
A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK
A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK S.Veni 1 and Dr.G.M.Kadhar Nawaz 2 1 Research Scholar, Barathiar University, Coimbatore, India [email protected] 2 Director, Dept. of MCA, Sona College
Pervasive Computing und. Informationssicherheit
Pervasive Computing und 11. Symposium on Privacy and Security Rüschlikon, 13. September 2006 Prof. Christof Paar European Competence Center for IT Security www.crypto.rub.de Contents 1. Pervasive Computing
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,
Packet Level Authentication Overview
Packet Level Authentication Overview Dmitrij Lagutin, [email protected] Helsinki Institute for Information Technology HIIT Aalto University School of Science and Technology Contents Introduction
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Safer data transmission using Steganography
Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: [email protected],
Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns
RESEARCH ARTICLE OPEN ACCESS Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns Mrs. Jayashree Katti, Sharadchandra Chavan, Dr. Sudeep Thepade, Samruddhi Puranik, Triloknath
