40,852 research outputs found

    Detecting time-fragmented cache attacks against AES using Performance Monitoring Counters

    Get PDF
    Cache timing attacks use shared caches in multi-core processors as side channels to extract information from victim processes. These attacks are particularly dangerous in cloud infrastructures, in which the deployed countermeasures cause collateral effects in terms of performance loss and increase in energy consumption. We propose to monitor the victim process using an independent monitoring (detector) process, that continuously measures selected Performance Monitoring Counters (PMC) to detect the presence of an attack. Ad-hoc countermeasures can be applied only when such a risky situation arises. In our case, the victim process is the AES encryption algorithm and the attack is performed by means of random encryption requests. We demonstrate that PMCs are a feasible tool to detect the attack and that sampling PMCs at high frequencies is worse than sampling at lower frequencies in terms of detection capabilities, particularly when the attack is fragmented in time to try to be hidden from detection

    An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations

    Full text link
    With the expansion of wireless sensor networks (WSNs), the need for securing the data flow through these networks is increasing. These sensor networks allow for easy-to-apply and flexible installations which have enabled them to be used for numerous applications. Due to these properties, they face distinct information security threats. Security of the data flowing through across networks provides the researchers with an interesting and intriguing potential for research. Design of these networks to ensure the protection of data faces the constraints of limited power and processing resources. We provide the basics of wireless sensor network security to help the researchers and engineers in better understanding of this applications field. In this chapter, we will provide the basics of information security with special emphasis on WSNs. The chapter will also give an overview of the information security requirements in these networks. Threats to the security of data in WSNs and some of their counter measures are also presented

    Network emulation focusing on QoS-Oriented satellite communication

    Get PDF
    This chapter proposes network emulation basics and a complete case study of QoS-oriented Satellite Communication

    BDII DOCUMENTATION

    Get PDF
    BDII Core contains elements common for top and site BDII. The top-level BDII is an instance fetching information from site BDII

    Wireless Sensor System for Monitoring and Control

    Get PDF
    With the fast development of wireless sensor network (WSN) technology, a large number of applications have been widely used over the past few years. As a matter of fact, wireless monitoring and control system is unavoidable one of the applications that consist of WSN nodes. A generic, modular and stackable WSN node, named UWASA Node has been developed by the University of Vaasa and Aalto University lately. Besides, SurfNet node, developed by Seinäjoki University of Applied Science, is designed as low-power consumption, high-data rate, small and powerful sensor node that is suitable to implement the monitoring and control tasks under multiple conditions. In this work, a wireless sensor system for monitoring and control is integrated and developed by one UWASA Node, one Linux board, and SurfNet nodes. Firstly, the basics of WSN including IEEE 802.15.4 and ZigBee standard are introduced. Secondly, a new design and development of the hardware and software for the wireless sensor system is explained in detail. After that, several experiments are performed to verify the system performance due to the limited computational and power source of the sensor nodes in the WSN. In one word, this developed wireless sensor system provides a wireless solution for remote monitoring and control of the deployed environment.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    A microscopy technique based on bio-impedance sensors

    Get PDF
    It is proposed a microscopy for cell culture applications based on impedance sensors. The imagined signals are measured with the Electrical Cell-Substrate Spectroscopy (ECIS) technique, by identifying the cell area. The proposed microscopy allows real-time monitoring inside the incubator, reducing the contamination risk by human manipulation. It requires specific circuits for impedance measurements, a two-dimensional sensor array (pixels), and employing electrical models to decode efficiently the measured signals. Analogue Hardware Description Language (AHDL) circuits for cell-microelectrode enables the use of geometrical and technological data into the system design flow. A study case with 8x8 sensor array is reported, illustrating the evolution and power of the proposed image acquisition.Junta de Andalucía P0-TIC-538
    corecore