SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "L773:2327 4662 srt2:(2019)"

Sökning: L773:2327 4662 > (2019)

  • Resultat 1-17 av 17
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Chen, Zhe, et al. (författare)
  • Toward FPGA Security in IoT : A New Detection Technique for Hardware Trojans
  • 2019
  • Ingår i: IEEE Internet of Things Journal. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 2327-4662. ; 6:4, s. 7061-7068
  • Tidskriftsartikel (refereegranskat)abstract
    • Nowadays, field programmable gate array (FPGA) has been widely used in Internet of Things (IoT) since it can provide flexible and scalable solutions to various IoT requirements. Meanwhile, hardware Trojan (HT), which may lead to undesired chip function or leak sensitive information, has become a great challenge for FPGA security. Therefore, distinguishing the Trojan-infected FPGAs is quite crucial for reinforcing the security of IoT. To achieve this goal, we propose a clock-tree-concerned technique to detect the HTs on FPGA. First, we present an experimental framework which helps us to collect the electromagnetic (EM) radiation emitted by FPGA clock tree. Then, we propose a Trojan identifying approach which extracts the mathematical feature of obtained EM traces, i.e., 2-D principal component analysis (2DPCA) in this paper, and automatically isolates the Trojan-infected FPGAs from the Trojan-free ones by using a BP neural network. Finally, we perform extensive experiments to evaluate the effectiveness of our method. The results reveal that our approach is valid in detecting HTs on FPGA. Specifically, for the trust-hub benchmarks, we can find out the FPGA with always on Trojans (100% detection rate) while identifying the triggered Trojans with high probability (by up to 92%). In addition, we give a thorough discussion on how the experimental setup, such as probe step size, scanning area, and chip ambient temperature, affects the Trojan detection rate.
  •  
2.
  • Eldefrawy, Mohamed, et al. (författare)
  • Key Distribution Protocol for Industrial Internet of Things without Implicit Certificates
  • 2019
  • Ingår i: IEEE Internet of Things Journal. - 2327-4662. ; 6:1, s. 906-917
  • Tidskriftsartikel (refereegranskat)abstract
    • The deployment of the Internet of Things (IoT) in industry, called the Industrial IoT (IIoT), is supporting the introduction of very desirable improvements such as increasing production flexibility, self-organization and real-time and quick response to events. However, security and privacy challenges are still to be well addressed. The IIoT requires different properties to achieve secure and reliable systems and these requirements create extra challenges considering the limited processing and communication power available to IIoT field devices. In this research article, we present a key distribution protocol for IIoT that is computationally and communicationally lightweight (requires a single message exchange) and handles node addition and revocation, as well as fast re-keying. The scheme can also resist the consequences of node capture attacks (we assume that captured nodes can be detected by the Gateway and previous works have shown this assumption to be acceptable in practice), server impersonation attacks and provides forward/backward secrecy. We show formally the correctness of our protocol and evaluate its energy consumption under realistic scenarios using a real embedded platform compared to previous state-of-the-art key-exchange protocols, to show our protocol reliability for IIoT.
  •  
3.
  • Esfahani, Alireza, et al. (författare)
  • A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment
  • 2019
  • Ingår i: IEEE Internet of Things Journal. - : IEEE. - 2327-4662. ; 6:1, s. 288-296
  • Tidskriftsartikel (refereegranskat)abstract
    • In the emerging Industrial IoT era, Machine-to-Machine (M2M) communication technology is considered as a key underlying technology for building Industrial IoT environments where devices (e.g., sensors, actuators, gateways) are enabled to exchange information with each other in an autonomous way without human intervention. However, most of the existing M2M protocols that can be also used in the Industrial IoT domain provide security mechanisms based on asymmetric cryptography resulting in high computational cost. As a consequence, the resource-constrained IoT devices are not able to support them appropriately and thus, many security issues arise for the Industrial IoT environment. Therefore, lightweight security mechanisms are required for M2M communications in Industrial IoT in order to reach its full potential. As a step towards this direction, in this paper, we propose a lightweight authentication mechanism, based only on hash and XOR operations, for M2M communications in Industrial IoT environment. The proposed mechanism is characterized by low computational cost, communication and storage overhead, while achieving mutual authentication, session key agreement, device’s identity confidentiality, and resistance against the following attacks: replay attack, man-in-the-middle attack, impersonation attack, and modification attack.
  •  
4.
