首页 > 最新文献

2021 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)最新文献

英文 中文
Timing Side-Channel Attack Resistant Key Derivation Functions for Cryptosystems 密码系统的时序侧信道抗攻击密钥派生函数
Pub Date : 2021-12-01 DOI: 10.1109/iSES52644.2021.00096
K. Lata, A. Bansal
In today’s digital world, security is required at each level of the implementation, even for Cryptographic algorithms, as we depend digitally on various needs of our daily life. Also, hackers are trying many ways to hack confidential information, and side-channel attacks are one of them. Key Derivation Functions (KDFs) are the basic and essential components of cryptographic systems; therefore, their security becomes more crucial for such systems. This paper presents the implementation of KDFs based on Block Ciphers and Hash functions (AES-128 and SHA-256, SHA- 512). The key feature of this implementation is that it generates a unique and secure key. Moreover, the generated key is less prone to the Timing side-channel attacks. These KDFs are implemented using high-level language C in Xilinx Vivado HLS. The results show that the proposed design offers a highly secure generated key while mitigating the Timing side-channel attacks possibility. Security analysis is done in terms of Hamming Distance and Avalanche Effects. The reported KDF based on AES-128 operates at 152.3 MHz with a max throughput of 9.728 Gbps, whereas KDF based on Hash Function, i.e., SHA-256 and SHA-512, operate at 108.6 MHz and 118.1 MHz with the max throughput of 2.28 Mbps and 2.28 Mbps, respectively.
在当今的数字世界中,由于我们的日常生活依赖于数字的各种需求,因此安全性需要在各个层面的实现,甚至对于加密算法也是如此。此外,黑客正在尝试许多方法来破解机密信息,而侧信道攻击就是其中之一。密钥派生函数(KDFs)是密码系统的基本组成部分;因此,它们的安全性对此类系统来说变得更加重要。本文介绍了基于块密码和哈希函数(AES-128和SHA-256, SHA- 512)的kdf的实现。此实现的关键特性是它生成唯一且安全的密钥。此外,生成的密钥不容易受到定时旁信道攻击。这些kdf是在Xilinx Vivado HLS中使用高级语言C实现的。结果表明,所提出的设计提供了一个高度安全的生成密钥,同时减少了定时侧信道攻击的可能性。安全性分析是根据汉明距离和雪崩效应进行的。报道的基于AES-128的KDF工作频率为152.3 MHz,最大吞吐量为9.728 Gbps,而基于Hash Function的KDF,即SHA-256和SHA-512,工作频率为108.6 MHz和118.1 MHz,最大吞吐量分别为2.28 Mbps和2.28 Mbps。
{"title":"Timing Side-Channel Attack Resistant Key Derivation Functions for Cryptosystems","authors":"K. Lata, A. Bansal","doi":"10.1109/iSES52644.2021.00096","DOIUrl":"https://doi.org/10.1109/iSES52644.2021.00096","url":null,"abstract":"In today’s digital world, security is required at each level of the implementation, even for Cryptographic algorithms, as we depend digitally on various needs of our daily life. Also, hackers are trying many ways to hack confidential information, and side-channel attacks are one of them. Key Derivation Functions (KDFs) are the basic and essential components of cryptographic systems; therefore, their security becomes more crucial for such systems. This paper presents the implementation of KDFs based on Block Ciphers and Hash functions (AES-128 and SHA-256, SHA- 512). The key feature of this implementation is that it generates a unique and secure key. Moreover, the generated key is less prone to the Timing side-channel attacks. These KDFs are implemented using high-level language C in Xilinx Vivado HLS. The results show that the proposed design offers a highly secure generated key while mitigating the Timing side-channel attacks possibility. Security analysis is done in terms of Hamming Distance and Avalanche Effects. The reported KDF based on AES-128 operates at 152.3 MHz with a max throughput of 9.728 Gbps, whereas KDF based on Hash Function, i.e., SHA-256 and SHA-512, operate at 108.6 MHz and 118.1 MHz with the max throughput of 2.28 Mbps and 2.28 Mbps, respectively.","PeriodicalId":293167,"journal":{"name":"2021 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130248701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Solid Waste Management System Using Blockchain and IoT for Smart Cities 基于区块链和物联网的智慧城市固体废物管理系统
Pub Date : 2021-12-01 DOI: 10.1109/iSES52644.2021.00107
Mohinish Paturi, Sampath Puvvada, Badhari Sai Ponnuru, Mounika Simhadri, B. S. Egala, A. K. Pradhan
Because of urbanization and industrialization, non-biodegradable garbage is growing at an exponential rate. Industries have their own waste management and treatment divisions to take care of their waste products. However, civilian entities are facing many issues in waste management due to the lack of proper systems for segregating waste materials. This article proposed a unique smart waste management system using Blockchain and Internet of Things (IoT) to simplify the waste segregation with the help of smart bins. The proposed system distributes rewards to users for proper disposal of waste into smart bins using smart contracts. We deployed a prototype model on different test networks to compare its real-time performance. From the experimental analysis, we can conclude that the proposed model performs better on the Matic test network than the Binance Smart Chain (BSC) and Ropsten test networks. Finally, the proposed solution ensures system transparency, traceability, and scalability, as well as eliminating single points of failure (SPoF).
