Visible to the public Biblio

Filters: Keyword is Wires  [Clear All Filters]
2023-05-12
Yang, Wendi, Zhang, Ming, Li, Chuan, Wang, Zutao, Xiao, Menghan, Li, Jiawei, Li, Dingchen, Zheng, Wei.  2022.  Influence of Magnetic Field on Corona Discharge Characteristics under Different Humidity Conditions. 2022 IEEE 3rd China International Youth Conference on Electrical Engineering (CIYCEE). :1–7.
The humidity in the air parameters has an impact on the characteristics of corona discharge, and the magnetic field also affects the electron movement of corona discharge. We build a constant humidity chamber and use a wire-mesh electrode device to study the effects of humidity and magnetic field on the discharge. The enhancement of the discharge by humidity is caused by the combination of water vapor molecules and ions generated by the discharge into hydrated ions. By building a “water flow channel” between the high voltage wire electrode and the ground mesh electrode, the ions can pass more smoothly, thereby enhanced discharge. The ions are subjected to the Lorentz force in the electromagnetic field environment, the motion state of the ions changes, and the larmor motion in the electromagnetic field increases the movement path, the collision between the gas molecules increases, and more charged particles are generated, which increases the discharge current. During the period, the electrons and ions generated by the ionization of the wire electrode leave the ionization zone faster, which reduces the inhibitory effect of the ion aggregation on the discharge and promotes the discharge.
Glocker, Tobias, Mantere, Timo.  2022.  Implementation of an Intelligent Caravan Monitoring System Using the Controller Area Network. 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET). :1–6.
Nowadays, safety systems are an important feature for modern vehicles. Many accidents would have been occurred without them. In comparison with older vehicles, modern vehicles have a much better crumple zone, more airbags, a better braking system, as well as a much better and safer driving behaviour. Although, the vehicles safety systems are working well in these days, there is still space for improvement and for adding new security features. This paper describes the implementation of an Intelligent Caravan Monitoring System (ICMS) using the Controller Area Network (CAN), for the communication between the vehicle’s electronic system and the trailer’s electronic system. Furthermore, a comparison between the communication technology of this paper and a previous published paper will be made. The new system is faster, more flexible and more energy efficient.
2022-09-16
Garcia, Daniel, Liu, Hong.  2021.  A Study of Post Quantum Cipher Suites for Key Exchange. 2021 IEEE International Symposium on Technologies for Homeland Security (HST). :1—7.
Current cryptographic solutions used in information technologies today like Transport Layer Security utilize algorithms with underlying computationally difficult problems to solve. With the ongoing research and development of quantum computers, these same computationally difficult problems become solvable within reasonable (polynomial) time. The emergence of large-scale quantum computers would put the integrity and confidentiality of today’s data in jeopardy. It then becomes urgent to develop, implement, and test a new suite of cybersecurity measures against attacks from a quantum computer. This paper explores, understands, and evaluates this new category of cryptosystems as well as the many tradeoffs among them. All the algorithms submitted to the National Institute of Standards and Technology (NIST) for standardization can be categorized into three major categories, each relating to the new underlying hard problem: namely error code correcting, algebraic lattices (including ring learning with errors), and supersingular isogenies. These new mathematical hard problems have shown to be resistant to the same type of quantum attack. Utilizing hardware clock cycle registers, the work sets up the benchmarks of the four Round 3 NIST algorithms in two environments: cloud computing and embedded system. As expected, there are many tradeoffs and advantages in each algorithm for applications. Saber and Kyber are exceedingly fast but have larger ciphertext size for transmission over a wire. McEliece key size and key generation are the largest drawbacks but having the smallest ciphertext size and only slightly decreased performance allow a use case where key reuse is prioritized. NTRU finds a middle ground in these tradeoffs, being better than McEliece performance wise and better than Kyber and Saber in ciphertext size allows for a use case of highly varied environments, which need to value speed and ciphertext size equally. Going forward, the benchmarking system developed could be applied to digital signature, another vital aspect to a cryptosystem.
2022-08-26
Kreher, Seth E., Bauer, Bruno S., Klemmer, Aidan W., Rousculp, Christopher L., Starrett, Charles E..  2021.  The Surprising Role of Equation of State Models In Electrically Exploding Metal Rod MHD Simulations. 2021 IEEE International Conference on Plasma Science (ICOPS). :1—1.
