期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Study on Security of NGN Service Platform
1
作者 Huang Mingshi (Network Division of ZTE Corporation, Nanjing 210012, China) 《ZTE Communications》 2005年第4期17-20,共4页
This article discusses the security of the NGN service platform in terms of the open service interface and service deployment. It thinks that security of the open service interface can be solved by adding the service ... This article discusses the security of the NGN service platform in terms of the open service interface and service deployment. It thinks that security of the open service interface can be solved by adding the service access gateway and service management platform. The service access gateway provides security features to the open service interface concerning ID authentication, authorization, audit, encryption and integrity protection. For service deployment, its security can be solved by issuing related user digital certificates, deploying a firewall or an intrusion detection system, implementing load control, managing users' home location and displaying users' real-time IP addresses. 展开更多
关键词 NGN Study on security of NGN Service platform security
下载PDF
Arm PSA-Certified IoT Chip Security: A Case Study
2
作者 Fei Chen Duming Luo +3 位作者 Jianqiang Li Victor C.M.Leung Shiqi Li Junfeng Fan 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2023年第2期244-257,共14页
With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem today.IoT security significantly relies on th... With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem today.IoT security significantly relies on the security of the underlying hardware chip,which often contains critical information,such as encryption key.To understand existing IoT chip security,this study analyzes the security of an IoT security chip that has obtained an Arm Platform Security Architecture(PSA)Level 2 certification.Our analysis shows that the chip leaks part of the encryption key and presents a considerable security risk.Specifically,we use commodity equipment to collect electromagnetic traces of the chip.Using a statistical T-test,we find that the target chip has physical leakage during the AES encryption process.We further use correlation analysis to locate the detailed encryption interval in the collected electromagnetic trace for the Advanced Encryption Standard(AES)encryption operation.On the basis of the intermediate value correlation analysis,we recover half of the 16-byte AES encryption key.We repeat the process for three different tests;in all the tests,we obtain the same result,and we recover around 8 bytes of the 16-byte AES encryption key.Therefore,experimental results indicate that despite the Arm PSA Level 2 certification,the target security chip still suffers from physical leakage.Upper layer application developers should impose strong security mechanisms in addition to those of the chip itself to ensure IoT application security. 展开更多
关键词 Internet of Things(IoT)security chip Arm platform security Architecture(PSA)certification electromagnetic side-channel attack Advanced Encryption Standard(AES)encryption key leakage
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部