System On Chip
System On Chip
System On Chip
VLSI Design
Volume 2011, Article ID 731957, 10 pages
doi:10.1155/2011/731957
Review Article
SoC: A Real Platform for IP Reuse, IP Infringement, and
IP Protection
Debasri Saha and Susmita Sur-Kolay
Advanced Computing and Microelectronics Unit, Indian Statistical Institute, Kolkata 700108, India
Correspondence should be addressed to Debasri Saha, debasri r@isical.ac.in
Received 12 October 2010; Revised 4 January 2011; Accepted 24 January 2011
Academic Editor: Shiyan Hu
Copyright 2011 D. Saha and S. Sur-Kolay. This is an open access article distributed under the Creative Commons Attribution
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly
cited.
Increased design complexity, shrinking design cycle, and low costthis three-dimensional demand mandates advent of system-onchip (SoC) methodology in semiconductor industry. The key concept of SoC is reuse of the intellectual property (IP) cores. Reuse
of IPs on SoC increases the risk of misappropriation of IPs due to introduction of several new attacks and involvement of various
parties as adversaries. Existing literature has huge number of proposals for IP protection (IPP) techniques to be incorporated
in the IP design flow as well as in the SoC design methodology. However, these are quite scattered, limited in possibilities in
multithreat environment, and sometimes mutually conflicting. Existing works need critical survey, proper categorization, and
summarization to focus on the inherent tradeo, existing security holes, and new research directions. This paper discusses the
IP-based SoC design flow to highlight the exact locations and the nature of infringements in the flow, identifies the adversaries,
categorizes these infringements, and applies strategic analysis on the eectiveness of the existing IPP techniques for these categories
of infringements. It also clearly highlights recent challenges and new opportunities in this emerging field of research.
1. Introduction
In the recent era of automation, there are urgent needs
of highly complex and application-specific multifunctional
chips in every sphere of life. Customers specification
for complex chip causes explosion of gates on a single
chip, advancement in process technology, and requirement
for integrating heterogeneous technologies. The increased
design complexity consequently needs more design eort.
However, requirements for application-specific chips in
every sphere mandate enhanced productivity and low cost.
The only way to bridge the gap is to adopt hierarchical
approach and reuse of already designed, optimized, and
verified design components or fabricated and tested hardware cores to meet specification of a complex chip in time
and at low cost. The way of designing an electronic system
from the scratch has been replaced and system-on-chip
(SoC) has emerged as an inevitable solution, where the
major functional components of a complete end product
are integrated into a single chip. Already-designed electronic
components or fabricated hardware chips to be reused for
2
realize a more complex system. The components of an SoC
and the way of IP reuse in SoC environment are shown in
Figure 1.
As reuse of IP is promoted in SoC environment, access
control becomes essential for the IPs. In order to reuse an
IP component on SoC, the SoC company should purchase
the IP from its genuine vendor in legitimate way. Further, its
reuse in SoC design house, in fabrication facility, and in SoC
application environment should be protected. Unauthorized
reuse of an IP by an SoC company and any other adversary
renders loss of revenue to the genuine IP owner (IP
vendor/IP creator), thus causes economic damage to the IP
vendor.
An IP may be infringed during its design as well as
during designing an SoC reusing that IP. So, in silicon
industries, first, IP protection (IPP) techniques have been
incorporated in VLSI design flow, and later on, security considerations have been extended for SoC design
methodology. IPP techniques often rely on standard security
mechanisms like cryptography, obfuscation, watermarking,
fingerprinting, and so forth. Design concepts, system level
knowledge and mechanism, design or chip level analysis,
and characterization sometimes form the basis of the IPP
techniques.
Section 2 discusses in detail the state of the art of IP reuse,
IP infringement, and IP protection in SoC environment.
Section 3 focuses on critical challenges, and Section 4
highlights the new opportunities in the field of SoC security.
Conclusion appears in Section 5.
