期刊文献+
共找到75篇文章
< 1 2 4 >
每页显示 20 50 100
Temperature-Triggered Hardware Trojan Based Algebraic Fault Analysis of SKINNY-64-64 Lightweight Block Cipher
1
作者 Lei Zhu Jinyue Gong +1 位作者 Liang Dong Cong Zhang 《Computers, Materials & Continua》 SCIE EI 2023年第6期5521-5537,共17页
SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length,and it is mainly used on the Internet of Things(IoT).Currently,faults can be injected into cryptographic devices by attackers in a v... SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length,and it is mainly used on the Internet of Things(IoT).Currently,faults can be injected into cryptographic devices by attackers in a variety of ways,but it is still difficult to achieve a precisely located fault attacks at a low cost,whereas a Hardware Trojan(HT)can realize this.Temperature,as a physical quantity incidental to the operation of a cryptographic device,is easily overlooked.In this paper,a temperature-triggered HT(THT)is designed,which,when activated,causes a specific bit of the intermediate state of the SKINNY-64-64 to be flipped.Further,in this paper,a THT-based algebraic fault analysis(THT-AFA)method is proposed.To demonstrate the effectiveness of the method,experiments on algebraic fault analysis(AFA)and THT-AFA have been carried out on SKINNY-64-64.In the THT-AFA for SKINNY-64-64,it is only required to activate the THT 3 times to obtain the master key with a 100%success rate,and the average time for the attack is 64.57 s.However,when performing AFA on this cipher,we provide a relation-ship between the number of different faults and the residual entropy of the key.In comparison,our proposed THT-AFA method has better performance in terms of attack efficiency.To the best of our knowledge,this is the first HT attack on SKINNY-64-64. 展开更多
关键词 SKINNY-64-64 lightweight block cipher algebraic fault analysis Hardware Trojan residual entropy
下载PDF
Fault Analysis and Structure Optimization of Traveling Transmission System of Shuttle Car
2
作者 WANG Liang 《International Journal of Plant Engineering and Management》 2023年第1期1-11,共11页
This paper firstly introduces the common faults of traveling transmission system of shuttle car.Secondly,by analyzing the characteristics of shuttle car structure,the layout of traveling transmission system and the co... This paper firstly introduces the common faults of traveling transmission system of shuttle car.Secondly,by analyzing the characteristics of shuttle car structure,the layout of traveling transmission system and the common faults on shuttle car,this paper concludes that"internal holding torque"is the main cause of faults.Finally,this paper proposes a corresponding optimization design scheme to reduce the impact of"internal torque",and calculates the relevant results through the finite element simulation analysis method.Through these analyses and calculations,it is shown that the method can effectively reduce the probability of failure of traveling transmission system of shuttle car. 展开更多
关键词 shuttle car traveling transmission system fault analysis structure optimization
下载PDF
Formalization of Fault Analysis and a New Approach of Fault Detection
3
作者 王超 谷大武 祝力 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第3期301-306,共6页
Substitution permutation network (SPN) is one important structure of block cipher cryptosystems. Prior work has shown different fault analyses on SPN. The formalization of fault analysis of both attack and protect on ... Substitution permutation network (SPN) is one important structure of block cipher cryptosystems. Prior work has shown different fault analyses on SPN. The formalization of fault analysis of both attack and protect on SPN have been given. The overhead and time tolerance of fault detection have been discussed. The pseudo-blinding method to detect fault attack is introduced, and the balance of the security, overhead and time tolerance based on the evaluation could be made. 展开更多
关键词 fault analysis differential fault analysis (DFA) substitution permutation network (SPN) pseudo-blinding parity-based technique
下载PDF
An Effective Differential Fault Analysis on the Serpent Cryptosystem in the Internet of Things 被引量:1
4
作者 LI Wei TAO Zhi +4 位作者 GU Dawu SUN Li QU Bo LIU Zhiqiang LIU Ya 《China Communications》 SCIE CSCD 2014年第6期129-139,共11页
Due to the strong attacking ability, fast speed, simple implementation and other characteristics, differential fault analysis has become an important method to evaluate the security of cryptosystem in the Internet of ... Due to the strong attacking ability, fast speed, simple implementation and other characteristics, differential fault analysis has become an important method to evaluate the security of cryptosystem in the Internet of Things. As one of the AES finalists, the Serpent is a 128-bit Substitution-Permutation Network(SPN) cryptosystem. It has 32 rounds with the variable key length between 0 and 256 bits, which is flexible to provide security in the Internet of Things. On the basis of the byte-oriented model and the differential analysis, we propose an effective differential fault attack on the Serpent cryptosystem. Mathematical analysis and simulating experiment show that the attack could recover its secret key by introducing 48 faulty ciphertexts. The result in this study describes that the Serpent is vulnerable to differential fault analysis in detail. It will be beneficial to the analysis of the same type of other iterated cryptosystems. 展开更多
关键词 internet of things CRYPTanalysis differential fault analysis serpent.
