{"title":"RAZOR A Lightweight Block Cipher for Security in IoT","authors":"Dheeraj Singh, Manoj Kumar, T. Yadav","doi":"10.14429/dsj.74.18421","DOIUrl":"https://doi.org/10.14429/dsj.74.18421","url":null,"abstract":"Rapid technological developments prompted a need to do everything from anywhere and that is growing due to modern lifestyle. The Internet of Things (IoT) technology is helping to provide the solutions by inter-connecting the smart devices. Lightweight block ciphers are deployed to enable the security in such devices. In this paper, a new lightweight block cipher RAZOR is proposed that is based on a hybrid design technique. The round function of RAZOR is designed by mixing the Feistel and substitution permutation network techniques. The rotation and XOR based diffusion function is applied on 32-bit input with 8 branches and branch number 7 to optimize the security. The strength of RAZOR is proved against differential, linear, and impossible differential attacks. The number of active S-boxes in any 5-round differential characteristic of RAZOR is 21 in comparison to the 10, 6, 4, 7, and 6 for PRESENT, Rectangle, LBlock, GIFT, and SCENERY respectively. RAZOR provides better security than the existing lightweight designs. The average throughput of 1.47 mega bytes per second to encrypt the large files makes it a better choice for software oriented IoT applications.","PeriodicalId":11043,"journal":{"name":"Defence Science Journal","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139624766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sumeet Sunilrao Ragit, Karandeep Singh, M. Srinivas
{"title":"Feasibility Study of Lithium Ion Batteries for Torpedo Applications","authors":"Sumeet Sunilrao Ragit, Karandeep Singh, M. Srinivas","doi":"10.14429/dsj.73.19015","DOIUrl":"https://doi.org/10.14429/dsj.73.19015","url":null,"abstract":"A comprehensive study on the feasibility of Lithium (Li)-ion battery technology for Light Weight Torpedoes (LWT) and Heavy Weight Torpedoes (HWT) applications are reported in this article. The global scenario of Li-ion battery technology for torpedo applications and current Indigenous Li-ion battery developments in India are studied. Configuration study of Li-ion battery for LWT and HWT with commercial cells was carried out and it is found feasible to partially meet the required power for LWT and HWT applications. A comparison of the cost per cycle of Li-ion battery versus AgO-Zn battery indicates that Li-ion batteries work out to be cheaper beyond 100 cycles of use and by an order of magnitude cheaper on average. The detailed survey on Indigenous developments reveals that cell-level development is predominant in public sector agencies, whereas the private sector is mostly focussed on the assembly of imported cells and BMS.","PeriodicalId":11043,"journal":{"name":"Defence Science Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135614884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Predictive Model with Data Scaling Methodologies for Forecasting Spare Parts Demand in Military Logistics","authors":"Jae-Dong Kim, Ji-Hwan Hwang, Hyoung-Ho Doh","doi":"10.14429/dsj.73.19129","DOIUrl":"https://doi.org/10.14429/dsj.73.19129","url":null,"abstract":"This study addresses the challenge of accurately forecasting demand for maintenance-related spare parts of the K-X tank, influenced by high uncertainty and external factors. Deep learning models with RobustScaler demonstrate significant improvements, achieving an accuracy of 86.90% compared to previous methods. RobustScaler outperforms other scaling models, enhancing machine learning performance across time series and data mining. By collecting eight years’ worth of demand data and utilising various consumption data items, this study develops accurate forecasting models that contribute to the advancement of spare parts demand forecasting. The results highlight the effectiveness of the proposed approach, showcasing its superiority in accuracy, precision, recall, and F1-Score. RobustScaler particularly excels in time series analysis, further emphasizing its potential for enhancing machine learning performance on diverse datasets. This study provides innovative techniques and insights, demonstrating the effectiveness of deep learning and data scaling methodologies in improving forecasting accuracy for maintenance spare parts demand.","PeriodicalId":11043,"journal":{"name":"Defence Science Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135566165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multistage High Capacity Reversible Data Hiding Technique Without Overhead Communication","authors":"Sanjay Kumar, Gurjit Singh Walia, Anjana Gupta","doi":"10.14429/dsj.73.18991","DOIUrl":"https://doi.org/10.14429/dsj.73.18991","url":null,"abstract":"Reversible Data Hiding(RDH) has been extensively investigated, recently, due to its numerous applications in the field of defence, medical, law enforcement and image authentication. However, most of RDH techniques suffer from low secret data hiding capacity and communication overhead. For this, multistage high-capacity reversible data hiding technique without overhead is proposed in this manuscript. Proposed reversible data hiding approach exploits histogram peaks for embedding the secret data along with overhead bits both in plain and encrypted domain. First, marked image is obtained by embedding secret data in the plain domain which is further processed using affine cipher maintaining correlation among the pixels. In second stage, overhead bits are embedded in the encrypted marked image. High embedding capacity is achieved through exploiting histogram peak for embedding multiple bits of secret data. Proposed approach is experimentally validated on different datasets and results are compared with the state-of-the-art techniques over different images.","PeriodicalId":11043,"journal":{"name":"Defence Science Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135615008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M K Jindal, Mainuddin ., S Veerabuthiran, Atul Kumar