VLSI Design
General-purpose P
P
RAM
ROM
Programmable
block
Controller
IP
IP
IP
(a)
IP vendor1
IP1
Design house1
SoC1
IP vendor2
IP vendor3
IP3
IP2
Design house2
SoC2
IP vendorn
IPn
Design housem
SoCm
System designer
System
(b)
VLSI Design
3
Design tool owner
Design tool
IP vendor
(design
house)
SoC company
(design house)
Design
team
Partial
design
Design IP
IC
Redesigned
IP
Selling
Design
team
Virtual
component
IC
Mask
Fabrication
facility
IC
Block-based
SoC
Mask
IC
Plug-and-play SoC
IP Vendor
IP/SoC design
tool owner
Fabrication
facility
Design team
SoC company
Other
IP vendors
SoC user
Remote machine,
unknown adversary
VLSI Design
SoC design tool owner
Design tool
(3) Trojan inclusion
(1) Hacking
(2) Reselling
IP vendor
(design
house)
IC
SoC
company
Design
team
Partial
design
(3) Trojan
inclusion
Design IP
SoC company
(design house)
Design
team
Redesigned
IP
(4) Reselling
(3) Trojan
inclusion
Virtual
component
Selling
Block-based
SoC
IC
(5) Hacking
(7) HTH
inclusion
Mask
IC
Mask
Fabrication
facility
IC
(8) Illegal
IC creation
Mask
Mask
(7) HTH
inclusion
IC
IC
(6) Illegal
access
Plug-and-play SoC
IC
(9) Trojan
side channel
IC
IC
Another
IC
Plug-and-play
SoC
Loss of IP vendor
3, 4, 5, 6, 7, 8, 9, 10
VLSI Design
(i) An SoC design tool or a firm/hard IP is often resold
by its legitimate buyer (an SoC design house) to
another SoC design house in an illegal way.
(ii) From a mask of a hard IP or a virtual component,
an untrusted fabrication facility may create illegal ICs
or construct an additional mask, which is later on
utilized to create any number of illegal ICs. Then
the untrusted fabrication facility in unauthorized way
sells these illegal ICs to SoC companies where those
are reused on a plug-and-play SoC.
An hardware instance of an IP, that is, an IC, may be
altered, replaced, or spoofed while is being used on a system.
Therefore, each IC also needs separate authentication.
2.2.3. Information Retrieval through Trojan Horse. Trojanbased attack consists of inclusion of trojan horse (addition/modification of circuitry or design specification) into an
IP by an adversary and later on, retrieval of circuit and design
information through the already inserted trojan. This attack
becomes relevant in SoC platform [9].
Trojan horse may be included in any of the following
ways.
(i) Synthesis by an unreliable design team or usage
of an untrusted design tool or an untrusted FPGA
configuration tool may insert trojan horse into a
soft/firm IP in IP design house or into a firm IP
purchased in SoC design house.
(ii) In SoC company, unreliable firmware designer may
maliciously modify interface definition of an IP,
that is, its specification, to extract information from
an IC after fabrication. Sometimes, untrusted SoC
system design tool, used to redesign interface of an
IP, facilitates unauthorized extraction of information
from an IC fabricated from that IP.
(iii) Trojan Horses may be inserted into a mask by
unreliable fabrication facility during fabrication so
that the ASICs fabricated from that mask are trojaninfected.
Hardware trojan horse (HTH) acts as a side channel
and leaks circuit and design information in the following
scenarios.
(i) From an ASIC containing trojan horse, valuable
information may be retrieved by the SoC designer
during SoC realization or by an SoC user, while the
IC is functional on SoC.
(ii) Information may also be extracted from an IP
through any other untrusted hardware IP, while there
is exchange of data between these two IPs.
(iii) While an hardware IP is communicating with a
remote hardware (which may be malicious or their
communication channel may be intercepted), trojan
may leak information from the hardware IP.
In order to counterfeit these three major categories of
IP misappropriation, several IP protection techniques have
5
been adopted in various stages of IP-based SoC flow. Several
critical attacks have also been designed to crack these security
mechanisms or render these ineective. The next section
discusses on IPP techniques, attacks on those, and their
countermeasures.
2.3. IP Protection in SoC
2.3.1. Locking-Based Security. This is a direct/active way to
prevent unauthorized access of an electronic IP, to render
illegally created/intercepted ICs useless and to protect communication of a hardware IP with remote devices. Lockingbased security techniques include encryption, obfuscation,
and remote activation.