下载PDF
Short-circuit fault analysis and isolation strategy for matrix converters
5
作者 王莉娜 L.De Lillo +2 位作者 C.Brunson L.Empringham P.Wheeler 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第9期3458-3470,共13页
The behavior of matrix converter(MC) drive systems under the condition of MC short-circuit faults is comprehensively investigated. Two isolation strategies using semiconductors and high speed fuses(HSFs) for MC short-... The behavior of matrix converter(MC) drive systems under the condition of MC short-circuit faults is comprehensively investigated. Two isolation strategies using semiconductors and high speed fuses(HSFs) for MC short-circuit faults are examined and their performances are compared. The behavior of MC drive systems during the fuse action time under different operating conditions is explored. The feasibility of fault-tolerant operation during the fuse action time is also studied. The basic selection laws for the HSFs and the requirements for the passive components of the MC drive system from the point view of short-circuit faults are also discussed. Simulation results are used to demonstrate the feasibility of the proposed isolation strategies. 展开更多
关键词 matrix converter short-circuit fault fault analysis fault behavior fault isolation
下载PDF
A Comprehensive Study of Algebraic Fault Analysis on PRINCE
6
作者 ZHANG Fan ZHAO Xinjie +3 位作者 GUO Shize SHEN Jizhong HUANG Jing HU Zijie 《China Communications》 SCIE CSCD 2015年第7期127-141,共15页
PRINCE is a 64-bit lightweight block cipher with a 128-bit key published at ASIACRYPT 2012. Assuming one nibble fault is injected, previous different fault analysis(DFA) on PRINCE adopted the technique from DFA on AES... PRINCE is a 64-bit lightweight block cipher with a 128-bit key published at ASIACRYPT 2012. Assuming one nibble fault is injected, previous different fault analysis(DFA) on PRINCE adopted the technique from DFA on AES and current results are different. This paper aims to make a comprehensive study of algebraic fault analysis(AFA) on PRINCE. How to build the equations for PRINCE and faults are explained. Extensive experiments are conducted. Under nibble-based fault model, AFA with three or four fault injections can succeed within 300 seconds with a very high probability. Under other fault models such as byte-based, half word-based, word-based fault models, the faults become overlapped in the last round and previous DFAs are difficult to work. Our results show that AFA can still succeed to recover the full master key. To evaluate security of PRINCE against fault attacks, we utilize AFA to calculate the reduced entropy of the secret key for given amount of fault injections. The results can interpret and compare the efficiency of previous work. Under nibble-based fault model, the master key of PRINCE can be reduced to 29.69 and 236.10 with 3 and 2 fault injections on average, respectively. 展开更多
关键词 algebraic fault analysis PRINCE Crypto Mini SAT
下载PDF
An Improved Differential Fault Analysis on Block Cipher KLEIN-64
7
作者 Min Long Man Kong +1 位作者 Sai Long Xiang Zhang 《Computers, Materials & Continua》 SCIE EI 2020年第11期1425-1436,共12页
KLEIN-64 is a lightweight block cipher designed for resource-constrained environment,and it has advantages in software performance and hardware implementation.Recent investigation shows that KLEIN-64 is vulnerable to ... KLEIN-64 is a lightweight block cipher designed for resource-constrained environment,and it has advantages in software performance and hardware implementation.Recent investigation shows that KLEIN-64 is vulnerable to differential fault attack(DFA).In this paper,an improved DFA is performed to KLEIN-64.It is found that the differential propagation path and the distribution of the S-box can be fully utilized to distinguish the correct and wrong keys when a half-byte fault is injected in the 10th round.By analyzing the difference matrix before the last round of S-box,the location of fault injection can be limited to a small range.Thus,this improved analysis can greatly improve the attack efficiency.For the best case,the scale of brute-force attack is only 256.While for the worst case,the scale of brute-force attack is far less than 232 with another half byte fault injection,and the probability for this case is 1/64.Furthermore,the measures for KLEIN-64 in resisting the improved DFA are proposed. 展开更多
关键词 Block cipher KLEIN-64 differential fault analysis half-byte fault injection
下载PDF
