252 research outputs found

    A Radio Frequency Non-reciprocal Network Based on Switched Low-loss Acoustic Delay Lines

    Full text link
    This work demonstrates the first non-reciprocal network based on switched low-loss acoustic delay lines. A 21 dB non-reciprocal contrast between insertion loss (IL=6.7 dB) and isolation (28.3 dB) has been achieved over a fractional bandwidth of 8.8% at a center frequency 155MHz, using a record low switching frequency of 877.22 kHz. The 4-port circulator is built upon a newly reported framework by the authors, but using two in-house fabricated low-loss, wide-band lithium niobate (LiNbO3) delay lines with single-phase unidirectional transducers (SPUDT) and commercial available switches. Such a system can potentially lead to future wide-band, low-loss chip-scale nonreciprocal RF systems with unprecedented programmability.Comment: 4 pages, 7 figure

    SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices

    Full text link
    The simplicity of deployment and perpetual operation of energy harvesting devices provides a compelling proposition for a new class of edge devices for the Internet of Things. In particular, Computational Radio Frequency Identification (CRFID) devices are an emerging class of battery-free, computational, sensing enhanced devices that harvest all of their energy for operation. Despite wireless connectivity and powering, secure wireless firmware updates remains an open challenge for CRFID devices due to: intermittent powering, limited computational capabilities, and the absence of a supervisory operating system. We present, for the first time, a secure wireless code dissemination (SecuCode) mechanism for CRFIDs by entangling a device intrinsic hardware security primitive Static Random Access Memory Physical Unclonable Function (SRAM PUF) to a firmware update protocol. The design of SecuCode: i) overcomes the resource-constrained and intermittently powered nature of the CRFID devices; ii) is fully compatible with existing communication protocols employed by CRFID devices in particular, ISO-18000-6C protocol; and ii) is built upon a standard and industry compliant firmware compilation and update method realized by extending a recent framework for firmware updates provided by Texas Instruments. We build an end-to-end SecuCode implementation and conduct extensive experiments to demonstrate standards compliance, evaluate performance and security.Comment: Accepted to the IEEE Transactions on Dependable and Secure Computin

    Toward Ka Band Acoustics: Lithium Niobate Asymmetrical Mode Piezoelectric MEMS Resonators

    Full text link
    This work presents a new class of micro-electro-mechanical system (MEMS) resonators toward Ka band (26.5-40GHz) for fifth-generation (5G) wireless communication. Resonant frequencies of 21.4 and 29.9 GHz have been achieved using the fifth and seventh order asymmetric (A5 and A7) Lamb-wave modes in a suspended Z-cut lithium niobate (LiNbO3) thin film. The fabricated device has demonstrated an electromechanical coupling (kt2) of 1.5% and 0.94% and extracted mechanical Qs of 406 and 474 for A5 and A7 respectively. The quality factors are the highest reported for piezoelectric MEMS resonators operating at this frequency range. The demonstrated performance has shown the strong potential of LiNbO3 asymmetric mode devices to meet the front-end filtering requirements of 5G.Comment: 5 pages, 7 figures, 2018 IEEE International Frequency Control Symposiu

    NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions

    Full text link
    Building hardware security primitives with on-device memory fingerprints is a compelling proposition given the ubiquity of memory in electronic devices, especially for low-end Internet of Things devices for which cryptographic modules are often unavailable. However, the use of fingerprints in security functions is challenged by the small, but unpredictable variations in fingerprint reproductions from the same device due to measurement noise. Our study formulates a novel and pragmatic approach to achieve highly reliable fingerprints from device memories. We investigate the transformation of raw fingerprints into a noise-tolerant space where the generation of fingerprints is intrinsically highly reliable. We derive formal performance bounds to support practitioners to easily adopt our methods for applications. Subsequently, we demonstrate the expressive power of our formalization by using it to investigate the practicability of extracting noise-tolerant fingerprints from commodity devices. Together with extensive simulations, we have employed 119 chips from five different manufacturers for extensive experimental validations. Our results, including an end-to-end implementation demonstration with a low-cost wearable Bluetooth inertial sensor capable of on-demand and runtime key generation, show that key generators with failure rates less than 10−610^-6 can be efficiently obtained with noise-tolerant fingerprints with a single fingerprint snapshot to support ease-of-enrollment.Comment: Accepted to IEEE Transactions on Dependable and Secure Computing. Yansong Gao and Yang Su contributed equally to the study and are co-first authors in alphabetical orde
    • …
    corecore