(i) A hard IP, which is a design layout file in either GDSII
(graphics data system II) or OASIS (open artwork system
interchange standard) binary format, is locked by applying
cryptographic encryption [10] on its binary content. It is
encrypted while transferred from design house of IP/SoC
company to fabrication foundry, where it is decrypted
prior to fabrication. Symmetric (private) key cryptographic
algorithms (e.g., DES, i.e., data encryption standard, AES,
i.e., advanced encryption standard [11]) use same key
for encryption and decryption, whereas, in public key
cryptographic algorithms (e.g, RSA, ECC, i.e., elliptic key
cryptography [11]) two separate keys are used for encryption
and decryption. For FPGA design, corresponding bitfile
core is kept encrypted [12] during its transmission to the
SoC company, where it is decrypted using a decryption
unit on FPGA hardware. Contrary to encryption which
renders cipher text unreadable, another eective technique
is obfuscation of an electronic IP, which renders the IP
unusable to serve the purpose of security. The technique in
[13] deterministically obfuscates a firm IP to a low-quality
design using a secret key prior to transmission so that the
high-quality IP can be regenerated only by the authorized
person. It is directly applicable to firm IPs, thereby provides
a faster way for its access control.
(ii) In the following techniques, IP is so designed that
its each hardware instance needs a distinct secret key to
be operational. If such an IC is illegally created by a
malicious foundry or intercepted by an unauthorized person,
its unauthorized user does not have the secret key, thus
interception/illegal creation of ICs becomes useless.
An hardware instance of IP, that is, an IC, is locked
by scrambling the control bus by controlled reversible bit
permutations and substitutions [14]. Passive metering [15]
registers each IC in a database uniquely based on its gate level
characteristics. It can only detect illegal ICs by authenticating
a chip against the database. In its active counterpart [16],
design house keeps control of illegal ICs through monitoring
of IC property and reuse, and by disabling functionalities
of illegal ICs. The idea is further developed in remote
activation technique [17], which replicates few states of
underlying finite state machine (FSM) of an IP and then
exploits inherent unclonable manufacturing variability to
generate unique ID for each IC and adds a control, based
on the unique ID, to the state transitions. Thus, it facilitates
VLSI Design
VLSI Design
temperature, and electromagnetic profile. The technique is
also capable of detecting trojan of 3-4 orders of magnitude
smaller than the main circuit using signal processing [28].
The above two techniques in (iv), and (v) can be categorized
as postfabrication IC fingerprinting techniques. In (iv), PUF
structure is embedded in the IP design by the IP design house
as a prerequisite.
(vi) Signature of IP vendor, that is, watermark, may be
embedded into logic synthesis phase through incremental
technology mapping of selective disjoint closed cones [29].
(vii) Signatures of both IP vendor and IP buyer are
stored as configuration bitstream of unused configurable
logic blocks (CLBs) of FPGA [30].
The techniques in (i) and (ii) are associated with
behavioral phase and, therefore, are applicable to both ASIC
and FPGA. The techniques in (iii), (iv) and (v) are for ASIC
authentication and those in (vi), and (vii) are for FPGA
bitfile core authentication.
While a hardware IP is operational on SoC and needs to
communicate with an external device or remote hardware,
hardware security module on the SoC authenticates the
device prior to establishing communication. In the technique
discussed in [23], a secure hardware/cryptoprocessor in
an SoC authenticates the remote processor by challenging
it to compute a check sum that depends on cycle-bycycle activities of its internal microarchitectural mechanisms
for a given code within a time limit. Thus, it controls
unauthorized access of data from an IP operating on SoC.
2.3.3. Security against Trojan Horse. An IP, to be reused on
SoC, is first handled by the SoC system designer, who is well
equipped with circuit and system knowledge, and when it is
operational on SoC, it exchanges data with other hardware
IPs on SoC and other external devices or remote hardware.
So, if the IP is already trojan-infected, trojan side channel
attack is quite prominent. So, detection of existence of trojan
becomes essential prior to dispatching the chip to SoC
company. Trojan may be inserted in design level as well as
during its fabrication. So, we need ecient trojan detection
techniques eective for both design and hardware IP.
Information hiding strategy to design trusted system [31]
is capable of detecting possible existence of trojan horse in
design IP. In this work, an IP company (design team 1)
creates a high-quality partial solution for a given problem
specification and extracts a modified specification from that
partial solution. The modified specification is then sent to
another design team (team 2 which may be untrusted).
From the complete design generated by the team 2, a partial
solution is extracted to cross-check it with the high-quality
partial solution created by team 1 to detect possible inclusion
of trojan by team 2.
