Since the end of the 1990s,cryptosystems implemented on smart cards have had to deal with two main categories of attacks:side-channel attacks and fault injection attacks.Countermeasures have been developed and validat...Since the end of the 1990s,cryptosystems implemented on smart cards have had to deal with two main categories of attacks:side-channel attacks and fault injection attacks.Countermeasures have been developed and validated against these two types of attacks,taking into account a well-defined attacker model.This work focuses on small vulnerabilities and countermeasures related to the Elliptic Curve Digital Signature Algorithm(ECDSA)algorithm.The work done in this paper focuses on protecting the ECDSA algorithm against fault-injection attacks.More precisely,we are interested in the countermeasures of scalar multiplication in the body of the elliptic curves to protect against attacks concerning only a few bits of secret may be sufficient to recover the private key.ECDSA can be implemented in different ways,in software or via dedicated hardware or a mix of both.Many different architectures are therefore possible to implement an ECDSA-based system.For this reason,this work focuses mainly on the hardware implementation of the digital signature ECDSA.In addition,the proposed ECDSA architecture with and without fault detection for the scalar multiplication have been implemented on Xilinxfield programmable gate arrays(FPGA)platform(Virtex-5).Our implementation results have been compared and discussed.Our area,frequency,area overhead and frequency degradation have been compared and it is shown that the proposed architecture of ECDSA with fault detection for the scalar multiplication allows a trade-off between the hardware overhead and the security of the ECDSA.展开更多
The rapid expansion of Internet of Things(IoT)devices deploys various sensors in different applications like homes,cities and offices.IoT applications depend upon the accuracy of sensor data.So,it is necessary to pred...The rapid expansion of Internet of Things(IoT)devices deploys various sensors in different applications like homes,cities and offices.IoT applications depend upon the accuracy of sensor data.So,it is necessary to predict faults in the sensor and isolate their cause.A novel primitive technique named fall curve is presented in this paper which characterizes sensor faults.This technique identifies the faulty sensor and determines the correct working of the sensor.Different sources of sensor faults are explained in detail whereas various faults that occurred in sensor nodes available in IoT devices are also presented in tabular form.Fault prediction in digital and analog sensors along with methods of sensor fault prediction are described.There are several advantages and disadvantages of sensor fault prediction methods and the fall curve technique.So,some solutions are provided to overcome the limitations of the fall curve technique.In this paper,a bibliometric analysis is carried out to visually analyze 63 papers fetched from the Scopus database for the past five years.Its novelty is to predict a fault before its occurrence by looking at the fall curve.The sensing of current flow in devices is important to prevent a major loss.So,the fall curves of ACS712 current sensors configured on different devices are drawn for predicting faulty or non-faulty devices.The analysis result proved that if any of the current sensors gets faulty,then the fall curve will differ and the value will immediately drop to zero.Various evaluation metrics for fault prediction are also described in this paper.At last,this paper also addresses some possible open research issues which are important to deal with false IoT sensor data.展开更多
To solve the problems of a few optical fibre line fault samples and the inefficiency of manual communication optical fibre fault diagnosis,this paper proposes a communication optical fibre fault diagnosis model based ...To solve the problems of a few optical fibre line fault samples and the inefficiency of manual communication optical fibre fault diagnosis,this paper proposes a communication optical fibre fault diagnosis model based on variational modal decomposition(VMD),fuzzy entropy(FE)and fuzzy clustering(FC).Firstly,based on the OTDR curve data collected in the field,VMD is used to extract the different modal components(IMF)of the original signal and calculate the fuzzy entropy(FE)values of different components to characterize the subtle differences between them.The fuzzy entropy of each curve is used as the feature vector,which in turn constructs the communication optical fibre feature vector matrix,and the fuzzy clustering algorithm is used to achieve fault diagnosis of faulty optical fibre.The VMD-FE combination can extract subtle differences in features,and the fuzzy clustering algorithm does not require sample training.The experimental results show that the model in this paper has high accuracy and is relevant to the maintenance of communication optical fibre when compared with existing feature extraction models and traditional machine learning models.展开更多
