Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (11)
  • Open Access

    ARTICLE

    A Novel Attack on Complex APUFs Using the Evolutionary Deep Convolutional Neural Network

    Ali Ahmadi Shahrakht1, Parisa Hajirahimi2, Omid Rostami3, Diego Martín4,*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 3059-3081, 2023, DOI:10.32604/iasc.2023.040502

    Abstract As the internet of things (IoT) continues to expand rapidly, the significance of its security concerns has grown in recent years. To address these concerns, physical unclonable functions (PUFs) have emerged as valuable tools for enhancing IoT security. PUFs leverage the inherent randomness found in the embedded hardware of IoT devices. However, it has been shown that some PUFs can be modeled by attackers using machine-learning-based approaches. In this paper, a new deep learning (DL)-based modeling attack is introduced to break the resistance of complex XAPUFs. Because training DL models is a problem that falls under the category of NP-hard… More >

  • Open Access

    PROCEEDINGS

    Analysis of Production Dynamics of Fractured Horizontal Well with CO2 Huff and Puff in Shale Reservoirs

    Meng Wang1, Jun Yao1, Dongyan Fan1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.26, No.2, pp. 1-1, 2023, DOI:10.32604/icces.2023.08913

    Abstract In view of the current situation of the lack of suitable calculation models for the analysis of production dynamics of fractured horizontal well with CO2 huff and puff in shale reservoirs,based on the process and mechanism of CO2 huff and puff, an analytical model for the production dynamics of fractured horizontal well with CO2 huff and puff in shale reservoirs was proposed, in which took into account the changes in crude oil viscosity and volume caused by the difference in CO2 concentration at different locations in the formation after soaking and the adsorption and desorption process of CO2 in the… More >

  • Open Access

    ARTICLE

    Horizontal Well Interference Performance and Water Injection Huff and Puff Effect on Well Groups with Complex Fracture Networks: A Numerical Study

    Haoyu Fu1,2,3, Hua Liu1,2, Xiaohu Hu1,2, Lei Wang1,2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.3, pp. 2285-2309, 2023, DOI:10.32604/cmes.2023.027996

    Abstract Well interference has become a common phenomenon with the increasing scale of horizontal well fracturing. Recent studies on well interference in horizontal wells do not properly reflect the physical model of the postfracturing well groups and the realistic fracturing process of infill wells. Establishing the correspondence between well interference causative factors and manifestations is of great significance for infill well deployment and secondary oil recovery. In this work, we develop a numerical model that considers low velocity non-Darcy seepage in shale reservoirs to study the inter-well interference phenomenon that occurs in the Santanghu field, and construct an explicit hydraulic fracture… More >

  • Open Access

    ARTICLE

    MCRO-PUF: A Novel Modified Crossover RO-PUF with an Ultra-Expanded CRP Space

    Hassan Rabiei1, Masoud Kaveh2, Mohammad Reza Mosavi1, Diego Martín3,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4831-4845, 2023, DOI:10.32604/cmc.2023.034981

    Abstract With the expanding use of the Internet of Things (IoT) devices and the connection of humans and devices to the Internet, the need to provide security in this field is constantly growing. The conventional cryptographic solutions need the IoT device to store secret keys in its non-volatile memory (NVM) leading the system to be vulnerable to physical attacks. In addition, they are not appropriate for IoT applications due to their complex calculations. Thus, physically unclonable functions (PUFs) have been introduced to simultaneously address these issues. PUFs are lightweight and easy-to-access hardware security primitives which employ the unique characteristics of integrated… More >

  • Open Access

    ARTICLE

    A Novel Secure Scan Design Based on Delayed Physical Unclonable Function

    Weizheng Wang1,2, Xingxing Gong1, Xiangqi Wang3, Gwang-jun Kim4,*, Fayez Alqahtani5, Amr Tolba6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6605-6622, 2023, DOI:10.32604/cmc.2023.031617

    Abstract The advanced integrated circuits have been widely used in various situations including the Internet of Things, wireless communication, etc. But its manufacturing process exists unreliability, so cryptographic chips must be rigorously tested. Due to scan testing provides high test coverage, it is applied to the testing of cryptographic integrated circuits. However, while providing good controllability and observability, it also provides attackers with a backdoor to steal keys. In the text, a novel protection scheme is put forward to resist scan-based attacks, in which we first use the responses generated by a strong physical unclonable function circuit to solidify fuse-antifuse structures… More >