The fundamental limits of high-current conduction and response of metal conductors to large, fast current pulses are of interest to high-speed fuses, exploding wires and foils, and magnetically driven dynamic material property and inertial confinement fusion experiments. A collaboration between the University of Nevada, Reno, University of New Mexico, and Sandia National Laboratory has fielded an electrically thick (R 400-μm \textbackslashtextgreater skin-depth) cylindrical metal rod platform in a Z-pinch configuration driven by the Sandia 100-ns, 900-kA Mykonos linear transformer driver 1 . Photonic Doppler velocimetry (PDV) measuring the expansion velocity of the uncoated surface of aluminum rods 2 was used to benchmark equation of state (EOS) and electrical conductivity models used in magnetohydrodynamics simulations using the Los Alamos National Laboratory (LANL) code FLAG 3 . The metal surface was found to expand along the liquid-vapor coexistence curve in density-temperature space for 90 ns of the rod’s expansion for both tabular EOSs with Van der Waals loops and with Maxwell constructions under the vapor dome. As the slope of the coexistence curve varies across EOS models, the metal surface in simulation was found to heat and expand at different rates depending on the model used. The expansion velocities associated with EOS models were then compared against the PDV data to validate the EOS used in simulations of similar systems. Here, the most recent aluminum EOS (SESAME 93722) 4 was found to drive a simulated velocity that best compared with the experimental data due to its relatively steep coexistence curve and high critical point.
2022-03-01
Vrána, Roman, Ko\v renek, Jan.  2021.  Efficient Acceleration of Decision Tree Algorithms for Encrypted Network Traffic Analysis. 2021 24th International Symposium on Design and Diagnostics of Electronic Circuits Systems (DDECS). :115–118.
Network traffic analysis and deep packet inspection are time-consuming tasks, which current processors can not handle at 100 Gbps speed. Therefore security systems need fast packet processing with hardware acceleration. With the growing of encrypted network traffic, it is necessary to extend Intrusion Detection Systems (IDSes) and other security tools by new detection methods. Security tools started to use classifiers trained by machine learning techniques based on decision trees. Random Forest, Compact Random Forest and AdaBoost provide excellent result in network traffic analysis. Unfortunately, hardware architectures for these machine learning techniques need high utilisation of on-chip memory and logic resources. Therefore we propose several optimisations of highly pipelined architecture for acceleration of machine learning techniques based on decision trees. The optimisations use the various encoding of a feature vector to reduce hardware resources. Due to the proposed optimisations, it was possible to reduce LUTs by 70.5 % for HTTP brute force attack detection and BRAMs by 50 % for application protocol identification. Both with only negligible impact on classifiers' accuracy. Moreover, proposed optimisations reduce wires and multiplexors in the processing pipeline, positively affecting the proposed architecture's maximal achievable frequency.
2022-01-31
Jadhav, Krishna D, Balaji, Sripathy.  2021.  Analysis of Wireless Mesh Security to Minimize Privacy and Security Breach. 2021 IEEE 12th Annual Ubiquitous Computing, Electronics Mobile Communication Conference (UEMCON). :0797–0804.
Due to its minimal price and expandable wireless open system interconnection options for the coming years, wireless mesh networking is appealing, developing, and novel medium of speech, which is why it is becoming a somewhat widely used communication field. In all network types, one of the essential factors for prevalent and trustworthy communication is cybersecurity. The IEEE 802.11 working gathering has created various correspondence guidelines. Yet, they are by and by focusing on the 802.11s standard because of its dynamic setup and geography learning abilities. Information, voice, and directions are steered between hubs employing remote lattice organising. WMNs incidentally give nearby 802.11g admittance to customers and connection neighbours utilising 802.11a "backhaul," but this isn’t generally the situation because of changing requirements, for example, top information rate and inclusion range. The small cross-sectional organisation emerged as a fundamental innovation to enable broadband system management in large regions. It benefits specialised organisations by reducing the cost of sending networks and end customers by providing ubiquitous Internet access anywhere, anytime. Given the idea of wireless mesh networking and the lack of integrated organisational technology, small grid networks are powerless against malicious attacks. In the meantime, the limit of multi-radio multi-channel correspondence, the need for heterogeneous organisation coordination, and the interest for multi-bounce remote equality often render conventional security strategies ineffectual or challenging to carry out. Thus, wireless mesh networking presents new issues that require more viable and relevant arrangements. WMNs have piqued the curiosity of both scholastics and industry because of their promising future. Numerous testbeds are built for research purposes, and business items for veritable WMNs are accessible. Anyway, a few concerns should be cleared up before they can very well become widespread. For example, the accessible MAC and routing conventions are not customisable; the throughput drops impressively with an increasing number of hubs or bounces in WMNs. Because of the weakness of WMNs against various malicious attacks, the security and protection of correspondence is a serious concern. For