350 research outputs found

    Self-powered Time-Keeping and Time-of-Occurrence Sensing

    Get PDF
    Self-powered and passive Internet-of-Things (IoT) devices (e.g. RFID tags, financial assets, wireless sensors and surface-mount devices) have been widely deployed in our everyday and industrial applications. While diverse functionalities have been implemented in passive systems, the lack of a reference clock limits the design space of such devices used for applications such as time-stamping sensing, recording and dynamic authentication. Self-powered time-keeping in passive systems has been challenging because they do not have access to continuous power sources. While energy transducers can harvest power from ambient environment, the intermittent power cannot support continuous operation for reference clocks. The thesis of this dissertation is to implement self-powered time-keeping devices on standard CMOS processes. In this dissertation, a novel device that combines the physics of quantum tunneling and floating-gate (FG) structures is proposed for self-powered time-keeping in CMOS process. The proposed device is based on thermally assisted Fowler-Nordheim (FN) tunneling process across high-quality oxide layer to discharge the floating-gate node, therefore resulting in a time-dependent FG potential. The device was fully characterized in this dissertation, and it does not require external powering during runtime, making it feasible for passive devices and systems. Dynamic signature based on the synchronization and desynchronization behavior of the FN timer is proposed for authentication of IoT devices. The self-compensating physics ensure that when distributed timers are subjected to identical environment variances that are common-mode noise, they can maintain synchronization with respect to each other. On the contrary, different environment conditions will desynchronize the timers creating unique signatures. The signatures could be used to differentiate between products that belong to different supply-chains or products that were subjected to malicious tampering. SecureID type dynamic authentication protocols based on the signature generated by the FN timers are proposed and they are proven to be robust to most attacks. The protocols are further analyzed to be lightweight enough for passive devices whose computational sources are limited. The device could also be applied for self-powered sensing of time-of-occurrence. The prototype was verified by integrating the device with a self-powered mechanical sensor to sense and record time-of-occurrence of mechanical events. The system-on-chip design uses the timer output to modulate a linear injector to stamp the time information into the sensing results. Time-of-occurrence can be reconstructed by training the mathematical model and then applying that to the test data. The design was verified to have a high reconstruction accuracy

    Supporting Cyber-Physical Systems with Wireless Sensor Networks: An Outlook of Software and Services

    Get PDF
    Sensing, communication, computation and control technologies are the essential building blocks of a cyber-physical system (CPS). Wireless sensor networks (WSNs) are a way to support CPS as they provide fine-grained spatial-temporal sensing, communication and computation at a low premium of cost and power. In this article, we explore the fundamental concepts guiding the design and implementation of WSNs. We report the latest developments in WSN software and services for meeting existing requirements and newer demands; particularly in the areas of: operating system, simulator and emulator, programming abstraction, virtualization, IP-based communication and security, time and location, and network monitoring and management. We also reflect on the ongoing efforts in providing dependable assurances for WSN-driven CPS. Finally, we report on its applicability with a case-study on smart buildings

    Features, operation principle and limits of SPI and I2C communication protocols for smart objects: a novel SPI-based hybrid protocol especially suitable for IoT applications

    Get PDF
    The Internet of Things (IoT) is an expression, sometimes abused by companies given the absence of an unambiguous meaning, that indicates the upcoming evolution of Internet as it has been known so far. In fact, all objects will have network capabilities which will be exploited to overcome, in certain situations, human intervention. Thanks to the direct cooperation of new class of devices, aware of their operating scenario and interconnected in subnetworks, our life style will be strongly enhanced and simplified. IoT, however, is not yet the “El Dorado” of technology, capable of revolutionizing everyday life: some aspects and open issues have to be carefully analyzed. The huge complexity of this new technology forces companies to select a specific research field: for this reason, they focus only on some features that an IoT device should have to guarantee fulfillment of requirements. In this context, this research work concerns an analysis of features, operation principle and limits of SPI and I2C communication protocols followed by the proposal of a new hybrid protocol suited for embedded systems, named FlexSPI, thought as an evolution of the classic SPI. Thanks to a robust software architecture, it is able to provide many features that can be used by smart objects to enhance their capabilities. In this way, sensors and actuators or, more in general, subsystems, can quickly exchange data and efficiently react to malfunctioning; moreover, number of devices on bus can be safely increased even while smart object is performing operations

    Proposta de um protocolo de roteamento autoconfigurĂĄvel para redes mesh em Bluetooth Low Energy (BLE) baseado em proactive source routing