Fault Analysis of 10-kV Switch Cabinet
8
《Electricity》 2013年第1期36-39,共4页
Considering the actual operating experience of the Daode Wind Farm, this paper analyzes the rea-sons for the fault of the lO-kV switch cabinet. Some technical improvements and management measures, such as implementing... Considering the actual operating experience of the Daode Wind Farm, this paper analyzes the rea-sons for the fault of the lO-kV switch cabinet. Some technical improvements and management measures, such as implementing the anti-accident technical measures, improving the installation and debugging level, and strengthening operation inspection, are proposed. 展开更多
关键词 10-kV switch cabinet fault analysis anti-accident measures
下载PDF
Fault Analysis and Innovation in Slag Discharge System of 440-t/h CFB Boiler
9
作者 Xu Qisheng and Song Jinghui Guangdong Electric Power Test and Research Institute Wang Ningling 《Electricity》 2009年第1期34-37,共4页
CFB boilers have been widely used in China in recent years with their perfect performances in coal adaptability, load variation capability and lower pollutant emission. The No.3 135-MW CFB unit in Lianzhou Power Plant... CFB boilers have been widely used in China in recent years with their perfect performances in coal adaptability, load variation capability and lower pollutant emission. The No.3 135-MW CFB unit in Lianzhou Power Plant is the f irst 440-t/h series CFB unit in Guangdong Province. It f inished 72-hour trial operation in Feb. 2004 and was transferred to trial operation. During the trial operation and the next commercial operation, there were some problems happened in the boiler slag discharging system, seriously affecting the safe and reliable operation and the loading capability. After innovation, these problems have been completely solved. Hopefully the solutions may be used for reference to the units with similar problems. 展开更多
关键词 CFB fault analysis and Innovation in Slag Discharge System of 440-t/h CFB Boiler INNOVATION
下载PDF
Power System Modelling and Fault Analysis of NamPower's 330 kV HVAC Transmission Line
10
作者 Innocent Davidson Immanuel Mbangula 《Journal of Energy and Power Engineering》 2014年第8期1432-1442,共11页
Electric power systems usually cover large geographical areas and transmission facilities are continuously increasing. These power systems are exposed to different environmental conditions which may cause faults to oc... Electric power systems usually cover large geographical areas and transmission facilities are continuously increasing. These power systems are exposed to different environmental conditions which may cause faults to occur on the system. Different types of studies are usually done on electric power systems to determine how the system behaves before, during and after a fault condition. The behaviour of variables of interest such as currents, voltage, rotor angle and active and reactive power under fault conditions are studied and observed to help determine possible causes of faults in a power system. The objective of this paper is to investigate a fault that occurred on the 330 kV transmission line between Ruacana power station and Omburu sub-station, the fault caused all the generators at Ruacana power station to trip and consequently caused a blackout at the power station that lasted for 6 h. Preliminary findings showed that the observed fault was an earth fault but the exact type of earth fault was however not known at the time. This research investigation sets out to determine the exact fault that occurred; the most probable cause of the fault, and propose possible solutions to prevent reoccurrence of such a fault. The section of the power network in which the fault occurred was modelled using DigSilent Power Factory software tool, and transient fault analysis was carried out on the model for different fault conditions. Results obtained were then compared with data obtained from NamPower records to ascertain the type of fault. 展开更多
关键词 fault analysis power system transient stability
下载PDF
Fault Analysis on AES:A Property-Based Verification Perspective
11
作者 Xiaojie Dai Xingxin Wang +2 位作者 Xue Qu Baolei Mao Wei Hu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2024年第2期576-588,共13页
