Abstract: Presents a listing of the editorial board, board of governors, current staff, committee members, and/or society editors for this issue of the publication. PubDate:
Dec. 2019
Issue No:Vol. 11, No. 4 (2019)
Abstract: These instructions give guidelines for preparing papers for this publication. Presents information for authors publishing in this journal. PubDate:
Dec. 2019
Issue No:Vol. 11, No. 4 (2019)
Authors:
Francesco Regazzoni;Arquimedes Canedo;Mohammad Abdullah Al Faruque;
Pages: 101 - 101 Abstract: Cyber-physical systems (CPSs) tightly couple cyber components (used for computation and communication) with physical components for sensing and actuating. These systems are extremely heterogeneous and require novel and holistic design methods to completely capture the requirements and the constraints. PubDate:
Dec. 2019
Issue No:Vol. 11, No. 4 (2019)
Authors:
Saurav Kumar Ghosh;Soumyajit Dey;Debdeep Mukhopadhyay;
Pages: 102 - 105 Abstract: This letter summarizes the established vulnerability analysis techniques for cyber physical control software and highlights the possibility of employing lightweight security measures in conjunction with reachability analysis for such systems. We propose a possible cyber physical control system implementation methodology, which leverages the dependence of control performance on the choice of security measure adopted and the resulting platform level vulnerability. PubDate:
Dec. 2019
Issue No:Vol. 11, No. 4 (2019)
Authors:
Johanna Sepúlveda;Shiyang Liu;Jose M. Bermudo Mera;
Pages: 106 - 110 Abstract: Cyber physical systems (CPSs) will be deployed for decades, thus they should be secure against long-term attacks. Most CPSs adopt the datagram transport layer security (DTLS), as the de facto security protocol. By using public key cryptography (PKC) based on traditional RSA or elliptic-curves, DTLS establishes secured communication channels between multiple parties. However, the foreseeable breakthrough of quantum computers represents a risk for many PKC ecosystems. Traditional PKC will no be longer considered secure. Therefore, the integration of post-quantum security is mandatory. Due to their limited resources, tight performance requirements, and long-term life-cycles, this is especially challenging for CPSs. In this letter we propose, implement and evaluate for the first time a post-quantum enhanced DTLS, able to establish secure communications of CPSs, even in the presence of quantum computers. An NTRU post-quantum solution was used to perform the key transport among the CPSs entities. We show that is feasible to integrate our post-quantum enhanced DTLS, together with the full Internet engineering task force protocol stack in highly constrained environments, such as the CPSs. PubDate:
Dec. 2019
Issue No:Vol. 11, No. 4 (2019)
Authors:
Fredrik Asplund;John McDermid;Robert Oates;Jonathan Roberts;
Pages: 111 - 114 Abstract: The security and safety of cyber-physical systems (CPSs) often influence each other. Ensuring that this does not have negative implications might require a large and rigorous effort during the development of CPS. However, early in the life-cycle, quick feedback can be valuable helping security and safety engineers to understand how seemingly trivial design choices in their domain may have unacceptable implications in the other. We propose the cyber risk assessment framework (CRAF) for this purpose. The CRAF is based on openly available and widely used taxonomies from the safety and security domains, and a unique mapping of where loss of data security may impact aspects of data with safety implications. This letter represents the first time these different elements have been brought together into a single framework with an associated process. Through examples from within our organizations we show how this framework can be put to good use. PubDate:
Dec. 2019
Issue No:Vol. 11, No. 4 (2019)
Authors:
Mael Gay;Batya Karp;Osnat Keren;Ilia Polian;
Pages: 115 - 118 Abstract: We present an error-correcting architecture for cryptographic circuits that are exposed to maliciously injected faults. The architecture is based on a new class of error-detecting and correcting codes, which combine high rate, large distance, and robustness; that is, they can detect all error patterns injected by a skillful and strategic attacker and automatically correct simpler errors. Correction of errors is superior to detection since it avoids service disruptions and system-level recovery actions. We investigate the architectures using both mathematical analysis and physical fault injection on an field programmable gate array (FPGA) platform, and point out critical divergences between these methods and the need to employ both of them. PubDate:
Dec. 2019
Issue No:Vol. 11, No. 4 (2019)
Authors:
Walaa M. Elsayed;Hazem M. El-Bakry;Salah M. El-Sayed;
Pages: 119 - 122 Abstract: Wireless sensor networks (WSNs) are collecting data periodically through randomly dispersed sensors (motes) that typically exploit high energy in monitoring a specified application. Furthermore, dissemination mode in WSN usually produces noisy or missing information that affects the behavior of WSN. Data prediction-based filtering is an important approach to reduce redundant data transmissions, conserve node energy, and overcome the defects resulted from data dissemination. Therefore, this letter introduced a novel model was based on a finite impulse response filter integrated with the recursive least squares adaptive filter for improving the signals transferring function by canceling the unwanted noise and reflections accompanying of the transmitted signal and providing high convergence of the transferred signals. The proposed distributed data predictive model (DDPM) was built upon a distributive clustering model for minimizing the amount of transmitted data aimed to decrease the energy consumption in WSN sensor nodes. The results clarified that DDPM reduced the rate of data transmission to ~20%. Also, it depressed the energy consumption to ~95% throughout the dataset sample. DDPM effectively upgraded the performance of the sensory network by about 19%, and hence extend its lifetime. PubDate:
Dec. 2019
Issue No:Vol. 11, No. 4 (2019)
Authors:
Kuladeep Sai Reddy;Kizheppatt Vipin;
Pages: 123 - 126 Abstract: Network on chip (NoC) architectures enable efficient and scalable interconnection between hardware accelerators on the same chip. Most of the traditional NoC architectures are highly resource intensive and suffer from low clock performance when implemented on field programmable gate array platforms. They fail to provide standard interface to accelerators and fall short on detailing the external interface. Availability of open source NoC infrastructures saves development time also faster adoption of this technique. This letter discusses the implementation of OpenNoC, an open source lite-weight deflection torus-based NoC with PCIe-based communication controller. PubDate:
Dec. 2019
Issue No:Vol. 11, No. 4 (2019)