Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Security (2)
- System-on-chip (2)
- 5G wireless network systems (1)
- 5G wireless security architecture (1)
- Authentication (1)
-
- Availability (1)
- Circuit faults (1)
- Clustering algorithms (1)
- Computational complexity (1)
- Computer security (1)
- Confidentiality (1)
- Device-to-device communications (1)
- Dynamic scheduling (1)
- Fault diagnosis (1)
- Heterogenous networks (1)
- Heuristic algorithms (1)
- Integrated circuit noise (1)
- Interference (1)
- Internet of Things (1)
- Key management (1)
- Low-power electronics (1)
- Machine learning (1)
- Malware (1)
- Massive multiple-input multiple-output (1)
- Multiprocessor interconnection networks (1)
- Network-on-chip (1)
- Privacy (1)
- Reliability (1)
- Resource management (1)
- Software defined networks (1)
Articles 1 - 7 of 7
Full-Text Articles in Engineering
Fifa: Exploring A Focally Induced Fault Attack Strategy In Near-Threshold Computing, Prabal Basu, Chidhambaranathan Rajamanikkam, Aatreyi Bal, Pramesh Pandey, Trevor Carter, Koushik Chakraborty, Sanghamitra Roy
Fifa: Exploring A Focally Induced Fault Attack Strategy In Near-Threshold Computing, Prabal Basu, Chidhambaranathan Rajamanikkam, Aatreyi Bal, Pramesh Pandey, Trevor Carter, Koushik Chakraborty, Sanghamitra Roy
Electrical and Computer Engineering Faculty Publications
In this letter, we explore the emerging security threats of near-threshold computing (NTC). Researchers have shown that the delay sensitivity of a circuit to supply voltage variation tremendously increases, as the circuit's operating conditions shift from traditional super-threshold values to NTC values. As a result, NTC systems become extremely vulnerable to timing fault attacks, jeopardizing trustworthy computing. Inspired by the operation of a polymorphic virus, we propose a novel threat model for NTC, referred to as a focally induced fault attack (FIFA). FIFA employs a machine learning framework to ascertain the circuit vulnerabilities and generates targeted software modules to cause …
Security For 5g Mobile Wireless Networks, Dongfeng Fang, Yi Qian, Rose Qingyang Hu
Security For 5g Mobile Wireless Networks, Dongfeng Fang, Yi Qian, Rose Qingyang Hu
Electrical and Computer Engineering Faculty Publications
The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks. The paper starts with a review on 5G wireless networks particularities as well as on the new requirements and motivations of 5G wireless security. The potential attacks and security services with the consideration of new service requirements and new use cases in 5G wireless networks are then summarized. The recent development and the existing schemes for the 5G wireless security are presented based on the corresponding …
Robust An-Aided Beamforming Design For Secure Miso Cognitive Radio Based On A Practical Nonlinear Eh Model, Yangchao Huang, Zan Li, Fuhui Zhou, Rui Zhu
Robust An-Aided Beamforming Design For Secure Miso Cognitive Radio Based On A Practical Nonlinear Eh Model, Yangchao Huang, Zan Li, Fuhui Zhou, Rui Zhu
Electrical and Computer Engineering Faculty Publications
Energy harvesting techniques are promising in next generation wireless communication systems. However, most of the existing works are based on an ideal linear energy harvesting model. In this paper, a multiple-input single-output cognitive radio network is studies under a practical non-linear energy harvesting model. In order to improve the security of both the primary network and the secondary network, a cooperative jamming scheme is proposed. A robust artificial noise aided beamforming design problem is formulated under the bounded channel state information error model. The formulated problem is non-convex and challenging to be solved. Using S-procedure and the semidefinite relaxation method, …
Iconoclast: Tackling Voltage Noise In The Noc Power Supply Through Flow-Control And Routing Algorithms, Prabal Basu, Rajesh Jayashankarashridevi, Koushik Chakraborty, Sanghamitra Roy
Iconoclast: Tackling Voltage Noise In The Noc Power Supply Through Flow-Control And Routing Algorithms, Prabal Basu, Rajesh Jayashankarashridevi, Koushik Chakraborty, Sanghamitra Roy
Electrical and Computer Engineering Faculty Publications
Power supply noise (PSN) is a growing concern in modern multiprocessor system-on-chips (MPSoCs). The advent of new architectures, such as the network-on-chip (NoC), the standard for on-chip communication in MPSoCs, has given rise to new challenges in maintaining reliable and energy-efficient operation. The growing NoC power footprint, increase in the transistor current, and high switching speed of the logic devices exacerbate the peak PSN in the NoC power delivery network (PDN). Hence, preserving power supply integrity in the NoC PDN is critical. In this paper, we propose IcoNoClast, a collection of a novel flow-control protocol (PAF) and an adaptive routing …
Security Measures Against A Rogue Network-On-Chip, Rajesh Jayashankarashridevi, Dean Michael Ancajas, Koushik Chakraborty, Sanghamitra Roy
Security Measures Against A Rogue Network-On-Chip, Rajesh Jayashankarashridevi, Dean Michael Ancajas, Koushik Chakraborty, Sanghamitra Roy
Electrical and Computer Engineering Faculty Publications
Network-on-chip facilitates glueless interconnection of various on-chip components in the forthcoming system-on-chips. As in the case of any new technology, security is a major concern in network-on-chip (NoC) design too. In this work, we explore a covert threat model for multiprocessor system-on-chips (MPSoCs) stemming from the use of malicious third-party network-on-chips (NoCs). We illustrate that a rogue NoC (rNoC) can selectively disrupt the perceived availability of on-chip resources, thereby causing large performance bottlenecks for the applications running on the MPSoC platform. Further, to counter the threat posed by rNoC, we propose a runtime latency auditor that enables an MPSoC integrator …
Fast And Efficient Radio Resource Allocation In Dynamic Ultra-Dense Heterogeneous Networks, Chonggyu Niu, Yibing Li, Rose Qingyang Hu, Fang Ye
Fast And Efficient Radio Resource Allocation In Dynamic Ultra-Dense Heterogeneous Networks, Chonggyu Niu, Yibing Li, Rose Qingyang Hu, Fang Ye
Electrical and Computer Engineering Faculty Publications
Ultra-dense network (UDN) is considered as a promising technology in 5G wireless networks. In an UDN network, dynamic traffic patterns can lead to a high computational complexity and an excessive communications overhead with traditional resource allocation schemes. In this paper, a new resource allocation scheme presenting a low computational overhead and a low subband handoff rate in a dynamic ultra-dense heterogeneous network is presented. The scheme first defines a new interference estimation method that constructs network interference state map, based on which a radio resource allocation scheme is proposed. The resource allocation problem is a MAX-K cut problem and can …
Analysis And Design Of Highly Transparent Meshed Patch Antenna Backed By A Solid Ground Plane, Tursunjan Yasin, Reyhan Baktur, Timothy Turpin, Jesus Arellano
Analysis And Design Of Highly Transparent Meshed Patch Antenna Backed By A Solid Ground Plane, Tursunjan Yasin, Reyhan Baktur, Timothy Turpin, Jesus Arellano
Electrical and Computer Engineering Faculty Publications
This paper analyzes rectangular and circular patch antennas fabricated from meshed conductors and backed with solid ground planes. Because of the meshing, the antennas are rendered optically transparent, where the transparency is determined by the mesh geometry. It is found that although there is a compromise between the antenna's efficiency and the optical transparency of the meshed patch, it is possible to optimize the antenna by refining mesh lines to certain extent. The limiting factors for refining mesh lines include material handling and fabrication process as well as the increased line impedance when being refined, which accordingly causes loss in …