Social Icons

Showing posts with label integrated circuits. Show all posts
Showing posts with label integrated circuits. Show all posts

Friday, March 29, 2024

Inside the Drone: A Chip Odyssey

In this post, we're diving into the fascinating world of drone technology as we explore the tiny yet mighty chips that power these remarkable flying machines.

In this short 4 min YouTube video, we take a closer look at the multitude of chips found within drones. From micro-controllers to GPS modules, each chip plays a vital role in ensuring smooth flight, precise navigation, and stunning aerial captures.

Watch the Video:

List discussed:

    1. Microcontrollers
    2. IMU (Inertial Measurement Unit) chips
    3. GPS modules
    4. Wireless communication chips
    5. Vision Processing Units (VPUs)
    6. Battery Management System (BMS) chips
    7. Motor controllers (ESCs - Electronic Speed Controllers)
    8. Power Management ICs
    9. Onboard camera chips
    10. Barometer sensor chips
    11. Magnetometer sensor chips
    12. Optical flow sensors
    13. Ultrasonic sensors
    14. LiDAR sensors
    15. Microphones
    16. Thermal imaging sensors
    17. FPV (First Person View) transmission chips
    18. Memory chips
    19. Temperature sensors
    20. Encryption and security chips
    21. Flight controllers
    22. Telemetry transceivers
    23. Gimbal controllers
    24. LED drivers
    25. Air quality sensors
    26. Biochemical sensors
    27. Radio frequency (RF) filters and amplifiers
    28. Digital signal processors (DSPs)
    29. Microelectromechanical systems (MEMS)
    30. Radar sensors
    31. Spectroscopy sensors
    32. Hydrophones
    33. Geiger-Müller counters
    34. Custom ASICs (Application-Specific Integrated Circuits)
    35. FPGA (Field-Programmable Gate Array)
    36. Bioacoustic sensors
    37. Laser rangefinders
    38. Electrochemical sensors
    39. Microfluidic chips
    40. Cybersecurity chips

Monday, May 04, 2015

Hardware Trojans : Do we have a Solution or Clue to resolve?

1.    IT Security is an ever interesting field and those passionate about this field will always find surplus to read about so many happening things in the field.In the already chaotic environs of Cyber Security there comes another GIGANTIC issue...by the name of HARDWARE TROJANS and I use this word Gigantic not just to reflect my reaction on the subject...but for any first time reader on the subject this will be a huge issue in times to come and is already in for majors.The issue is yet unattended because no one has clue where to detect,how to detect and what to do to resolve?

2.   Electronic systems have proliferated over the past few decades to the point that most aspects of daily life are aided or affected by the automation, control, monitoring, or computational power provided by Integrated Circuits (ICs). The ability to trust these ICs to perform their specified operation (and only their specified operation) has always been a security concern and has recently become a more active topic of research. Without trust in these ICs, the systems they support cannot necessarily be trusted to perform as specified and may even be susceptible to attack by a malicious adversary.A new disruptive threat has surfaced over the past five years  , a hardware-based security threat known as the Hardware Trojan.Hardware Trojans are intentional,malicious modifications to electronic circuitry designed to disrupt operation or compromise security including circuitry added into Integrated Circuits (ICs). These ICs underpin the information infrastructure of many critical sectors including the financial, military, and industrial sectors.Consequently, hardware trojans pose a security risk to organisations due to the broad attack surface and specific organisations’ reliance on ICT infrastructure. Hardware trojans can be difficult to prevent and even more difficult to detect. Most of the current security protection mechanisms implicitly trust the hardware, allowing hardware trojans to bypass software or firmware security measures .Hardware trojans inserted during fabrication or design stages can become widely dispersed within an organisation and pose a systemic threat.

3.   Hardware Trojans are usually composed of a Trigger and a Payload.The trigger is the activation mechanism and the payload generates the effect. Prior to triggering, a hardware trojan lies dormant without interfering with the operation of any electronics.The trigger mechanism for our network hardware trojan is based on a communication channel in network packet timing, while the payload is an adjustable degradation level of the ethernet channel through noise injection into the ethernet controller’s clock.
4.  The ease with which Hardware Trojans can make their way into modern ICs and electronic designs is concerning. Modifications to hardware can occur at any stage during the design and manufacturing process, including the specification, design, verification and manufacturing stages. Hardware Trojans may even be retro-fitted to existing ICs post manufacture.

5.   With above as a preview it makes any one wonder upto what extents would one require to go for a 100 % secure IT attribute.Imagine the risk stake this would put on a typical country who is entirely dependent on global vendors for its own Defence and Consumer goods....or for that matter even developing countries would feel the pinch....no clue as to where to start from...or even if a frame work is desired to setup a standard for controlling this menace it would be prudent to only get dependent off shores since in most of the cases expertise would not exist only.......

Thanks to these two papers for giving me an over view on the subject.

Hardware Trojans – A Systemic Threat by John Shield, Bradley Hopkins, Mark Beaumont, Chris North

Hardware Trojans – Prevention, Detection,Countermeasures by Mark Beaumont, Bradley Hopkins and Tristan Newby

Sunday, August 21, 2011

IBM developing PCs that may run 30 times faster


1.   A one-atom-thick layer of carbon has currently become the focus of interest of IBM and the U.S. military to build computers that function at near the speed of light.


2.  The focus is actually based on GRAPHENE, the thinnest and toughest material ever produced, that conducts electricity, a breakthrough that opens the door to its use in digital electronics

3.   Some key finding on GRAPHINE :

- Graphene is the basic structural element of some carbon allotropes including graphite, charcoal, carbon nanotubes and fullerenes.

- Graphene conducts electricity 30 times faster than silicon -- approaching the speed of light

- Until recently, use of graphene was limited to development of more-efficient batteries and foldable touch screens.

- Nokia, the world’s largest maker of mobile phones by volume, is investigating the material’s potential use in cell phones, touch screens, and printed electronics. 

- Graphene’s flexibility and strength is astonishingly 300 times tougher than steel - may lead to the Nokia Morph, the first foldable phone.

- “With a graphene battery the same amount of weight and volume as a current one, you could drive 300 miles instead of 100,” said Yuegang Zhang, a principal investigator at the lab. 

- Graphene has the ideal properties to be an excellent component of integrated circuits. Graphene has a high carrier mobility, as well as low noise, allowing it to be used as the channel in a FET.

4.     Thanks Wiki and electroiq
Powered By Blogger