  • Gonzalo Peces, Carlos, et al. (författare)
  • Sleepy Devices Versus Radio Duty Cycling : The Case of Lightweight M2M
  • 2019
  • Ingår i: IEEE Internet of Things Journal. - : Institute of Electrical and Electronics Engineers (IEEE). - 2327-4662 .- 2372-2541. ; 6:2, s. 2550-2562
  • Tidskriftsartikel (refereegranskat)abstract
    • Standard protocols for wireless Internet of Things (IoT) communication must be energy-efficient in order to prolong the lifetimes of IoT devices. Two energy-saving strategies for wireless communication are prevalent within the IoT domain: 1) sleepy devices and 2) radio duty cycling. In this paper, we conduct a comprehensive evaluation as to what types of application scenarios benefit the most from either type of energy-saving strategy. We select the lightweight machine to machine (LwM2M) protocol for this purpose because it operates atop the standard constrained application protocol, and has support for sleepy devices through its Queue Mode. We implement the Queue Mode at both the server side and client side, and design enhancements of Queue Mode to further improve the performance. In our experimental evaluation, we compare the performance and characteristics of Queue Mode with that of running LwM2M in a network stack with the standard time-slotted channel hopping as the duty cycling medium access control protocol. By analyzing the results with the support of an empirical model, we find that each energy-saving strategy has different advantages and disadvantages depending on the scenario and traffic pattern. Hence, we also produce guidelines that can help developers to select the appropriate energy-saving strategy based on the application scenario.
  •  
5.
  • Gonzalo Peces, Carlos, et al. (författare)
  • Sleepy Devices Versus Radio Duty Cycling: The Case of Lightweight M2M
  • 2019
  • Ingår i: IEEE Internet of Things Journal. - : IEEE. - 2327-4662. ; 6:2, s. 2550-2562
  • Tidskriftsartikel (refereegranskat)abstract
    • Standard protocols for wireless Internet of Things (IoT) communication must be energy-efficient in order to prolong the lifetimes of IoT devices. Two energy-saving strategies for wireless communication are prevalent within the IoT domain: 1) sleepy devices and 2) radio duty cycling. In this paper, we conduct a comprehensive evaluation as to what types of application scenarios benefit the most from either type of energy-saving strategy. We select the lightweight machine to machine (LwM2M) protocol for this purpose because it operates atop the standard constrained application protocol, and has support for sleepy devices through its Queue Mode. We implement the Queue Mode at both the server side and client side, and design enhancements of Queue Mode to further improve the performance. In our experimental evaluation, we compare the performance and characteristics of Queue Mode with that of running LwM2M in a network stack with the standard time-slotted channel hopping as the duty cycling medium access control protocol. By analyzing the results with the support of an empirical model, we find that each energy-saving strategy has different advantages and disadvantages depending on the scenario and traffic pattern. Hence, we also produce guidelines that can help developers to select the appropriate energy-saving strategy based on the application scenario.
  •  
6.
  • Li, Nan, et al. (författare)
  • Spectrum Sharing With Network Coding for Multiple Cognitive Users
  • 2019
  • Ingår i: IEEE Internet of Things Journal. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 2327-4662. ; 6:1, s. 230-238
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, an intelligently cooperative communication network with cognitive users is considered, where in a primary system and a secondary system, respectively, a message is communicated to their respective receiver over a packet-based wireless link. The secondary system assists in the transmission of the primary message employing network coding, on the condition of maintaining or improving the primary performance, and is granted limited access to the transmission resources as a reward. The users in both systems exploit their previously received information in encoding and decoding the binary combined packets. Considering the priority of legitimate users, a selective cooperation mechanism is investigated and the system performance based on an optimization problem is analyzed. Both the analytical and numerical results show that the condition for the secondary system accessing the licensed spectrum resource is when the relay link performs better than the direct link of the primary transmission. We also extend the system model into a network with multiple secondary users and propose two relay selection algorithms. Jointly considering the related link qualities, a best relay selection and a best relay group selection algorithm are discussed. Overall, it is found that the throughput performance can be improved with multiple secondary users, especially with more potential users cooperating in the best relay group selection algorithm.
  •  
7.
  • Liu, Ye, et al. (författare)
  • ECOVIBE : On-Demand Sensing for Railway Bridge Structural Health Monitoring
  • 2019
  • Ingår i: IEEE Internet of Things Journal. - : Institute of Electrical and Electronics Engineers (IEEE). - 2327-4662. ; 6:1, s. 1068-1078
  • Tidskriftsartikel (refereegranskat)abstract
    • Energy efficient sensing is one of the main objectives in the design of networked embedded monitoring systems. However, existing approaches such as duty cycling and ambient energy harvesting face challenges in railway bridge health monitoring applications due to the unpredictability of train passages and insufficient ambient energy around bridges. This paper presents ECOVIBE (Eco-friendly Vibration), an on-demand sensing system that automatically turns on itself when a train passes on the bridge and adaptively powers itself off after finishing all tasks. After that, it goes into an inactive state with near-zero power dissipation. ECOVIBE achieves these by: Firstly, a novel, fully passive event detection circuit to continuously detect passing trains without consuming any energy. Secondly, combining train-induced vibration energy harvesting with a transistor-based load switch, a tiny amount of energy is sufficient to keep ECOVIBE active for a long time. Thirdly, a passive adaptive off control circuit is introduced to quickly switch off ECOVIBE. Also this circuit does not consume any energy during inactivity periods. We present the prototype implementation of the proposed system using commercially available components and evaluate its performance in real-world scenarios. Our results show that ECOVIBE is effective in railway bridge health monitoring applications.