Aiming at the problems of low accuracy,long time consumption,and failure to obtain quantita-tive fault identification results of existing automatic fault identification technic,a fault recognition method based on clus...Aiming at the problems of low accuracy,long time consumption,and failure to obtain quantita-tive fault identification results of existing automatic fault identification technic,a fault recognition method based on clustering linear regression is proposed.Firstly,Hough transform is used to detect the line segment of the enhanced image obtained by the coherence cube algorithm.Secondly,the endpoint of the line segment detected by Hough transform is taken as the key point,and the adaptive clustering linear regression algorithm is used to cluster the key points adaptively according to the lin-ear relationship between them.Finally,a fault is generated from each category of key points based on least squares curve fitting method to realize fault identification.To verify the feasibility and pro-gressiveness of the proposed method,it is compared with the traditional method and the latest meth-od on the actual seismic data through experiments,and the effectiveness of the proposed method is verified by the experimental results on the actual seismic data.展开更多
A P and S wave velocity model is obtained for the crust in the region along the Longmenshan fault zone, Sichuan Province, China, by using data from a refraction profiling survey carried out in this region and those fr...A P and S wave velocity model is obtained for the crust in the region along the Longmenshan fault zone, Sichuan Province, China, by using data from a refraction profiling survey carried out in this region and those from local earthquakes. 202 local earthquakes along the fault zone are based on this velocity model, location errors being estimated to be about 1.5 km. The present relocations fairly improved the accuracy of hypocenter locations for earthquakes in this area, which is recognized from small scatter of data in the arrival time distance diagram compared with that for the original locations in the Earthquake Catalogue of Sichuan Seismic Network. The obtained hypocenter distribution shows that shallow earthquakes, confined to the upper crust in the depth range from 3 km to 22 km, are actively occurring along the main fault of the Longmenshan fault zone. The velocity model and the location method are presently used quite effective for precisely locating local earthquakes such as those in Sichuan Province. Installation of these with the real time processing system developed by Tohoku University in the Sichuan Telemetered Seismic Network would help to improve the location accuracy of events beneath the network.展开更多
This paper proposes the concept of projection curves based on the theory of CT image reconstruction to probe the internal structure of the working panel prior to formal mining of the working panel.As well as reducing ...This paper proposes the concept of projection curves based on the theory of CT image reconstruction to probe the internal structure of the working panel prior to formal mining of the working panel.As well as reducing costs,this method provides safe and efficient excavation of the working panel.According to the results of the numerical model and the actual working panel,the new method has been proven to be accurate in detecting the location of the fault that extends into the face.Concealed faults of the internal working panel,as well as the start and end points of the fault,can be detected by this method.Engineering practice has proven that the method is highly reliable,has a highly decisive impact on faults for coal mining,and can be used to guide the safe mining of the working panel.展开更多
An integrated fault tolerant approach for data encryption and digitalsignature based on elliptic curve cryptography is proposed. Phis approach allows the receiver toverify the sender's identity and can simultaneou...An integrated fault tolerant approach for data encryption and digitalsignature based on elliptic curve cryptography is proposed. Phis approach allows the receiver toverify the sender's identity and can simultaneously deal with error detection and data correction.Up to three errors in our approach can be detected and corrected. This approach has at least thesame security as that based on RSA system, but smaller keys to achieve the same level of security.Our approach is more efficient than the known ones and more suited for limited environments likepersonal digital assistants (PDAs), mobile phones and smart cards without RSA co-processors.展开更多
The design procedure is made for a mine shaft where permanent underground facilities are interconnected. The highly faulted grounds were identified using empirical and semi-empirical theories. Furthermore, the behavio...The design procedure is made for a mine shaft where permanent underground facilities are interconnected. The highly faulted grounds were identified using empirical and semi-empirical theories. Furthermore, the behavior types are presented. This paper presents excavation and support methods in such ground conditions and the calculations results show that the installation of the yielding elements have an effect on support elements and prevent shotcrete damage during the curing stage. Different numerical analyses carried out showed that, with the yielding elements installed, the total displacements increase but the final axial force reduces, and therefore, the characteristic compressive strength of shotcrete is not exceeded. The calculation results of ground loads and displacements on the designed support system are presented with a 3D numerical geo-mechanical model adopted for highly faulted ground surrounding deeper complex underground structures.展开更多
基金The funding was provided by the Deanship of Scientific Research at King Khalid University through Research Group Project[grant number RGP.1/157/42].
