Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (931)

Search Parameters:
Keywords = hardware security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 4831 KiB  
Article
Hierarchical Aggregation for Federated Learning in Heterogeneous IoT Scenarios: Enhancing Privacy and Communication Efficiency
by Chen Qiu, Ziang Wu, Haoda Wang, Qinglin Yang, Yu Wang and Chunhua Su
Future Internet 2025, 17(1), 18; https://doi.org/10.3390/fi17010018 (registering DOI) - 5 Jan 2025
Abstract
Federated Learning (FL) is a distributed machine-learning paradigm that enables models to be trained across multiple decentralized devices or servers holding local data without transferring the raw data to a central location. However, applying FL to heterogeneous IoT scenarios comes with several challenges [...] Read more.
Federated Learning (FL) is a distributed machine-learning paradigm that enables models to be trained across multiple decentralized devices or servers holding local data without transferring the raw data to a central location. However, applying FL to heterogeneous IoT scenarios comes with several challenges due to the diverse nature of these devices in terms of hardware capabilities, communications, and data heterogeneity. Furthermore, the conventional parameter server-based FL paradigm aggregates the trained parameters of devices directly, which incurs high communication overhead. To this end, this paper designs a hierarchical federated-learning framework for heterogeneous IoT systems, focusing on enhancing communication efficiency and ensuring data security through lightweight encryption. By leveraging hierarchical aggregation, lightweight stream encryption, and adaptive device participation, the proposed framework provides an efficient and robust solution for federated learning in dynamic and resource-constrained IoT environments. The extensive experimental results show that the proposed FL paradigm significantly reduces round time by 20%. Full article
32 pages, 2525 KiB  
Article
Cyberthreats and Security Measures in Drone-Assisted Agriculture
by Kyriaki A. Tychola and Konstantinos Rantos
Viewed by 224
Abstract
Nowadays, the use of Unmanned Aerial Vehicles (UAVs), or drones in agriculture for crop assessment and monitoring is a timely and important issue that concerns both researchers and farmers. Mapping agricultural land is imperative for making appropriate management decisions. As a result, the [...] Read more.
Nowadays, the use of Unmanned Aerial Vehicles (UAVs), or drones in agriculture for crop assessment and monitoring is a timely and important issue that concerns both researchers and farmers. Mapping agricultural land is imperative for making appropriate management decisions. As a result, the necessity of this technology is increasing, given its numerous benefits. However, as with any modern and automated technology, security concerns arise from various aspects. In this paper, we discuss cyberthreats to drones, as this technology is vulnerable to attackers during data collection, storage, and usage. Although various techniques and methods have been developed to address attacks on drones, this field remains in its infancy in many respects. This paper provides a comprehensive review of the security challenges associated with the use of agricultural drones. The security issues were thoroughly analyzed, with a particular focus on cybersecurity, categorized into four distinct levels: emerging threats, sensor vulnerabilities, hardware and software attacks, and communication-related threats. Additionally, we examined the limitations and challenges posed by cyberthreats to drone systems. Full article
Show Figures

Figure 1

73 pages, 3621 KiB  
Review
Hardware Design and Verification with Large Language Models: A Scoping Review, Challenges, and Open Issues
by Meisam Abdollahi, Seyedeh Faegheh Yeganli, Mohammad (Amir) Baharloo and Amirali Baniasadi
Electronics 2025, 14(1), 120; https://doi.org/10.3390/electronics14010120 - 30 Dec 2024
Viewed by 371
Abstract
Background: Large Language Models (LLMs) are emerging as promising tools in hardware design and verification, with recent advancements suggesting they could fundamentally reshape conventional practices. Objective: This study examines the significance of LLMs in shaping the future of hardware design and verification. It [...] Read more.
Background: Large Language Models (LLMs) are emerging as promising tools in hardware design and verification, with recent advancements suggesting they could fundamentally reshape conventional practices. Objective: This study examines the significance of LLMs in shaping the future of hardware design and verification. It offers an extensive literature review, addresses key challenges, and highlights open research questions in this field. Design: in this scoping review, we survey over 360 papers most of the published between 2022 and 2024, including 71 directly relevant ones to the topic, to evaluate the current role of LLMs in advancing automation, optimization, and innovation in hardware design and verification workflows. Results: Our review highlights LLM applications across synthesis, simulation, and formal verification, emphasizing their potential to streamline development processes while upholding high standards of accuracy and performance. We identify critical challenges, such as scalability, model interpretability, and the alignment of LLMs with domain-specific languages and methodologies. Furthermore, we discuss open issues, including the necessity for tailored model fine-tuning, integration with existing Electronic Design Automation (EDA) tools, and effective handling of complex data structures typical of hardware projects. Conclusions: this survey not only consolidates existing knowledge but also outlines prospective research directions, underscoring the transformative role LLMs could play in the future of hardware design and verification. Full article
(This article belongs to the Special Issue Machine Learning in Network-on-Chip Architectures)
Show Figures