  •  
8.
  • Ma, Zheng, et al. (författare)
  • High-Reliability and Low-Latency Wireless Communication for Internet of Things : Challenges, Fundamentals, and Enabling Technologies
  • 2019
  • Ingår i: IEEE Internet of Things Journal. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 2327-4662. ; 6:5, s. 7946-7970
  • Tidskriftsartikel (refereegranskat)abstract
    • As one of the key enabling technologies of emerging smart societies and industries (i.e., industry 4.0), the Internet of Things (IoT) has evolved significantly in both technologies and applications. It is estimated that more than 25 billion devices will be connected by wireless IoT networks by 2020. In addition to ubiquitous connectivity, many envisioned applications of IoT, such as industrial automation, vehicle-to-everything (V2X) networks, smart grids, and remote surgery, will have stringent transmission latency and reliability requirements, which may not be supported by existing systems. Thus, there is an urgent need for rethinking the entire communication protocol stack for wireless IoT networks. In this tutorial paper, we review the various application scenarios, fundamental performance limits, and potential technical solutions for high-reliability and lowlatency (HRLL) wireless IoT networks. We discuss physical, MAC (medium access control), and network layers of wireless IoT networks, which all have significant impacts on latency and reliability. For the physical layer, we discuss the fundamental information-theoretic limits for HRLL communications, and then we also introduce a frame structure and preamble design for HRLL communications. Then practical channel codes with finite block length are reviewed. For the MAC layer, we first discuss optimized spectrum and power resource management schemes and then recently proposed grant-free schemes are discussed. For the network layer, we discuss the optimized network structure (traffic dispersion and network densification), the optimal traffic allocation schemes and network coding schemes to minimize latency.
  •  
9.
  •  
10.
  • Mahmood, Aamir, 1980-, et al. (författare)
  • Energy-Reliability Aware Link Optimization for Battery-Powered IoT Devices With Nonideal Power Amplifiers
  • 2019
  • Ingår i: IEEE Internet of Things Journal. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 2327-4662. ; 6:3, s. 5058-5067
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, we study cross-layer optimization of low-power wireless links for reliability-aware applications while considering both the constraints and the nonideal characteristics of the hardware in Internet-of-Things (IoT) devices. Specifically, we define an energy consumption (EC) model that captures the energy cost-of transceiver circuitry, power amplifier (PA), packet error statistics, packet overhead, etc.-in delivering a useful data bit. We derive the EC models for an ideal and two realistic nonlinear PA models. To incorporate packet error statistics, we develop a simple, in the form of elementary functions, and accurate closed-form packet error rate approximation in Rayleigh block-fading. Using the EC models, we derive energy-optimal yet reliability and hardware compliant conditions for limiting unconstrained optimal signal-to-noise ratio (SNR), and payload size. Together with these conditions, we develop a semianalytic algorithm for resource-constrained IoT devices to jointly optimize parameters on physical (modulation size, SNR) and medium access control (payload size and the number of retransmissions) layers in relation to link distance. Our results show that despite reliability constraints, the common notion-higherorder M-ary modulations are energy optimal for short-range communication-prevails, and can provide up to 180% lifetime extension as compared to often used OQPSK modulation in IoT devices. However, the reliability constraints reduce both their range and the energy efficiency, while nonideal traditional PA reduces the range further by 50% and diminishes the energy gains unless a better PA is used.
  •  
11.
  •  
12.
