6 research outputs found

    An Energy-Efficient Reconfigurable DTLS Cryptographic Engine for End-to-End Security in IoT Applications

    Get PDF
    This paper presents a reconfigurable cryptographic engine that implements the DTLS protocol to enable end-to-end security for IoT. This implementation of the DTLS engine demonstrates 10x reduction in code size and 438x improvement in energy-efficiency over software. Our ECC primitive is 237x and 9x more energy-efficient compared to software and state-of-the-art hardware respectively. Pairing the DTLS engine with an on-chip RISC-V allows us to demonstrate applications beyond DTLS with up to 2 orders of magnitude energy savings.Comment: Published in 2018 IEEE International Solid-State Circuits Conference (ISSCC

    An Energy-Efficient Reconfigurable DTLS Cryptographic Engine for End-to-End Security in IoT Applications

    Full text link
    This paper presents a reconfigurable cryptographic engine that implements the DTLS protocol to enable end-to-end security for IoT. This implementation of the DTLS engine demonstrates 10x reduction in code size and 438x improvement in energy-efficiency over software. Our ECC primitive is 237x and 9x more energy-efficient compared to software and state-of-the-art hardware respectively. Pairing the DTLS engine with an on-chip RISC-V allows us to demonstrate applications beyond DTLS with up to 2 orders of magnitude energy savings.Comment: Published in 2018 IEEE International Solid-State Circuits Conference (ISSCC

    Analyzing Attacking methods on Wi-Fi wireless networks pertaining (WEP, WPA-WPA2) security protocols

    Get PDF
    The technology of wireless network systems has eased the possibility to communicate utilising the electromagnetic waves which leads to eliminating the major barriers in portable communications. Wireless networks have a vital role in the current era that all devices; ranging from local modems to organizational equipment, are using various coding approaches to exchange data on the network. However, since the wireless networks utilise the air, as the communication medium, that results to confront more vulnerabilities. If an attacker penetrates a wireless network, he/she would be capable to attack users connected to the network. Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and WPA2 are the common security protocols that play the most significant role in local and organizational wireless communication. Accordingly, this study analysed the attacking methods in WEP, WPA, and WPA2 coding protocols. The main objective of the current study is to identify the security vulnerabilities related to these three protocols and define optimal solutions to improve the security of wireless networks against the attackers. The findings presented in this study would support users to maintain security of their home wireless networks as well as employees to secure the organizational network

    An analyzing process on wireless protection criteria focusing on (WPA) within computer network security

    Get PDF
    Network security from a long ago approaches to cryptography and hash functions which are tremendous and due to the weakness of different vulnerabilities in the networks and obviously there is a significant need for analyzes. In this manuscript, the state-of-the-art wireless environment is focused solely on the sensor technology, in which security needs to be integrated with the Wireless Protected Access (WPA) standards. Wireless networking includes numerous points of view from wireless sensor systems, ad hoc mobile devices, Wi-Max and many more. The authentication and dynamic encryption is modified by system managers so that general communication can be anchored without any sniper effort in order to perform higher degrees of security and overall execution. The key exchange mechanism in wireless systems such as forward cases is accompanied by the sophisticated cryptography so as to anchor the whole computer state. The manuscript carries out a significant audit of test points of view using the methodologies used for the cryptography angle for protection and honesty in the wireless case, stressing Wi-Fi Secure Protected (WPA) needs

    Revisi贸n sistem谩tica de sistemas inteligentes de transporte (ITS) a trav茅s de internet de las cosas (IOT) para problemas de transporte terrestre de pasajeros

    Get PDF
    Trabajo de Investigaci贸nEl desarrollo de este trabajo fue realizar una revisi贸n sistem谩tica de sistemas inteligentes de transporte (ITS) a trav茅s de internet de las cosas (IOT) para problemas de transporte terrestre de pasajeros, siguiendo la metodolog铆a de revisi贸n sistem谩tica de Barbara Kitchenham, definiendo palabras y frases para generar cadenas de busqueda e ir agregando criterios de inclusi贸n y exclusi贸n, en el proceso de b煤squeda en bases de datos cient铆ficas, con el fin de realizar un an谩lisis cuantitativo, mostrando una caracterizaci贸n de t茅rminos referentes a la investigaci贸n.INTRODUCCI脫N 1. GENERALIDADES 2. PLANIFICACION DE LA REVICION SISTEMATICA. 3. RESULTADOS CONCLUCIONES RECOMENDACIONES BIBLIOGRAF脥A ANEXOSPregradoIngeniero de Sistema
    corecore