  • Open Access

    ARTICLE

    Secured Cloud Communication Using Lightweight Hash Authentication with PUF

    R. Padmavathy*, M. Newlin Rajkumar

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 233-243, 2022, DOI:10.32604/csse.2022.021129

    Abstract Internet-of-Things (IoT) is an awaited technology in real-world applications to process daily tasks using intelligent techniques. The main process of data in IoT involves communication, integration, and coordination with other real-world applications. The security of transferred, stored, and processed data in IoT is not ensured in many constraints. Internet-enabled smart devices are widely used among populations for all types of applications, thus increasing the popularity of IoT among widely used server technologies. Smart grid is used in this article with IoT to manage large data. A smart grid is a collection of numerous users in the network with the fastest… More >

  • Open Access

    ARTICLE

    Lightweight Direct Acyclic Graph Blockchain for Enhancing Resource-Constrained IoT Environment

    Salaheddine Kably1,2,*, Mounir Arioua1, Nabih Alaoui2

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5271-5291, 2022, DOI:10.32604/cmc.2022.020833

    Abstract Blockchain technology is regarded as the emergent security solution for many applications related to the Internet of Things (IoT). In concept, blockchain has a linear structure that grows with the number of transactions entered. This growth in size is the main obstacle to the blockchain, which makes it unsuitable for resource-constrained IoT environments. Moreover, conventional consensus algorithms such as PoW, PoS are very computationally heavy. This paper solves these problems by introducing a new lightweight blockchain structure and lightweight consensus algorithm. The Multi-Zone Direct Acyclic Graph (DAG) Blockchain (Multizone-DAG-Blockchain) framework is proposed for the fog-based IoT environment. In this context,… More >

  • Open Access

    ARTICLE

    A CPK-Based Identity Authentication Scheme for IoT

    Mingming Zhang1, Jiaming Mao1,*, Yuanyuan Ma2, Liangjie Xu3, Chuanjun Wang1, Ran Zhao1, Zhihao Li3, Lu Chen4, Wenbing Zhao5

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1217-1231, 2022, DOI:10.32604/csse.2022.017657

    Abstract As the power Internet of Things (IoT) enters the security construction stage, the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and practicality. The existing public key infrastructure (PKI)-based security authentication scheme is currently difficult to apply in many terminals in IoT. Its key distribution and management costs are high, which hinders the development of power IoT security construction. Combined Public Key (CPK) technology uses a small number of seeds to generate unlimited public keys. It is very suitable for identity authentication in the power Internet of Things. In this paper, we… More >

  • Open Access

    ARTICLE

    An Authentication Mechanism for Autonomous Vehicle ECU Utilizing a Novel Slice-Based PUF Design

    Jihai Yang1, Zongtao Duan1, Muyao Wang2, Jabar Mahmood1, Yuanyuan Xiao1, Yun Yang1,*

    Journal of New Media, Vol.2, No.4, pp. 157-165, 2020, DOI:10.32604/jnm.2020.014309

    Abstract Modern autonomous vehicles are getting progressively popular and increasingly getting closer to the core of future development in transportation field. However, there is no reliable authentication mechanism for the unmanned vehicle communication system, this phenomenon draws attention about the security of autonomous vehicles of people in all aspects. Physical Unclonable Function (PUF) circuits is light-weight, and it can product unique and unpredictable digital signature utilizing the manufacturing variations occur in each die and these exact silicon features cannot be recreated theoretically. Considering security issues of communication between Electronic Control Units (ECUs) in vehicles, we propose a novel delay-based PUF circuit… More >

  • Open Access

    ARTICLE

    PUF-Based Key Distribution in Wireless Sensor Networks

    Zheng Zhang1, Yanan Liu1, *, Qinyuan Zuo1, Lein Harn2, Shuo Qiu1, Yuan Cheng1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1261-1280, 2020, DOI:10.32604/cmc.2020.010034

    Abstract Physical Unclonable Functions (PUFs) can be seen as kind of hardware oneway functions, who are easily fabricated but difficult to clone, duplicate or predict. Therefore, PUFs with unclonable and unpredictable properties are welcome to be applied in designing lightweight cryptography protocols. In this paper, a Basic Key Distribution Scheme (Basic-KDS) based on PUFs is firstly proposed. Then, by employing different deployment modes, a Random Deployment Key Distribution Scheme (RD-KDS) and a Grouping Deployment Key Distribution Scheme (GD-KDS) are further proposed based on the Basic-KDS for large scale wireless sensor networks. In our proposals, a sensor is not pre-distributed with any… More >

Displaying 1-10 on page 1 of 11. Per Page