文摘Since the end of the 1990s,cryptosystems implemented on smart cards have had to deal with two main categories of attacks:side-channel attacks and fault injection attacks.Countermeasures have been developed and validated against these two types of attacks,taking into account a well-defined attacker model.This work focuses on small vulnerabilities and countermeasures related to the Elliptic Curve Digital Signature Algorithm(ECDSA)algorithm.The work done in this paper focuses on protecting the ECDSA algorithm against fault-injection attacks.More precisely,we are interested in the countermeasures of scalar multiplication in the body of the elliptic curves to protect against attacks concerning only a few bits of secret may be sufficient to recover the private key.ECDSA can be implemented in different ways,in software or via dedicated hardware or a mix of both.Many different architectures are therefore possible to implement an ECDSA-based system.For this reason,this work focuses mainly on the hardware implementation of the digital signature ECDSA.In addition,the proposed ECDSA architecture with and without fault detection for the scalar multiplication have been implemented on Xilinxfield programmable gate arrays(FPGA)platform(Virtex-5).Our implementation results have been compared and discussed.Our area,frequency,area overhead and frequency degradation have been compared and it is shown that the proposed architecture of ECDSA with fault detection for the scalar multiplication allows a trade-off between the hardware overhead and the security of the ECDSA.
基金supported by Taif University Researchers supporting Project number(TURSP-2020/347),Taif University,Taif,Saudi Arabia.
文摘The rapid expansion of Internet of Things(IoT)devices deploys various sensors in different applications like homes,cities and offices.IoT applications depend upon the accuracy of sensor data.So,it is necessary to predict faults in the sensor and isolate their cause.A novel primitive technique named fall curve is presented in this paper which characterizes sensor faults.This technique identifies the faulty sensor and determines the correct working of the sensor.Different sources of sensor faults are explained in detail whereas various faults that occurred in sensor nodes available in IoT devices are also presented in tabular form.Fault prediction in digital and analog sensors along with methods of sensor fault prediction are described.There are several advantages and disadvantages of sensor fault prediction methods and the fall curve technique.So,some solutions are provided to overcome the limitations of the fall curve technique.In this paper,a bibliometric analysis is carried out to visually analyze 63 papers fetched from the Scopus database for the past five years.Its novelty is to predict a fault before its occurrence by looking at the fall curve.The sensing of current flow in devices is important to prevent a major loss.So,the fall curves of ACS712 current sensors configured on different devices are drawn for predicting faulty or non-faulty devices.The analysis result proved that if any of the current sensors gets faulty,then the fall curve will differ and the value will immediately drop to zero.Various evaluation metrics for fault prediction are also described in this paper.At last,this paper also addresses some possible open research issues which are important to deal with false IoT sensor data.
基金This paper is supported by State Grid Gansu Electric Power Company Science and Technology Project(20220515003).
文摘To solve the problems of a few optical fibre line fault samples and the inefficiency of manual communication optical fibre fault diagnosis,this paper proposes a communication optical fibre fault diagnosis model based on variational modal decomposition(VMD),fuzzy entropy(FE)and fuzzy clustering(FC).Firstly,based on the OTDR curve data collected in the field,VMD is used to extract the different modal components(IMF)of the original signal and calculate the fuzzy entropy(FE)values of different components to characterize the subtle differences between them.The fuzzy entropy of each curve is used as the feature vector,which in turn constructs the communication optical fibre feature vector matrix,and the fuzzy clustering algorithm is used to achieve fault diagnosis of faulty optical fibre.The VMD-FE combination can extract subtle differences in features,and the fuzzy clustering algorithm does not require sample training.The experimental results show that the model in this paper has high accuracy and is relevant to the maintenance of communication optical fibre when compared with existing feature extraction models and traditional machine learning models.