  • Raza, Shahid, et al. (författare)
  • TinyIKE : Lightweight IKEv2 for Internet of Things
  • 2019
  • Ingår i: IEEE Internet of Things Journal. - 2327-4662. ; 6:1, s. 856-866
  • Tidskriftsartikel (refereegranskat)abstract
    • There is unanimous consensus that cyber security in the IoT is necessary. In cyber security, key establishment is one of the toughest problems. It is even more challenging in resource-constrained but Internet-connected IoT devices that use low-power wireless communication. A number of IoT communication protocols define cryptographic mechanisms for confidentiality and integrity services but do not specify key management. For example, IEEE 802.15.4, RPL, and object security all rely on external key management protocols. Due to the lack of automatic key management support, IoT devices either end up using pre-shared keys or no security at all. In this paper we overcome these challenges and present TinyIKE, a lightweight adaptation of IKEv2 for the IoT. Using TinyIKE, we solve the key establishment problem for multiple IoT protocols using a single IKEv2-based solution. We implement TinyIKE for resource-constrained IoT devices that run the Contiki OS. The TinyIKE implementation supports full certificate-based IKEv2 that uses Elliptic Curve Cryptography (ECC). In order to ensure the feasibility of TinyIKE in the IoT, we perform an extensive evaluation of TinyIKE using a setup consisting of real IoT hardware.
  •  
13.
  • Wang, Jin, et al. (författare)
  • Multiagent and Bargaining-Game-Based Real-Time Scheduling for Internet of Things-Enabled Flexible Job Shop
  • 2019
  • Ingår i: IEEE Internet of Things Journal. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 2327-4662. ; 6:2, s. 2518-2531
  • Tidskriftsartikel (refereegranskat)abstract
    • With the rapid advancement and widespread applications of information technology in the manufacturing shop floor, a huge amount of real-time data is generated, providing a good opportunity to effectively respond to unpredictable exceptions so that the productivity can be improved. Thus, how to schedule the manufacturing shop floor for achieving such a goal is very challenging. This paper addresses this issue and a new multiagent-based real-time scheduling architecture is proposed for an Internet of Things-enabled flexible job shop. Differing from traditional dynamic scheduling strategies, the proposed strategy optimally assigns tasks to machines according to their real-time status. A bargaining-game-based negotiation mechanism is developed to coordinate the agents so that the problem can be efficiently solved. To demonstrate the feasibility and effectiveness of the proposed architecture and scheduling method, a proof-of-concept prototype system is implemented with Java agent development framework platform. A case study is used to test the performance and effectiveness of the proposed method. Through simulation and comparison, it is shown that the proposed method outperforms the traditional dynamic scheduling strategies in terms of makespan, critical machine workload, and total energy consumption.
  •  
14.
  • Wazid, Mohammad, et al. (författare)
  • Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment
  • 2019
  • Ingår i: IEEE Internet of Things Journal. - : IEEE. - 2327-4662. ; 6:2, s. 3572-3584
  • Tidskriftsartikel (refereegranskat)abstract
    • The Internet of Drones (IoD) provides a coordinated access to Unmanned Aerial Vehicles (UAVs) that are referred as drones. The on-going miniaturization of sensors, actuators, and processors with ubiquitous wireless connectivity makes drones to be used in a wide range of applications ranging from military to civilian. Since most of the applications involved in the IoD are real-time based, the users are generally interested in accessing real-time information from drones belonging to a particular fly zone. This happens if we allow users to directly access real-time data from flying drones inside IoD environment and not from the server. This is a serious security breach which may deteriorate performance of any implemented solution in this IoD environment. To address this important issue in IoD, we propose a novel lightweight user authentication scheme in which a user in the IoD environment needs to access data directly from a drone provided that the user is authorized to access the data from that drone. The formal security verification using the broadly-accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool along with informal security analysis show that our scheme is secure against several known attacks. The performance comparison demonstrates that our scheme is efficient with respect to various parameters, and it provides better security as compared to those for the related existing schemes. Finally, the practical demonstration of our scheme is done using the widely-accepted NS2 simulation.
  •  
15.
  • Zhang, Jiao, et al. (författare)
  • Joint Resource Allocation for Latency-Sensitive Services Over Mobile Edge Computing Networks With Caching
  • 2019
  • Ingår i: IEEE Internet of Things Journal. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 2327-4662. ; 6:3, s. 4283-4294
  • Tidskriftsartikel (refereegranskat)abstract
    • Mobile edge computing (MEC) has risen as a promising paradigm to provide high quality of experience via relocating the cloud server in close proximity to smart mobile devices (SMDs). In MEC networks, the MEC server with computation capability and storage resource can jointly execute the latency-sensitive offloading tasks and cache the contents requested by SMDs. In order to minimize the total latency consumption of the computation tasks, we jointly consider computation offloading, content caching, and resource allocation as an integrated model, which is formulated as a mixed integer nonlinear programming (MINLP) problem. We design an asymmetric search tree and improve the branch and bound method to obtain a set of accurate decisions and resource allocation strategies. Furthermore, we introduce the auxiliary variables to reformulate the proposed model and apply the modified generalized benders decomposition method to solve the MINLP problem in polynomial computation complexity time. Simulation results demonstrate the superiority of the proposed schemes.
  •  
16.
  •  
17.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-17 av 17

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy