150 research outputs found

    An Ultra-Miniaturised CMOS Clock and Data Recovery System for Wireless ASK Transmission

    Get PDF
    Over the years, several clock and data recovery architectures have been proposed for wireless Amplitude Shift Keying (ASK) transmitted signals. State-of-the-art architectures mainly rely on synchronous phase-locked loop circuits or self- sampling systems, both resulting in large area consumption. This work presents a novel CMOS architecture for Clock and Data Recovery (CDR) in miniaturised and wirelessly powered implants. The proposed CDR architecture works at 433.92 MHz and includes: an ASK-demodulator, an on-chip oscillator, a power-on-reset, a control and a recovering block operating in feedback-loop. The ASK-demodulator works for a data rate as high as 6 Mbps and a modulation index in the range of 9-30%. A novel communication protocol is presented for a separated clock and data transmission. The entire CDR architecture occupies 17×89μm2 and consumes 15.01μW while operating with a clock rate of 6 Mbps

    Lightweight Cryptography for Passive RFID Tags

    Get PDF

    Sensor-based management systems based on RFID technology

    Get PDF
    Παρατηρήσεις έκδοσης: λείπουν οι σελίδες 78, 102 από το φυσικό τεκμήριο.In this diploma thesis, the RFID technology is analyzed (operating principles, readers' and tags hardware, coding, modulation, anticollision procedures, frequencies, standards, applications). Moreover, a protocol to synchronize readers working in a multi-reader multi-tag environment is proposed. The protocol is applied to the store shelf scanning application and further refined to meet the requirements of this specific application

    Collective Communications and Computation Mechanisms on the RF Channel for Organic Printed Smart Labels and Resource-limited IoT Nodes

    Get PDF
    Radio Frequency IDentification (RFID) and Wireless Sensor Networks (WSN) are seen as enabler technologies for realizing the Internet of Things (IoT). Organic and printed Electronics (OE) has the potential to provide low cost and all-printable smart RFID labels in high volumes. With regard to WSN, power harvesting techniques and resource-efficient communications are promising key technologies to create sustainable and for the environment friendly sensing devices. However, the implementation of OE smart labels is only allowing printable devices of ultra-low hardware complexity, that cannot employ standard RFID communications. And, the deployment of current WSN technology is far away from offering battery-free and low-cost sensing technology. To this end, the steady growth of IoT is increasing the demand for more network capacity and computational power. With respect to wireless communications research, the state-of-the-art employs superimposed radio transmission in form of physical layer network coding and computation over the MAC to increase information flow and computational power, but lacks on practicability and robustness so far. With regard to these research challenges we developed in particular two approaches, i.e., code-based Collective Communications for dense sensing environments, and time-based Collective Communications (CC) for resource-limited WSNs. In respect to the code-based CC approach we exploit the principle of superimposed radio transmission to acquire highly scalable and robust communications obtaining with it at the same time as well minimalistic smart RFID labels, that can be manufactured in high volume with present-day OE. The implementation of our code-based CC relies on collaborative and simultaneous transmission of randomly drawn burst sequences encoding the data. Based on the framework of hyper-dimensional computing, statistical laws and the superposition principle of radio waves we obtained the communication of so called ensemble information, meaning the concurrent bulk reading of sensed values, ranges, quality rating, identifiers (IDs), and so on. With 21 transducers on a small-scale reader platform we tested the performance of our approach successfully proving the scalability and reliability. To this end, we implemented our code-based CC mechanism into an all-printable passive RFID label down to the logic gate level, indicating a circuit complexity of about 500 transistors. In respect to time-based CC approach we utilize the superimposed radio transmission to obtain resource-limited WSNs, that can be deployed in wide areas for establishing, e.g., smart environments. In our application scenario for resource-limited WSN, we utilize the superimposed radio transmission to calculate functions of interest, i.e., to accomplish data processing directly on the radio channel. To prove our concept in a case study, we created a WSN with 15 simple nodes measuring the environmental mean temperature. Based on our analysis about the wireless computation error we were able to minimize the stochastic error arbitrarily, and to remove the systematic error completely

