Fig 1.
Block diagram of OFDM transmitter and receiver.
Fig 2.
Cyclic prefix property of OFDM communication scheme.
Table 1.
Summarized threat model for AMS IC.
Fig 3.
System level block diagram of proposed wireless AES crypto IC.
Fig 4.
Detailed block diagram of trojan free IC.
Fig 5.
Flow chart of the AES based wireless transmitter module.
Fig 6.
Flowchart of the AES based wireless receiver module.
Fig 7.
Trojan trigger implementation by modifying LFSR generated using Leonardo spectrum.
Fig 8.
Trojan data insertion in ECP of an OFDM symbol.
Fig 9.
Flowchart of HT infested wireless transmitter module.
Fig 10.
Detailed block diagram of trojan infested IC.
Fig 11.
Flowchart of HT infested wireless receiver module.
Fig 12.
Placement of SENTRY in detailed block diagram of cryptographic IC.
Fig 13.
Detailed block diagram of SENTRY.
Fig 14.
Flowchart of SENTRY.
Fig 15.
Simulation waveform of trojan free wireless cryptographic IC.
Fig 16.
Simulation waveform of trojan infested wireless cryptographic IC when HT is dormant.
Fig 17.
Simulation waveform of the trojan infested wireless cryptographic IC when HT is active.
Fig 18.
Simulation waveform of SENTRY with trojan free wireless cryptographic IC.
Fig 19.
Simulation waveform of SENTRY with trojan infested wireless crypto IC.
Table 2.
Comparison between proposed HT threat model and existing HT threat models.