Fault analysis is a frequently used side-channel attack for cryptanalysis.However,existing fault attack methods usually involve complex fault fusion analysis or computation-intensive statistical analysis of massive fa... Fault analysis is a frequently used side-channel attack for cryptanalysis.However,existing fault attack methods usually involve complex fault fusion analysis or computation-intensive statistical analysis of massive fault traces.In this work,we take a property-based formal verification approach to fault analysis.We derive fine-grained formal models for automatic fault propagation and fusion,which establish a mathematical foundation for precise measurement and formal reasoning of fault effects.We extract the correlations in fault effects in order to create properties for fault verification.We further propose a method for key recovery,by formally checking when the extracted properties can be satisfied with partial keys as the search variables.Experimental results using both unprotected and masked advanced encryption standard(AES)implementations show that our method has a key search complexity of 216,which only requires two correct and faulty ciphertext pairs to determine the secret key,and does not assume knowledge about fault location or pattern. 展开更多
关键词 side-channel attack fault analysis fault propagation model property extraction fault verification
原文传递
Conjugate Vectors Method Applied to Asymmetrical Fault Analysis of Power Electronized Power Systems
12
作者 Yingbiao Li Xing Liu +2 位作者 Jiabing Hu Jianhang Zhu Jianbo Guo 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2024年第4期1536-1549,共14页
With the wide application of power electronized resources(PERs),the amplitude and frequency of voltages show significant time-varying characteristics under asymmetrical faults.As a result,the traditional phasor model,... With the wide application of power electronized resources(PERs),the amplitude and frequency of voltages show significant time-varying characteristics under asymmetrical faults.As a result,the traditional phasor model,impedance model,and symmetrical components method based on the constant amplitude and frequency of voltages are facing great challenges.Hence,a novel asymmetrical fault analysis method based on conjugate vectors is proposed in this paper which can meet the modeling and analysis requirements of the network excited by voltages with time-varying amplitude/frequency.Furthermore,asymmetrical fault characteristics are extracted.As an application,a faulted phase identification(FPI)strategy is proposed based on the fault characteristics.The correctness and superiority of the asymmetrical fault analysis method and FPI strategy are verified in time-domain simulations and a real-time digital simulator. 展开更多
关键词 Asymmetrical fault characteristics conjugate vectors method dynamic asymmetrical fault analysis time-varying amplitude/frequency
原文传递
The differential fault analysis on block cipher FeW
13
作者 Haiyan Xiao Lifang Wang Jinyong Chang 《Cybersecurity》 EI CSCD 2023年第2期62-74,共13页
Feather weight(FeW)cipher is a lightweight block cipher proposed by Kumar et al.in 2019,which takes 64 bits plaintext as input and produces 64 bits ciphertext.As Kumar et al.said,FeW is a software oriented design with... Feather weight(FeW)cipher is a lightweight block cipher proposed by Kumar et al.in 2019,which takes 64 bits plaintext as input and produces 64 bits ciphertext.As Kumar et al.said,FeW is a software oriented design with the aim of achieving high efficiency in software based environments.It seems that FeW is immune to many cryptographic attacks,like linear,impossible differential,differential and zero correlation attacks.However,in recent work,Xie et al.reassessed the security of FeW.More precisely,they proved that under the differential fault analysis(DFA)on the encryption states,an attacker can completely recover the master secret key.In this paper,we revisit the block cipher FeW and consider the DFA on its key schedule algorithm,which is rather popular cryptanalysis for kinds of block ciphers.In particular,by respectively injected faults into the 30th and 29th round subkeys,one can recover about 55/80~69%bits of master key.Then the brute force searching remaining bits,one can obtain the full master secret key.The simulations and experiment results show that our analysis is practical. 展开更多
关键词 Differential fault analysis Block cipher FEW Side channel attack
原文传递
Analysis and Treatment of Faults in the Operation of Rainfall Sensors in Automatic Weather Stations
14
作者 Qichao TANG Yuan LIU +1 位作者 Yiping LIN Weibiao ZHANG 《Meteorological and Environmental Research》 CAS 2023年第2期1-3,共3页
