-
FPGA Implementation of SIMON-128 Cryptographic Algorithm Using Artix-7
Abstract: FPGA is a hardware architecture based on a matrix of programmable and configurable logic circuits thanks to which a large number of functionalities inside the device can be modified using a hardware description language. These functionalities must often be secured especially when the context is sensitive (military, banking, medical, legal, etc.). In this paper, we put forward an efficient implemen… ▽ More
Submitted 4 January, 2023; originally announced January 2023.
Comments: ECAI 2022
-
Fuzzy approach on modelling cyber attacks patterns on data transfer in industrial control systems
Abstract: Cybersecurity of industrial control system is a very complex and challenging research topic, due to the integration of these systems in national critical infrastructures. The control systems are now interconnected in industrial networks and frequently to the Internet. In this context they are becoming targets of various cyber attacks conducted by malicious people such as hackers, script kiddies, i… ▽ More
Submitted 30 November, 2019; originally announced December 2019.
Comments: 6 pages; Paper accepted and presented at ECAI 2015 - 7th International Conference Electronics, Computers and Artificial Intelligence, 25 June -27 June, 2015, Bucharest, ROMÂNIA
-
On the design of an innovative solution for increasing hazardous materials transportation safety
Abstract: Transportation of hazardous materials represent a high risk operation all over the world. Flammable substances such as oil, kerosene, hydrocarbons, ammonium nitrate or toxic products are shipped every day on busy roads by trucks. An innovative solution for increasing hazardous materials transportation safety is presented in this paper. The solution integrates three systems: one mounted on the truc… ▽ More
Submitted 10 September, 2019; originally announced September 2019.
Comments: Paper presented at the 17th International Conference on System Theory, Control and Computing (ICSTCC 2013), Sinaia, Romania - 11-13 October 2013
Journal ref: Proceedings of the 7th International Conference on System Theory, Control and Computing (ICSTCC 2013)
-
Real-time stock analysis for blending recipes in industrial plants
Abstract: Many companies use Excel spreadsheets to keep stock records and to calculate process-specific data. These spreadsheets are often hard to understand and track. And if the user does not protect them, there is a risk that the user randomly changes or erase formulas. The paper focuses on the stocks of products used in a blending process with a known recipe. Developing an application that can bring thi… ▽ More
Submitted 29 August, 2019; originally announced September 2019.
Comments: Accepted for presentation at 23rd International Conference on System Theory, Control and Computing (ICSTCC 2019), October 9-11, 2019, Sinaia, Romania
-
IoT Forensic -- A digital investigation framework for IoT systems
Abstract: Security issues, threats, and attacks in relation with the IoT have been identified as promising and challenging area of research. Eventually, the need for a forensics methodology for investigating IoT-related crime is therefore essential. However, the IoT poses many challenges for forensics investigators. These include the wide range and variety of information, the unclear lines of differentiatio… ▽ More
Submitted 6 September, 2019; originally announced September 2019.
Comments: Paper presented at 10th International Conference on Electronics, Computers and Artificial Intelligence, , ECAI 2018 - 28-30 June 2018 - Iasi, Romania
Journal ref: 018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Iasi, Romania, 2018, pp. 1-4
-
arXiv:1903.05791 [pdf, ps, other]
Authentication by Witness Functions
Abstract: Witness functions have recently been introduced in cryptographic protocols' literature as a new powerful way to prove protocol correctness with respect to secrecy. In this paper, we extend them to the property of authentication. We show how to use them safely and we run an analysis on a modified version of the Woo-Lam protocol. We show that it is correct with respect to authentication.
Submitted 13 March, 2019; originally announced March 2019.
Comments: Published in: 2016 IEEE Trustcom/BigDataSE/ISPA
Journal ref: Trustcom/BigDataSE/ISPA 2016: 1990-1997
-
arXiv:1903.00499 [pdf, ps, other]
On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions
Abstract: In this paper, we show how practical the little theorem of witness functions is in detecting security flaws in some category of cryptographic protocols. We convey a formal analysis of the Needham-Schroeder symmetric-key protocol in the theory of witness functions. We show how it helps to teach about a security vulnerability in a given step of this protocol where the value of security of a particul… ▽ More
Submitted 1 March, 2019; originally announced March 2019.
Comments: Accepted at the 2019 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE) on March 1, 2019
-
Considerations regarding security issues impact on systems availability
Abstract: Control systems behavior can be analyzed taking into account a large number of parameters: performances, reliability, availability, security. Each control system presents various security vulnerabilities that affect in lower or higher measure its functioning. In this paper the authors present a method to assess the impact of security issues on the systems availability. A fuzzy model for estimating… ▽ More
Submitted 16 January, 2018; originally announced January 2018.
Comments: Paper accepted for 2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI 2016) Proceedings, Ploiesti, Romania
Journal ref: 2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)
-
Radiation Pattern Synthesis Using Hybrid Fourier- Woodward-Lawson-Neural Networks for Reliable MIMO Antenna Systems
Abstract: In this paper, we implement hybrid Woodward-Lawson-Neural Networks and weighted Fourier method to synthesize antenna arrays. The neural networks (NN) is applied here to simplify the modeling of MIMO antenna arrays by assessing phases. The main problem is obviously to find optimal weights of the linear antenna array elements giving radiation pattern with minimum sidelobe level (SLL) and hence ameli… ▽ More
Submitted 7 October, 2017; originally announced October 2017.
Comments: Accepted at the IEEE SMC 2017
-
arXiv:1707.09078 [pdf, ps, other]
Witness-Functions versus Interpretation-Functions for Secrecy in Cryptographic Protocols: What to Choose?
Abstract: Proving that a cryptographic protocol is correct for secrecy is a hard task. One of the strongest strategies to reach this goal is to show that it is increasing, which means that the security level of every single atomic message exchanged in the protocol, safely evaluated, never deceases. Recently, two families of functions have been proposed to measure the security level of atomic messages. The f… ▽ More
Submitted 27 July, 2017; originally announced July 2017.
Comments: Accepted at the IEEE SMC (6 two column pages) on 2017-07-10
-
arXiv:1707.07801 [pdf, ps, other]
Cryptographic Protocol for Multipart Missions Involving Two Independent and Distributed Decision Levels in a Military Context
Abstract: In several critical military missions, more than one decision level are involved. These decision levels are often independent and distributed, and sensitive pieces of information making up the military mission must be kept hidden from one level to another even if all of the decision levels cooperate to accomplish the same task. Usually, a mission is negotiated through insecure networks such as the… ▽ More
Submitted 27 July, 2017; v1 submitted 24 July, 2017; originally announced July 2017.
Comments: Accepted at the IEEE SMC'2017 on 2017-07-10 (6 double column pages)