由于城市化和工业化的发展,不可生物降解的垃圾正以指数级的速度增长。各行各业都有自己的废物管理和处理部门来处理他们的废物。然而,由于缺乏适当的废物分类系统,民用实体在废物管理方面面临许多问题。本文提出了一种独特的智能垃圾管理系统,利用区块链和物联网(IoT),在智能垃圾箱的帮助下简化垃圾分类。该系统通过智能合约向将垃圾妥善处理到智能垃圾箱中的用户分发奖励。我们在不同的测试网络上部署了一个原型模型来比较它的实时性能。通过实验分析,我们可以得出结论,所提出的模型在Matic测试网络上的性能优于币安智能链(BSC)和Ropsten测试网络。最后,提出的解决方案确保了系统的透明性、可追溯性和可伸缩性,并消除了单点故障(SPoF)。
{"title":"Smart Solid Waste Management System Using Blockchain and IoT for Smart Cities","authors":"Mohinish Paturi, Sampath Puvvada, Badhari Sai Ponnuru, Mounika Simhadri, B. S. Egala, A. K. Pradhan","doi":"10.1109/iSES52644.2021.00107","DOIUrl":"https://doi.org/10.1109/iSES52644.2021.00107","url":null,"abstract":"Because of urbanization and industrialization, non-biodegradable garbage is growing at an exponential rate. Industries have their own waste management and treatment divisions to take care of their waste products. However, civilian entities are facing many issues in waste management due to the lack of proper systems for segregating waste materials. This article proposed a unique smart waste management system using Blockchain and Internet of Things (IoT) to simplify the waste segregation with the help of smart bins. The proposed system distributes rewards to users for proper disposal of waste into smart bins using smart contracts. We deployed a prototype model on different test networks to compare its real-time performance. From the experimental analysis, we can conclude that the proposed model performs better on the Matic test network than the Binance Smart Chain (BSC) and Ropsten test networks. Finally, the proposed solution ensures system transparency, traceability, and scalability, as well as eliminating single points of failure (SPoF).","PeriodicalId":293167,"journal":{"name":"2021 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130260653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Approximate Multiplier Architectures for Error Resilient Applications 误差弹性应用的近似乘法器架构
Pub Date : 2021-12-01 DOI: 10.1109/iSES52644.2021.00031
U. A. Kumar, Ratna Kumari Chintakunta, Surinder Kumar, K. Jamal, Syed Ershad Ahmed
Approximate computing is an emerging paradigm to achieve substantial improvement in the area, speed, and power in image processing applications where exact computation is not required. This paper proposes new approximate unsigned multiplier architectures which aim to reduce the power consumption and area with better accuracy. For the 8-bit multiplier scheme, experimental results show an improvement of 41.4% and 34.02% in power and area respectively, when the proposed design is compared against the exact design, and 22.88% and 26.72% respectively when compared against other approximate designs, without compromising on the accuracy.