Based on the structure and working principle of rain sensors in new automatic weather stations,according to the abnormal precipitation records found in the observation business,the possible faults of rain sensors were... Based on the structure and working principle of rain sensors in new automatic weather stations,according to the abnormal precipitation records found in the observation business,the possible faults of rain sensors were analyzed,and treatment methods were discussed. Daily maintenance and management measures were put forward to ensure the normal operation of rain sensors and improve the quality of surface meteorological observation business. 展开更多
关键词 Rainfall sensor fault analysis Treatment Automatic weather station
下载PDF
Milling Fault Detection Method Based on Fault Tree Analysis and Hierarchical Belief Rule Base
15
作者 Xiaoyu Cheng Mingxian Long +1 位作者 Wei He Hailong Zhu 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期2821-2844,共24页
Expert knowledge is the key to modeling milling fault detection systems based on the belief rule base.The construction of an initial expert knowledge base seriously affects the accuracy and interpretability of the mil... Expert knowledge is the key to modeling milling fault detection systems based on the belief rule base.The construction of an initial expert knowledge base seriously affects the accuracy and interpretability of the milling fault detection model.However,due to the complexity of the milling system structure and the uncertainty of the milling failure index,it is often impossible to construct model expert knowledge effectively.Therefore,a milling system fault detection method based on fault tree analysis and hierarchical BRB(FTBRB)is proposed.Firstly,the proposed method uses a fault tree and hierarchical BRB modeling.Through fault tree analysis(FTA),the logical correspondence between FTA and BRB is sorted out.This can effectively embed the FTA mechanism into the BRB expert knowledge base.The hierarchical BRB model is used to solve the problem of excessive indexes and avoid combinatorial explosion.Secondly,evidence reasoning(ER)is used to ensure the transparency of the model reasoning process.Thirdly,the projection covariance matrix adaptation evolutionary strategies(P-CMA-ES)is used to optimize the model.Finally,this paper verifies the validity model and the method’s feasibility techniques for milling data sets. 展开更多
关键词 fault detection milling system belief rule base fault tree analysis evidence reasoning
下载PDF
DC fault analysis for modular multilevel converter-based system 被引量:36
16
作者 Bin LI Jiawei HE +2 位作者 Jie TIAN Yadong FENG Yunlong DONG 《Journal of Modern Power Systems and Clean Energy》 SCIE EI 2017年第2期275-282,共8页
DC fault protection is the key technique for the development of the DC distribution and transmission system. This paper analyzes the transient characteristics of DC faults in a modular multilevel converter(MMC) based ... DC fault protection is the key technique for the development of the DC distribution and transmission system. This paper analyzes the transient characteristics of DC faults in a modular multilevel converter(MMC) based DC system combining with the numerical method. Meanwhile,lots of simulation tests based on MATLAB/Simulink are carried out to verify the correctness of the theoretical analysis. Finally, the technological difficulties of and requirements for the protection and isolation are discussed to provide the theoretical foundation for the design of dc fault protection strategy. 展开更多
关键词 DC system DC fault analysis DC fault protection Modular multilevel converter
原文传递
Robust fault analysis in transmission lines using Synchrophasor measurements 被引量:3
17
作者 Rajaraman P. Sundaravaradan N.A. +2 位作者 Mallikarjuna B. Jaya Bharata Reddy M. Mohanta D.K. 《Protection and Control of Modern Power Systems》 2018年第1期108-120,共13页