The technique in [32] precisely measures actual combinational delay of large number of paths. Thus, it can detect
hardware trojan horse (HTH) due to increase in delay at
certain paths. This method characterizes each fabricated IC
instance based on manufacturing variability, therefore, it is
eective for IC fingerprinting. However, it is exhaustive and
not time ecient.
7
Among the trojan detection techniques based on gatelevel characterization (GLC), [33] characterizes gates using
physical properties specifically leakage current. Measurements on leakage current are processed with linear programming (LP). It imposes additional constraints on LP
formulation to indicate nature and location of additional
ghost circuitry. However, this technique cannot characterize
all the gates due to collinearity and cannot detect collinear
HTH. The technique in [34] breaks the correlations by
applying thermal control on the process of GLC. Thermal
conditioning imposes extra variations on gate level leakage
power by characterizing switching power followed by heat
dissipation due to it. Both of them are eective for process
invariant trojan detection.
The authors of [35] proposed an IPP technique for
detection of trojan horse inserted in FPGA design files, from
bitfile core, or from FPGA hardware loaded with bitfile core.
It is a parity-based method and uses two-level randomized
ECC structures. Failing to detect desired parity relation
signals possible existence of additional circuitry, that is,
trojan in the FPGA design.
The technique in [36] resists an untrusted synthesis CAD
tool to add/modify design specification. It employs the CAD
tool under inspection to dicult scheduling and assignment
synthesis tasks for a completely specified pertinent design
so that there is no room for the tool to add malicious
circuitry. The technique uses a trusted tool to fully account
all resources at each step.
Eectiveness of several IPP techniques for various security aspects are summarized in Table 1. Y in a cell indicates
the technique in the corresponding row is eective to achieve
the security aspect specified in the corresponding column.
3. Challenges
(i) In the SoC environment, SoC designer has enough
opportunity to misappropriate an IC during realization of the SoC. An IC exchanges data with
other hardware IPs on SoC and external devices or
remote hardware. SoC users, other IPs on SoC and
external or remote device may be malicious, so an IC
faces multiple security threats in SoC environment.
Remote activation authenticates an IC as a legal
instance of hardware IP, but if the IC belongs to some
untrusted source, its remote access may pose threats
to other trusted IP components on the same SoC.
(ii) In SoC environment, each instance of IP, that is, IC,
needs to be protected. All the existing techniques to
control access of ICs use PUF-based IC fingerprinting. However, signature of an IC is limited in length,
and an attacker may guess a signature by developing
a timing model for PUF structure.
(iii) Emphasis has been given to IC fingerprinting and
design IP watermarking. However, fingerprinting of
design IPs is quite relevant as transaction of IP
often takes place in form of firm/hard IP between IP
vendor and SoC company. A fingerprinting technique
VLSI Design
Table 1: Eectiveness of IPP techniques for the following security aspects.
IPP techniques
Charbon and Torunoglu 2000 [10]
IP
Access control
IC
Data from IC
Authentication
IP
IC
Trojan detection
From design
From hardware
Y
Y
4. New Opportunities
(i) There is no sole technique to ensure protection
in all the three major security aspects shown in
Table 1. Furthermore, any technique, which serves
two security purposes, is not equally ecient and
robust in both the tasks.
(ii) We are in need of ecient techniques for certain
detection of presence of trojan horse both at design
level as well as at hardware level.
(iii) The existing countermeasures to side channel attacks
cannot prevent the new class of side channel attacks
based on CPA and MIA. SoC-based industry, therefore, awaits for innovative solutions to resist these
attacks.
5. Conclusion
Rapid growth of technology in semiconductor industry continually creates new security holes specially in SoC platform.
As security threats have direct impact on Psilicon-based
VLSI Design
economy, these threats demand immediate solutions to check
misuse of technology and consequently loss of revenue for
the IP companies. In recent trends, design-for-security for
IP-based SoC design methodology forms an open research
area, where constant eort and domain expertise are needed
to check misappropriation of IPs.
References
[1] R. Rajsuman, System-On-a-Chip, Artech House, London, UK,
2009.
[2] W. Wolf, Modern VLSI Design: IP-Based Design, Prentice Hall,
New York, NY, USA, 2008.
