9 research outputs found

    Proposing a Novel Method for Hardware Trojan Detection

    Get PDF
    415-418Hardware Trojan refers to an unintended or undesirable alteration in many circuits which turned out to be a major challenge for the design and fabrication of integrated circuits for the semiconductor industries. Such a challenge has been addressed in numerous critical applications. Due to their diversity and process variation, Trojans vary in terms of detection and prevention methods. This paper proposes a novel technique for the Trojan detection involving the application of self-examining circuits. This method adequately resists against the PV and scalability and do not need to any golden ICs. Segmenting the circuit enables the technique to both detect and locate the Trojans with a quick possible time. The implementation of this method indicates a significant improvement in the detection rate

    MEMS Gyroscope Raw Data Noise Reduction Using Fading Memory Filter

    Get PDF
    553-558Nowadays, MEMS sensors are widely used in systems such as autonomous vehicles, but they still suffer from high stochastic errors such as Angle random walk (ARW) noise, which causes failure in real-signals and produces an error in the position and attitude of mobile systems. So far, many filters are developed to reduce the amount of noise in the output of the MEMS sensors. The computational overhead, the rate of noise reduction, and the phase-delay of the filter are the most important characteristics of choosing a suitable filter. In this paper, a low pass filter based on the alpha-beta filter with a very low computational overhead is proposed to reduce the amount of noise. In order to find the optimal filter gain, the improvement in the positioning is selected as a criterion, which is a tradeoff between the amount of noise reduction and the phase delay of the filtered signal. In this work, the KITTI database is used to evaluate the proposed filter. The results show that the proposed filter reduces the sensor’s noise and improves the positioning of the moving car, significantly

    Authentication Phase of Security Bootstrapping in the Internet of Things Networks Based on a Trusted Zone

    Get PDF
    751-754Internet of Things (IoT) represents enabling all things in such a smart way that those things be accessed any time and anywhere through the Internet. Presence of IoT as a novel way of networking, opens up new concernsaround the communication and network world. A secure establishing in such a diffused network is a great concerns of the researchers. Due to Smart things’ resource-constraints and power-limitation the former ways of securing networks cannot be applicable in IoT. Thus, security bootstrapping has introduced a solution for establishing security in the first instance of deploying the network. In this study, we have proposed a security bootstrapping solution which can be applied in IoT environment. This security bootstrapping focused on the authentication phase of security as a basis. Our solution is based on having a unique device identifier, which physical address was chosen. Devices can automatically introduce themselves to the router of IoT network by their unique identifier with the minimum of human intervention. Besides, we suggest that an IoT Center to be a trusted medium between the manufacturer of smart things and the buyers. Therefore, we make a connection between the router and the IoT Center
    corecore