近似计算是一种新兴的范例,在不需要精确计算的图像处理应用程序中,它在面积、速度和功率方面取得了实质性的改进。本文提出了一种新的近似无符号乘法器结构,旨在降低功耗和面积,提高精度。对于8位乘法器方案,实验结果表明,在不影响精度的情况下,与精确设计相比,该方案的功耗和面积分别提高了41.4%和34.02%,与其他近似设计相比,分别提高了22.88%和26.72%。
{"title":"Approximate Multiplier Architectures for Error Resilient Applications","authors":"U. A. Kumar, Ratna Kumari Chintakunta, Surinder Kumar, K. Jamal, Syed Ershad Ahmed","doi":"10.1109/iSES52644.2021.00031","DOIUrl":"https://doi.org/10.1109/iSES52644.2021.00031","url":null,"abstract":"Approximate computing is an emerging paradigm to achieve substantial improvement in the area, speed, and power in image processing applications where exact computation is not required. This paper proposes new approximate unsigned multiplier architectures which aim to reduce the power consumption and area with better accuracy. For the 8-bit multiplier scheme, experimental results show an improvement of 41.4% and 34.02% in power and area respectively, when the proposed design is compared against the exact design, and 22.88% and 26.72% respectively when compared against other approximate designs, without compromising on the accuracy.","PeriodicalId":293167,"journal":{"name":"2021 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128932783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SRTLock: A Sensitivity Resilient Two-Tier Logic Encryption Scheme SRTLock:一种敏感弹性的两层逻辑加密方案
Pub Date : 2021-12-01 DOI: 10.1109/iSES52644.2021.00095
N. Saxena, Ram Venkat Narayanan, Juneet Kumar Meka, R. Vemuri
Logic encryption is a method to improve hardware security by inserting key gates on carefully selected signals in a logic design. Various logic encryption schemes have been proposed in the past decade. Many attack methods to thwart these logic locking schemes have also emerged. The satisfiability (SAT) attack can recover correct keys for many logic obfuscation methods. Recently proposed sensitivity analysis attack can decrypt stripped functionality based logic encryption schemes. This article presents a new encryption scheme named SRTLock, which is resilient against both attacks. SRTLock method first generates 0-injection circuits and encrypts the functionality of these nodes with the key inputs. In the next step, these values are used to control the sensitivity of the functionally stripped output for specific input patterns. The resultant locked circuit is resilient against the SAT and sensitivity analysis attacks. Experimental results demonstrating this on several attacks using standard benchmark circuits are presented.
逻辑加密是一种通过在逻辑设计中精心选择的信号上插入密钥门来提高硬件安全性的方法。在过去的十年里,人们提出了各种各样的逻辑加密方案。也出现了许多阻止这些逻辑锁定方案的攻击方法。满足性攻击可以恢复许多逻辑混淆方法的正确密钥。最近提出的敏感性分析攻击可以对基于剥离功能的逻辑加密方案进行解密。本文提出了一种名为SRTLock的新加密方案,它可以抵御这两种攻击。SRTLock方法首先生成0注入电路,并用密钥输入加密这些节点的功能。在下一步中,这些值用于控制特定输入模式的功能剥离输出的灵敏度。由此产生的锁定电路对SAT和灵敏度分析攻击具有弹性。用标准基准电路对几种攻击进行了实验验证。
{"title":"SRTLock: A Sensitivity Resilient Two-Tier Logic Encryption Scheme","authors":"N. Saxena, Ram Venkat Narayanan, Juneet Kumar Meka, R. Vemuri","doi":"10.1109/iSES52644.2021.00095","DOIUrl":"https://doi.org/10.1109/iSES52644.2021.00095","url":null,"abstract":"Logic encryption is a method to improve hardware security by inserting key gates on carefully selected signals in a logic design. Various logic encryption schemes have been proposed in the past decade. Many attack methods to thwart these logic locking schemes have also emerged. The satisfiability (SAT) attack can recover correct keys for many logic obfuscation methods. Recently proposed sensitivity analysis attack can decrypt stripped functionality based logic encryption schemes. This article presents a new encryption scheme named SRTLock, which is resilient against both attacks. SRTLock method first generates 0-injection circuits and encrypts the functionality of these nodes with the key inputs. In the next step, these values are used to control the sensitivity of the functionally stripped output for specific input patterns. The resultant locked circuit is resilient against the SAT and sensitivity analysis attacks. Experimental results demonstrating this on several attacks using standard benchmark circuits are presented.","PeriodicalId":293167,"journal":{"name":"2021 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120961798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bilayer Graphene Field Effect Transistor Modelling with Improved Mobility Analysis 改进迁移率分析的双层石墨烯场效应晶体管模型
Pub Date : 2021-12-01 DOI: 10.1109/iSES52644.2021.00040
Sai Akash Dusi, B. T. Sundari
