129 research outputs found

    Methods and Tools for Battery-free Wireless Networks

    Get PDF
    Embedding small wireless sensors into the environment allows for monitoring physical processes with high spatio-temporal resolutions. Today, these devices are equipped with a battery to supply them with power. Despite technological advances, the high maintenance cost and environmental impact of batteries prevent the widespread adoption of wireless sensors. Battery-free devices that store energy harvested from light, vibrations, and other ambient sources in a capacitor promise to overcome the drawbacks of (rechargeable) batteries, such as bulkiness, wear-out and toxicity. Because of low energy input and low storage capacity, battery-free devices operate intermittently; they are forced to remain inactive for most of the time charging their capacitor before being able to operate for a short time. While it is known how to deal with intermittency on a single device, the coordination and communication among groups of multiple battery-free devices remain largely unexplored. For the first time, the present thesis addresses this problem by proposing new methods and tools to investigate and overcome several fundamental challenges

    SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices

    Full text link
    The simplicity of deployment and perpetual operation of energy harvesting devices provides a compelling proposition for a new class of edge devices for the Internet of Things. In particular, Computational Radio Frequency Identification (CRFID) devices are an emerging class of battery-free, computational, sensing enhanced devices that harvest all of their energy for operation. Despite wireless connectivity and powering, secure wireless firmware updates remains an open challenge for CRFID devices due to: intermittent powering, limited computational capabilities, and the absence of a supervisory operating system. We present, for the first time, a secure wireless code dissemination (SecuCode) mechanism for CRFIDs by entangling a device intrinsic hardware security primitive Static Random Access Memory Physical Unclonable Function (SRAM PUF) to a firmware update protocol. The design of SecuCode: i) overcomes the resource-constrained and intermittently powered nature of the CRFID devices; ii) is fully compatible with existing communication protocols employed by CRFID devices in particular, ISO-18000-6C protocol; and ii) is built upon a standard and industry compliant firmware compilation and update method realized by extending a recent framework for firmware updates provided by Texas Instruments. We build an end-to-end SecuCode implementation and conduct extensive experiments to demonstrate standards compliance, evaluate performance and security.Comment: Accepted to the IEEE Transactions on Dependable and Secure Computin

    Energy Harvesting Powered Wireless Sensor Nodes With Energy Efficient Network Joining Strategies

    Get PDF
    This is the author accepted manuscript. The final version is available from IEEE via the DOI in this recordThis paper presents strategies for batteryless energy harvesting powered wireless sensor nodes based on IEEE 802.15.4e standard to join the network successfully with minimal attempts, which minimizes energy wastage. This includes using a well-sized capacitor and different duty cycles for the network joining. Experimental results showed a wireless sensor node that uses a 100 mF energy storage capacitor can usually join the network in one attempt but multiple attempts may be needed if it uses smaller capacitances especially when the harvested power is low. With a duty-cycled network joining, the time required to form a network is shorter, which reduces the overall energy usage of the nodes in joining the network. An energy harvesting powered wireless sensor network (WSN) was successfully formed in one attempt by using the proposed methods.Engineering and Physical Sciences Research Council (EPSRC

    Leak Detection and Location Technology Assessment for Aerospace Applications

    Get PDF
    Micro Meteoroid and Orbital Debris (MMOD) and other impacts can cause leaks in the International Space Station and other aerospace vehicles. The early detection and location of leaks is paramount to astronaut safety. Therefore this document surveys the state of the art in leak detection and location technology for aerospace vehicles

    Advanced technologies for productivity-driven lifecycle services and partnerships in a business network

    Get PDF

    Advanced technologies for productivity-driven lifecycle services and partnerships in a business network

    Get PDF

    Circuits and Systems for Energy Harvesting and Internet of Things Applications

    Get PDF
    The Internet of Things (IoT) continues its growing trend, while new “smart” objects are con-stantly being developed and commercialized in the market. Under this paradigm, every common object will be soon connected to the Internet: mobile and wearable devices, electric appliances, home electronics and even cars will have Internet connectivity. Not only that, but a variety of wireless sensors are being proposed for different consumer and industrial applications. With the possibility of having hundreds of billions of IoT objects deployed all around us in the coming years, the social implications and the economic impact of IoT technology needs to be seriously considered. There are still many challenges, however, awaiting a solution in order to realize this future vision of a connected world. A very important bottleneck is the limited lifetime of battery powered wireless devices. Fully depleted batteries need to be replaced, which in perspective would generate costly maintenance requirements and environmental pollution. However, a very plausible solution to this dilemma can be found in harvesting energy from the ambient. This dissertation focuses in the design of circuits and system for energy harvesting and Internet of Things applications. The first part of this dissertation introduces the research motivation and fundamentals of energy harvesting and power management units (PMUs). The architecture of IoT sensor nodes and PMUs is examined to observe the limitations of modern energy harvesting systems. Moreover, several architectures for multisource harvesting are reviewed, providing a background for the research presented here. Then, a new fully integrated system architecture for multisource energy harvesting is presented. The design methodology, implementation, trade-offs and measurement results of the proposed system are described. The second part of this dissertation focus on the design and implementation of low-power wireless sensor nodes for precision agriculture. First, a sensor node incorporating solar energy harvesting and a dynamic power management strategy is presented. The operation of a wireless sensor network for soil parameter estimation, consisting of four nodes is demonstrated. After that, a solar thermoelectric generator (STEG) prototype for powering a wireless sensor node is proposed. The implemented solar thermoelectric generator demonstrates to be an alternative way to harvest ambient energy, opening the possibility for its use in agricultural and environmental applications. The open problems in energy harvesting for IoT devices are discussed at the end, to delineate the possible future work to improve the performance of EH systems. For all the presented works, proof-of-concept prototypes were fabricated and tested. The measured results are used to verify their correct operation and performance

    Hardware Architectures for Low-power In-Situ Monitoring of Wireless Embedded Systems

    Get PDF
    As wireless embedded systems transition from lab-scale research prototypes to large-scale commercial deployments, providing reliable and dependable system operation becomes absolutely crucial to ensure successful adoption. However, the untethered nature of wireless embedded systems severely limits the ability to access, debug, and control device operation after deployment—post-deployment or in-situ visibility. It is intuitive that the more information we have about a system’s operation after deployment, the better/faster we can respond upon the detection of anomalous behavior. Therefore, post-deployment visibility is a foundation upon which other runtime reliability techniques can be built. However, visibility into system operation diminishes significantly once the devices are remotely deployed, and we refer to this problem as a lack of post-deployment visibility
    corecore