{"title":"Design Analysis of Mid IR DIAL System for Detection of Hazardous Chemical Species","authors":"M K Jindal, Mainuddin ., S Veerabuthiran, Atul Kumar","doi":"10.14429/dsj.73.18829","DOIUrl":"https://doi.org/10.14429/dsj.73.18829","url":null,"abstract":"Nowadays, both military and public agencies are concerned with the remote detection of toxic gases and chemical warfare agents in the atmosphere. A promising method for the remote detection of such harmful chemicals in the atmosphere is Differential Absorption Lidar (DIAL). In the current paper, system design analysis has been carried out to build a DIAL system for the detection of toxic chemical warfare agents, chemical warfare simulants, explosive precursors, and pollutants. The proposed DIAL system comprises an Optical Parametric Oscillator (OPO) based tuneable laser, a 203 mm diameter Cassegrain telescope, a TE-cooled MCT detector, suitable data acquisition hardware, etc. The DIAL output parameters like return signals, SNR, and minimum measurable concentrations have been simulated under different weather conditions such as clear sky, moderately hazy sky, and hazy atmospheric conditions for given system input parameters (pulse energy, detectivity, bandwidth, DAQ resolution, etc.). We have considered chemicals such as Sarin, Thiodiglycol (TDG), acetone, and methane to be detected using the system. Analysis has been carried out for these chemicals present at different locations with varying concentrations. Our analysis reveals that the DIAL system with a laser transmitter of 5 mJ energy and 203 mm receiver telescope is capable of detecting a few ppm concentrations of toxic chemicals present anywhere between the ranges from a few tens of meters to 2 km with topographic target present. The sensitivity of the system in terms of minimum detectable concentrations for the considered chemicals is also estimated for different atmospheric conditions. It is seen that the minimum detectable concentration of TDG is 3.2 ppm in clear weather conditions which increases to 9.2 ppm under a hazy atmosphere. A similar analysis has been carried out for other toxic chemicals and has been discussed in the paper.","PeriodicalId":11043,"journal":{"name":"Defence Science Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135566164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secrecy of WSN Data Over Nakagami m Fading Channels with Selection Combining Diversity","authors":"Hemant Kumar Sharma, Brijesh Kumbhani","doi":"10.14429/dsj.73.18804","DOIUrl":"https://doi.org/10.14429/dsj.73.18804","url":null,"abstract":"We consider the security of wireless sensor network (WSN) data over Nakagami – m fading channels at the physical layer. A WSN in which the fusion center performs selection diversity has been considered for better quality reception. The links between the WSN node and fusion center are assumed to follow Nakagami-m fading distribution. Closed-form expressions for secrecy outage probability (SOP) are derived, and it is established that SOP analysis also leads to the analysis of the existence of secrecy as a special case of SOP. The analytical expressions have been validated through results from simulations. The analysis is valid for all positive real values of the fading parameter, m. The limits on the signal-to-noise ratio can be obtained to secure the transmitted data against eavesdropping with the required SOP and secrecy rate using the analysis presented in this paper.","PeriodicalId":11043,"journal":{"name":"Defence Science Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135614886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Harminder Singh Johar, Abhijit Bhattacharya, S. Srinivasa Rao
{"title":"Fault Tolerant Brushless DC Motor Drive for Aerospace Applications","authors":"Harminder Singh Johar, Abhijit Bhattacharya, S. Srinivasa Rao","doi":"10.14429/dsj.73.18898","DOIUrl":"https://doi.org/10.14429/dsj.73.18898","url":null,"abstract":"This article brings out a Fault-tolerant BLDC motor drive for aerospace applications using the redundancy concept. In a way, it brings out a fault-tolerant strategy that can be used to continue the regular operation of a BLDC motor drive even after the occurrence of faults. As BLDC motors are used in critical and dangerous control areas like military services and space vehicles, a fault-tolerant drive is essential to maintain drive operation and provide desirable output. This article compares fault simulation results in the software model of a BLDC motor drive to those of fault simulation results in hardware for three main types of faults. Fault simulation is carried out for three types of faults, viz. inverter device open circuit fault, motor winding open circuit fault, and rotor position sensor (hall sensor) open-circuited fault. Fault tolerance is ensured by introducing a redundant drive (drive-2), which operates the complete drive at the advent of any of the faults mentioned above in the main (healthy) drive-1. A fault-tolerant (redundant) hardware comprising dual stator BLDC motor and redundant controllers is realized and operationalized. Fault simulation is carried out in this hardware, and these results are validated with the results of fault simulation in the MATLAB SIMULINK model. Software and hardware results are comparable and form a basis for developing fault-tolerant electro-mechanical actuation systems for high-reliability, high-cost applications, mainly aerospace.","PeriodicalId":11043,"journal":{"name":"Defence