Silicon has been the major driving force behind the technological advancement of humanity for the past 50 years. Silicon is used for manufacturing transistors, memory, Printed Circuit Broads, etc. Gordon Moore predicted that “the number of transistors on a silicon chip would double approximately every eighteen months”. The semiconductor industry had taken this prediction as the primary driving force behind the innovation of faster and efficient electronics manufacturing. This is achieved by miniaturizing devices, also know as scaling. Silicon is limited by performance degradation due to effects such as band to band tunneling, scattering phenomenon, etc, so the search to replace silicon in semiconductors has started. Many different methods to increase performance and efficiency were introduced before jumping wagon to beyond silicon materials such as designing 3-D transistors, FINFETs, replacing Silicon Dioxide with high-k dielectrics, etc. These proved to be increasing the manufacturing costs. The prime candidates for replacing Silicon are Carbon based materials, owing to their extraordinary electronic, thermal, optical and mechanical properties. The most researched are Carbon Nano Tubes and Graphene. The work focuses on modelling a Bilayer Graphene Field Effect Transistor with different mobility of holes and electrons taken into consideration.
在过去的50年里,硅一直是人类技术进步的主要推动力。硅用于制造晶体管、存储器、印刷电路宽带等。戈登·摩尔预言“硅芯片上晶体管的数量大约每18个月翻一番”。半导体行业将这一预测作为推动更快、更高效的电子制造创新的主要动力。这是通过将设备小型化来实现的,也称为缩放。硅受到诸如带间隧道效应、散射现象等影响而导致的性能下降的限制,因此在半导体中寻找硅的替代品已经开始。在跳过硅材料之前,引入了许多不同的方法来提高性能和效率,例如设计3-D晶体管,finfet,用高k介电体代替二氧化硅等。事实证明,这增加了制造成本。取代硅的主要候选材料是碳基材料,因为它们具有非凡的电子、热、光学和机械性能。研究最多的是碳纳米管和石墨烯。研究了考虑不同空穴和电子迁移率的双层石墨烯场效应晶体管的模型。
{"title":"Bilayer Graphene Field Effect Transistor Modelling with Improved Mobility Analysis","authors":"Sai Akash Dusi, B. T. Sundari","doi":"10.1109/iSES52644.2021.00040","DOIUrl":"https://doi.org/10.1109/iSES52644.2021.00040","url":null,"abstract":"Silicon has been the major driving force behind the technological advancement of humanity for the past 50 years. Silicon is used for manufacturing transistors, memory, Printed Circuit Broads, etc. Gordon Moore predicted that “the number of transistors on a silicon chip would double approximately every eighteen months”. The semiconductor industry had taken this prediction as the primary driving force behind the innovation of faster and efficient electronics manufacturing. This is achieved by miniaturizing devices, also know as scaling. Silicon is limited by performance degradation due to effects such as band to band tunneling, scattering phenomenon, etc, so the search to replace silicon in semiconductors has started. Many different methods to increase performance and efficiency were introduced before jumping wagon to beyond silicon materials such as designing 3-D transistors, FINFETs, replacing Silicon Dioxide with high-k dielectrics, etc. These proved to be increasing the manufacturing costs. The prime candidates for replacing Silicon are Carbon based materials, owing to their extraordinary electronic, thermal, optical and mechanical properties. The most researched are Carbon Nano Tubes and Graphene. The work focuses on modelling a Bilayer Graphene Field Effect Transistor with different mobility of holes and electrons taken into consideration.","PeriodicalId":293167,"journal":{"name":"2021 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115318266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unified Countermeasures against Physical Attacks in Internet of Things - A survey 物联网中物理攻击的统一对策研究
Pub Date : 2021-12-01 DOI: 10.1109/iSES52644.2021.00053
Jaya Dofe, Aaron Nguyen, Andy Nguyen
The Internet of Things (IoT) impacts how we interact with the world around us for good. While IoT benefits are undeniable, it is a double-edged sword. The security aspect is the major concern in the IoT realm, especially side-channel attacks since there are abundant channels due to physical effects. IoT devices have been widely used in many fields of production and social living, such as healthcare, energy and industrial automation and military application, to name a few. Much research focuses on software, network, and cloud security; however, hardware security in these devices has been overlooked. The low-power, heterogeneous and resource-constrained nature of IoT devices makes incorporating security features extremely challenging. Conventional security measures, such as encryption, are infeasible for deployment under such constraints. This survey paper discusses the existing countermeasures for isolated side-channel attacks (SCA) and then dives into unified countermeasures that benefit IoT devices to address the area footprint and power constraints. Further, to defeat the IoT system from the advanced SCA, we proposed to use 3D integration as an IoT platform. 3D technology provides various advantages such as heterogeneous integration, split manufacturing, disparate technologies for IoT like MEMS sensors, etc., making 3D integration the best choice for IoT platforms.
