[HTML][HTML] Clustering and reliability-driven mitigation of routing attacks in massive IoT systems

AL Santos, CAV Cervantes, M Nogueira… - Journal of Internet …, 2019 - Springer
As an integral component of the 5G communications, the massive Internet of Things (IoT) are
vulnerable to various routing attacks due to their dynamic infrastructure, distinct computing …

Construction of rotation symmetric S-boxes with high nonlinearity and improved DPA resistivity

B Mazumdar, D Mukhopadhyay - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we provide an n× n bijective rotation symmetric S-box (RSSB) construction with
improved resistance to differential power analysis (DPA) using rotation-symmetric Boolean …

A proposed ANFIS evaluator for RSA cryptosystem used in cloud networking

SB Sadkhan, FH Abdulraheem - … International Conference on …, 2017 - ieeexplore.ieee.org
The security aspect is considered as the most important challenge in communication and
computer networks. Therefore the “security level evaluation” of cryptosystem, is very …

[HTML][HTML] Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissions

J Martínez Padilla, U Meyer-Baese, S Foo - EURASIP Journal on …, 2018 - Springer
In this work, side-channel attacks (SCAs) are considered as a security metric for the
implementation of hybrid cryptosystems utilizing the neural network-based Tree Parity Re …

Built-in self-evaluation of first-order power side-channel leakage for FPGAs

O Glamočanin, L Coulon, F Regazzoni… - Proceedings of the 2020 …, 2020 - dl.acm.org
Embedded and cyber-physical systems are pervading all aspects of our lives, including
sensitive and critical ones. As a result, they are an alluring target for cyber attacks. These …

Analyzing circuit layout to probing attack

Q Shi, D Forte, MM Tehranipoor - Hardware IP Security and Trust, 2017 - Springer
Abstract Probing attacks against Integrated Circuits (IC) for security critical applications have
become a serious concern. With the help of modern IC debug technologies, an attacker …

Testing of side-channel leakage of cryptographic intellectual properties: metrics and evaluations

DB Roy, S Bhasin, S Patranabis… - Hardware IP Security and …, 2017 - Springer
Embedded cryptographic IP forms the basis of security in a modern system on chip.
Therefore such cryptographic IPs must be equipped with side-channel countermeasures …

[引用][C] Mitigação de ataques no roteamento em iot densa e móvel baseada em agrupamento e confiabilidade dos dispositivos

C Cervantes, M Nogueira, A Santos - Anais do XXXVI Simpósio Brasileiro de …, 2018 - SBC