Work-in-Progress: A Chip-Level Security Framework for Assessing Sensor Data Integrity

Author(s):  
Taimour Wehbe ◽  
Vincent J. Mooney ◽  
David C. Keezer
2020 ◽  
Vol 16 (5) ◽  
pp. 3301-3310 ◽  
Author(s):  
Bowen Yang ◽  
Lulu Guo ◽  
Fangyu Li ◽  
Jin Ye ◽  
Wenzhan Song

Electronics ◽  
2021 ◽  
Vol 10 (6) ◽  
pp. 719
Author(s):  
Aamir Hussain ◽  
Tariq Ali ◽  
Faisal Althobiani ◽  
Umar Draz ◽  
Muhammad Irfan ◽  
...  

The amazing fusion of the internet of things (IoT) into traditional health monitoring systems has produced remarkable advances in the field of e-health. Different wireless body area network devices and sensors are providing real-time health monitoring services. As the number of IoT devices is rapidly booming, technological and security challenges are also rising day by day. The data generated from sensor-based devices need confidentiality, integrity, authenticity, and end-to-end security for safe communication over the public network. IoT-based health monitoring systems work in a layered manner, comprising a perception layer, a network layer, and an application layer. Each layer has some security, and privacy concerns that need to be addressed accordingly. A lot of research has been conducted to resolve these security issues in different domains of IoT. Several frameworks for the security of IoT-based e-health systems have also been developed. This paper introduces a security framework for real-time health monitoring systems to ensure data confidentiality, integrity, and authenticity by using two common IoT protocols, namely constrained application protocol (CoAP) and message query telemetry transports (MQTT). This security framework aims to defend sensor data against the security loopholes while it is continuously transmitting over the layers and uses hypertext transfer protocols (HTTPs) for this purpose. As a result, it shields from the breach with a very low ratio of risk. The methodology of this paper focuses on how the security framework of IoT-based real-time health systems is protected under the tiers of CoAP and HTTPs. CoAP works alongside HTTPs and is responsible for providing end-to-end security solutions.


Sensors ◽  
2020 ◽  
Vol 20 (19) ◽  
pp. 5530
Author(s):  
Raghu Changalvala ◽  
Brandon Fedoruk ◽  
Hafiz Malik

The modern-day vehicle is evolved in a cyber-physical system with internal networks (controller area network (CAN), Ethernet, etc.) connecting hundreds of micro-controllers. From the traditional core vehicle functions, such as vehicle controls, infotainment, and power-train management, to the latest developments, such as advanced driver assistance systems (ADAS) and automated driving features, each one of them uses CAN as their communication network backbone. Automated driving and ADAS features rely on data transferred over the CAN network from multiple sensors mounted on the vehicle. Verifying the integrity of the sensor data is essential for the safety and security of occupants and the proper functionality of these applications. Though the CAN interface ensures reliable data transfer, it lacks basic security features, including message authentication, which makes it vulnerable to a wide array of attacks, including spoofing, replay, DoS, etc. Using traditional cryptography-based methods to verify the integrity of data transmitted over CAN interfaces is expected to increase the computational complexity, latency, and overall cost of the system. In this paper, we propose a light-weight alternative to verify the sensor data’s integrity for vehicle applications that use CAN networks for data transfers. To this end, a framework for 2-dimensional quantization index modulation (2D QIM)-based data hiding is proposed to achieve this goal. Using a typical radar sensor data transmission scenario in an autonomous vehicle application, we analyzed the performance of the proposed framework regarding detecting and localizing the sensor data tampering. The effects of embedding-induced distortion on the applications using the radar data were studied through a sensor fusion algorithm. It was observed that the proposed framework offers the much-needed data integrity verification without compromising on the quality of sensor fusion data and is implemented with low overall design complexity. This proposed framework can also be used on any physical network interface other than CAN, and it offers traceability to in-vehicle data beyond the scope of the in-vehicle applications.


1976 ◽  
Vol 32 ◽  
pp. 109-116 ◽  
Author(s):  
S. Vauclair

This paper gives the first results of a work in progress, in collaboration with G. Michaud and G. Vauclair. It is a first attempt to compute the effects of meridional circulation and turbulence on diffusion processes in stellar envelopes. Computations have been made for a 2 Mʘstar, which lies in the Am - δ Scuti region of the HR diagram.Let us recall that in Am stars diffusion cannot occur between the two outer convection zones, contrary to what was assumed by Watson (1970, 1971) and Smith (1971), since they are linked by overshooting (Latour, 1972; Toomre et al., 1975). But diffusion may occur at the bottom of the second convection zone. According to Vauclair et al. (1974), the second convection zone, due to He II ionization, disappears after a time equal to the helium diffusion time, and then diffusion may happen at the bottom of the first convection zone, so that the arguments by Watson and Smith are preserved.


2007 ◽  
Vol 38 (3) ◽  
pp. 1-92
Author(s):  
CHRISTINE KILGORE
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document