物联网(IoT)将永远影响我们与周围世界的互动方式。虽然物联网的好处是不可否认的,但它是一把双刃剑。安全方面是物联网领域的主要关注点,特别是由于物理影响而存在大量通道的侧通道攻击。物联网设备已广泛应用于生产和社会生活的许多领域,如医疗保健、能源和工业自动化、军事应用等。许多研究集中在软件、网络和云安全上;然而,这些设备的硬件安全性一直被忽视。物联网设备的低功耗、异构和资源受限特性使得整合安全功能极具挑战性。传统的安全措施,如加密,在这样的约束下是不可行的。本调查报告讨论了针对孤立侧信道攻击(SCA)的现有对策,然后深入研究了有利于物联网设备解决面积占用和功率限制的统一对策。此外,为了击败来自高级SCA的物联网系统,我们建议使用3D集成作为物联网平台。3D技术为物联网提供了异构集成、分裂制造、MEMS传感器等不同技术等多种优势,使3D集成成为物联网平台的最佳选择。
{"title":"Unified Countermeasures against Physical Attacks in Internet of Things - A survey","authors":"Jaya Dofe, Aaron Nguyen, Andy Nguyen","doi":"10.1109/iSES52644.2021.00053","DOIUrl":"https://doi.org/10.1109/iSES52644.2021.00053","url":null,"abstract":"The Internet of Things (IoT) impacts how we interact with the world around us for good. While IoT benefits are undeniable, it is a double-edged sword. The security aspect is the major concern in the IoT realm, especially side-channel attacks since there are abundant channels due to physical effects. IoT devices have been widely used in many fields of production and social living, such as healthcare, energy and industrial automation and military application, to name a few. Much research focuses on software, network, and cloud security; however, hardware security in these devices has been overlooked. The low-power, heterogeneous and resource-constrained nature of IoT devices makes incorporating security features extremely challenging. Conventional security measures, such as encryption, are infeasible for deployment under such constraints. This survey paper discusses the existing countermeasures for isolated side-channel attacks (SCA) and then dives into unified countermeasures that benefit IoT devices to address the area footprint and power constraints. Further, to defeat the IoT system from the advanced SCA, we proposed to use 3D integration as an IoT platform. 3D technology provides various advantages such as heterogeneous integration, split manufacturing, disparate technologies for IoT like MEMS sensors, etc., making 3D integration the best choice for IoT platforms.","PeriodicalId":293167,"journal":{"name":"2021 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131637559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FarmEdge: A Unified Edge Computing Framework Enabling Digital Agriculture FarmEdge:实现数字农业的统一边缘计算框架
Pub Date : 2021-12-01 DOI: 10.1109/iSES52644.2021.00065
P. Joshi, Debanjan Das, Venkanna Udutalapally, S. Misra
Ensuring higher crop yield helps in optimal utilisation of available land and man power along with agriculture inputs. Factors such as poor crop health, soil infertility and limited access to resources lead to low crop yield. Existing solutions offer cloud based services to the farmers which are not available to farmers residing in remote areas with no internet access. To prevent this, FarmEdge introduces an end-to-end edge based unified computing platform in the form of an android application - Hamar Kisaan for rural farmers to monitor crop field, track real time developments and propose solutions for higher crop yield. The crop health monitoring feature of Hamar Kisaan with an accuracy of 94.2% when paired with soil health monitoring enabled by IoT Krishi nodes, provides a one stop agriculture solution for the farmer community.
