Next-Generation Data Security Architectures
下一代数据安全架构
基本信息
- 批准号:EP/G007586/1
- 负责人:
- 金额:$ 184.8万
- 依托单位:
- 依托单位国家:英国
- 项目类别:Fellowship
- 财政年份:2008
- 资助国家:英国
- 起止时间:2008 至 无数据
- 项目状态:已结题
- 来源:
- 关键词:
项目摘要
Dramatic advances in digital wireless technology over the past two decades have led to many exciting developments including the rapid growth of mobile and ubiquitous computing. In the future, through the use of mobile applications and devices embedded in the surrounding environment, users will be offered transparent computing and communication services at all times and in all places. Applications of wireless mobile and ubiquitous computing, such as smart homes and smart automobiles, have already begun to emerge. Security is an important factor that must be taken into consideration if the uptake of this new computing paradigm is to be successful. The capability of digital devices to autonomously interact brings with it significant security and privacy risks for the end user. Therefore, research into data security for next-generation wireless communications applications is essential. This 5-year proposed project involves nearer term and longer term research into the data security requirements associated with emerging applications of mobile and ubiquitous computing: - The realisation of mobile and ubiquitous computing technology will require secure wireless ad hoc networks. An ad hoc network is a collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure. Security in ad hoc networks is difficult to achieve due to the unique characteristics associated with such networks over traditional wireless networks. Research into the provision of adequate security techniques for homogenous ad hoc networks will be addressed within the proposed research. - The development of resource constrained security architectures that can be integrated into mobile devices is also an essential requirement. Low-cost hardware security designs will be researched since hardware offers real-time security, lower power and is inherently more tamper-proof than software. These advantages are vital if security is to be provided in next-generation wireless applications so that end-users are provided with effective security with little or no overhead cost. - A major problem with hardware security designs implemented on current CMOS-based technology is the fact that the security keys can be uncovered by monitoring the power consumption and applying statistical analysis techniques. Thus, research is required into low-cost and effective countermeasures against such attacks that are suitable for resource constrained applications. - Looking further ahead, CMOS scaling is approaching its limits and the International Technology Roadmap for Semiconductors 2007 forecasts that by the end of the next decade, the introduction of new technologies will be necessary to augment the capabilities of the CMOS process. The longer term research will focus on quantum-dot cellular automata (QCA) nanotechnology, which is being considered as a possible alternative to CMOS. The PI believes that this will be a very attractive technology from which to develop security architectures since it has extremely low power dissipation and therefore, QCA security designs would be immune to power analysis attack.The proposed research into security for homogeneous networks will also be applicable to body sensor network security and security for remote healthcare, both of which are important aspects of the 'Towards next generation healthcare' EPSRC strategic priority. The research into the development of QCA-based security architectures with resistance to DPA attacks falls within the 'Nanosciences through engineering to application' theme. The overall research project also meets the 'Digital Economy' strategic priority. The ability to provided effective low-cost security architectures that fit seamlessly into emerging ICT applications will significantly impact the early adoption and uptake of such applications by end-users who want guaranteed privacy of personal information at no extra cost.