Figure 1

27 pages, 4677 KiB  
Review
Weak Physycally Unclonable Functions in CMOS Technology: A Review
by Massimo Vatalaro, Raffaele De Rose, Marco Lanuzza and Felice Crupi
Viewed by 245
Abstract
Physically unclonable functions (PUFs) represent emerging cryptographic primitives that exploit the uncertainty of the CMOS manufacturing process as an entropy source for generating unique, random and stable keys. These devices can be potentially used in a wide variety of applications ranging from secret [...] Read more.
Physically unclonable functions (PUFs) represent emerging cryptographic primitives that exploit the uncertainty of the CMOS manufacturing process as an entropy source for generating unique, random and stable keys. These devices can be potentially used in a wide variety of applications ranging from secret key generation, anti-counterfeiting, and low-cost authentications to advanced protocols such as oblivious transfer and key exchange. Unfortunately, guaranteeing adequate PUF stability is still challenging, thus often requiring post-silicon stability enhancement techniques. The latter help to contrast the raw sensitivity to on-chip noise and variations in the environmental conditions (i.e., voltage and temperature variations), but their area and energy costs are not always feasible for IoT devices that operate with constrained budgets. This pushes the demand for ever more stable, area- and energy-efficient solutions at design time. This review aims to provide an overview of several weak PUF solutions implemented in CMOS technology, discussing their performance and suitability for being employed in security applications. Full article
Show Figures

Figure 1

23 pages, 501 KiB  
Article
Advanced Network and System Security Teaching
by Mihajlo Ogrizović, Pavle Vuletić and Žarko Stanisavljević
Viewed by 221
Abstract
In an attempt to address the growing shortage of cybersecurity specialists in the country, the School of Electrical Engineering, University of Belgrade, started the course entitled Advanced Network and System Security (ANS) in the 2019/2020 school year. The ANS course covers the topics [...] Read more.
In an attempt to address the growing shortage of cybersecurity specialists in the country, the School of Electrical Engineering, University of Belgrade, started the course entitled Advanced Network and System Security (ANS) in the 2019/2020 school year. The ANS course covers the topics of computer system and network security, intrusion detection and prevention, and ethical hacking methodologies. This paper presents the course organization and associated laboratory environment and exercises and aims to prove that providing such a multidisciplinary laboratory leads to successful learning outcomes and directly improves gained knowledge in cybersecurity. The ANS course differs from all other related courses by covering various cybersecurity topics ranging from hardware through to network to web security. The analysis showed that 13 out of 19 Cyber Security Body of Knowledge classification Knowledge Areas are covered in the ANS course, unlike other related courses which cover up to 8 Knowledge Areas. Ultimately, the students’ practical skills improvement evaluation was performed through quantitative and qualitative analysis in order to prove that improving practical skills in the ANS laboratory resulted in the overall improvement of the gained knowledge. Full article
(This article belongs to the Special Issue Network and Information Security)
Show Figures