确保更高的作物产量有助于优化利用可用土地和人力以及农业投入。作物健康状况差、土壤不孕症和获取资源的机会有限等因素导致作物产量低。现有的解决方案为农民提供基于云的服务,而这些服务对于居住在没有互联网接入的偏远地区的农民来说是不可用的。为了防止这种情况,FarmEdge引入了一个基于端到端边缘的统一计算平台,以android应用程序的形式- Hamar Kisaan,用于农村农民监控农田,跟踪实时发展并提出提高作物产量的解决方案。Hamar Kisaan的作物健康监测功能与物联网Krishi节点支持的土壤健康监测相结合,准确率为94.2%,为农民社区提供一站式农业解决方案。
{"title":"FarmEdge: A Unified Edge Computing Framework Enabling Digital Agriculture","authors":"P. Joshi, Debanjan Das, Venkanna Udutalapally, S. Misra","doi":"10.1109/iSES52644.2021.00065","DOIUrl":"https://doi.org/10.1109/iSES52644.2021.00065","url":null,"abstract":"Ensuring higher crop yield helps in optimal utilisation of available land and man power along with agriculture inputs. Factors such as poor crop health, soil infertility and limited access to resources lead to low crop yield. Existing solutions offer cloud based services to the farmers which are not available to farmers residing in remote areas with no internet access. To prevent this, FarmEdge introduces an end-to-end edge based unified computing platform in the form of an android application - Hamar Kisaan for rural farmers to monitor crop field, track real time developments and propose solutions for higher crop yield. The crop health monitoring feature of Hamar Kisaan with an accuracy of 94.2% when paired with soil health monitoring enabled by IoT Krishi nodes, provides a one stop agriculture solution for the farmer community.","PeriodicalId":293167,"journal":{"name":"2021 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126717297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power Distribution Network Capacitive Decoupling for Side-Channel Resistance 配电网侧道电阻电容解耦
Pub Date : 2021-12-01 DOI: 10.1109/iSES52644.2021.00051
R. Selvam, A. Tyagi
In power side-channel attacks (SCA), the adversary observes the power leakage at the external power pin to reverse engineer the secrets embedded in sensitive circuits. Mitigation techniques are often integrated into the logic to make power consumption data independent. In this paper, we develop a new design strategy for designing the on-chip power distribution network using a decoupling capacitance to thwart the power side-channel attack. The decoupling capacitances are introduced along the power lanes in a distributed fashion, to suppress the data-leakage from the sensitive-circuit. To facilitate the computer-aided design of such PDNs, we also develop approximate heuristics to extract feature vectors from the current (I) profile of the internal logic blocks, and for feature vector propagation over the on-chip power distribution network. We study the sensitivity of decoupling capacitance value and its placement over the power distribution network. Finally, we evaluate the side-channel resistance with and without decoupling capacitance using Spice level simulations. Machine Learning (ML) classifiers are used to quantify the side-channel strength in terms of success rate for power side-channel adversary. A 100pf decoupling capacitance, in some cases, reduces the ML success rate from 80% to 21% to provide significant SCA resistance.