Science Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135614883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nomographs for Polymeric Material Selection for Environmental Conscious Design of Industrial Products","authors":"Vidya Shanker Pandey, Anil Kumar Agrawal, Ashish Dubey","doi":"10.14429/dsj.73.19016","DOIUrl":"https://doi.org/10.14429/dsj.73.19016","url":null,"abstract":"Environmentally-conscious product design using Life Cycle Assessment (LCA) deserves the utmost attention to save and sustain our planet’s lives, flora and fauna. The choice of materials during the design stage needs to address environmental concerns from their sourcing to production and ultimately going up to the disposal stage. A good majority of industrial products are still not designed, focusing the environmental concerns. The inclusion and practice of the LCA approach during product designing are in a nascent stage not only in India but even over the rest of the world. Nowadays, polymers share a major chunk of the volume of goods produced worldwide and thus have a significant effect on the environment. The available design books or nomographs guide the selection of materials considering several criteria but not considering the related environmental issues. This paper attempts to bridge this gap only for the selection of polymeric materials by providing some easily interpretable and visually ready reckoners in the form of 3-D nomographs. These 3-D nomographs, graphical representations developed using the Solidworks software, echo the material’s Environmental Impact (EI) potential on an axis with some two material properties (e.g., tensile strength and density) on the other two axes. 3-D nomographs are suitably transformed into 2-D nomographs without the loss of any information. EIs on these nomographs were computed using SimaPro software. The potential EI of any product and the overall environmental burden due to them can be significantly reduced, and more so when they are mass-produced, by selecting the right materials using these nomographs. Such an approach will help in fulfilling long-term sustainable development goals of society and the globe.","PeriodicalId":11043,"journal":{"name":"Defence Science Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135565580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of Gyroscopic Couple on Aircraft Landing Gear Shimmy","authors":"Giridharan V, Sivakumar S","doi":"10.14429/dsj.73.18932","DOIUrl":"https://doi.org/10.14429/dsj.73.18932","url":null,"abstract":"This article presents the effect of gyroscopic couples on the shimmy response of landing gear. The gyroscopic effect between the rotational motions of the aircraft’s longitudinal and vertical axes may be one of the causes of shimmy. The vertical load acting on the wheel axle plays a significant role in a tire’s dynamic characteristics, which may influence shimmy oscillation. So, vertical dynamics also need to be considered for shimmy analysis along with lateral and torsional modes. Suitable mathematical models are required to study the system’s shimmy oscillation and stability nature. The mathematical model was developed by introducing a gyroscopic couple with 5 degrees of freedom (DOF). A numeric analysis was made to investigate the influence of gyroscopic couples on the landing gear model. The simulation results of the model with and without gyroscopic couple are compared and the effect of each parameter on shimmy is studied.","PeriodicalId":11043,"journal":{"name":"Defence Science Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135614212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a Scan Chain for Side Channel Attacks on AES Cryptosystem for Improved Security","authors":"G. Sowmiya, S. Malarvizhi","doi":"10.14429/dsj.73.18879","DOIUrl":"https://doi.org/10.14429/dsj.73.18879","url":null,"abstract":"Scan chain-based attacks are side-channel attacks focusing on one of the most significant features of hardware test circuitry. A technique called Design for Testability (DfT) involves integrating certain testability components into a hardware design. However, this creates a side channel for cryptanalysis, providing crypto devices vulnerable to scan-based attacks. Advanced Encryption Standard (AES) has been proven as the most powerful and secure symmetric encryption algorithm announced by USA Government and it outperforms all other existing cryptographic algorithms. Furthermore, the on-chip implementation of private key algorithms like AES has faced scan-based side-channel attacks. With the aim of protecting the data for secure communication, a new hybrid pipelined AES algorithm with enhanced security features is implemented. This paper proposes testing an AES core with unpredictable response compaction and bit level-masking throughout the scan chain process. A bit-level scan flipflop focused on masking as a scan protection solution for secure testing. The experimental results show that the best security is provided by the randomized addition of masked scan flipflop through the scan chain and also provides minimal design difficulty and power expansion overhead with some negligible delay measures. Thus, the proposed technique outperforms the state-of-the-art LUT-based S-box and the composite sub-byte transformation model regarding throughput rate 2 times and 15 times respectively. And security measured in the avalanche effect for the sub-pipelined model has been increased up to 95 per cent with reduced computational complexity. Also, the proposed sub-pipelined S-box utilizing a composite field arithmetic scheme achieves 7 per cent area effectiveness and 2.5 times the hardware complexity compared to the LUT-based model.","PeriodicalId":11043,"journal":{"name":"Defence Science Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135614762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}