    Get PDF
    Orientador: Yuzo IanoTese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia ElĂ©trica e de ComputaçãoResumo: A Internet das Coisas (Internet of Things Âż IoT) visa a criação de ambientes inteligentes como domĂłtica, comunicação intra-veicular e redes de sensores sem fio (Wireless Sensor Network Âż WSN), sendo que atualmente essa tecnologia vem crescendo de forma rĂĄpida. Uma das tecnologias sem fio utilizada para aplicaçÔes de curta distĂąncia que se encontra mais acessĂ­vel Ă  população, em geral, Ă© o Bluetooth. No final de 2010, o Bluetooth Special Interest Group (Bluetooth SIG), lançou a especificação Bluetooth 4.0 e, como parte dessa especificação, tem-se o Bluetooth Low Energy (BLE). O BLE Ă© uma tecnologia sem fio de baixĂ­ssimo consumo de potĂȘncia, que pode ser alimentada por uma bateria tipo moeda, ou atĂ© mesmo por indução elĂ©trica (energy harvesting). A natureza do Bluetooth (e BLE) Ă© baseada na conexĂŁo do tipo Mestre/Escravo. Muitos estudos mostram como criar redes mesh baseadas no Bluetooth clĂĄssico, que sĂŁo conhecidas como Scatternets, onde alguns nĂłs sĂŁo utilizados como escravos com o objetivo de repassar os dados entre os mestres. Contudo, o BLE nĂŁo tinha suporte para a mudança entre mestre e escravo atĂ© o lançamento da especificação Bluetooth 4.1, em 2013. A capacidade de uma tecnologia sem fio para IoT de criar uma rede ad-hoc mĂłvel (Mobile Ad-hoc Network Âż MANET) Ă© vital para poder suportar uma grande quantidade de sensores, perifĂ©ricos e dispositivos que possam coexistir em qualquer ambiente. Este trabalho visa propor um novo mĂ©todo de autoconfiguração para BLE, com descoberta de mapa de roteamento e manutenção, sem a necessidade de mudanças entre mestre e escravo, sendo compatĂ­vel com os dispositivos Bluetooth 4.0, assim como com os 4.1 e mais recentes. Qualquer protocolo de mensagens pode aproveitar o mĂ©todo proposto para descobrir e manter a topologia de rede mesh em cada um dos seus nĂłsAbstract: Nowadays, the Internet of Things (IoT) is spreading rapidly towards creating smart environments. Home automation, intra-vehicular interaction, and wireless sensor networks (WSN) are among the most popular applications discussed in IoT literature. One of the most available and popular wireless technologies for short-range operations is Bluetooth. In late 2010, the Bluetooth Special Interest Group (SIG) launched the Bluetooth 4.0 Specification, which brings Bluetooth Low Energy (BLE) as part of the specification. BLE characterises as being a very low power wireless technology, capable of working on a coin-cell or even by energy scavenging. Nevertheless, the nature of Bluetooth (and BLE) has always been a connection-oriented communication in a Master/Slave configuration. Several studies exist showing how to create mesh networks for Classic Bluetooth, called Scatternets, by utilizing some nodes as slaves to relay data between Masters. However, BLE didnÂżt support role changing until the 4.1 Specification released in 2013. The capability of a wireless technology to create a Mobile Ad-Hoc Network (MANET) is vital for supporting the plethora of sensors, peripherals, and devices that could coexist in any IoT environment. This work focuses on proposing a new autoconfiguring dynamic address allocation scheme for a BLE Ad-Hoc network, and a network map discovery and maintenance mechanism that doesnÂżt require role changing, thus being possible to implement it in 4.0 compliant devices as well as 4.1 or later to develop a MANET. Any ad-hoc routing protocol can utilise the proposed method to discover, keep track, and maintain the mesh network node topology in each of their nodesDoutoradoTelecomunicaçÔes e TelemĂĄticaDoutor em Engenharia ElĂ©tricaCAPE

    Wireless innovation for smart independent living

    Get PDF

    New Waves of IoT Technologies Research – Transcending Intelligence and Senses at the Edge to Create Multi Experience Environments

    Get PDF
    The next wave of Internet of Things (IoT) and Industrial Internet of Things (IIoT) brings new technological developments that incorporate radical advances in Artificial Intelligence (AI), edge computing processing, new sensing capabilities, more security protection and autonomous functions accelerating progress towards the ability for IoT systems to self-develop, self-maintain and self-optimise. The emergence of hyper autonomous IoT applications with enhanced sensing, distributed intelligence, edge processing and connectivity, combined with human augmentation, has the potential to power the transformation and optimisation of industrial sectors and to change the innovation landscape. This chapter is reviewing the most recent advances in the next wave of the IoT by looking not only at the technology enabling the IoT but also at the platforms and smart data aspects that will bring intelligence, sustainability, dependability, autonomy, and will support human-centric solutions.acceptedVersio

    GPS Anomaly Detection And Machine Learning Models For Precise Unmanned Aerial Systems

    Get PDF
    The rapid development and deployment of 5G/6G networks have brought numerous benefits such as faster speeds, enhanced capacity, improved reliability, lower latency, greater network efficiency, and enablement of new applications. Emerging applications of 5G impacting billions of devices and embedded electronics also pose cyber security vulnerabilities. This thesis focuses on the development of Global Positioning Systems (GPS) Based Anomaly Detection and corresponding algorithms for Unmanned Aerial Systems (UAS). Chapter 1 provides an overview of the thesis background and its objectives. Chapter 2 presents an overview of the 5G architectures, their advantages, and potential cyber threat types. Chapter 3 addresses the issue of GPS dropouts by taking the use case of the Dallas-Fort Worth (DFW) airport. By analyzing data from surveillance drones in the (DFW) area, its message frequency, and statistics on time differences between GPS messages were examined. Chapter 4 focuses on modeling and detecting false data injection (FDI) on GPS. Specifically, three scenarios, including Gaussian noise injection, data duplication, data manipulation are modeled. Further, multiple detection schemes that are Clustering-based and reinforcement learning techniques are deployed and detection accuracy were investigated. Chapter 5 shows the results of Chapters 3 and 4. Overall, this research provides a categorization and possible outlier detection to minimize the GPS interference for UAS enhancing the security and reliability of UAS operations
    • 

    corecore