The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the security is becoming more and more important these days, we still should not forget about reliability. When designing a cryptographic device for some mission-critical or another reliability demanding system, we need to make the device not only attack-resistant, but also fault-tolerant. There are many common fault-tolerant digital design techniques, however, it is questionable, how these techniques...
Distributed hash tables (DHTs), such as Chord and Kademlia, offer an efficient means to locate resources in peer-to-peer networks. Unfortunately, malicious nodes on a lookup path can easily subvert such queries. Several systems, including Halo (based on Chord) and Kad (based on Kademlia), mitigate such attacks by using redundant lookup queries. Much greater assurance can be provided; we present Reputation...
Security is considered to be one of the most critical aspects in a cloud computing environment due to the sensitivity and importance of information stored in the cloud and also because the management of the data might not be fully trustworthy. The risk of malicious insiders in the cloud and the failing of cloud services have received a strong attention by companies. Security brings in concerns for...
This paper focuses on the resiliency of wireless sensor network routing protocols against selective forwarding attacks by compromised nodes. To provide for security in such a context cryptographic solutions must be completed by algorithmic solutions considering "beyond cryptography" approaches. Enhancing the routing protocol resiliency to attacks is one approach that merits further investigation...
The basic concept of redundancy is simple. Instead of relying on a single piece of equipment, there are duplicate or triplicate sets that perform the same function. Consequently, if one piece of equipment fails, the function will still be performed by a redundant device. Redundancy of components plays a major role in elevating the reliability of protection systems. The impact on the power system when...
In wireless sensor networks (WSN), packets being sent over the transmission channel could get lost or corrupted due to factors such as channel noises, interferences, and node failures. Using the traditional retransmission mechanism to recover the lost/erroneous packets is costly or even impossible for WSN because sensor nodes are severely resource constrained and data transmission is the most energy...
This paper introduces a digital design of rod control and position indication (RCPI) system, in which digital control, network control, redundancy and autonomy control technology are employed to achieve the distributed control of reactor power. The system can help avoid the excessive centralization of failure risk and improve the capability of data processing, central monitoring and the maintainability,...
This paper presents a novel approach for evaluating the reliability of protective systems taking into account its components reliability. In this paper, a previously proposed extended model is used for directional overcurrent scheme. In the extended model, the impacts of individual protective components are taken into account. An optimum routine test schedule is determined for each protective component...
The scope of this paper is to present the necessity to improve the existent ambient intelligence model with respect to data security. The security of such a model poses a great challenge due to the fact that different networks are mixing in order to provide such an environment. In addition, these networks are generally deployed and then left unattended. All these aspects joined together make it unfeasible...
High assurance systems have evolving requirements and, hence, the definition for assurance requirements should allow evolution. We recommend the use of ontology to capture such evolving requirements. In this paper, we introduce the concept of trustworthiness to include dependability and some additional high assurance attributes. We develop an ontology of trustworthiness aspects and an ontology of...
In this paper, we present a new technique to improve the reliability of H-tree SRAM memories. This technique deals with the SRAM power-bus monitoring by using built-in current sensor (BICS) circuits that detect abnormal current dissipation in the memory power-bus. This abnormal current is the result of a single-event upset (SEU) in the memory and it is generated during the inversion of the state of...
With an increased focus on national security and public safety communications, the US Congress revisited its plan to reclaim television broadcaster frequencies to be reallocated and auctioned by the FCC and it specifically allocated a portion of that spectrum for use by public safety. The FCC was charged with the duty of auctioning this spectrum and licensing it to create a public safety network....
Based on the high speed inserted chip of DSP, the digital telex anti-skid controller with dual-redundancy introduced in this essay can significantly improve the present system. This essay expounding this anti-skid brake controller with the crossing dual-redundancy will involve its thought of system design, the management of redundancy and its realization of hardware system. In addition, the Malkof...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.