Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (11)

Search Parameters:
Keywords = interface protection system (IPS)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
9 pages, 1091 KiB  
Proceeding Paper
Simulation-Based Assessment of the Control of a Hybrid ECS Including a Vapor Cycle System
by Arnav Pathak and Victor Norrefeldt
Eng. Proc. 2025, 90(1), 80; https://doi.org/10.3390/engproc2025090080 - 27 Mar 2025
Viewed by 251
Abstract
Within the Clean Sky 2 regional project, a hybrid environmental control system has been conceived that combines the classical bleed air approach with a vapor cycle cooling in the recirculation air. To protect partners’ IP, a functional mock-up (FMU) model of the hybrid [...] Read more.
Within the Clean Sky 2 regional project, a hybrid environmental control system has been conceived that combines the classical bleed air approach with a vapor cycle cooling in the recirculation air. To protect partners’ IP, a functional mock-up (FMU) model of the hybrid ECS was provided describing the system behavior. This model was interfaced with a zonal model of a 100-passenger regional aircraft cabin to investigate comfort and air quality conditions within the cabin. The interfacing reveals that some optimization of the control algorithm is possible for the hybrid ECS, while some operational points already perform as intended. Hence, the coupled simulation approach, at an early design stage, already shows the strengths and weaknesses of the system conception. Recommendations from the simulation study can subsequently be incorporated into the design before a physical demonstrator is produced. Full article
Show Figures

Figure 1

20 pages, 1338 KiB  
Article
Efficient RO-PUF for Generation of Identifiers and Keys in Resource-Constrained Embedded Systems
by Macarena C. Martínez-Rodríguez, Luis F. Rojas-Muñoz, Eros Camacho-Ruiz, Santiago Sánchez-Solano and Piedad Brox
Cryptography 2022, 6(4), 51; https://doi.org/10.3390/cryptography6040051 - 5 Oct 2022
Cited by 11 | Viewed by 4711
Abstract
The generation of unique identifiers extracted from the physical characteristics of the underlying hardware ensures the protection of electronic devices against counterfeiting and provides security to the data they store and process. This work describes the design of an efficient Physical Unclonable Function [...] Read more.
The generation of unique identifiers extracted from the physical characteristics of the underlying hardware ensures the protection of electronic devices against counterfeiting and provides security to the data they store and process. This work describes the design of an efficient Physical Unclonable Function (PUF) based on the differences in the frequency of Ring Oscillators (ROs) with identical layout due to variations in the technological processes involved in the manufacture of the integrated circuit. The logic resources available in the Xilinx Series-7 programmable devices are exploited in the design to make it more compact and achieve an optimal bit-per-area rate. On the other hand, the design parameters can also be adjusted to provide a high bit-per-time rate for a particular target device. The PUF has been encapsulated as a configurable Intellectual Property (IP) module, providing it with an AXI4-Lite interface to ease its incorporation into embedded systems in combination with soft- or hard-core implementations of general-purpose processors. The capability of the proposed RO-PUF to generate implementation-dependent identifiers has been extensively tested, using a series of metrics to evaluate its reliability and robustness for different configuration options. Finally, in order to demonstrate its utility to improve system security, the identifiers provided by RO-PUFs implemented on different devices have been used in a Helper Data Algorithm (HDA) to obfuscate and retrieve a secret key. Full article
(This article belongs to the Special Issue Emerging Trends on Physical Security)
Show Figures