在过去的二十年里,数字无线技术的巨大进步已经导致了许多令人兴奋的发展,包括移动的和无处不在的计算的快速增长。未来,通过使用嵌入周围环境的移动的应用程序和设备,用户将随时随地获得透明的计算和通信服务。无线移动的和普适计算的应用,如智能家居和智能汽车,已经开始出现。安全是一个重要的因素,必须考虑到,如果采用这种新的计算模式是成功的。数字设备自主交互的能力为最终用户带来了重大的安全和隐私风险。因此,对下一代无线通信应用的数据安全性的研究是必不可少的。这个5年的拟议项目涉及到与移动的和无处不在的计算的新兴应用程序相关的数据安全要求的近期和长期研究:-移动的和无处不在的计算技术的实现将需要安全的无线ad hoc网络。自组织网络是无线移动的节点的集合,它们在没有任何已建立的基础设施的帮助下形成临时网络。由于与传统无线网络相关联的与这种网络相关联的独特特性,在ad hoc网络中的安全性难以实现。研究提供足够的安全技术同质的ad hoc网络将在拟议的研究。- 开发可集成到移动的设备中的资源受限的安全体系结构也是一个基本要求。将研究低成本的硬件安全设计,因为硬件提供实时安全性,功耗低,而且比软件更防篡改。如果要在下一代无线应用中提供安全性,以便以很少或没有开销成本向最终用户提供有效的安全性,则这些优点是至关重要的。- 在当前基于CMOS的技术上实现的硬件安全设计的主要问题是安全密钥可以通过监视功耗和应用统计分析技术来发现的事实。因此,需要研究适合于资源受限应用的低成本且有效的对抗此类攻击的对策。- 展望未来,CMOS的规模正在接近其极限,2007年国际半导体技术路线图预测,到下一个十年结束时,将需要引入新技术来增强CMOS工艺的能力。长期的研究将集中在量子点细胞自动机(QCA)纳米技术,这被认为是一个可能的替代CMOS。PI认为这将是一项非常有吸引力的技术,因为它具有极低的功耗,因此QCA安全设计将免受功耗分析攻击。拟议的同构网络安全研究也将适用于身体传感器网络安全和远程医疗安全,这两者都是“迈向下一代医疗保健”EPSRC战略优先事项的重要方面。对基于QCA的安全体系结构的开发与DPA攻击的抵抗力的研究福尔斯“纳米科学通过工程应用”的主题。整个研究项目也符合“数字经济”战略优先事项。能够提供有效的低成本安全架构,无缝地融入新兴的信通技术应用,将大大影响那些希望在不增加额外费用的情况下保证个人信息隐私的最终用户对此类应用的早期采用和吸收。
项目成果
期刊论文数量(10)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
A hardware wrapper for the SHA-3 hash algorithms
SHA-3 哈希算法的硬件包装器
- DOI:10.1049/cp.2010.0478
- 发表时间:2010
- 期刊:
- 影响因子:0
- 作者:Baldwin B
- 通讯作者:Baldwin B
Security of AES Sbox designs to power analysis
AES Sbox 设计对功率分析的安全性
- DOI:10.1109/icecs.2010.5724741
- 发表时间:2010
- 期刊:
- 影响因子:0
- 作者:Boey K
- 通讯作者:Boey K
Application-oriented SHA-256 hardware design for low-cost RFID
面向应用的低成本 RFID SHA-256 硬件设计
- DOI:10.1109/iscas.2012.6271509
- 发表时间:2012
- 期刊:
- 影响因子:0
- 作者:Cao X
- 通讯作者:Cao X
Optimised Multiplication Architectures for Accelerating Fully Homomorphic Encryption
- DOI:10.1109/tc.2015.2498606
- 发表时间:2016-09
- 期刊:
- 影响因子:3.7
- 作者:Xiaolin Cao;C. Moore;Máire O’Neill;E. O'Sullivan;Neil Hanley
- 通讯作者:Xiaolin Cao;C. Moore;Máire O’Neill;E. O'Sullivan;Neil Hanley
A Private and Scalable Authentication for RFID Systems Using Reasonable Storage
使用合理存储的 RFID 系统私有且可扩展的身份验证
- DOI:10.1109/trustcom.2011.48
- 发表时间:2011
- 期刊:
- 影响因子:0
- 作者:Cao X
- 通讯作者:Cao X
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Máire O'Neill其他文献
Máire O'Neill的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
{{ truncateString('Máire O'Neill', 18)}}的其他基金
TruDetect: Trustworthy Deep-Learning based Hardware Trojan Detection
TruDetect:值得信赖的基于深度学习的硬件木马检测
- 批准号:
EP/X036960/1 - 财政年份:2023
- 资助金额:
$ 184.8万 - 项目类别:
Research Grant
Centre for Secure Information Technologies (CSIT) - Phase 3
安全信息技术中心 (CSIT) - 第 3 阶段
- 批准号:
EP/X022323/1 - 财政年份:2022
- 资助金额:
$ 184.8万 - 项目类别:
Research Grant
SIPP - Secure IoT Processor Platform with Remote Attestation
SIPP - 具有远程认证的安全物联网处理器平台