example, enemies can sniff long-distance correspondence to obtain sensitive data. Attackers can carry out DoS attacks and control the substance of the information sent through compromised hubs, thereby endangering the company’s secret, accessibility authenticity, and integrity. WMNs, like compact Impromptu Organisations (MANETs), share a typical medium, no traffic aggregate point, and incredible topography. Due to these restrictions, normal safety frameworks in wired associations can’t be quickly applied to WMNs. Also, the techniques utilised in MANETs are not viable with WMNs. This is because of the manner in which WMNs expand MANETs in different ways. Framework centres are generally outfitted with an assortment of radios. Then, at that point, many channels are doled out to every centre to work with concurrent data move and diversity.
2021-09-07
Zhang, Xinghai, Zhuang, Zhen, Liu, Genggeng, Huang, Xing, Liu, Wen-Hao, Guo, Wenzhong, Wang, Ting-Chi.  2020.  MiniDelay: Multi-Strategy Timing-Aware Layer Assignment for Advanced Technology Nodes. 2020 Design, Automation Test in Europe Conference Exhibition (DATE). :586–591.
Layer assignment, a major step in global routing of integrated circuits, is usually performed to assign segments of nets to multiple layers. Besides the traditional optimization goals such as overflow and via count, interconnect delay plays an important role in determining chip performance and has been attracting much attention in recent years. Accordingly, in this paper, we propose MiniDelay, a timing-aware layer assignment algorithm to minimize delay for advanced technology nodes, taking both wire congestion and coupling effect into account. MiniDelay consists of the following three key techniques: 1) a non-default-rule routing technique is adopted to reduce the delay of timing critical nets, 2) an effective congestion assessment method is proposed to optimize delay of nets and via count simultaneously, and 3) a net scalpel technique is proposed to further reduce the maximum delay of nets, so that the chip performance can be improved in a global manner. Experimental results on multiple benchmarks confirm that the proposed algorithm leads to lower delay and few vias, while achieving the best solution quality among the existing algorithms with the shortest runtime.
2021-08-31
Loreto, Jayson, Gerasta, Olga Joy L., Gumera, Aileen C..  2020.  Residual Current Circuit Implemented in Complementary Metal Oxide Semiconductor for Remanence Correction. 2020 IEEE 12th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment, and Management (HNICEM). :1–6.
This research paper presented a design that will address the challenges brought by remanence in ground-fault current interrupter devices (gfci). Remanence or residual magnetism is the magnetization left behind in a ferromagnetic material (such as iron) after an external magnetic field is removed. Remanence will make the gfci devices less accurate and less reliable in tripping the current above threshold in just five (5) years. It affects the performance of the device in terms of efficiency, accuracy, and response time. In this research, the problems caused by remanence were alleviated by using two identical transformers in detecting residual current both for hot and neutral wires. The difference of the current detected by the two transformers will be the basis of the signal threshold in tripping the device. By doing so, the problems caused by remanence phenomenon will be solved without compromising the response time of the circuit which is around 16 mS. The design will extend the life span of GFCI devices up to 15 years.
2021-05-03
Le, Son N., Srinivasan, Sudarshan K., Smith, Scott C..  2020.  Exploiting Dual-Rail Register Invariants for Equivalence Verification of NCL Circuits. 2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS). :21–24.
Equivalence checking is one of the most scalable and useful verification techniques in industry. NULL Convention Logic (NCL) circuits utilize dual-rail signals (i.e., two wires to represent one bit of DATA), where the wires are inverses of each other during a DATA wavefront. In this paper, a technique that exploits this invariant at NCL register boundaries is proposed to improve the efficiency of equivalence verification of NCL circuits.
2020-11-09
Li, H., Patnaik, S., Sengupta, A., Yang, H., Knechtel, J., Yu, B., Young, E. F. Y., Sinanoglu, O..  2019.  Attacking Split Manufacturing from a Deep Learning Perspective. 2019 56th ACM/IEEE Design Automation Conference (DAC). :1–6.
The notion of integrated circuit split manufacturing which delegates the front-end-of-line (FEOL) and back-end-of-line (BEOL) parts to different foundries, is to prevent overproduction, piracy of the intellectual property (IP), or targeted insertion of hardware Trojans by adversaries in the FEOL facility. In this work, we challenge the security promise of split manufacturing by formulating various layout-level placement and routing hints as vector- and image-based features. We construct a sophisticated deep neural network which can infer the missing BEOL connections with high accuracy. Compared with the publicly available network-flow attack [1], for the same set of ISCAS-85benchmarks, we achieve 1.21× accuracy when splitting on M1 and 1.12× accuracy when splitting on M3 with less than 1% running time.
2020-07-30
Tina, Sonam, Harshit, Singla, Muskan.  2019.  Smart Lightning and Security System. 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU). :1—6.

