期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Lightweight Authentication Protocol Based on Physical Unclonable Function
1
作者 Hanguang Luo Tao Zou +3 位作者 Chunming Wu Dan li shunbin li Chu Chu 《Computers, Materials & Continua》 SCIE EI 2022年第9期5031-5040,共10页
In the emerging Industrial Internet of Things(IIoT),authentication problems have become an urgent issue for massive resource-constrained devices because traditional costly security mechanisms are not suitable for them... In the emerging Industrial Internet of Things(IIoT),authentication problems have become an urgent issue for massive resource-constrained devices because traditional costly security mechanisms are not suitable for them.The security protocol designed for resource-constrained systems should not only be secure but also efficient in terms of usage of energy,storage,and processing.Although recently many lightweight schemes have been proposed,to the best of our knowledge,they are unable to address the problem of privacy preservation with the resistance of Denial of Service(DoS)attacks in a practical way.In this paper,we propose a lightweight authentication protocol based on the Physically Unclonable Function(PUF)to overcome the limitations of existing schemes.The protocol provides an ingenious authentication and synchronization mechanism to solve the contradictions amount forward secrecy,DoS attacks,and resource-constrained.The performance analysis and comparison show that the proposed scheme can better improve the authentication security and efficiency for resource-constrained systems in IIoT. 展开更多
关键词 LIGHTWEIGHT AUTHENTICATION physically unclonable functions
下载PDF
Research on the Key Techniques of TCP Protocol Normalization for Mimic Defense Architecture
2
作者 Mingxing Zhu Yansong Wang +4 位作者 Ruyun Zhang Tianning Zhang Heyuan li Hanguang Luo shunbin li 《Journal on Internet of Things》 2021年第3期99-107,共9页
The Mimic Defense(MD)is an endogenous security technology with the core technique of Dynamic Heterogeneous Redundancy(DHR)architecture.It can effectively resist unknown vulnerabilities,backdoors,and other security thr... The Mimic Defense(MD)is an endogenous security technology with the core technique of Dynamic Heterogeneous Redundancy(DHR)architecture.It can effectively resist unknown vulnerabilities,backdoors,and other security threats by schedule strategy,negative feedback control,and other mechanisms.To solve the problem that Cyber Mimic Defense devices difficulty of supporting the TCP protocol.This paper proposes a TCP protocol normalization scheme for DHR architecture.Theoretical analysis and experimental results show that this scheme can realize the support of DHR-based network devices to TCP protocol without affecting the security of mimicry defense architecture. 展开更多
关键词 Mimic defense TCP protocol NORMALIZATION
下载PDF
从SoC到SDSoW:微电子发展的新范式
3
作者 邬江兴 刘勤让 +23 位作者 沈剑良 吕平 宋克 张帆 李沛杰 陈艇 刘冬培 张汝云 李顺斌 高彦钊 魏帅 张文建 赵博 郭威 虎艳宾 祁晓峰 董春雷 于洪 张丽 张霞 裴雪 赵豪兵 李智超 刘文斌 《中国科学:信息科学》 CSCD 北大核心 2024年第6期1350-1368,共19页
微电子在智能时代正迎来新一轮技术与产业的重大变革期.本文从智能时代的科学方法论、系统集成的工程技术路线和微电子摩尔定律(Moore’s law)的维度扩展3个层面导入,提出了网络极大化节点极小化的复杂巨系统构造、异构异质芯粒的晶上... 微电子在智能时代正迎来新一轮技术与产业的重大变革期.本文从智能时代的科学方法论、系统集成的工程技术路线和微电子摩尔定律(Moore’s law)的维度扩展3个层面导入,提出了网络极大化节点极小化的复杂巨系统构造、异构异质芯粒的晶上拼装集成、硬件资源的领域专用软硬件协同定义,形成了软件定义晶上系统的新发展范式,对微电子的设计方法、系统集成、应用开发、经济性指标等进行了内涵升级,可全面刷新信息基础设施的技术物理形态,贡献一条“晶圆级硅基直连”的系统集成工程技术路线,并有望打造出智能涌现的物理底座. 展开更多
关键词 片上系统 软件定义互连 软件定义晶上系统 异质异构 热压键合 软硬件协同
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部