252 research outputs found
A Radio Frequency Non-reciprocal Network Based on Switched Low-loss Acoustic Delay Lines
This work demonstrates the first non-reciprocal network based on switched
low-loss acoustic delay lines. A 21 dB non-reciprocal contrast between
insertion loss (IL=6.7 dB) and isolation (28.3 dB) has been achieved over a
fractional bandwidth of 8.8% at a center frequency 155MHz, using a record low
switching frequency of 877.22 kHz. The 4-port circulator is built upon a newly
reported framework by the authors, but using two in-house fabricated low-loss,
wide-band lithium niobate (LiNbO3) delay lines with single-phase unidirectional
transducers (SPUDT) and commercial available switches. Such a system can
potentially lead to future wide-band, low-loss chip-scale nonreciprocal RF
systems with unprecedented programmability.Comment: 4 pages, 7 figure
SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices
The simplicity of deployment and perpetual operation of energy harvesting
devices provides a compelling proposition for a new class of edge devices for
the Internet of Things. In particular, Computational Radio Frequency
Identification (CRFID) devices are an emerging class of battery-free,
computational, sensing enhanced devices that harvest all of their energy for
operation. Despite wireless connectivity and powering, secure wireless firmware
updates remains an open challenge for CRFID devices due to: intermittent
powering, limited computational capabilities, and the absence of a supervisory
operating system. We present, for the first time, a secure wireless code
dissemination (SecuCode) mechanism for CRFIDs by entangling a device intrinsic
hardware security primitive Static Random Access Memory Physical Unclonable
Function (SRAM PUF) to a firmware update protocol. The design of SecuCode: i)
overcomes the resource-constrained and intermittently powered nature of the
CRFID devices; ii) is fully compatible with existing communication protocols
employed by CRFID devices in particular, ISO-18000-6C protocol; and ii) is
built upon a standard and industry compliant firmware compilation and update
method realized by extending a recent framework for firmware updates provided
by Texas Instruments. We build an end-to-end SecuCode implementation and
conduct extensive experiments to demonstrate standards compliance, evaluate
performance and security.Comment: Accepted to the IEEE Transactions on Dependable and Secure Computin
Toward Ka Band Acoustics: Lithium Niobate Asymmetrical Mode Piezoelectric MEMS Resonators
This work presents a new class of micro-electro-mechanical system (MEMS)
resonators toward Ka band (26.5-40GHz) for fifth-generation (5G) wireless
communication. Resonant frequencies of 21.4 and 29.9 GHz have been achieved
using the fifth and seventh order asymmetric (A5 and A7) Lamb-wave modes in a
suspended Z-cut lithium niobate (LiNbO3) thin film. The fabricated device has
demonstrated an electromechanical coupling (kt2) of 1.5% and 0.94% and
extracted mechanical Qs of 406 and 474 for A5 and A7 respectively. The quality
factors are the highest reported for piezoelectric MEMS resonators operating at
this frequency range. The demonstrated performance has shown the strong
potential of LiNbO3 asymmetric mode devices to meet the front-end filtering
requirements of 5G.Comment: 5 pages, 7 figures, 2018 IEEE International Frequency Control
Symposiu
NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions
Building hardware security primitives with on-device memory fingerprints is a
compelling proposition given the ubiquity of memory in electronic devices,
especially for low-end Internet of Things devices for which cryptographic
modules are often unavailable. However, the use of fingerprints in security
functions is challenged by the small, but unpredictable variations in
fingerprint reproductions from the same device due to measurement noise. Our
study formulates a novel and pragmatic approach to achieve highly reliable
fingerprints from device memories. We investigate the transformation of raw
fingerprints into a noise-tolerant space where the generation of fingerprints
is intrinsically highly reliable. We derive formal performance bounds to
support practitioners to easily adopt our methods for applications.
Subsequently, we demonstrate the expressive power of our formalization by using
it to investigate the practicability of extracting noise-tolerant fingerprints
from commodity devices. Together with extensive simulations, we have employed
119 chips from five different manufacturers for extensive experimental
validations. Our results, including an end-to-end implementation demonstration
with a low-cost wearable Bluetooth inertial sensor capable of on-demand and
runtime key generation, show that key generators with failure rates less than
can be efficiently obtained with noise-tolerant fingerprints with a
single fingerprint snapshot to support ease-of-enrollment.Comment: Accepted to IEEE Transactions on Dependable and Secure Computing.
Yansong Gao and Yang Su contributed equally to the study and are co-first
authors in alphabetical orde
- …