Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Engineering

A Study On Controlling Power Supply Ramp-Up Time In Sram Pufs, Harshavardhan Ramanna Oct 2019

A Study On Controlling Power Supply Ramp-Up Time In Sram Pufs, Harshavardhan Ramanna

Masters Theses

With growing connectivity in the modern era, the risk of encrypted data stored in hardware being exposed to third-party adversaries is higher than ever. The security of encrypted data depends on the secrecy of the stored key. Conventional methods of storing keys in Non-Volatile Memory have been shown to be susceptible to physical attacks. Physically Unclonable Functions provide a unique alternative to conventional key storage. SRAM PUFs utilize inherent process variation caused during manufacturing to derive secret keys from the power-up values of SRAM memory cells.

This thesis analyzes the effect of supply ramp-up times on the reliability of SRAM …


Robust Resource Allocation To Secure Physical Layer Using Uav-Assisted Mobile Relay Communications In 5g Technology, Shakil Ahmed Aug 2019

Robust Resource Allocation To Secure Physical Layer Using Uav-Assisted Mobile Relay Communications In 5g Technology, Shakil Ahmed

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The unmanned aerial vehicles (UAVs) are also known as drones. Recently, UAVs have attracted the next generation researchers due to their flexible, dynamic, and cost-effective deployment, etc. Moreover, the UAVs have a wide range of application domains, such as rescue operation in the remote area, military surveillance, emergency application, etc. Given the UAVs are appropriately deployed, the UAVs provide continuous and reliable connectivity, on-demand, and cost-effective features to the desired destination in the wireless communication system. Thus, the UAVs can be a great choice to deploy as a mobile relay in co-existence with the base stations (BSs) on the ground …


Security Of Vehicular Platooning, Soodeh Dadras May 2019

Security Of Vehicular Platooning, Soodeh Dadras

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Platooning concept involves a group of vehicles acting as a single unit through coordination of movements. While Platooning as an evolving trend in mobility and transportation diminishes the individual and manual driving concerns, it creates new risks. New technologies and passenger’s safety and security further complicate matters and make platooning attractive target for the malicious minds. To improve the security of the vehicular platooning, threats and their potential impacts on vehicular platooning should be identified to protect the system against security risks. Furthermore, algorithms should be proposed to detect intrusions and mitigate the effects in case of attack. This dissertation …


The Sap Link: A Controller Architecture For Secure Industrial Control Systems, Matthew Cody Wyman Feb 2019

The Sap Link: A Controller Architecture For Secure Industrial Control Systems, Matthew Cody Wyman

Theses and Dissertations

Industrial Control Systems are essential to modern life. They are utilized in hundreds of processes including power distribution, water treatment, manufacturing, traffic management, and amusement park ride control. These systems are an essential part of modern life and if compromised, could result in significant economic loss, safety impacts, damage to the environment, and even loss of life. Unfortunately, many of these systems are not properly secured from a cyber attack. It is likely that a well-funded and motivated attack from a nation-state will successfully compromise an industrial control system's network. As cyber war becomes more prevalent, it is becoming more …


High Security Cognitive Radio Network Via Instantaneous Channel Information, Kaiyu Huang Jan 2019

High Security Cognitive Radio Network Via Instantaneous Channel Information, Kaiyu Huang

Browse all Theses and Dissertations

The cognitive radio network has been considered one of the most promising communication technologies for next generation wireless communication. One important aspect of cognitive radio network research is the so-called Primary User Authentication. Naturally, the primary user authentication in the cognitive radio network requires strong encryption. For the primary user identification, this dissertation provides a method which hides the user information in the header of the data frames with an underlay waveform. It is important to note that the underlay waveform will not bring redundancy data to the communication system. Using the synchronizing frequency as the underlay waveform carrier also …