Figure 1

29 pages, 3241 KiB  
Article
Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA
by Abdullah Sevin and Abdu Ahmed Osman Mohammed
Appl. Sci. 2024, 14(24), 11967; https://doi.org/10.3390/app142411967 - 20 Dec 2024
Viewed by 481
Abstract
Blockchain has several unique features: data integrity, security, privacy, and immutability. For this reason, it is considered one of the most promising new technologies for a wide range of applications. Initially prominent in cryptocurrencies such as Bitcoin, its applications have expanded into areas [...] Read more.
Blockchain has several unique features: data integrity, security, privacy, and immutability. For this reason, it is considered one of the most promising new technologies for a wide range of applications. Initially prominent in cryptocurrencies such as Bitcoin, its applications have expanded into areas such as the Internet of Things. However, integrating blockchain into IoT systems is challenging due to the limited computing and storage capabilities of IoT devices. Efficient blockchain mining requires lightweight hash functions that balance computational complexity with resource constraints. In this study, we employed a structured methodology to evaluate hash functions for blockchain–IoT systems. Initially, a survey is conducted to identify the most commonly used hash functions in such environments. Also, this study identifies and evaluates a lightweight hash function, designated as HashLEA, for integration within blockchain-based IoT systems. Subsequently, these functions are implemented and evaluated using software coded in C and Node.js, thereby ensuring compatibility and practical applicability. Performance metrics, including software efficiency, hardware implementation, energy consumption, and security assessments, were conducted and analyzed. Ultimately, the most suitable hash functions, including HashLEA for blockchain–IoT applications, are discussed, striking a balance between computational efficiency and robust cryptographic properties. Also, the HashLEA hash function is implemented on a Raspberry Pi 4 with an ARM processor to assess its performance in a real-world blockchain–IoT environment. HashLEA successfully passes security tests, achieving a near-ideal avalanche effect, uniform hash distribution, and low standard deviation. It has been shown to demonstrate superior execution time performance, processing 100 KB messages in 0.157 ms and 10 MB messages in 15.48 ms, which represents a significant improvement in execution time over other alternatives such as Scrypt, X11, and Skein. Full article
Show Figures

Figure 1

14 pages, 891 KiB  
Article
A Lightweight Malware Detection Model Based on Knowledge Distillation
by Chunyu Miao, Liang Kou, Jilin Zhang and Guozhong Dong
Mathematics 2024, 12(24), 4009; https://doi.org/10.3390/math12244009 - 20 Dec 2024
Viewed by 363
Abstract
The extremely destructive nature of malware has become a major threat to Internet security. The research on malware detection techniques has been evolving. Deep learning-based malware detection methods have achieved good results by using large-scale, pre-trained models. However, these models are complex, have [...] Read more.
The extremely destructive nature of malware has become a major threat to Internet security. The research on malware detection techniques has been evolving. Deep learning-based malware detection methods have achieved good results by using large-scale, pre-trained models. However, these models are complex, have large parameters, and require a large amount of hardware resources and have a high inference time cost when applied. To address this challenge, this paper proposes DistillMal, a new method for lightweight malware detection based on knowledge distillation, which improves performance by using a student network to learn valuable cueing knowledge from a teacher network to achieve a lightweight model. We conducted extensive experiments on two new datasets and showed that the student network model’s performance is very close to that of the original model and the outperforms it on some metrics. Our approach helps address the resource constraints and computational challenges faced by traditional deep learning large models. Our research highlights the potential of using knowledge distillation to develop lightweight malware detection models. Full article
(This article belongs to the Special Issue Mathematical Models in Information Security and Cryptography)
Show Figures

Figure 1

15 pages, 3573 KiB  
Article
Electrocardiogram-Based Driver Authentication Using Autocorrelation and Convolutional Neural Network Techniques
by Giwon Ku, Choeljun Choi, Chulseung Yang, Jiseong Jeong, Pilkyo Kim, Sangyong Park, Taekeon Jung and Jinsul Kim
Electronics 2024, 13(24), 4974; https://doi.org/10.3390/electronics13244974 - 17 Dec 2024
Viewed by 413
Abstract
This study presents a novel driver authentication system utilizing electrocardiogram (ECG) signals collected through dry electrodes embedded in the steering wheel. Traditional biometric authentication methods are sensitive to environmental changes and vulnerable to replication, but this study addresses these issues by leveraging the [...] Read more.
This study presents a novel driver authentication system utilizing electrocardiogram (ECG) signals collected through dry electrodes embedded in the steering wheel. Traditional biometric authentication methods are sensitive to environmental changes and vulnerable to replication, but this study addresses these issues by leveraging the unique characteristics and forgery resistance of ECG signals. The proposed system is designed using autocorrelation profiles (ACPs) and a convolutional neural network and is optimized for real-time processing even in constrained hardware environments. Additionally, advanced signal processing algorithms were applied to refine the ECG data and minimize noise in driving environments. The system’s performance was evaluated using a public dataset of 154 participants and a real-world dataset of 10 participants, achieving F1-Scores of 96.8% and 96.02%, respectively. Furthermore, an ablation study was conducted to analyze the importance of components such as ACPs, normalization, and filtering. When all components were removed, the F1-Score decreased to 60.1%, demonstrating the critical role of each component. These findings highlight the potential of the proposed system to deliver high accuracy and efficiency not only in vehicle environments but also in various security applications. Full article
(This article belongs to the Special Issue AI-Driven Bioinformatics: Emerging Trends and Technologies)
Show Figures