Figure 1

25 pages, 8737 KiB  
Article
Design of a CANFD to SOME/IP Gateway Considering Security for In-Vehicle Networks
by Zheng Zuo, Shichun Yang, Bin Ma, Bosong Zou, Yaoguang Cao, Qiangwei Li, Sida Zhou and Jichong Li
Sensors 2021, 21(23), 7917; https://doi.org/10.3390/s21237917 - 27 Nov 2021
Cited by 18 | Viewed by 10278
Abstract
In recent years, Ethernet has been introduced into vehicular networks to cope with the increasing demand for bandwidth and complexity in communication networks. To exchange data between controller area network (CAN) and Ethernet, a gateway system is required to provide a communication interface. [...] Read more.
In recent years, Ethernet has been introduced into vehicular networks to cope with the increasing demand for bandwidth and complexity in communication networks. To exchange data between controller area network (CAN) and Ethernet, a gateway system is required to provide a communication interface. Additionally, the existence of networked devices exposes automobiles to cyber security threats. Against this background, a gateway for CAN/CAN with flexible data-rate (CANFD) to scalable service-oriented middleware over IP (SOME/IP) protocol conversion is designed, and security schemes are implemented in the routing process to provide integrity and confidentiality protections. Based on NXP-S32G, the designed gateway is implemented and evaluated. Under most operating conditions, the CPU and the RAM usage are less than 5% and 20 MB, respectively. Devices running a Linux operating system can easily bear such a system resource overhead. The latency caused by the security scheme accounts for about 25% of the entire protocol conversion latency. Considering the security protection provided by the security scheme, this overhead is worthwhile. The results show that the designed gateway can ensure a CAN/CANFD to SOME/IP protocol conversion with a low system resource overhead and a low latency while effectively resisting hacker attacks such as frame forgery, tampering, and sniffing. Full article
Show Figures

Figure 1

17 pages, 4989 KiB  
Article
A Configurable RO-PUF for Securing Embedded Systems Implemented on Programmable Devices
by Macarena C. Martínez-Rodríguez, Eros Camacho-Ruiz, Piedad Brox and Santiago Sánchez-Solano
Electronics 2021, 10(16), 1957; https://doi.org/10.3390/electronics10161957 - 14 Aug 2021
Cited by 16 | Viewed by 4158
Abstract
Improving the security of electronic devices that support innovative critical services (digital administrative services, e-health, e-shopping, and on-line banking) is essential to lay the foundations of a secure digital society. Security schemes based on Physical Unclonable Functions (PUFs) take advantage of intrinsic characteristics [...] Read more.
Improving the security of electronic devices that support innovative critical services (digital administrative services, e-health, e-shopping, and on-line banking) is essential to lay the foundations of a secure digital society. Security schemes based on Physical Unclonable Functions (PUFs) take advantage of intrinsic characteristics of the hardware for the online generation of unique digital identifiers and cryptographic keys that allow to ensure the protection of the devices against counterfeiting and to preserve data privacy. This paper tackles the design of a configurable Ring Oscillator (RO) PUF that encompasses several strategies to provide an efficient solution in terms of area, timing response, and performance. RO-PUF implementation on programmable logic devices is conceived to minimize the use of available resources, while operating speed can be optimized by properly selecting the size of the elements used to obtain the PUF response. The work also describes the interface added to the PUF to facilitate its incorporation as hardware Intellectual Property (IP)-modules into embedded systems. The performance of the RO-PUF is proven with an extensive battery of tests, which are executed to analyze the influence of different test strategies on the PUF quality indexes. The configurability of the proposed RO-PUF allows establishing the most suitable “cost/performance/security-level” trade-off for a certain application. Full article
(This article belongs to the Special Issue Hardware Intrinsic Security for Trusted Electronic Systems)
Show Figures

Figure 1

47 pages, 13215 KiB  
Article
A Novel Smart Energy Management as a Service over a Cloud Computing Platform for Nanogrid Appliances
by Bilal Naji Alhasnawi, Basil H. Jasim, Maria Dolores Esteban and Josep M. Guerrero
Sustainability 2020, 12(22), 9686; https://doi.org/10.3390/su12229686 - 20 Nov 2020
Cited by 33 | Viewed by 4183
Abstract
There will be a dearth of electrical energy in the world in the future due to exponential increase in electrical energy demand of rapidly growing world population. With the development of Internet of Things (IoT), more smart appliances will be integrated into homes [...] Read more.
There will be a dearth of electrical energy in the world in the future due to exponential increase in electrical energy demand of rapidly growing world population. With the development of Internet of Things (IoT), more smart appliances will be integrated into homes in smart cities that actively participate in the electricity market by demand response programs to efficiently manage energy in order to meet this increasing energy demand. Thus, with this incitement, the energy management strategy using a price-based demand response program is developed for IoT-enabled residential buildings. We propose a new EMS for smart homes for IoT-enabled residential building smart devices by scheduling to minimize cost of electricity, alleviate peak-to-average ratio, correct power factor, automatic protective appliances, and maximize user comfort. In this method, every home appliance is interfaced with an IoT entity (a data acquisition module) with a specific IP address, which results in a wide wireless system of devices. There are two components of the proposed system: software and hardware. The hardware is composed of a base station unit (BSU) and many terminal units (TUs). The software comprises Wi-Fi network programming as well as system protocol. In this study, a message queue telemetry transportation (MQTT) broker was installed on the boards of BSU and TU. In this paper, we present a low-cost platform for the monitoring and helping decision making about different areas in a neighboring community for efficient management and maintenance, using information and communication technologies. The findings of the experiments demonstrated the feasibility and viability of the proposed method for energy management in various modes. The proposed method increases effective energy utilization, which in turn increases the sustainability of IoT-enabled homes in smart cities. The proposed strategy automatically responds to power factor correction, to protective home appliances, and to price-based demand response programs to combat the major problem of the demand response programs, which is the limitation of consumer’s knowledge to respond upon receiving demand response signals. The schedule controller proposed in this paper achieved an energy saving of 6.347 kWh real power per day, this paper achieved saving 7.282 kWh apparent power per day, and the proposed algorithm in our paper saved $2.3228388 per day. Full article
(This article belongs to the Special Issue Sustainable Construction and Building Materials for Environment)
Show Figures