[3] S. Raif and K. Arno, Reuse Techniques for VLSI Design, Kluwer
Academic Press, Boston, Mass, USA, 1999.
[4] R. Seepold and N. M. Madrid, Virtual Components Design and
Reuse, Kluwer Academic Press, Boston, Mass, USA, 2000.
[5] D. Mathaikutty and S. Shukla, Metamodelling-Driven IP Reuse
for SoC Integration and Microprocessor Design, Artech House,
London, UK, 2009.
[6] G. Qu and M. Potkonjak, Intellectual Property Protection in
VLSI Designs: Theory and Practice, Kluwer Academic Press,
Boston, Mass, USA, 2003.
[7] D. Saha, P. Dasgupta, S. Sur-Kolay, and S. Sen-Sarma, A
novel scheme for encoding and watermark embedding in VLSI
physical design for IP protection, in Proceedings of the International Conference on Computing: Theory and Applications
(ICCTA 07), pp. 111116, March 2007.
[8] A. B. Kahng, J. Lach, W. H. Mangione-Smith et al.,
Constraint-based watermarking techniques for design IP
protection, IEEE Transactions on Computer-Aided Design of
Integrated Circuits and Systems, vol. 20, no. 10, pp. 12361252,
2001.
[9] A.-R. Sadeghi and D. Naccache, Towards Hardware-Intrinsic
Security: Foundations and Practice, Springer, New York, NY,
USA, 2010.
[10] E. Charbon and I. H. Torunoglu, On intellectual property
protection invited paper, in Proceedings of the 22nd Annual
Custom Integrated Circuits Conference (CICC 00), pp. 517
522, May 2000.
[11] A. Menezes, P. V. Oorschot, and S. Vanstone, Handbook of
Applied Cryptography, CRC Press, New York, NY, USA, 1996.
[12] W. Adi, R. Ernst, B. Soudan, and A. Hanoun, VLSI design
exchange with intellectual property protection in FPGA
environment using both secret and public-key cryptography,
in Proceedings of the IEEE Annual Symphosium on VLSI
(ISVLSI 06), pp. 2432, 2006.
[13] D. Saha and S. Sur-Kolay, Encoding of floorplans through
deterministic perturbation, in Proceedings of the 22nd International Conference on VLSI Design, pp. 315320, January
2009.
[14] J. A. Roy, F. Koushanfar, and I. L. Markov, Protecting busbased hardware IP by secret sharing, in Proceedings of the 45th
Design Automation Conference (DAC 08), pp. 846851, June
2008.
[15] Y. Alkabani, F. Koushanfar, N. Kiyavash, and M. Potkonjak,
Trusted integrated circuits: a nondestructive hidden characteristics extraction approach, Proceedings of the Information
Hiding, pp. 112117, 2008.
[16] Y. Alkabani and F. Koushanfar, Active hardware metering for
intellectual property protection and security, in Proceedings of
the USENIX Security Symphosium, pp. 291306, 2007.
9
[17] Y. Alkabani, F. Koushanfar, and M. Potkonjak, Remote
activation of ICs for privacy prevention and digital right
management, in Proceedings of the International Conference on
CAD, pp. 674677, 2007.
[18] R. S. Chakraborty and S. Bhunia, HARPOON: an
obfuscation-based SoC design methodology for hardware
protection, IEEE Transactions on Computer-Aided Design of
Integrated Circuits and Systems, vol. 28, no. 10, pp. 14931502,
2009.
[19] J. M. Granado-Criado, M. A. Vega-Rodrguez, J. M. Sanchez
Perez, and J. A. Gomez-Pulido,
A new methodology to
implement the AES algorithm using partial and dynamic
reconfiguration, Integration, the VLSI Journal, vol. 43, no. 1,
pp. 7280, 2010.
[20] Z. Dyka and P. Langendoerfer, Area ecient hardware
implementation of elliptic curve cryptography by iteratively
applying karatsubas method, in Proceedings of the Design
Automation and Test in Europe, vol. 3, pp. 7075, 2005.
[21] D. Suzuki, M. Saeki, and T. Ichikawa, Random Switching
Logic: A Counter-Measure against DPA based on Transition
Probability, ePrint Archive, 2004.
[22] E. Prou and R. McEvoy, First-order side-channel attack on
the permutation table countermeasures, in Proceedings of the
Cryptographic Hardware and Embedded Systems, pp. 8196,
2009.