As more electric utilities and transmission system operators move toward the smart grid concept,robust fault analysis has become increasingly complex.This paper proposes a methodology for the detection,classification,... As more electric utilities and transmission system operators move toward the smart grid concept,robust fault analysis has become increasingly complex.This paper proposes a methodology for the detection,classification,and localization of transmission line faults using Synchrophasor measurements.The technique involves the extraction of phasors from the instantaneous three-phase voltages and currents at each bus in the system which are then decomposed into their symmetrical components.These components are sent to the phasor data concentrator(PDC)for real-time fault analysis,which is completed within 2–3 cycles after fault inception.The advantages of this technique are its accuracy and speed,so that fault information may be appropriately communicated to facilitate system restoration.The proposed algorithm is independent of the transmission system topology and displays high accuracy in its results,even with varying parameters such as fault distance,fault inception angle and fault impedance.The proposed algorithm is validated using a three-bus system as well as the Western System Coordinating Council(WSCC)nine bus system.The proposed algorithm is shown to accurately detect the faulted line and classify the fault in all the test cases presented. 展开更多
关键词 Transmission line faults fault analysis Phasor measurement units Symmetrical components
原文传递
A SIMULATED ANNEALING METHOD FOR FAULT TREE ANALYSIS
18
作者 刘子先 何桢 贾湖 《Transactions of Tianjin University》 EI CAS 1997年第2期113-116,共4页
This paper presents an approximate algorithm based on simulated annealing to achieve the maximum probability of the minimal cut sets for a fault tree. Near optimal minimal cut sets and important sequence of the basic ... This paper presents an approximate algorithm based on simulated annealing to achieve the maximum probability of the minimal cut sets for a fault tree. Near optimal minimal cut sets and important sequence of the basic events are also solved by the method. Computer simulations show that the algorithm performs very well. 展开更多
关键词 fault tree analysis minimal cut set simulated annealing probability of the minimal cut set
下载PDF
Fault Tree Analysis:Investigation of Epidemic Hemorrhagic Fever Infection Acquired in Animal Laboratories in China 被引量:4
19
作者 LIU Xiao Yu XUE Kang Ning +1 位作者 RONG Rong ZHAO Chi Hong 《Biomedical and Environmental Sciences》 SCIE CAS CSCD 2016年第9期690-695,共6页
Epidemic hemorrhagic fever has been an ongoing threat to laboratory personnel involved in animal care and use. Laboratory transmissions and severe infections occurred over the past twenty years, even though the standa... Epidemic hemorrhagic fever has been an ongoing threat to laboratory personnel involved in animal care and use. Laboratory transmissions and severe infections occurred over the past twenty years, even though the standards and regulations for laboratory biosafety have been issued, upgraded, and implemented in China. Therefore, there is an urgent need to identify risk factors and to seek effective preventive measures that can curb the incidences of epidemic hemorrhagic fever among laboratory personnel. In the present study, we reviewed literature that relevant to animals laboratory-acquired hemorrhagic fever infections reported from 1995 to 2015, and analyzed these incidences using fault tree analysis (FTA). 展开更多
关键词 fault Tree analysis
下载PDF
HYBRID WAVELET PACKET-TEAGER ENERGY OPERATOR ANALYSIS AND ITS APPLICATION FOR GEARBOX FAULT DIAGNOSIS 被引量:6
20
作者 LIU Xiaofeng QIN Shuren BO Lin 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2007年第6期79-83,共5页
Based on wavelet packet decomposition (WPD) algorithm and Teager energy operator (TEO), a novel gearbox fault detection and diagnosis method is proposed. Its process is expatiated after the principles of WPD and T... Based on wavelet packet decomposition (WPD) algorithm and Teager energy operator (TEO), a novel gearbox fault detection and diagnosis method is proposed. Its process is expatiated after the principles of WPD and TEO modulation are introduced respectively. The preprocessed sigaaal is interpolated with the cubic spline function, then expanded over the selected basis wavelets. Grouping its wavelet packet components of the signal based on the minimum entropy criterion, the interpolated signal can be decomposed into its dominant components with nearly distinct fault frequency contents. To extract the demodulation information of each dominant component, TEO is used. The performance of the proposed method is assessed by means of several tests on vibration signals collected from the gearbox mounted on a heavy truck. It is proved that hybrid WPD-TEO method is effective and robust for detecting and diagnosing localized gearbox faults. 展开更多
关键词 Wavelet packet Teager energy operator fault diagnosis Demodulation analysis
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部