×
Well done. You've clicked the tower. This would actually achieve something if you had logged in first. Use the key for that. The name takes you home. This is where all the applicables sit. And you can't apply any changes to my site unless you are logged in.

Our policy is best summarized as "we don't care about _you_, we care about _them_", no emails, so no forgetting your password. You have no rights. It's like you don't even exist. If you publish material, I reserve the right to remove it, or use it myself.

Don't impersonate. Don't name someone involuntarily. You can lose everything if you cross the line, and no, I won't cancel your automatic payments first, so you'll have to do it the hard way. See how serious this sounds? That's how serious you're meant to take these.

×
Register


Required. 150 characters or fewer. Letters, digits and @/./+/-/_ only.
  • Your password can’t be too similar to your other personal information.
  • Your password must contain at least 8 characters.
  • Your password can’t be a commonly used password.
  • Your password can’t be entirely numeric.

Enter the same password as before, for verification.
Login

Grow A Dic
Define A Word
Make Space
Set Task
Mark Post
Apply Votestyle
Create Votes
(From: saved spaces)
Exclude Votes
Apply Dic
Exclude Dic

Click here to flash read.

Intelligent Electronic Devices (IEDs) are vital components in modern
electrical substations, collectively responsible for monitoring electrical
parameters and performing protective functions. As a result, ensuring the
integrity of IEDs is an essential criteria. While standards like IEC 61850 and
IEC 60870-5-104 establish cyber-security protocols for secure information
exchange in IED-based power systems, the physical integrity of IEDs is often
overlooked, leading to a rise in counterfeit and tainted electronic products.
This paper proposes a physical unclonable function (PUF)-based device (IEDPUF
probe) capable of extracting unique hardware signatures from commercial IEDs.
These signatures can serve as identifiers, facilitating the authentication and
protection of IEDs against counterfeiting. The paper presents the complete
hardware architecture of the IEDPUF probe, along with algorithms for signature
extraction and authentication. The process involves the central computer system
(CCS) initiating IED authentication requests by sending random challenges to
the IEDPUF probe. Based on the challenges, the IEDPUF probe generates
responses, which are then verified by the CCS to authenticate the IED.
Additionally, a two-way authentication technique is employed to ensure that
only verified requests are granted access for signature extraction.
Experimental results confirm the efficacy of the proposed IEDPUF probe. The
results demonstrate its ability to provide real-time responses possessing
randomness while uniquely identifying the IED under investigation. The proposed
IEDPUF probe offers a simple, cost-effective, accurate solution with minimal
storage requirements, enhancing the authenticity and integrity of IEDs within
electrical substations

Click here to read this post out
ID: 301638; Unique Viewers: 0
Voters: 0
Latest Change: July 31, 2023, 7:30 a.m. Changes:
Dictionaries:
Words:
Spaces:
Comments:
Newcom
<0:100>