[23] D. Deng, A. H. Chan, and G. Edward Suh, Hardware authentication leveraging performance limits in detailed simulations
and emulations, in Proceedings of the 46th Design Automation
Conference (DAC 09), pp. 682687, 2009.
[24] E. Castillo, U. Meyer-Baese, A. Garca, L. Parrilla, and A.
Lloris, IPP@HDL: ecient intellectual property protection
scheme for IP cores, IEEE Transactions on Very Large Scale
Integration (VLSI) Systems, vol. 15, no. 5, pp. 578591,
2007.
[25] A. T. Abdel-Hamid, S. Tahar, and EL. M. Aboulhamid,
A public-key watermarking technique for IP designs, in
Proceedings of the Design, Automation and Test in Europe
(DATE 05), pp. 330335, March 2005.
[26] D. Saha and S. Sur-Kolay, A unified approach for IP protection across design phases in a packaged chip, in Proceedings of
the 23rd International Conference on VLSI Design, pp. 105110,
January 2010.
[27] M. Majzoobi and F. Koushanfar, Techniques for design
and Implementation of secure reconfigurable PUFs, ACM
Transactions on Reconfigurable Technology and Systems, vol. 2,
no. 1, article 5, 2009.
[28] D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B.
Sunar, Trojan detection using IC fingerprinting, in Proceedings of the IEEE Symposium on Security and Privacy (SP 07),
pp. 296310, May 2007.
[29] A. Cui, C. H. Chang, and S. Tahar, IP watermarking using
incremental technology mapping at logic synthesis level, IEEE
Transactions on Computer-Aided Design of Integrated Circuits
and Systems, vol. 27, no. 9, pp. 15651570, 2008.
[30] J. Lach, W. H. Mangione-Smith, and M. Potkonjak, Fingerprinting techniques for field-programmable gate array intellectual property protection, IEEE Transactions on ComputerAided Design of Integrated Circuits and Systems, vol. 20, no. 10,
pp. 12531261, 2001.
[31] J. Gu, G. Qu, and Q. Zhou, Information hiding for trusted
system design, in Proceedings of the 46th Design Automation
Conference (DAC 09), pp. 698701, July 2009.
10
[32] J. Li and J. Lach, At-speed delay characterization for IC
authentication and Trojan horse detection, in Proceedings
of the IEEE International Workshop on Hardware-Oriented
Security and Trust (HOST 08), pp. 814, June 2008.
[33] M. Potkonjak, A. Nahapetian, M. Nelson, and T. Massey,
Hardware trojan horse detection using gate-level characterization, in Proceedings of the 46th Design Automation
Conference (DAC 09), pp. 688693, July 2009.
[34] S. Wei, S. Meguerdichian, and M. Potkonjak, Gate-level characterization: foundations and hardware security applications,
in Proceedings of the Design Automation Conference (DAC 10),
pp. 222227, 2010.
[35] S. Dutt and L. Li, Trust-based design and check of FPGA
circuits using two-level randomize ECC structure, ACM
Transactions on Reconfigurable Technology and Systems, vol. 2,
no. 1, 2009.
[36] M. Potkonjak, Synthesis of trustable ICs using untrusted
CAD tools, in Proceedings of the Design Automation Conference, pp. 633634, 2010.
[37] T. Nie and M. Toyonaga, An ecient and reliable watermarking system for IP Protection, IEICE Transactions on
Fundamentals of Electronics, Communications and Computer
Sciences, vol. E90-A, no. 9, pp. 19321939, 2007.
VLSI Design
International Journal of
Rotating
Machinery
The Scientific
World Journal
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Engineering
Journal of
Volume 2014
Volume 2014
Advances in
Mechanical
Engineering
Journal of
Sensors
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
International Journal of
Distributed
Sensor Networks
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Advances in
Civil Engineering
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Volume 2014
Advances in
OptoElectronics
Journal of
Robotics
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Volume 2014
VLSI Design
Modelling &
Simulation
in Engineering
International Journal of
Navigation and
Observation
International Journal of
Chemical Engineering
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Volume 2014
Advances in
Volume 2014
Volume 2014
Journal of
Control Science
and Engineering
Volume 2014
International Journal of
Journal of
Antennas and
Propagation
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Volume 2014
Volume 2014