Figure 1

19 pages, 1036 KiB  
Article
Autopolicy: Automated Traffic Policing for Improved IoT Network Security
by Pawel Foremski, Sławomir Nowak, Piotr Fröhlich, José Luis Hernández-Ramos and Gianmarco Baldini
Sensors 2020, 20(15), 4265; https://doi.org/10.3390/s20154265 - 30 Jul 2020
Cited by 5 | Viewed by 3601
Abstract
A 2.3Tbps DDoS attack was recently mitigated by Amazon, which is a new record after the 2018 GitHub attack, or the famous 2016 Dyn DNS attack launched from hundreds of thousands of hijacked Internet of Things (IoT) devices. These attacks may disrupt the [...] Read more.
A 2.3Tbps DDoS attack was recently mitigated by Amazon, which is a new record after the 2018 GitHub attack, or the famous 2016 Dyn DNS attack launched from hundreds of thousands of hijacked Internet of Things (IoT) devices. These attacks may disrupt the lives of billions of people worldwide, as we increasingly rely on the Internet. In this paper, we tackle the problem that hijacked IoT devices are often the origin of these attacks. With the goal of protecting the Internet and local networks, we propose Autopolicy: a system that automatically limits the IP traffic bandwidth—and other network resources—available to IoT devices in a particular network. We make use of the fact that devices, such as sensors, cameras, and smart home appliances, rarely need their high-speed network interfaces for normal operation. We present a simple yet flexible architecture for Autopolicy, specifying its functional blocks, message sequences, and general operation in a Software Defined Network. We present the experimental validation results, and release a prototype open source implementation. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

17 pages, 5501 KiB  
Article
Cyber-Physical Co-Simulation of Shipboard Integrated Power System Based on Optimized Event-Driven Synchronization
by You Wu, Lijun Fu, Fan Ma and Xiaoliang Hao
Electronics 2020, 9(3), 540; https://doi.org/10.3390/electronics9030540 - 24 Mar 2020
Cited by 11 | Viewed by 3445
Abstract
As the energy management system (EMS) participates in the closed-loop control of shipboard integrated power system (IPS), the information network of EMS is closely coupled with the power system and its characteristics affect power system performance significantly. To study the close-coupling relationship between [...] Read more.
As the energy management system (EMS) participates in the closed-loop control of shipboard integrated power system (IPS), the information network of EMS is closely coupled with the power system and its characteristics affect power system performance significantly. To study the close-coupling relationship between the two systems, a cyber–physical co-simulation platform based on the high level architecture (HLA) framework is constructed in this paper. The proposed platform uses PSCAD and OPNET to simulate shipboard power system and information network respectively, and utilizes OPNET HLA nodes and PSCAD user-defined modules to implement co-simulation interfaces. In order to achieve a higher co-simulation precision without impairing efficiency, an optimized event-driven co-simulation synchronization method is also proposed. By pre-defining power system synchronization points and detecting information network synchronization points in the co-simulation process, both systems can be synchronized in time and the synchronization error is eliminated. Furthermore, the co-simulation efficiency is also improved by optimizing the data transmission in the synchronization process. A co-simulation model of shipboard power distribution network protection based on CAN bus communication is built and analyzed. Simulation results show that the proposed co-simulation platform and synchronization method are feasible and effective. Full article
(This article belongs to the Section Power Electronics)
Show Figures