基金the National Natural Science Foundation of China(No.41804135)the Key Laboratory of Petroleum Resources Research,Institute of Geology and Geophysics,Chinese Academy of Sciences,Open Project(No.KLOR2018-9)the Beijing Information Science and Technology University Research Fund Project(No.2025025).
文摘Aiming at the problems of low accuracy,long time consumption,and failure to obtain quantita-tive fault identification results of existing automatic fault identification technic,a fault recognition method based on clustering linear regression is proposed.Firstly,Hough transform is used to detect the line segment of the enhanced image obtained by the coherence cube algorithm.Secondly,the endpoint of the line segment detected by Hough transform is taken as the key point,and the adaptive clustering linear regression algorithm is used to cluster the key points adaptively according to the lin-ear relationship between them.Finally,a fault is generated from each category of key points based on least squares curve fitting method to realize fault identification.To verify the feasibility and pro-gressiveness of the proposed method,it is compared with the traditional method and the latest meth-od on the actual seismic data through experiments,and the effectiveness of the proposed method is verified by the experimental results on the actual seismic data.
文摘A P and S wave velocity model is obtained for the crust in the region along the Longmenshan fault zone, Sichuan Province, China, by using data from a refraction profiling survey carried out in this region and those from local earthquakes. 202 local earthquakes along the fault zone are based on this velocity model, location errors being estimated to be about 1.5 km. The present relocations fairly improved the accuracy of hypocenter locations for earthquakes in this area, which is recognized from small scatter of data in the arrival time distance diagram compared with that for the original locations in the Earthquake Catalogue of Sichuan Seismic Network. The obtained hypocenter distribution shows that shallow earthquakes, confined to the upper crust in the depth range from 3 km to 22 km, are actively occurring along the main fault of the Longmenshan fault zone. The velocity model and the location method are presently used quite effective for precisely locating local earthquakes such as those in Sichuan Province. Installation of these with the real time processing system developed by Tohoku University in the Sichuan Telemetered Seismic Network would help to improve the location accuracy of events beneath the network.
基金supported by the National Natural Science Foundation of China general Projects(No.51174193)the Youth Fund Project of the National Natural Science Foundation of China(No.51004102)the National High Technology Research and Development Program of China(No.2012AA062101)
文摘This paper proposes the concept of projection curves based on the theory of CT image reconstruction to probe the internal structure of the working panel prior to formal mining of the working panel.As well as reducing costs,this method provides safe and efficient excavation of the working panel.According to the results of the numerical model and the actual working panel,the new method has been proven to be accurate in detecting the location of the fault that extends into the face.Concealed faults of the internal working panel,as well as the start and end points of the fault,can be detected by this method.Engineering practice has proven that the method is highly reliable,has a highly decisive impact on faults for coal mining,and can be used to guide the safe mining of the working panel.
基金Supported by the National Natural Science Funda tion of China (90204012)
文摘An integrated fault tolerant approach for data encryption and digitalsignature based on elliptic curve cryptography is proposed. Phis approach allows the receiver toverify the sender's identity and can simultaneously deal with error detection and data correction.Up to three errors in our approach can be detected and corrected. This approach has at least thesame security as that based on RSA system, but smaller keys to achieve the same level of security.Our approach is more efficient than the known ones and more suited for limited environments likepersonal digital assistants (PDAs), mobile phones and smart cards without RSA co-processors.
文摘The design procedure is made for a mine shaft where permanent underground facilities are interconnected. The highly faulted grounds were identified using empirical and semi-empirical theories. Furthermore, the behavior types are presented. This paper presents excavation and support methods in such ground conditions and the calculations results show that the installation of the yielding elements have an effect on support elements and prevent shotcrete damage during the curing stage. Different numerical analyses carried out showed that, with the yielding elements installed, the total displacements increase but the final axial force reduces, and therefore, the characteristic compressive strength of shotcrete is not exceeded. The calculation results of ground loads and displacements on the designed support system are presented with a 3D numerical geo-mechanical model adopted for highly faulted ground surrounding deeper complex underground structures.