As Electric Power is one of the major concerns, so the concept of the automatic lighting and security system saves the electrical energy. By using the automatic lightning, the consumption of electrical power can be minimized to a greater extent and for that sensors and microcontrollers can be designed in such a manner such that lights get ON/OFF based on motion in a room. The various sensors used for sensing the motion in an area are PIR motion sensor, IR Motion Sensor. An IR sensor senses the heat of an object and detects its motion within some range as it emits infrared radiations and this complete process can be controlled by microcontroller. Along with that security system can be applied in this concept by programming the microcontroller in such a way that if there is some movement in an area then lights must get ON/OFF automatically or any alarm must start. This chapter proposes the framework for the smart lightning with security systems in a building so that electrical power can be utilized efficiently and secures the building.

2020-05-11
Poovendran, R, Billclinton., S, Darshan., R, Dinakar., R, Fazil., M.  2019.  Design and analysis of a mesh-based Adaptive Wireless Network-on Chips Architecture With Irregular Network Routing. 2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN). :1–6.
The metallic interface for between core messages expends wealth influence and lesser throughput which are huge in Network-on Chip (NoC) structures. We proposed a remote Network-on-Chip (NoC) building Wireless Network-on Chip that uses power and imperatives gainful remote handsets to improve higherenergy and throughput by altering channels as indicated by traffic plans. Our proposed computations uses interface use bits of knowledge to redispensreal platforms, and a vitality funds of 29-35%. Wireless channels and a token sharing arrangement to totally use the remote information transmission successfully. Remote/electrical topological with results demonstrates a through-put advancement of 69%, a speedup between 1.7-2.9X on real platform, and an power savings of 25-38%.
2020-03-16
Chau, Cuong, Hunt, Warren A., Kaufmann, Matt, Roncken, Marly, Sutherland, Ivan.  2019.  A Hierarchical Approach to Self-Timed Circuit Verification. 2019 25th IEEE International Symposium on Asynchronous Circuits and Systems (ASYNC). :105–113.
Self-timed circuits can be modeled in a link-joint style using a formally defined hardware description language. It has previously been shown how functional properties of these models can be formally verified with the ACL2 theorem prover using a scalable, hierarchical method. Here we extend that method to parameterized circuit families that may have loops and non-deterministic outputs. We illustrate this extension with iterative self-timed circuits that calculate the greatest common divisor of two natural numbers, with circuits that perform arbitrated merges non-deterministically, and with circuits that combine both of these.
2019-09-30
Onufer, J., Ziman, J., Duranka, P., Kravčák, J..  2019.  The Study of Closure Domain Structure Dynamics in Bistable Microwires Using the Technique of Three-Level Field Pulses. IEEE Transactions on Magnetics. 55:1–6.

The process of release of a single domain wall from the closure domain structure at the microwire ends and the process of nucleation of the reversed domain in regions far from the microwire ends were studied using the technique that consists in determining the critical parameters of the rectangular magnetic field pulse (magnitude-Hpc and length-τc) needed for free domain wall production. Since these processes can be influenced by the magnitude of the magnetic field before or after the application of the field pulse (Hi, τ), we propose a modified experiment in which the so-called three-level pulse is used. The three-level pulse starts from the first level, then continues with the second measuring rectangular pulse (Hi, τ), which ends at the third field level. Based on the results obtained in experiments using three-level field pulses, it has been shown that reversed domains are not present in the remanent state in regions far from the microwire ends. Some modification of the theoretical model of a single domain wall trapped in a potential well will be needed for an adequate description of the depinning processes.

2019-05-01
Chen, D., Chen, W., Chen, J., Zheng, P., Huang, J..  2018.  Edge Detection and Image Segmentation on Encrypted Image with Homomorphic Encryption and Garbled Circuit. 2018 IEEE International Conference on Multimedia and Expo (ICME). :1-6.

