44 research outputs found

    Reliable Delay Based Algorithm to Boost PUF Security Against Modeling Attacks

    Get PDF
    Silicon Physical Unclonable Functions (sPUFs) are one of the security primitives and state-of-the-art topics in hardware-oriented security and trust research. This paper presents an efficient and dynamic ring oscillator PUFs (d-ROPUFs) technique to improve sPUFs security against modeling attacks. In addition to enhancing the Entropy of weak ROPUF design, experimental results show that the proposed d-ROPUF technique allows the generation of larger and updated challenge-response pairs (CRP space) compared with simple ROPUF. Additionally, an innovative hardware-oriented security algorithm, namely, the Optimal Time Delay Algorithm (OTDA), is proposed. It is demonstrated that the OTDA algorithm significantly improves PUF reliability under varying operating conditions. Further, it is shown that the OTDA further efficiently enhances the d-ROPUF capability to generate a considerably large set of reliable secret keys to protect the PUF structure from new cyber-attacks, including machine learning and modeling attacks

    Detection of Lying Electrical Vehicles in Charging Coordination Application Using Deep Learning

    Full text link
    The simultaneous charging of many electric vehicles (EVs) stresses the distribution system and may cause grid instability in severe cases. The best way to avoid this problem is by charging coordination. The idea is that the EVs should report data (such as state-of-charge (SoC) of the battery) to run a mechanism to prioritize the charging requests and select the EVs that should charge during this time slot and defer other requests to future time slots. However, EVs may lie and send false data to receive high charging priority illegally. In this paper, we first study this attack to evaluate the gains of the lying EVs and how their behavior impacts the honest EVs and the performance of charging coordination mechanism. Our evaluations indicate that lying EVs have a greater chance to get charged comparing to honest EVs and they degrade the performance of the charging coordination mechanism. Then, an anomaly based detector that is using deep neural networks (DNN) is devised to identify the lying EVs. To do that, we first create an honest dataset for charging coordination application using real driving traces and information revealed by EV manufacturers, and then we also propose a number of attacks to create malicious data. We trained and evaluated two models, which are the multi-layer perceptron (MLP) and the gated recurrent unit (GRU) using this dataset and the GRU detector gives better results. Our evaluations indicate that our detector can detect lying EVs with high accuracy and low false positive rate

    E-Learning Course Recommender System Using Collaborative Filtering Models

    Get PDF
    e-Learning is a sought-after option for learners during pandemic situations. In e-Learning platforms, there are many courses available, and the user needs to select the best option for them. Thus, recommender systems play an important role to provide better automation services to users in making course choices. It makes recommendations for users in selecting the desired option based on their preferences. This system can use machine intelligence (MI)-based techniques to carry out the recommendation mechanism. Based on the preferences and history, this system is able to know what the users like most. In this work, a recommender system is proposed using the collaborative filtering mechanism for e-Learning course recommendation. This work is focused on MI-based models such as K-nearest neighbor (KNN), Singular Value Decomposition (SVD) and neural network–based collaborative filtering (NCF) models. Here, one lakh of Coursera’s course review dataset is taken from Kaggle for analysis. The proposed work can help learners to select the e-Learning courses as per their preferences. This work is implemented using Python language. The performance of these models is evaluated using performance metrics such as hit rate (HR), average reciprocal hit ranking (ARHR) and mean absolute error (MAE). From the results, it is observed that KNN is able to perform better in terms of higher HR and ARHR and lower MAE values as compared to other models

    Reliable Delay Based Algorithm to Boost PUF Security Against Modeling Attacks

    No full text
    Silicon Physical Unclonable Functions (sPUFs) are one of the security primitives and state-of-the-art topics in hardware-oriented security and trust research. This paper presents an efficient and dynamic ring oscillator PUFs (d-ROPUFs) technique to improve sPUFs security against modeling attacks. In addition to enhancing the Entropy of weak ROPUF design, experimental results show that the proposed d-ROPUF technique allows the generation of larger and updated challenge-response pairs (CRP space) compared with simple ROPUF. Additionally, an innovative hardware-oriented security algorithm, namely, the Optimal Time Delay Algorithm (OTDA), is proposed. It is demonstrated that the OTDA algorithm significantly improves PUF reliability under varying operating conditions. Further, it is shown that the OTDA further efficiently enhances the d-ROPUF capability to generate a considerably large set of reliable secret keys to protect the PUF structure from new cyber-attacks, including machine learning and modeling attacks

    A lightweight hardware-based authentication for secure smart grid energy storage units

    No full text
    Next generation smart power grid offers advanced features to enhance the traditional power grid by enabling faster and more user-friendly two-way communications between utility centers and the consumers for a faster, greener, safer, more reliable, and increasingly efficient power delivery. The energy storage units and smart charging stations have become the essential components of a smart power grid. An efficient authentication and key management scheme is proposed in this work to realize a secure and trusted smart charging coordination system using a low-cost data encryption standard (DES) design and a lightweight physical unclonable function. The proposed scheme is implemented and tested on a re-programmable platform using Artix-7 FPGA device. The experimental results demonstrate that the proposed scheme can be efficiently realized on a off-the-shelf hardware, preserve the privacy of energy storage unit owners, and provide low-cost authentication for different NIST security levels

    A secure hardware-assisted AMI authentication scheme for smart cities

    No full text
    IEEE In this paper, an area-efficient dynamic ring oscillator based physical unclonable function (d-ROPUF) design utilizing field-programmable gate arrays (FPGA) technology is proposed. An enormous amount of secret keys are generated to securely authenticate advanced metering infrastructure (AMI) nodes throughout their useful lifetime meting National Institute of Science and Technology (NIST) real-time authentication key and security standards. A secure key exchange scheme between a smart meter and utility center is implemented within an AMI network while preserving the privacy and identity of the meter using lightweight encryption. The proposed framework is demonstrated for six different security levels (L0 to L5), which have authentication keys with different length and robustness according to the NIST standards. Experimental results shows that our AMI scheme meets the NIST real-time requirements (efficiency) with security levels, L1 and L2, taking, respectively, 6.45 ms and 12.9 ms, which is considerably smaller than the existing techniques

    Duty-Cycle-Based Controlled Physical Unclonable Function

    No full text

    Reliable Delay Based Algorithm to Boost PUF Security Against Modeling Attacks

    Get PDF
    Silicon Physical Unclonable Functions (sPUFs) are one of the security primitives and state-of-the-art topics in hardware-oriented security and trust research. This paper presents an efficient and dynamic ring oscillator PUFs (d-ROPUFs) technique to improve sPUFs security against modeling attacks. In addition to enhancing the Entropy of weak ROPUF design, experimental results show that the proposed d-ROPUF technique allows the generation of larger and updated challenge-response pairs (CRP space) compared with simple ROPUF. Additionally, an innovative hardware-oriented security algorithm, namely, the Optimal Time Delay Algorithm (OTDA), is proposed. It is demonstrated that the OTDA algorithm significantly improves PUF reliability under varying operating conditions. Further, it is shown that the OTDA further efficiently enhances the d-ROPUF capability to generate a considerably large set of reliable secret keys to protect the PUF structure from new cyber-attacks, including machine learning and modeling attacks
    corecore