29 research outputs found

    Exploring Indoor Health: An In-depth Field Study on the Indoor Air Quality Dynamics

    Full text link
    Indoor air pollution, a significant driver of respiratory and cardiovascular diseases, claims 3.2 million lives yearly, according to the World Health Organization, highlighting the pressing need to address this global crisis. In contrast to unconstrained outdoor environments, room structures, floor plans, ventilation systems, and occupant activities all impact the accumulation and spread of pollutants. Yet, comprehensive in-the-wild empirical studies exploring these unique indoor air pollution patterns and scope are lacking. To address this, we conducted a three-month-long field study involving over 28 indoor spaces to delve into the complexities of indoor air pollution. Our study was conducted using our custom-built DALTON air quality sensor and monitoring system, an innovative IoT air quality monitoring solution that considers cost, sensor type, accuracy, network connectivity, power, and usability. Our study also revealed that conventional measures, such as the Indoor Air Quality Index (IAQI), don't fully capture complex indoor air quality dynamics. Hence, we proposed the Healthy Home Index (HHI), a new metric considering the context and household activities, offering a more comprehensive understanding of indoor air quality. Our findings suggest that HHI provides a more accurate air quality assessment, underscoring the potential for wide-scale deployment of our indoor air quality monitoring platform.Comment: 15 pages, 19 figure

    Differential Fault Analysis of Rectangle-80

    Get PDF
    We present various differential fault attack schemes for the RECTANGLE-80 and demonstrate how initially we started from a 80-bit fault to a single word fault scheme. This was mainly due to a differential vulnerability in the S-box of RECTANGLE as a result of which the exhaustive search space for the key reduces from 2802^{80} to 2322^{32}. We have also presented a key schedule attack that is a variant of the single fault scheme, exploiting the same vulnerability and reduces the search space to 2402^{40}. The paper concludes with the simulation results for the single word fault scheme followed by countermeasures

    Differential Fault Analysis of MICKEY Family of Stream Ciphers

    Get PDF
    This paper presents differential fault analysis of the MICKEY family of stream ciphers, one of the winners of eStream project. The current attacks are of the best performance among all the attacks against MICKEY ciphers reported till date. The number of faults required with respect to state size is about 1.5 times the state size. We obtain linear equations to determine state bits. The fault model required is reasonable. The fault model is further relaxed without reproducing the faults and allowing multiple bit faults. In this scenario, more faults are required when reproduction is not allowed whereas, it has been shown that the number of faults remains same for multiple bit faults

    A Generic Scan Attack on Hardware based eStream Winners

    Get PDF
    Scan chains, a design for testability (DFT) feature, are included in most modern-day ICs. But, it opens a side channel for attacking cryptographic chips. We propose a methodology by which we can recover internal states of any stream cipher using scan chains without knowledge of its design. We consider conven- tional scan-chain design which is normally not scram- bled or protected in any other way. In this scenario the challenge of the adversary is to obtain the corre- spondence of output of the scan chain and the internal state registers of the stream cipher. We present a math- ematical model of the attack and the correspondence between the scan chain-outputs and the internal state bits have been proved under this model. We propose an algorithm that through o-line and on-line simulation forms bijection between the above mentioned sets and thus nds the required correspondence. We also give an estimate of the number of o-line simulations necessary for nding the correspondence. The proposed strategy is successfully applied to eS- tream hardware based nalists MICKEY-128 2.0, Triv- ium and Grain-128. To the best of our knowledge, this is the rst scan based attack against full round Grain-128 and only the fourth reported cryptanalysis. This attack on Trivium is better than that of the published scan- attack on Trivium. This scan-based attack is also the rst reported scan based cryptanalysis against MICKEY- 128 2.0

    Fault Analysis of Grain Family of Stream Ciphers

    Get PDF
    In this paper, we present fault attack on Grain family of stream ciphers, an eStream finalist. The earlier fault attacks on Grain work on LFSR whereas our target for fault induction is the NFSR. Our attack requires a small number of faults to be injected; 150 only for Grain v1 and only 312 and 384 for Grain-128 and Grain-128a, respectively. The number of faults are much lesser than the earlier reported fault attacks; 1587 for Grain-128 and 1831 for Grain-128a

    Implementation of Energy Saver Circuit using 8051 Microcontroller

    Get PDF
    In this paper, we have proposed the development of a module based on 8051 microcontroller that allows us to operate a 220V AC lamp with a remote control and regulate the intensity of the lamp as per our needs. The ability to control the intensity of the lamp according to our requirement waives of unwanted wastage of energy thus providing an economic relief and reducing wastage of primary energy sources at this hour of shortage of non-renewable energy sources. Remote control provides an interface to the system that is simple to understand, operate, reliable and durable irrespective of usage and also economical. It adds comfort to our daily life by eliminating unwanted movement to operate the appliances. Remote control facilitates controlling various appliances from a convenient distance. The module is easy to install,convenient to use, energy saving and also cost effective without allowing compensation of efficiency

    NOCAS : A Nonlinear Cellular Automata Based Stream Cipher

    No full text
    LFSR and NFSR are the basic building blocks in almost all the state of the art stream ciphers like Trivium and Grain-128. However, a number of attacks are mounted on these type of ciphers. Cellular Automata (CA) has recently been chosen as a suitable structure for crypto-primitives. In this work, a stream cipher is presented based on hybrid CA. The stream cipher takes 128 bit key and 128 bit initialization vector (IV) as input. It is designed to produce 2128\mathrm{2^{128}} random keystream bits and initialization phase is made faster 4 times than that of Grain-128. We also analyze the cryptographic strength of this cipher. Finally, the proposed cipher is shown to be resistant against known existing attacks

    Intelligent MU-MIMO User Selection With Dynamic Link Adaptation in IEEE 802.11ax

    No full text
    corecore