Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

Block diagram of OFDM transmitter and receiver.

More »

Fig 1 Expand

Fig 2.

Cyclic prefix property of OFDM communication scheme.

More »

Fig 2 Expand

Table 1.

Summarized threat model for AMS IC.

More »

Table 1 Expand

Fig 3.

System level block diagram of proposed wireless AES crypto IC.

More »

Fig 3 Expand

Fig 4.

Detailed block diagram of trojan free IC.

More »

Fig 4 Expand

Fig 5.

Flow chart of the AES based wireless transmitter module.

More »

Fig 5 Expand

Fig 6.

Flowchart of the AES based wireless receiver module.

More »

Fig 6 Expand

Fig 7.

Trojan trigger implementation by modifying LFSR generated using Leonardo spectrum.

More »

Fig 7 Expand

Fig 8.

Trojan data insertion in ECP of an OFDM symbol.

More »

Fig 8 Expand

Fig 9.

Flowchart of HT infested wireless transmitter module.

More »

Fig 9 Expand

Fig 10.

Detailed block diagram of trojan infested IC.

More »

Fig 10 Expand

Fig 11.

Flowchart of HT infested wireless receiver module.

More »

Fig 11 Expand

Fig 12.

Placement of SENTRY in detailed block diagram of cryptographic IC.

More »

Fig 12 Expand

Fig 13.

Detailed block diagram of SENTRY.

More »

Fig 13 Expand

Fig 14.

Flowchart of SENTRY.

More »

Fig 14 Expand

Fig 15.

Simulation waveform of trojan free wireless cryptographic IC.

More »

Fig 15 Expand

Fig 16.

Simulation waveform of trojan infested wireless cryptographic IC when HT is dormant.

More »

Fig 16 Expand

Fig 17.

Simulation waveform of the trojan infested wireless cryptographic IC when HT is active.

More »

Fig 17 Expand

Fig 18.

Simulation waveform of SENTRY with trojan free wireless cryptographic IC.

More »

Fig 18 Expand

Fig 19.

Simulation waveform of SENTRY with trojan infested wireless crypto IC.

More »

Fig 19 Expand

Table 2.

Comparison between proposed HT threat model and existing HT threat models.

More »

Table 2 Expand