Figure 1

28 pages, 2127 KiB  
Article
ElasticPay: Instant Peer-to-Peer Offline Extended Digital Payment System
by Annapureddy Venkata Sai Kumar Reddy and Gourinath Banda
Sensors 2024, 24(24), 8034; https://doi.org/10.3390/s24248034 - 16 Dec 2024
Viewed by 480
Abstract
The widespread reliance on paper-based currency poses significant drawbacks, such as counterfeiting, lack of transparency, and environmental impacts. While Central Bank Digital Currencies (CBDCs) address many of these issues, their dependence on continuous internet connectivity limits their usability in scenarios with poor or [...] Read more.
The widespread reliance on paper-based currency poses significant drawbacks, such as counterfeiting, lack of transparency, and environmental impacts. While Central Bank Digital Currencies (CBDCs) address many of these issues, their dependence on continuous internet connectivity limits their usability in scenarios with poor or no network access. To overcome such limitations, this paper introduces ElasticPay, a novel Peer-to-Peer (P2P) Offline Digital Payment System that leverages advanced hardware security measures realised through Trusted Platform Modules (TPMs), Trusted Execution Environments (TEEs), and Secure Elements (SEs). ElasticPay ensures transaction privacy, unforgeability, and immediate settlement while preventing double spending. Our approach integrates robust recovery mechanisms and provides a scalable solution for diverse environments. Extensive experimentation validates the system’s reliability and practicality, highlighting its potential to advance secure and inclusive CBDC ecosystems. We demonstrate the proposed solution implementation on the iPhone mobilephone because it has an inbuilt Secure Enclave, which is an integrated implementation of the necessary TPM, TEE, and SE functionalities. Full article
Show Figures

Figure 1

19 pages, 526 KiB  
Article
SoK: A Reality Check for DNP3 Attacks 15 Years Later
by Juan David Parra Rodriguez, Kwasi Boakye-Boateng, Ratinder Kaur, Allyson Zhou, Rongxing Lu and Ali A. Ghorbani
Smart Cities 2024, 7(6), 3983-4001; https://doi.org/10.3390/smartcities7060154 - 14 Dec 2024
Viewed by 405
Abstract
OT (operational technology) protocols such as DNP3/TCP, commonly used in the electrical utility sector, have become a focal point for security researchers. We assess the applicability of attacks previously published from theoretical and practical points of view. From the theoretical point of view, [...] Read more.
OT (operational technology) protocols such as DNP3/TCP, commonly used in the electrical utility sector, have become a focal point for security researchers. We assess the applicability of attacks previously published from theoretical and practical points of view. From the theoretical point of view, previous work strongly focuses on transcribing protocol details (e.g., list fields at the link, transport, and application layer) without providing the rationale behind protocol features or how the features are used. This has led to confusion about the impact of many theoretical DNP3 attacks. After a detailed analysis around which protocol features are used and how, a review of the configuration capabilities for several IEDs (Intelligent Electrical Devices), and some testing with real devices, we conclude that similar results to several complex theoretical attacks can be achieved with considerably less effort. From a more practical point of view, there is existing work on DNP3 man-in-the-middle attacks; however, research still needs to discuss how to overcome a primary hardening effect: IEDs can be configured to allow for communication with specific IP addresses (allow list). For purely scientific purposes, we implemented a DNP3 man-in-the-middle attack capable of overcoming the IP allow-list restriction. We tested the attack using real IEDs and network equipment ruggedized for electrical environments. Even though the man-in-the-middle attack can be successful in a lab environment, we also explain the defense-in-depth mechanisms provided by industry in real life that mitigate the attack. These mechanisms are based on standard specifications, capabilities of the OT hardware, and regulations applicable to some electrical utilities. Full article
(This article belongs to the Special Issue Next Generation of Smart Grid Technologies)
Show Figures

