In this paper, we propose an algorithm of arbitration and shuffling of requests for a memory controller which enables high bandwidth, low latency and low power consumption in systems with SoC network protocols that su...
详细信息
ISBN:
(纸本)9781479912919
In this paper, we propose an algorithm of arbitration and shuffling of requests for a memory controller which enables high bandwidth, low latency and low power consumption in systems with SoC network protocols that support outstanding address and out-of-order completion transactions. The memory access commands are stored in a queue, analyzed and shuffled in order to minimize activating new rows and to reduce the power consumption in the proposed architecture. It also adjusts the priority of processing commands if the network protocol supports QoS. We compare the performance of the proposed algorithm for the various memory access patterns.
Mobile Adhoc Network is a progressively self-adjusting nodes of mobile devices connected without any wires and non-defined infrastructure. The advent of Mobile Adhoc Network is widely applied in Personal Area Networki...
详细信息
ISBN:
(纸本)9781509009008
Mobile Adhoc Network is a progressively self-adjusting nodes of mobile devices connected without any wires and non-defined infrastructure. The advent of Mobile Adhoc Network is widely applied in Personal Area Networking (PAN), military applications and administering some critical applications such as army-war relief and remote explorations. The set of actions introduced in the network to generate any malicious activities is known as attacks. The attack is of two types namely, active and passive attacks. Since, MANET is a self-adjusting network;it is more prone to the attacks. To deal with the security challenges, it is the most important that the malicious activities should recognized earlier without any significant modification in the networks. This paper is concentrated on recognizing earlier the malicious activities in MANET. We found the solution by proposing Adaptive Approach Detection using Key Distribution Scheme (KDS) with shuffling algorithm. This scheme reduced the impact of key management based authority certificates and generated maximum tolerance level without compromising the nodes. It also handle various attacks including detecting of black hole attacks with minimum communication cost in the mobile ad hoc networks. As an adversary can successfully deploy black hole attack in the Mobile Ad hoc Networks, finally we prove that using this technique can enhance the MANET security which increases the confidentiality and integrity.
In this study, the authors use a non-symmetric partition to generate N-phase pseudorandom sequences using the logistic maps. The theoretical analysis shows that this N-phase logistic sequence is with uniform distribut...
详细信息
In this study, the authors use a non-symmetric partition to generate N-phase pseudorandom sequences using the logistic maps. The theoretical analysis shows that this N-phase logistic sequence is with uniform distribution, as well as independent and identically distributed. Numerical experiments show that these N-phase logistic sequences have high complexity and are with good randomness. A fast algorithm with its time complexity be O(M) is proposed to generate these N-phase sequences. Furthermore, they propose a new image encryption algorithm based on the N-phase logistic sequence, which is combined with both shuffling and substitution algorithms. Several security tests are carried out to demonstrate that the authors' new algorithm is with a high security level, and can resist various attacks, which can be competitive with some other recently proposed image encryption algorithms.
In this paper, a novel multi-scroll memristive chaotic system is designed based on Chua's system via introducing a nonlinear memristor. The dynamics of this system is analyzed based on bifurcation diagrams, Lyapun...
详细信息
ISBN:
(纸本)9781450399449
In this paper, a novel multi-scroll memristive chaotic system is designed based on Chua's system via introducing a nonlinear memristor. The dynamics of this system is analyzed based on bifurcation diagrams, Lyapunov exponents and phase diagrams. Subsequently, an image encryption scheme based on this system is then proposed. First, the proposed chaotic system is used to generate continuously robust chaotic sequences, the hash values of plaintext images are embedded in the generation and selection of chaotic sequences and involved in each step of encryption to establish the coupling relationship between plaintext and ciphertext. Second, Knuth-Durstenfeld algorithm is used to scramble the high four-bit plane of the plain image twice, and the chaotic sequence is used as the index sequence, which greatly improves the efficiency and randomness of the permutation process. Finally, chaotic sequences are involved in DNA coding rules and pixel-level diffusion. The algorithm is highly sensitive to plain images, and it can realize adaptive encryption. Through performance analysis and comparison with recent literature, the proposed algorithm can cope with various attacks and show excellent performance.
In cryptography, one-time pad (OTP) is claimed to be the perfect secrecy algorithm in several works if all of its features are applied correctly. Its secrecy depends mostly on random keys, which must be truly random a...
详细信息
ISBN:
(纸本)9781728124582
In cryptography, one-time pad (OTP) is claimed to be the perfect secrecy algorithm in several works if all of its features are applied correctly. Its secrecy depends mostly on random keys, which must be truly random and unpredictable. Random number generators are used in key generation. In Psuedo Random Number Generator (PRNG), the possibility of producing numbers that are predictable and repeated exists. In this study, a proposed method using True Random Number Generator (TRNG) and Fisher-Yates shuffling algorithm are implemented to generate random keys for OTP. Frequency (monobit) test, frequency test within a block, and runs tests are performed and showed that the proposed method produces more random keys. Sufficient confusion and diffusion properties are obtained using Pearson correlation analysis.
暂无评论