Dear editor,This letter presents a practical industrial process identification scheme.More specifically,to improve the identification accuracy of practical process,a decoupled identification scheme is developed based ...Dear editor,This letter presents a practical industrial process identification scheme.More specifically,to improve the identification accuracy of practical process,a decoupled identification scheme is developed based on neural fuzzy network and autoregressive exogenous(ARX)model,which is based on multi-signal sources.The multiple signal sources include binary signals and random signals.Experimental results of pH neutralization process show that developed identification scheme can provide accurate identification accuracy.展开更多
The lightweight encryption algorithm based on Add-Rotation-XOR(ARX)operation has attracted much attention due to its high software affinity and fast operation speed.However,lacking an effective defense scheme for phys...The lightweight encryption algorithm based on Add-Rotation-XOR(ARX)operation has attracted much attention due to its high software affinity and fast operation speed.However,lacking an effective defense scheme for physical attacks limits the applications of the ARX algorithm.The critical challenge is how to weaken the direct dependence between the physical information and the secret key of the algorithm at a low cost.This study attempts to explore how to improve its physical security in practical application scenarios by analyzing the masking countermeasures of ARX algorithms and the leakage causes.Firstly,we specify a hierarchical security framework by quantitatively evaluating the indicators based on side-channel attacks.Then,optimize the masking algorithm to achieve a trade-off balance by leveraging the software-based local masking strategies and non-full-round masking strategies.Finally,refactor the assembly instruction to improve the leaks by exploring the leakage cause at assembly instruction.To illustrate the feasibility of the proposed scheme,we further conducted a case study by designing a software-based masking method for Chaskey.The experimental results show that the proposed method can effectively weaken the impact of physical attacks.展开更多
随着大型电网之间联系更加紧密,通过长距离线路进行的不同区域间电力传输的功率明显增加,使低频振荡的发生越来越频繁,这一直是限制电力传输能力甚至威胁整个电力系统安全的关键问题。一直以来,电力系统稳定器(Power System Stabilizer,...随着大型电网之间联系更加紧密,通过长距离线路进行的不同区域间电力传输的功率明显增加,使低频振荡的发生越来越频繁,这一直是限制电力传输能力甚至威胁整个电力系统安全的关键问题。一直以来,电力系统稳定器(Power System Stabilizer,PSS)广泛地应用于低频振荡的抑制中[1]。展开更多
基金the National Natural Science Foundation of China(62003151)the Natural Science Foundation of Jiangsu Province(BK20191035)the Changzhou Sci&Tech Program(CJ20220065)。
文摘Dear editor,This letter presents a practical industrial process identification scheme.More specifically,to improve the identification accuracy of practical process,a decoupled identification scheme is developed based on neural fuzzy network and autoregressive exogenous(ARX)model,which is based on multi-signal sources.The multiple signal sources include binary signals and random signals.Experimental results of pH neutralization process show that developed identification scheme can provide accurate identification accuracy.
基金This work was partially supported by the Natural Science Foundation of Jiangsu Province under Grant No.BK20201462partially supported by the Scientific Research Support Project of Jiangsu Normal University under Grant No.21XSRX001.
文摘The lightweight encryption algorithm based on Add-Rotation-XOR(ARX)operation has attracted much attention due to its high software affinity and fast operation speed.However,lacking an effective defense scheme for physical attacks limits the applications of the ARX algorithm.The critical challenge is how to weaken the direct dependence between the physical information and the secret key of the algorithm at a low cost.This study attempts to explore how to improve its physical security in practical application scenarios by analyzing the masking countermeasures of ARX algorithms and the leakage causes.Firstly,we specify a hierarchical security framework by quantitatively evaluating the indicators based on side-channel attacks.Then,optimize the masking algorithm to achieve a trade-off balance by leveraging the software-based local masking strategies and non-full-round masking strategies.Finally,refactor the assembly instruction to improve the leaks by exploring the leakage cause at assembly instruction.To illustrate the feasibility of the proposed scheme,we further conducted a case study by designing a software-based masking method for Chaskey.The experimental results show that the proposed method can effectively weaken the impact of physical attacks.