在功率侧信道攻击(SCA)中,攻击者通过观察外部电源引脚处的功率泄漏来逆向工程嵌入敏感电路中的秘密。缓解技术通常集成到逻辑中,使功耗数据独立。在本文中,我们开发了一种新的设计策略,利用去耦电容来设计片上配电网络,以阻止功率侧信道攻击。去耦电容沿功率通道以分布式方式引入,以抑制敏感电路的数据泄漏。为了便于此类pdn的计算机辅助设计,我们还开发了近似启发式方法,从内部逻辑块的电流(I)轮廓中提取特征向量,并在片上配电网络上传播特征向量。研究了解耦电容值的灵敏度及其在配电网上的位置。最后,我们使用Spice级模拟评估了有无去耦电容的侧通道电阻。机器学习(ML)分类器用于根据功率侧信道对手的成功率来量化侧信道强度。在某些情况下,100pf去耦电容可将ML成功率从80%降低到21%,从而提供显著的SCA电阻。
{"title":"Power Distribution Network Capacitive Decoupling for Side-Channel Resistance","authors":"R. Selvam, A. Tyagi","doi":"10.1109/iSES52644.2021.00051","DOIUrl":"https://doi.org/10.1109/iSES52644.2021.00051","url":null,"abstract":"In power side-channel attacks (SCA), the adversary observes the power leakage at the external power pin to reverse engineer the secrets embedded in sensitive circuits. Mitigation techniques are often integrated into the logic to make power consumption data independent. In this paper, we develop a new design strategy for designing the on-chip power distribution network using a decoupling capacitance to thwart the power side-channel attack. The decoupling capacitances are introduced along the power lanes in a distributed fashion, to suppress the data-leakage from the sensitive-circuit. To facilitate the computer-aided design of such PDNs, we also develop approximate heuristics to extract feature vectors from the current (I) profile of the internal logic blocks, and for feature vector propagation over the on-chip power distribution network. We study the sensitivity of decoupling capacitance value and its placement over the power distribution network. Finally, we evaluate the side-channel resistance with and without decoupling capacitance using Spice level simulations. Machine Learning (ML) classifiers are used to quantify the side-channel strength in terms of success rate for power side-channel adversary. A 100pf decoupling capacitance, in some cases, reduces the ML success rate from 80% to 21% to provide significant SCA resistance.","PeriodicalId":293167,"journal":{"name":"2021 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122573587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data-Driven Decision Making for Smart Cultivation 数据驱动的智能种植决策
Pub Date : 2021-12-01 DOI: 10.1109/iSES52644.2021.00064
Puspendu Biswas Paul, S. Biswas, A. Bairagi, Mehedi Masud
With the advancement of modern technology, traditional agriculture is drastically changing, especially with the utilization of Information and Communication Technology (ICT). Ubiquitous sensors and the Internet of Things (IoT) are being used independently for helping the farmers to understand better the condition of overall field condition targeting to monitor soil characteristics, climatic conditions, humidity, temperature, etc. These sensors and systems work individually and produce different data that requires analysis to understand. The typical process is time-consuming, and farmers should have technological knowledge. Contrary, most of the farmers are not technologically advanced to understand the term. A ready-made result can help farmers quick decision-making. In this paper, we have developed a remote field monitoring and controlling IoT system architecture. The system process and analyze the collected data to prepare a ready-made report for farmers with suggestions for further steps. It leverages the management process with real-time monitoring, nursing (i.e., irrigation, pesticide distribution, etc.), ultimately increasing productivity. The overall system records every successful case, and machine learning-based prediction helps further nursing guidelines.