Figure 1

20 pages, 4577 KiB  
Article
FedLSTM: A Federated Learning Framework for Sensor Fault Detection in Wireless Sensor Networks
by Rehan Khan, Umer Saeed and Insoo Koo
Electronics 2024, 13(24), 4907; https://doi.org/10.3390/electronics13244907 - 12 Dec 2024
Viewed by 550
Abstract
The rapid growth of Internet of Things (IoT) devices has significantly increased reliance on sensor-generated data, which are essential to a wide range of systems and services. Wireless sensor networks (WSNs), crucial to this ecosystem, are often deployed in diverse and challenging environments, [...] Read more.
The rapid growth of Internet of Things (IoT) devices has significantly increased reliance on sensor-generated data, which are essential to a wide range of systems and services. Wireless sensor networks (WSNs), crucial to this ecosystem, are often deployed in diverse and challenging environments, making them susceptible to faults such as software bugs, communication breakdowns, and hardware malfunctions. These issues can compromise data accuracy, stability, and reliability, ultimately jeopardizing system security. While advanced sensor fault detection methods in WSNs leverage a machine learning approach to achieve high accuracy, they typically rely on centralized learning, and face scalability and privacy challenges, especially when transferring large volumes of data. In our experimental setup, we employ a decentralized approach using federated learning with long short-term memory (FedLSTM) for sensor fault detection in WSNs, thereby preserving client privacy. This study utilizes temperature data enhanced with synthetic sensor data to simulate various common sensor faults: bias, drift, spike, erratic, stuck, and data-loss. We evaluate the performance of FedLSTM against the centralized approach based on accuracy, precision, sensitivity, and F1-score. Additionally, we analyze the impacts of varying the client participation rates and the number of local training epochs. In federated learning environments, comparative analysis with established models like the one-dimensional convolutional neural network and multilayer perceptron demonstrate the promising results of FedLSTM in maintaining client privacy while reducing communication overheads and the server load. Full article
(This article belongs to the Special Issue Advances in Cyber-Security and Machine Learning)
Show Figures

Figure 1

27 pages, 9453 KiB  
Article
DNA-PRESENT: An Improved Security and Low-Latency, Lightweight Cryptographic Solution for IoT
by Maria Imdad, Adnan Fazil, Sofia Najwa Binti Ramli, Jihyoung Ryu, Hairulnizam Bin Mahdin and Zahid Manzoor
Sensors 2024, 24(24), 7900; https://doi.org/10.3390/s24247900 - 11 Dec 2024
Viewed by 583
Abstract
The vast interconnection of resource-constrained devices and the immense amount of data exchange in the Internet of Things (IoT) environment resulted in the resurgence of various security threats. This resource-constrained environment of IoT makes data security a very challenging task. Recent trends in [...] Read more.
The vast interconnection of resource-constrained devices and the immense amount of data exchange in the Internet of Things (IoT) environment resulted in the resurgence of various security threats. This resource-constrained environment of IoT makes data security a very challenging task. Recent trends in integrating lightweight cryptographic algorithms have significantly improved data security in the IoT without affecting performance. The PRESENT block cipher, a standard and lightweight benchmark algorithm, is a widely accepted and implemented algorithm with a simple design, low-cost implementation, and optimum performance. However, this simple design utilizing lightweight linear and non-linear functions led to slow confusion and diffusion properties. The static bits in the permutation layer are the leading cause of slow diffusion, showcasing dependencies between plaintext and ciphertext bits. This research addresses and seeks to overcome this shortcoming of slow confusion and diffusion using the Deoxyribonucleic Acid (DNA) replication process and shift-aided operations, leading to the DNA-PRESENT block cipher. Security, cost, and performance analyses were performed to verify the improvements. The results demonstrated that with only 33.5% additional cost, DNA-PRESENT increased key sensitivity to 73.57%, plaintext sensitivity to 33%, and consistently ensured an average bit error rate (BER) of 50.2%. An evident increase of 176.47 kb/s in throughput and reduced latency to 17 cycles/block kept the good hardware efficiency of 43.41 kbps/KGE, and the reduction in execution time by 0.2333 s led to better performance. Considering the security advances achieved, this cost increase is a trade-off between security and performance. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

22 pages, 731 KiB  
Opinion
Intellectual Property Challenges in the Age of 3D Printing: Navigating the Digital Copycat Dilemma
by Antreas Kantaros
Appl. Sci. 2024, 14(23), 11448; https://doi.org/10.3390/app142311448 - 9 Dec 2024
Viewed by 873
Abstract
This paper examines the intellectual property (IP) challenges introduced by 3D printing, a transformative technology enabling widespread innovation, but also raising critical legal questions. It focuses on three main areas: (1) IP issues associated with 3D printing hardware, (2) copyright and licensing complexities [...] Read more.
This paper examines the intellectual property (IP) challenges introduced by 3D printing, a transformative technology enabling widespread innovation, but also raising critical legal questions. It focuses on three main areas: (1) IP issues associated with 3D printing hardware, (2) copyright and licensing complexities related to downloadable 3D files, and (3) IP concerns for commercialized 3D printed items. Through a comprehensive review, the paper highlights how existing IP frameworks struggle to keep pace with the flexibility and accessibility inherent in 3D printing. Proposed solutions, such as blockchain for secure design tracking and enhanced digital rights management (DRM), point towards a more controlled future for digital design protection. Additionally, the study underscores the need for international cooperation to harmonize IP laws, facilitating more effective cross-border enforcement. This work aims to contribute to the ongoing dialogue on IP rights in 3D printing, proposing adaptive strategies to support legal clarity while fostering technological advancement. Full article
(This article belongs to the Section Additive Manufacturing Technologies)
Show Figures

