40,852 research outputs found
Detecting time-fragmented cache attacks against AES using Performance Monitoring Counters
Cache timing attacks use shared caches in multi-core processors as side
channels to extract information from victim processes. These attacks are
particularly dangerous in cloud infrastructures, in which the deployed
countermeasures cause collateral effects in terms of performance loss and
increase in energy consumption. We propose to monitor the victim process using
an independent monitoring (detector) process, that continuously measures
selected Performance Monitoring Counters (PMC) to detect the presence of an
attack. Ad-hoc countermeasures can be applied only when such a risky situation
arises. In our case, the victim process is the AES encryption algorithm and the
attack is performed by means of random encryption requests. We demonstrate that
PMCs are a feasible tool to detect the attack and that sampling PMCs at high
frequencies is worse than sampling at lower frequencies in terms of detection
capabilities, particularly when the attack is fragmented in time to try to be
hidden from detection
An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations
With the expansion of wireless sensor networks (WSNs), the need for securing
the data flow through these networks is increasing. These sensor networks allow
for easy-to-apply and flexible installations which have enabled them to be used
for numerous applications. Due to these properties, they face distinct
information security threats. Security of the data flowing through across
networks provides the researchers with an interesting and intriguing potential
for research. Design of these networks to ensure the protection of data faces
the constraints of limited power and processing resources. We provide the
basics of wireless sensor network security to help the researchers and
engineers in better understanding of this applications field. In this chapter,
we will provide the basics of information security with special emphasis on
WSNs. The chapter will also give an overview of the information security
requirements in these networks. Threats to the security of data in WSNs and
some of their counter measures are also presented
Network emulation focusing on QoS-Oriented satellite communication
This chapter proposes network emulation basics and a complete case study of QoS-oriented Satellite Communication
BDII DOCUMENTATION
BDII Core contains elements common for top and site BDII. The top-level BDII is an instance fetching information from site BDII
Wireless Sensor System for Monitoring and Control
With the fast development of wireless sensor network (WSN) technology, a large number of applications have been widely used over the past few years. As a matter of fact, wireless monitoring and control system is unavoidable one of the applications that consist of WSN nodes. A generic, modular and stackable WSN node, named UWASA Node has been developed by the University of Vaasa and Aalto University lately. Besides, SurfNet node, developed by Seinäjoki University of Applied Science, is designed as low-power consumption, high-data rate, small and powerful sensor node that is suitable to implement the monitoring and control tasks under multiple conditions.
In this work, a wireless sensor system for monitoring and control is integrated and developed by one UWASA Node, one Linux board, and SurfNet nodes. Firstly, the basics of WSN including IEEE 802.15.4 and ZigBee standard are introduced. Secondly, a new design and development of the hardware and software for the wireless sensor system is explained in detail. After that, several experiments are performed to verify the system performance due to the limited computational and power source of the sensor nodes in the WSN. In one word, this developed wireless sensor system provides a wireless solution for remote monitoring and control of the deployed environment.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format
A microscopy technique based on bio-impedance sensors
It is proposed a microscopy for cell culture applications based on impedance sensors. The imagined signals are measured with the Electrical Cell-Substrate Spectroscopy (ECIS) technique, by identifying the cell area. The proposed microscopy allows real-time monitoring inside the incubator, reducing the contamination risk by human manipulation. It requires specific circuits for impedance measurements, a two-dimensional sensor array (pixels), and employing electrical models to decode efficiently the measured signals. Analogue Hardware Description Language (AHDL) circuits for cell-microelectrode enables the use of geometrical and technological data into the system design flow. A study case with 8x8 sensor array is reported, illustrating the evolution and power of the proposed image acquisition.Junta de Andalucía P0-TIC-538
- …