    Design and Analysis of Security Schemes for Low-cost RFID Systems

    Get PDF
    With the remarkable progress in microelectronics and low-power semiconductor technologies, Radio Frequency IDentification technology (RFID) has moved from obscurity into mainstream applications, which essentially provides an indispensable foundation to realize ubiquitous computing and machine perception. However, the catching and exclusive characteristics of RFID systems introduce growing security and privacy concerns. To address these issues are particularly challenging for low-cost RFID systems, where tags are extremely constrained in resources, power and cost. The primary reasons are: (1) the security requirements of low-cost RFID systems are even more rigorous due to large operation range and mass deployment; and (2) the passive tags' modest capabilities and the necessity to keep their prices low present a novel problem that goes beyond the well-studied problems of traditional cryptography. This thesis presents our research results on the design and the analysis of security schemes for low-cost RFID systems. Motivated by the recent attention on exploiting physical layer resources in the design of security schemes, we investigate how to solve the eavesdropping, modification and one particular type of relay attacks toward the tag-to-reader communication in passive RFID systems without requiring lightweight ciphers. To this end, we propose a novel physical layer scheme, called Backscatter modulation- and Uncoordinated frequency hopping-assisted Physical Layer Enhancement (BUPLE). The idea behind it is to use the amplitude of the carrier to transmit messages as normal, while to utilize its periodically varied frequency to hide the transmission from the eavesdropper/relayer and to exploit a random sequence modulated to the carrier's phase to defeat malicious modifications. We further improve its eavesdropping resistance through the coding in the physical layer, since BUPLE ensures that the tag-to-eavesdropper channel is strictly noisier than the tag-to-reader channel. Three practical Wiretap Channel Codes (WCCs) for passive tags are then proposed: two of them are constructed from linear error correcting codes, and the other one is constructed from a resilient vector Boolean function. The security and usability of BUPLE in conjunction with WCCs are further confirmed by our proof-of-concept implementation and testing. Eavesdropping the communication between a legitimate reader and a victim tag to obtain raw data is a basic tool for the adversary. However, given the fundamentality of eavesdropping attacks, there are limited prior work investigating its intension and extension for passive RFID systems. To this end, we firstly identified a brand-new attack, working at physical layer, against backscattered RFID communications, called unidirectional active eavesdropping, which defeats the customary impression that eavesdropping is a ``passive" attack. To launch this attack, the adversary transmits an un-modulated carrier (called blank carrier) at a certain frequency while a valid reader and a tag interacts at another frequency channel. Once the tag modulates the amplitude of reader's signal, it causes fluctuations on the blank carrier as well. By carefully examining the amplitude of the backscattered versions of the blank carrier and the reader's carrier, the adversary could intercept the ongoing reader-tag communication with either significantly lower bit error rate or from a significantly greater distance away. Our concept is demonstrated and empirically analyzed towards a popular low-cost RFID system, i.e., EPC Gen2. Although active eavesdropping in general is not trivial to be prohibited, for a particular type of active eavesdropper, namely a greedy proactive eavesdropper, we propose a simple countermeasure without introducing extra cost to current RFID systems. The needs of cryptographic primitives on constraint devices keep increasing with the growing pervasiveness of these devices. One recent design of the lightweight block cipher is Hummingbird-2. We study its cryptographic strength under a novel technique we developed, called Differential Sequence Attack (DSA), and present the first cryptanalytic result on this cipher. In particular, our full attack can be divided into two phases: preparation phase and key recovery phase. During the key recovery phase, we exploit the fact that the differential sequence for the last round of Hummingbird-2 can be retrieved by querying the full cipher, due to which, the search space of the secret key can be significantly reduced. Thus, by attacking the encryption (decryption resp.) of Hummingbird-2, our algorithm recovers 36-bit (another 28-bit resp.) out of 128-bit key with 2682^{68} (2602^{60} resp.) time complexity if particular differential conditions of the internal states and of the keys at one round can be imposed. Additionally, the rest 64-bit of the key can be exhaustively searched and the overall time complexity is dominated by 2682^{68}. During the preparation phase, by investing 2812^{81} effort in time, the adversary is able to create the differential conditions required in the key recovery phase with at least 0.5 probability. As an additional effort, we examine the cryptanalytic strength of another lightweight candidate known as A2U2, which is the most lightweight cryptographic primitive proposed so far for low-cost tags. Our chosen-plaintext-attack fully breaks this cipher by recovering its secret key with only querying the encryption twice on the victim tag and solving 32 sparse systems of linear equations (where each system has 56 unknowns and around 28 unknowns can be directly obtained without computation) in the worst case, which takes around 0.16 second on a Thinkpad T410 laptop

    Smart marine sensing systems for integrated multi-trophic aquaculture (IMTA)