- 批准号:
EP/S030867/1 - 财政年份:2019
- 资助金额:
$ 184.8万 - 项目类别:
Research Grant
DeepSecurity - Applying Deep Learning to Hardware Security
DeepSecurity - 将深度学习应用于硬件安全
- 批准号:
EP/R011494/1 - 财政年份:2017
- 资助金额:
$ 184.8万 - 项目类别:
Research Grant
相似国自然基金
Next Generation Majorana Nanowire Hybrids
- 批准号:
- 批准年份:2020
- 资助金额:20 万元
- 项目类别:
相似海外基金
Collaborative Research: Constraining next generation Cascadia earthquake and tsunami hazard scenarios through integration of high-resolution field data and geophysical models
合作研究:通过集成高分辨率现场数据和地球物理模型来限制下一代卡斯卡迪亚地震和海啸灾害情景
- 批准号:
2325311 - 财政年份:2024
- 资助金额:
$ 184.8万 - 项目类别:
Standard Grant
CAREER: Next-Generation Methods for Statistical Integration of High-Dimensional Disparate Data Sources
职业:高维不同数据源统计集成的下一代方法
- 批准号:
2422478 - 财政年份:2024
- 资助金额:
$ 184.8万 - 项目类别:
Continuing Grant
Next Generation Tools For Genome-Centric Multimodal Data Integration In Personalised Cardiovascular Medicine
个性化心血管医学中以基因组为中心的多模式数据集成的下一代工具
- 批准号:
10104323 - 财政年份:2024
- 资助金额:
$ 184.8万 - 项目类别:
EU-Funded
NEXT GENERATION TOOLS FOR GENOME-CENTRIC MULTIMODAL DATA INTEGRATION IN PERSONALISED CARDIOVASCULAR MEDICINE
用于个性化心血管医学中以基因组为中心的多模式数据集成的下一代工具
- 批准号:
10098097 - 财政年份:2024
- 资助金额:
$ 184.8万 - 项目类别:
EU-Funded
Collaborative Research: Constraining next generation Cascadia earthquake and tsunami hazard scenarios through integration of high-resolution field data and geophysical models
合作研究:通过集成高分辨率现场数据和地球物理模型来限制下一代卡斯卡迪亚地震和海啸灾害情景
- 批准号:
2325312 - 财政年份:2024
- 资助金额:
$ 184.8万 - 项目类别:
Standard Grant
Next generation forest dynamics modelling using remote sensing data
使用遥感数据的下一代森林动力学建模
- 批准号:
MR/Y033981/1 - 财政年份:2024
- 资助金额:
$ 184.8万 - 项目类别:
Fellowship
Empowering Next-Generation Spatial Digital Twins with Linked Spatial Data
利用链接的空间数据赋能下一代空间数字孪生
- 批准号:
DP240101006 - 财政年份:2024
- 资助金额:
$ 184.8万 - 项目类别:
Discovery Projects
Collaborative Research: Constraining next generation Cascadia earthquake and tsunami hazard scenarios through integration of high-resolution field data and geophysical models
合作研究:通过集成高分辨率现场数据和地球物理模型来限制下一代卡斯卡迪亚地震和海啸灾害情景
- 批准号:
2325310 - 财政年份:2024
- 资助金额:
$ 184.8万 - 项目类别:
Standard Grant
Archer: Next-generation unstructured data access for hospitals and clinical trial sponsors, delivering efficiency, reducing costs and improving care
Archer:为医院和临床试验申办者提供下一代非结构化数据访问,提高效率、降低成本并改善护理
- 批准号:
10096804 - 财政年份:2024
- 资助金额:
$ 184.8万 - 项目类别:
Collaborative R&D
Data-driven design of Next Generation Cross-Coupling catalysts by Ligand Parameterisation: A Combined Experimental and Computational Approach.
通过配体参数化进行下一代交叉偶联催化剂的数据驱动设计:实验和计算相结合的方法。
- 批准号:
2896325 - 财政年份:2023
- 资助金额:
$ 184.8万 - 项目类别:
Studentship