随着现代技术的进步,传统农业正在发生巨大的变化,特别是随着信息通信技术(ICT)的应用。无处不在的传感器和物联网(IoT)被独立使用,以帮助农民更好地了解整个田地的状况,目标是监测土壤特征、气候条件、湿度、温度等。这些传感器和系统单独工作,产生不同的数据,需要分析才能理解。典型的过程是耗时的,农民应该有技术知识。相反,大多数农民的技术并不先进,无法理解这个术语。现成的结果可以帮助农民快速决策。在本文中,我们开发了一个远程现场监控物联网系统架构。该系统对收集到的数据进行处理和分析,为农民准备一份现成的报告,并提出进一步措施的建议。它利用实时监控、护理(即灌溉、农药分发等)的管理过程,最终提高生产率。整个系统记录每一个成功的案例,基于机器学习的预测有助于进一步制定护理指南。
{"title":"Data-Driven Decision Making for Smart Cultivation","authors":"Puspendu Biswas Paul, S. Biswas, A. Bairagi, Mehedi Masud","doi":"10.1109/iSES52644.2021.00064","DOIUrl":"https://doi.org/10.1109/iSES52644.2021.00064","url":null,"abstract":"With the advancement of modern technology, traditional agriculture is drastically changing, especially with the utilization of Information and Communication Technology (ICT). Ubiquitous sensors and the Internet of Things (IoT) are being used independently for helping the farmers to understand better the condition of overall field condition targeting to monitor soil characteristics, climatic conditions, humidity, temperature, etc. These sensors and systems work individually and produce different data that requires analysis to understand. The typical process is time-consuming, and farmers should have technological knowledge. Contrary, most of the farmers are not technologically advanced to understand the term. A ready-made result can help farmers quick decision-making. In this paper, we have developed a remote field monitoring and controlling IoT system architecture. The system process and analyze the collected data to prepare a ready-made report for farmers with suggestions for further steps. It leverages the management process with real-time monitoring, nursing (i.e., irrigation, pesticide distribution, etc.), ultimately increasing productivity. The overall system records every successful case, and machine learning-based prediction helps further nursing guidelines.","PeriodicalId":293167,"journal":{"name":"2021 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123416847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Binary Multi-objective CLONAL Algorithm for Band Selection in Hyper-Spectral Images 高光谱图像波段选择的二值多目标克隆算法
Pub Date : 2021-12-01 DOI: 10.1109/iSES52644.2021.00033
G. Ramya, S. Nanda
A hyperspectral image collects the spectral information across the electromagnetic spectrum as a continuous set of hundreds of bands with a very narrow bandwidths ranging from 5-10nm. The bands are high correlated with each other and some of the bands carry negligible information. So, there is a need to reduce the dimensionality of the hyperspectral image. Thus the aim is to extract only those bands which are informative and eliminate the noisy and redundant bands. If the redundant bands are eliminated, the dimensionality of the hyperspectral image reduces. This reduction in dimensionality reduces the cost of computation and increases the accuracy of the analysis. In this paper, a dimension reduction technique based on binary multi-objective CLONAL algorithm has been proposed. The method uses two objective functions as entropy and Pearson correlation. The extracted spectral bands are taken and extracted hyperspectral image obtained is segmented using K-modes algorithm. Comparative results reveal superior performance of band selection by the proposed method over NSGA-II, BSSO and PCA based reduction.
高光谱图像收集电磁波谱上的光谱信息,作为一组连续的数百个波段,带宽非常窄,范围为5-10nm。波段之间的相关性很高,有些波段携带的信息可以忽略不计。因此,需要对高光谱图像进行降维处理。因此,目标是只提取那些信息量大的频带,消除噪声和冗余频带。如果去除冗余波段,则会降低高光谱图像的维数。维数的减少减少了计算成本,提高了分析的准确性。提出了一种基于二值多目标克隆算法的降维方法。该方法使用两个目标函数作为熵和Pearson相关。对提取的光谱带进行提取,得到提取的高光谱图像,使用K-modes算法进行分割。对比结果表明,该方法的波段选择性能优于NSGA-II、BSSO和基于PCA的约简。
{"title":"A Binary Multi-objective CLONAL Algorithm for Band Selection in Hyper-Spectral Images","authors":"G. Ramya, S. Nanda","doi":"10.1109/iSES52644.2021.00033","DOIUrl":"https://doi.org/10.1109/iSES52644.2021.00033","url":null,"abstract":"A hyperspectral image collects the spectral information across the electromagnetic spectrum as a continuous set of hundreds of bands with a very narrow bandwidths ranging from 5-10nm. The bands are high correlated with each other and some of the bands carry negligible information. So, there is a need to reduce the dimensionality of the hyperspectral image. Thus the aim is to extract only those bands which are informative and eliminate the noisy and redundant bands. If the redundant bands are eliminated, the dimensionality of the hyperspectral image reduces. This reduction in dimensionality reduces the cost of computation and increases the accuracy of the analysis. In this paper, a dimension reduction technique based on binary multi-objective CLONAL algorithm has been proposed. The method uses two objective functions as entropy and Pearson correlation. The extracted spectral bands are taken and extracted hyperspectral image obtained is segmented using K-modes algorithm. Comparative results reveal superior performance of band selection by the proposed method over NSGA-II, BSSO and PCA based reduction.","PeriodicalId":293167,"journal":{"name":"2021 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122001401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2021 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1