    Get PDF
    Aquaculture farming faces challenges to increase production whilst maintaining sustainability by reducing environmental impact and ensuring efficient resource usage. One solution is to use an Integrated Multi-Trophic Aquaculture (IMTA) approach, where a variety of different species are grown in the same site, taking advantage of by-products (such as waste and uneaten food) from one species as inputs (fertilizer, food, and energy) for the growth of other species. However, the remote monitoring of environmental and biological conditions is crucial to understand how the species interact with each other and with the environment, and to optimise the IMTA production and management system. Environmental monitoring of aquatic environments is already well supplied by commercial off-the-shelf sensors, but these sensors often measure only one parameter, which increases the power consumption and cost when monitoring multiple environmental variables with a fine-scale resolution. Current monitoring solutions for seaweed and kelp also include satellite and aerial sensing, which cover large areas effectively. However, these methods do not offer high-resolution, specific local data for growing sites, and are usually limited by turbidity and weather conditions. Another limitation of available commercial systems is data recovery. Most of them require that the sensor be retrieved to download data directly, increasing cost of maintenance. Radio Frequency Identification (RFID) systems that transmit in the near field (Near Field Communication – NFC) are less attenuated by the seawater environment than higher-frequency communications, and thus potentially provide a more viable alternative for underwater data transmission. In this work, we present a novel miniature low-power multi-sensor modality NFC-enabled data acquisition system to monitor a variety of farmed aquaculture species. This sensor system monitors temperature, light intensity, depth, and motion, logging the data collected internally. The sensor device can communicate with NFC-enabled readers (such as smartphones) to configure the sensors with custom sampling frequencies, communicate status, and to download data. It also has an internal machine learning enabled microcontroller, which can be used to perform data analysis internally. The device is designed to be attachable to seaweed and kelp blades or stipes. The system designed was tested in lab to characterise its sensors and to determine its battery lifetime. The sensor device was then deployed in an IMTA farm in Bertraghboy Bay, Connemara, Ireland, with the help of the Marine Institute. The data collected from the device was then correlated with environmental sensors placed in the site. Future work involves incorporating data analytics and machine learning algorithms to process data internally, allowing for lower transmission requirements

    RFID-Assisted wireless sensor networks for cardiac tele-healthcare

    Get PDF
    As the baby boomers head into old age, America will see a dramatic increase in the number of elderly patients admitted to healthcare facilities, such as nursing homes. Due to this rising elderly population, it will be difficult for nursing home personnel to monitor all patients at once. One way to cut down on the amount of supervision by the staff is for patients to administer their own medication. This leads to new problems though, as a patient incorrectly administering one of their many medications could lead to a disastrous end. Technology to wirelessly transmit a patient’s electrocardiogram (ECG) has also been implemented to reduce supervision. Wireless transmissions are infamous for their error rate, but the ECG is a sensitive signal where every second of data matters and cannot tolerate such losses. Additionally, such existing networks employ an expensive communication infrastructure. Due to this healthcare crisis, the ability for a device to remotely monitor a patient’s medication intake and transmit accurate ECG readings, while being cost efficient, is a major innovation. To combat this crisis, this thesis focuses on a multi-hop wireless sensor network (WSN) composed of many wearable sensors, one for each patient, that host a radio frequency identification (RFID) reader and are capable of RF communication. Each wearable device is also assumed to contain an ECG sensor, though this was not implemented in this work. The system is responsible for two distinct features. The first is remotely supervised patient medication intake via RFID and a central workstation/database. The second is the accurate remote transmission of a patient’s ECG using the extended Kalman filter (EKF) for wireless error recovery

    Intelligent Sensor Networks

    Get PDF
    In the last decade, wireless or wired sensor networks have attracted much attention. However, most designs target general sensor network issues including protocol stack (routing, MAC, etc.) and security issues. This book focuses on the close integration of sensing, networking, and smart signal processing via machine learning. Based on their world-class research, the authors present the fundamentals of intelligent sensor networks. They cover sensing and sampling, distributed signal processing, and intelligent signal learning. In addition, they present cutting-edge research results from leading experts

    Energy-Sustainable IoT Connectivity: Vision, Technological Enablers, Challenges, and Future Directions

    Full text link
    Technology solutions must effectively balance economic growth, social equity, and environmental integrity to achieve a sustainable society. Notably, although the Internet of Things (IoT) paradigm constitutes a key sustainability enabler, critical issues such as the increasing maintenance operations, energy consumption, and manufacturing/disposal of IoT devices have long-term negative economic, societal, and environmental impacts and must be efficiently addressed. This calls for self-sustainable IoT ecosystems requiring minimal external resources and intervention, effectively utilizing renewable energy sources, and recycling materials whenever possible, thus encompassing energy sustainability. In this work, we focus on energy-sustainable IoT during the operation phase, although our discussions sometimes extend to other sustainability aspects and IoT lifecycle phases. Specifically, we provide a fresh look at energy-sustainable IoT and identify energy provision, transfer, and energy efficiency as the three main energy-related processes whose harmonious coexistence pushes toward realizing self-sustainable IoT systems. Their main related technologies, recent advances, challenges, and research directions are also discussed. Moreover, we overview relevant performance metrics to assess the energy-sustainability potential of a certain technique, technology, device, or network and list some target values for the next generation of wireless systems. Overall, this paper offers insights that are valuable for advancing sustainability goals for present and future generations.Comment: 25 figures, 12 tables, submitted to IEEE Open Journal of the Communications Societ
    corecore