Edge detection is one of the most important topics of image processing. In the scenario of cloud computing, performing edge detection may also consider privacy protection. In this paper, we propose an edge detection and image segmentation scheme on an encrypted image with Sobel edge detector. We implement Gaussian filtering and Sobel operator on the image in the encrypted domain with homomorphic property. By implementing an adaptive threshold decision algorithm in the encrypted domain, we obtain a threshold determined by the image distribution. With the technique of garbled circuit, we perform comparison in the encrypted domain and obtain the edge of the image without decrypting the image in advanced. We then propose an image segmentation scheme on the encrypted image based on the detected edges. Our experiments demonstrate the viability and effectiveness of the proposed encrypted image edge detection and segmentation.

2018-06-11
Kwon, H., Harris, W., Esmaeilzadeh, H..  2017.  Proving Flow Security of Sequential Logic via Automatically-Synthesized Relational Invariants. 2017 IEEE 30th Computer Security Foundations Symposium (CSF). :420–435.

Due to the proliferation of reprogrammable hardware, core designs built from modules drawn from a variety of sources execute with direct access to critical system resources. Expressing guarantees that such modules satisfy, in particular the dynamic conditions under which they release information about their unbounded streams of inputs, and automatically proving that they satisfy such guarantees, is an open and critical problem.,,To address these challenges, we propose a domain-specific language, named STREAMS, for expressing information-flow policies with declassification over unbounded input streams. We also introduce a novel algorithm, named SIMAREL, that given a core design C and STREAMS policy P, automatically proves or falsifies that C satisfies P. The key technical insight behind the design of SIMAREL is a novel algorithm for efficiently synthesizing relational invariants over pairs of circuit executions.,,We expressed expected behavior of cores designed independently for research and production as STREAMS policies and used SIMAREL to check if each core satisfies its policy. SIMAREL proved that half of the cores satisfied expected behavior, but found unexpected information leaks in six open-source designs: an Ethernet controller, a flash memory controller, an SD-card storage manager, a robotics controller, a digital-signal processing (DSP) module, and a debugging interface.

2018-04-11
Yang, Y., Wu, L., Zhang, X., He, J..  2017.  A Novel Hardware Trojan Detection with Chip ID Based on Relative Time Delays. 2017 11th IEEE International Conference on Anti-Counterfeiting, Security, and Identification (ASID). :163–167.

This paper introduces a hardware Trojan detection method using Chip ID which is generated by Relative Time-Delays (RTD) of sensor chains and the effectiveness of RTD is verified by post-layout simulations. The rank of time-delays of the sensor chains would be changed in Trojan-inserted chip. RTD is an accurate approach targeting to all kinds of Trojans, since it is based on the RELATIVE relationship between the time-delays rather than the absolute values, which are hard to be measured and will change with the fabricate process. RTD needs no golden chip, because the RELATIVE values would not change in most situations. Thus the genuine ID can be generated by simulator. The sensor chains can be inserted into a layout utilizing unused spaces, so RTD is a low-cost solution. A Trojan with 4x minimum NMOS is placed in different places of the chip. The behavior of the chip is obtained by using transient based post-layout simulation. All the Trojans are detected AND located, thus the effectiveness of RTD is verified.

2015-05-06
Ramdas, A., Saeed, S.M., Sinanoglu, O..  2014.  Slack removal for enhanced reliability and trust. Design Technology of Integrated Systems In Nanoscale Era (DTIS), 2014 9th IEEE International Conference On. :1-4.

Timing slacks possibly lead to reliability issues and/or security vulnerabilities, as they may hide small delay defects and malicious circuitries injected during fabrication, namely, hardware Trojans. While possibly harmless immediately after production, small delay defects may trigger reliability problems as the part is being used in field, presenting a significant threat for mission-critical applications. Hardware Trojans remain dormant while the part is tested and validated, but then get activated to launch an attack when the chip is deployed in security-critical applications. In this paper, we take a deeper look into these problems and their underlying reasons, and propose a design technique to maximize the detection of small delay defects as well as the hardware Trojans. The proposed technique eliminates all slacks by judiciously inserting delay units in a small set of locations in the circuit, thereby rendering a simple set of transition fault patterns quite effective in catching parts with small delay defects or Trojans. Experimental results also justify the efficacy of the proposed technique in improving the quality of test while retaining the pattern count and care bit density intact.