This paper introduces a supporting model for a (Bluetooth) and IEEE 802.11 (Wi-Fi) attack activity that unique Battery-Sensing Intrusion Protection System (B-SIPS) for standard IDSs are incapable of detecting [1]. mobile computers, which alerts when power changes are detectedThis research further examines various means to refine the on small wireless devices. An analytical model is employed to B-SIPS detection capabilities. Smart battery polling rates, examine the smart battery characteristics to support the theoretical intrusion detection limits and capabilities of B-SIPS. system management bus speeds, and attack execution times This research explores the modification of the smart battery can be used to improve the theoretical accuracy of batterypolling rates in conjunction with the variance of malicious based anomaly detection. A methodology is then presented to network activity. Using the results from a previous study of identify an attack, using data sampled by an oscilloscope that optimized static polling rates to create minimum and maximum is filtered to characterize a unique trace signature. thresholds, a dynamic polling rate algorithm was devised. ThisThe rest of this paper is structured as follows. Section II algorithm allowed the smart battery to gauge the network's illicit attack density and adjust its polling rate to efficiently detect tpresents related work. Section III describes the ongoIng attacks, while conserving battery charge life. Lastly, a trace technology convergence trend in mobile devices. Secton IV signature methodology is presented that characterizes unique presents B-SIPS' implemented capabilities. Section V activity for IEEE 802.15.1 (Bluetooth) attack identification. discusses the smart battery polling model's design and outlines previous work on testing and optimizing static polling rate Index Terms-Battery, Intrusion Detection, Wireless Security solutions. Section VI utilizes the static polling results in formulating a dynamic solution and evaluating it in respect to
This work proposes a novel design flow for SWIP binding on a commodity FPGA platform lacking specialized hardcore security facilities. We accomplish this by leveraging the qualities of a Physical Unclonable Function (PUF) and a tight integration of hardware and software security features. A prototype implementation demonstrates our design flow's ability to successfully protect software by encryption using a 128 bit FPGA-unique key extracted from a PUF. Based on this proof of concept, a solution to perform secure remote software updates, a common challenge in embedded systems, is proposed to showcase the practicality and flexibility of the design flow.Index Terms-Design flow, firmware, field programmable gate arrays (FPGA), intellectual property, physical unclonable function, secure embedded systems, security, software binding.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.