Attacks on cryptosystems implemented via VLSI: A review

MM Sravani, SA Durai - Journal of Information Security and Applications, 2021 - Elsevier
Serious threats to the VLSI crypto devices are posed by the Side Channel Attack (SCA) that
utilizes the devices' SCI (Side Channel Information) to break the entire cryptographic …

Survey on power analysis attacks and its impact on intelligent sensor networks

SR Shanmugham… - IET Wireless Sensor …, 2018 - Wiley Online Library
Smart or intelligent sensors are integrated physical units embedded with sensors,
processors, and communication devices. The sensors also known as edge nodes form the …

Survey on vehicular ad hoc networks and its access technologies security vulnerabilities and countermeasures

KB Kelarestaghi, M Foruhandeh, K Heaslip… - arXiv preprint arXiv …, 2019 - arxiv.org
In this study, we attempt to add to the literature of Connected and Automated Vehicle (CAV)
security by incorporating the security vulnerabilities and countermeasures of the Vehicular …

Host-to-host TCP/IP connection over serial ports using visible light communication

H Yuksel, Ö Altunay - Physical Communication, 2020 - Elsevier
As the radio spectrum becomes increasingly crowded, the superior spectral capacity in the
visible light range becomes increasingly attractive. Visible light communication (VLC) …

Security Attack Detection Method Combining Side Channel with Fault Injection

W Shen, L Cui, G Shen, X Zhang - … International Conference on …, 2023 - ieeexplore.ieee.org
Thereare still many problems in the actual deployment of both masking technology and out-
of-order technology. In this paper, the typical SCA (Side channel attack) technology is …

Survey of Side-Channel Vulnerabilities for Short-Range Wireless Communication Technologies

S Beck, M Raavi, C Dale, K Weishalla… - … Conference on Electro …, 2024 - ieeexplore.ieee.org
Short-range wireless communications have become a part of everyday human life and
protecting the security and privacy of user data is the primary goal in this digital era. Multiple …

A low-complexity security technique in physical layer for fixed LiFi communication systems

I Romdhane, H Yuksel - Journal of Information Security and Applications, 2020 - Elsevier
This research paper introduces a novel low-complexity physical layer security technique
based on an encryption model for fixed LiFi communication systems. This encryption model …

Model for capturing noise free traces for Side Channel Power Cryptanalysis based on SAKURA-G FPGA and Case study of AES

V Nalla, D Narendar… - … Conference on Recent …, 2022 - ieeexplore.ieee.org
Side Channel Cryptanalysis is one of the minimum requirments for design of new
cryptosystem. The main research is focused on power attack of Side Channel Cryptanalysis …

A new approach in cyber security of industrial control systems: Li-Fi

S Gönen, HH Sayan, G Karacayılmaz, E Sindiren… - Politeknik …, 2022 - dergipark.org.tr
Industrial Control Systems used in the control of critical infrastructures, especially in smart
grids, have made a rapid transition from an isolated network architecture to wired and …

[PDF][PDF] A new approach in cyber security of industrial control systems: Li-Fi

FÜ SİNDİREN, H ARTUNER, EN YILMAZ, MF IŞIK - academia.edu
A new approach in cyber security of industrial control systems: Li-Fi Endüstriyel kontrol
sistemlerinin siber güvenli inde yen Page 1 POLİTEKNİK DERGİSİ JOURNAL of …