Show simple item record

dc.contributor.advisorMakris, Yiorgos
dc.contributor.advisorNosratinia, Aria
dc.creatorSubramani, Kiruba Sankaran
dc.date.accessioned2018-11-08T21:09:23Z
dc.date.available2018-11-08T21:09:23Z
dc.date.created2018-08
dc.date.issued2018-08
dc.date.submittedAugust 2018
dc.identifier.urihttp://hdl.handle.net/10735.1/6301
dc.description.abstractThe area of hardware security has received intense scrutiny in recent years due to outsourcing of semiconductor device manufacturing, use of third party Intellectual Properties (IPs) in the fabricated design, Electronic Design Automation (EDA) tools and software from different vendors, etc. Therefore, there is a general notion that the IC supply chain isn’t as secure as it used to be. This problem is further aggravated by the fact that the cost of having a fully trusted supply chain is too expensive. As a result, government entities, the semiconductor industry and academic groups have spent a lot of time and effort to secure the IC supply chain. Over the past decade, the area of hardware security has seen a lot of research activity, mainly focusing on the digital domain, addressing the design and development of secure microprocessors. However, little has been done in the Analog/RF design space including wireless networks. Therefore, in this research work, security vulnerabilities in wireless networks are explored, covering a broad design space spanning from the baseband to the Analog/RF front-end of a wireless device. The proposed approach is to first develop a metric to quantify the hardware Trojan threat in wireless devices. Next, the design space in a wireless device is explored to identify blocks that possess vulnerabilities that can be represented in terms of the defined metric. For each of the identified vulnerabilities, a theoretical analysis of the hardware Trojan threat is performed, followed by simulation and experimental evaluation of the Trojan’s impact on a user communication link. Accordingly, Trojan-agnostic defense techniques are developed to prevent these classes of hardware Trojan attacks and their effectiveness is evaluated under practical operating conditions.
dc.format.mimetypeapplication/pdf
dc.language.isoen
dc.rights©2018 The Author. Digital access to this material is made possible by the Eugene McDermott Library. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author.
dc.subjectHardware Trojans (Computers)
dc.subjectWireless communication systems
dc.subjectError-correcting codes (Information theory)
dc.subjectAnalog integrated circuits
dc.subjectRadio frequency integrated circuits
dc.subjectIEEE 802.11 (Standard)
dc.titleHardware Trojans in Wireless Networks
dc.typeDissertation
dc.date.updated2018-11-08T21:09:24Z
dc.type.materialtext
thesis.degree.grantorThe University of Texas at Dallas
thesis.degree.departmentElectrical Engineering
thesis.degree.levelDoctoral
thesis.degree.namePHD


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record