Figure 1

12 pages, 2298 KiB  
Article
Distribution and Release Characteristics of Phosphorus in a Reservoir in Southwest China
by Yuanming Wang, Kefeng Li, Ruifeng Liang, Shiqing Han and Yong Li
Int. J. Environ. Res. Public Health 2019, 16(3), 303; https://doi.org/10.3390/ijerph16030303 - 23 Jan 2019
Cited by 15 | Viewed by 3703
Abstract
Dam construction changes the nutrient transport of a river system. Phosphorus is an important fundamental material in the global biochemical cycle and is always a limiting factor in the primary productivity of reservoirs. Extending the study of phosphorus in reservoirs is necessary given [...] Read more.
Dam construction changes the nutrient transport of a river system. Phosphorus is an important fundamental material in the global biochemical cycle and is always a limiting factor in the primary productivity of reservoirs. Extending the study of phosphorus in reservoirs is necessary given the dam construction in southwest China. Zipingpu Reservoir was chosen as the research site in this study. The form and distribution of phosphorus in the reservoir’s surface sediments and overlying water were analyzed. The results showed that overall, the total phosphorus (TP) content of surface sediments in the Zipingpu Reservoir decreased from the tail to the front of the dam. The TP content ranged from 682.39 to 1609.06 mg/kg, with an average value of 1121.08 mg/kg. The TP content at some sampling points was affected by exogenous input. Inorganic phosphorus (IP) was the main form of phosphorus in surface sediments and had a proportion of 89.38%. Among the forms of IP, the content of Ca-P was larger than that of O-P; Ex-P, Fe-P, and Al-P had the lowest contents. Particulate phosphorus (PP) was the main form of phosphorus in the overlying water of the Zipingpu Reservoir and was strongly affected by hydrodynamic conditions. The content of total dissolved phosphorus (TDP) in the overlying water was relatively low. To further understand the risk of phosphorus release in the surface sediments in the reservoir, the rate and flux of phosphorus exchange at the sediment-overlying water interface were investigated through laboratory experiments. The results showed that both water temperature and pH significantly affected the sediment release rate, but the influence of water temperature was more significant. Acidic and alkaline conditions were conducive to the release of phosphorus from sediment, while a neutral environment was not. The release rate significantly increased with increasing water temperature, and a positive linear relationship was found between these two parameters. The sediment exhibited absorption characteristics when the water temperature was extremely low and exhibited releasing characteristics at a high temperature. These results could provide a theoretical basis for the management and protection of reservoir water environments. Full article
(This article belongs to the Special Issue Water Quality Improvement and Ecological Restoration)
Show Figures

Figure 1

21 pages, 2962 KiB  
Article
Designing Secure Heterogeneous Multicore Systems from Untrusted Components
by Michel A. Kinsy, Lake Bu, Mihailo Isakov and Miguel Mark
Cryptography 2018, 2(3), 12; https://doi.org/10.3390/cryptography2030012 - 26 Jun 2018
Cited by 5 | Viewed by 7823
Abstract
In current systems-on-chip (SoCs) designs, processing elements, i.e., intellectual property (IP) cores, may come from different providers, and executable code may have varying levels of trust, all executing on the same compute platform and sharing resources. This creates a very fertile attack ground [...] Read more.
In current systems-on-chip (SoCs) designs, processing elements, i.e., intellectual property (IP) cores, may come from different providers, and executable code may have varying levels of trust, all executing on the same compute platform and sharing resources. This creates a very fertile attack ground and represents the Achilles’ heel of heterogeneous SoC architectures and distributed connected devices. The general consensus today is that conventional approaches and software-only add-on schemes fail to provide sufficient security protections and trustworthiness. In this paper, we develop a secure heterogeneous SoC architecture named Hermes. It represents a new architectural model that integrates multiple processing elements (called tenants) of secure and non-secure cores into the same chip design while: (a) maintaining individual tenant security; (b) preventing data leakage and corruption; (c) promoting collaboration among the tenants; and (d) tolerating untrusted tenants with potentially malicious purposes. The Hermes architecture is based on a programmable secure router interface and a trust-aware routing algorithm. Depending on the trust levels of computing nodes, it is able to virtually isolate them in different access modes to the memory blocks. With secure key management and join protocols, Hermes is also able to function properly when nodes request for, or allow, memory access in a dishonest manner. With 17% hardware overhead, it enables the implementation of processing-element-oblivious secure multicore systems with a programmable distributed group key management scheme. The Hermes architecture is meant to emblematize the design of secure heterogeneous multicore computing systems out of unsecured or untrusted components using user-defined security policies to create at the hardware-level virtual zones to enforce these security and trust policies. Full article
(This article belongs to the Section Hardware Security)
Show Figures

