Showing 1–2 of 2 results for author: N, A K
-
FFT and Linear Convolution Implementation with Bit Slicing Multiplier: A Novel Approach
Authors:
Aravind Kumar N,
Hari Krishna S,
Anita Angeline A
Abstract:
This paper presents a comprehensive exploration of Fast Fourier Transform (FFT) and linear convolution implementations, integrating both conventional methods and novel approaches leveraging the Bit Slicing Multiplier (BSM) technique. The Bit Slicing Multiplier utilizes Look-Up Tables (LUTs) to execute bitwise operations in parallel, offering efficient arithmetic operations ideally suited for digit…
▽ More
This paper presents a comprehensive exploration of Fast Fourier Transform (FFT) and linear convolution implementations, integrating both conventional methods and novel approaches leveraging the Bit Slicing Multiplier (BSM) technique. The Bit Slicing Multiplier utilizes Look-Up Tables (LUTs) to execute bitwise operations in parallel, offering efficient arithmetic operations ideally suited for digital signal processing tasks. We extensively investigate the integration of BSM into FFT and linear convolution algorithms, emphasizing its advantages in terms of speed and resource utilization. Additionally, we introduce our own innovative ideas for FFT and convolution algorithms, contributing to the broader discourse on efficient signal processing techniques. Experimental validation of our implementations is conducted using Vivado, a leading FPGA synthesis and implementation tool. Comparative analysis demonstrates the superior performance of our BSM-enhanced approaches, showcasing their potential for real-time signal processing applications. This study not only advances the understanding of FFT and convolution implementations but also highlights the effectiveness of novel techniques like BSM in enhancing computational efficiency in FPGA-based systems.
△ Less
Submitted 25 April, 2024;
originally announced July 2024.
-
Formal Synthesis of Monitoring and Detection Systems for Secure CPS Implementations
Authors:
Ipsita Koley,
Saurav Kumar Ghosh,
Soumyajit Dey,
Debdeep Mukhopadhyay,
Amogh Kashyap K N,
Sachin Kumar Singh,
Lavanya Lokesh,
Jithin Nalu Purakkal,
Nishant Sinha
Abstract:
We consider the problem of securing a given control loop implementation of a cyber-physical system (CPS) in the presence of Man-in-the-Middle attacks on data exchange between plant and controller over a compromised network. To this end, there exist various detection schemes that provide mathematical guarantees against such attacks for the theoretical control model. However, such guarantees may not…
▽ More
We consider the problem of securing a given control loop implementation of a cyber-physical system (CPS) in the presence of Man-in-the-Middle attacks on data exchange between plant and controller over a compromised network. To this end, there exist various detection schemes that provide mathematical guarantees against such attacks for the theoretical control model. However, such guarantees may not hold for the actual control software implementation. In this article, we propose a formal approach towards synthesizing attack detectors with varying thresholds which can prevent performance degrading stealthy attacks while minimizing false alarms.
△ Less
Submitted 27 February, 2020;
originally announced February 2020.