Figure 1

22 pages, 10279 KiB  
Article
Cybersecurity Challenges in UAV Systems: IEMI Attacks Targeting Inertial Measurement Units
by Issam Boukabou, Naima Kaabouch and Dulana Rupanetti
Viewed by 864
Abstract
The rapid expansion in unmanned aerial vehicles (UAVs) across various sectors, such as surveillance, agriculture, disaster management, and infrastructure inspection, highlights the growing need for robust navigation systems. However, this growth also exposes critical vulnerabilities, particularly in UAV package delivery operations, where intentional [...] Read more.
The rapid expansion in unmanned aerial vehicles (UAVs) across various sectors, such as surveillance, agriculture, disaster management, and infrastructure inspection, highlights the growing need for robust navigation systems. However, this growth also exposes critical vulnerabilities, particularly in UAV package delivery operations, where intentional electromagnetic interference (IEMI) poses significant security and safety threats. This paper addresses IEMI attacks targeting inertial measurement units (IMUs) in UAVs, focusing on their susceptibility to medium-power electromagnetic interference. Our approach combines a comprehensive literature review and QuickField simulation with experimental validation using a commercially available 6-degree-of-freedom (DOF) IMU sensor. We propose a hardware-based electromagnetic shielding solution using mu-metal to mitigate IEMI’s impact on sensor performance. The study combines experimental testing with simulations to evaluate the shielding effectiveness under controlled conditions. The results of the measurements showed that medium-power IEMI significantly distorted IMU sensor readings, but our proposed shielding method effectively reduces the impact, improving sensor reliability. We demonstrate the mechanisms by which medium-power IEMI disrupts sensor operation, offering insights for future research directions. These findings also highlight the importance of integrating hardware-based shielding solutions to safeguard UAV systems against electromagnetic threats. Full article
Show Figures

Figure 1

21 pages, 8458 KiB  
Article
The Effect of Ironic Process Theory on Brain Signal-Based Encryption for IoT Devices
by Ahmet Furkan Aydogan, Cihan Varol, Narasimha Karpoor Shashidhar, Amar Rasheed, Van Vung Pham and Murat Karabatak
Electronics 2024, 13(23), 4804; https://doi.org/10.3390/electronics13234804 - 5 Dec 2024
Viewed by 507
Abstract
Numerous encryption methods have been published to secure IoT devices in the last decade. Existing encryption methods still have disadvantages when it comes to securing IoT devices. On the other hand, a new encryption method using brain signals in IoT devices is gaining [...] Read more.
Numerous encryption methods have been published to secure IoT devices in the last decade. Existing encryption methods still have disadvantages when it comes to securing IoT devices. On the other hand, a new encryption method using brain signals in IoT devices is gaining attention as a new solution. The encryption method based on brain signals essentially involves a hypothesis called imposed recall based on ironic process theory. The imposed recall was created with the expectation that imposing a specific choice on the subjects during the acquisition of brain signals would allow for better separation of EEG data. This paper presents experiments and approaches to prove the validity of the imposed recall hypothesis. With the experiments, the effects of ironic process theory on brain signal-based encryption can be observed. While performing the tests, varying approaches, including Granger causality, were applied to analyze the results. The results show that the imposed recall hypothesis can successfully reconstruct EEG data. The structured signals were determined to be effective in capturing matches of brain signals on subjects at different time intervals. Thus, the imposed recall hypothesis can be used in various fields, such as authentication, questioning, and identification, by reserving brain signals to be obtained from individuals. In addition, it was reported that it is possible to acquire the ability to provide security in both devices with limited hardware, such as IoT devices or complex systems. Full article
(This article belongs to the Special Issue Futuristic Security and Privacy in 6G-Enabled IoT)
Show Figures

Figure 1

Back to TopTop