Figure 1

20 pages, 2646 KiB  
Article
Effects of Energy Storage Systems Grid Code Requirements on Interface Protection Performances in Low Voltage Networks
by Fabio Bignucolo, Alberto Cerretti, Massimiliano Coppo, Andrea Savio and Roberto Turri
Energies 2017, 10(3), 387; https://doi.org/10.3390/en10030387 - 18 Mar 2017
Cited by 30 | Viewed by 6309
Abstract
The ever-growing penetration of local generation in distribution networks and the large diffusion of energy storage systems (ESSs) foreseen in the near future are bound to affect the effectiveness of interface protection systems (IPSs), with negative impact on the safety of medium voltage [...] Read more.
The ever-growing penetration of local generation in distribution networks and the large diffusion of energy storage systems (ESSs) foreseen in the near future are bound to affect the effectiveness of interface protection systems (IPSs), with negative impact on the safety of medium voltage (MV) and low voltage (LV) systems. With the scope of preserving the main network stability, international and national grid connection codes have been updated recently. Consequently, distributed generators (DGs) and storage units are increasingly called to provide stabilizing functions according to local voltage and frequency. This can be achieved by suitably controlling the electronic power converters interfacing small-scale generators and storage units to the network. The paper focuses on the regulating functions required to storage units by grid codes currently in force in the European area. Indeed, even if such regulating actions would enable local units in participating to network stability under normal steady-state operating conditions, it is shown through dynamic simulations that they may increase the risk of unintentional islanding occurrence. This means that dangerous operating conditions may arise in LV networks in case dispersed generators and storage systems are present, even if all the end-users are compliant with currently applied connection standards. Full article
Show Figures

Figure 1

16 pages, 2056 KiB  
Article
Impact of Distributed Generation Grid Code Requirements on Islanding Detection in LV Networks
by Fabio Bignucolo, Alberto Cerretti, Massimiliano Coppo, Andrea Savio and Roberto Turri
Energies 2017, 10(2), 156; https://doi.org/10.3390/en10020156 - 26 Jan 2017
Cited by 51 | Viewed by 6414
Abstract
The recent growing diffusion of dispersed generation in low voltage (LV) distribution networks is entailing new rules to make local generators participate in network stability. Consequently, national and international grid codes, which define the connection rules for stability and safety of electrical power [...] Read more.
The recent growing diffusion of dispersed generation in low voltage (LV) distribution networks is entailing new rules to make local generators participate in network stability. Consequently, national and international grid codes, which define the connection rules for stability and safety of electrical power systems, have been updated requiring distributed generators and electrical storage systems to supply stabilizing contributions. In this scenario, specific attention to the uncontrolled islanding issue has to be addressed since currently required anti-islanding protection systems, based on relays locally measuring voltage and frequency, could no longer be suitable. In this paper, the effects on the interface protection performance of different LV generators’ stabilizing functions are analysed. The study takes into account existing requirements, such as the generators’ active power regulation (according to the measured frequency) and reactive power regulation (depending on the local measured voltage). In addition, the paper focuses on other stabilizing features under discussion, derived from the medium voltage (MV) distribution network grid codes or proposed in the literature, such as fast voltage support (FVS) and inertia emulation. Stabilizing functions have been reproduced in the DIgSILENT PowerFactory 2016 software environment, making use of its native programming language. Later, they are tested both alone and together, aiming to obtain a comprehensive analysis on their impact on the anti-islanding protection effectiveness. Through dynamic simulations in several network scenarios the paper demonstrates the detrimental impact that such stabilizing regulations may have on loss-of-main protection effectiveness, leading to an increased risk of unintentional islanding. Full article
Show Figures

Figure 1

Back to TopTop