19 research outputs found

    Intelligent and passive RFID tag for identification and sensing

    Get PDF
    In this work, we present a design that can be used to emulate RFID tags, or to measure parameters and deliver the results in a form that is compatible with an RFID protocol. The data delivered can be an identity, a measured parameter, or a combination of both. Thanks to the use of a new ultra low power microcontroller, the power needs of the tag are kept low. The intelligence and flexibility associated with microcontrollers can be used for preprocessing of the sensor data, implementation of a protocol, or even an extension of the protocol to suit the application. The tag does not require the use of batteries, and is powered by the field of the RFID reader. After stating the challenges to overcome, we discuss the considerations that guided our design and the results of some preliminary tests

    Incremental checkpointing of program state to NVRAM for transiently-powered systems

    Get PDF
    International audienceAs technology improves, it becomes possible to design autonomous, energy-harvesting networked embedded systems, a key building block for the Internet of Things. However, running from harvested energy means frequent and unpredictable power failures. Programming such Transiently Powered Computers will remain an arduous task for the software developer, unless some OS support abstracts energy management away from application design. Various approaches were proposed to address this problem. We focus on checkpointing, i.e. saving and restoring program state to and from non-volatile memory. In this paper, we propose an incremental checkpointing scheme which aims at minimizing the amount of data written to non-volatile memory, while keeping the execution overhead as low as possible

    A context‐aware approach to defend against unauthorized reading and relay attacks in RFID systems

    Full text link
    Radio frequency identification (RFID) systems are becoming increasingly ubiquitous in both public and private domains. However, because of the inherent weaknesses of underlying wireless radio communications, RFID systems are plagued with a wide variety of security and privacy threats. A large number of these threats arise because of the tag's promiscuous response to any reader requests. This renders sensitive tag information easily subject to unauthorized reading . Promiscuous tag response also incites different forms of relay attacks whereby a malicious colluding pair, relaying messages between a tag and a reader, can successfully impersonate the tag without actually possessing it. Because of the increasing ubiquity of RFID devices, there is a pressing need for the development of security primitives and protocols to defeat unauthorized reading and relay attacks. However, currently deployed or proposed solutions often fail to satisfy the constraints and requirements of the underlying RFID applications in terms of (one or more of) efficiency, security, and usability. This paper proposes a novel research direction, one that utilizes sensing technologies, to tackle the problems of unauthorized reading and relay attacks with a goal of reconciling the requirements of efficiency, security, and usability. The premise of the proposed work is based on a current technological advancement that enables many RFID tags with low‐cost sensing capabilities. The on‐board tag sensors will be used to acquire useful contextual information about the tag's environment (or its owner, or the tag itself). For defense against unauthorized reading and relay attacks, such context information can be leveraged in two ways. First, contextual information can be used to design context‐aware selective unlocking mechanisms so that tags can selectively respond to reader interrogations and thus minimize the likelihood of unauthorized reading and “ghost‐and‐leech” relay attacks. Second, contextual information can be used as a basis for context‐aware secure transaction verification to defend against special types of relay attacks involving malicious readers. Copyright © 2011 John Wiley & Sons, Ltd. This paper proposes a novel research direction, one that utilizes sensing technologies to tackle the challenging problems of unauthorized reading and relay attacks in radio frequency identification systems. First, contextual information is used to design context‐aware selective unlocking mechanisms, so that tags can selectively respond to reader interrogations and, thus, minimize the likelihood of unauthorized reading and “ghost‐and‐leech” relay attacks. Second, contextual information is used as a basis for context‐aware secure transaction verification to defend against special types of relay attacks involving malicious readers.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/109577/1/sec404.pd

    A New Vision for Smart Objects and the Internet of Things: Mobile Robots and Long-Range UHF RFID Sensor Tags

    Get PDF
    Abstract-We present a new vision for smart objects and the Internet of Things wherein mobile robots interact with wirelessly-powered, long-range, ultra-high frequency radio frequency identification (UHF RFID) tags outfitted with sensing capabilities. We explore the technology innovations driving this vision by examining recently-commercialized sensor tags that could be affixed-to or embedded-in objects or the environment to yield true embodied intelligence. Using a pair of autonomous mobile robots outfitted with UHF RFID readers, we explore several potential applications where mobile robots interact with sensor tags to perform tasks such as: soil moisture sensing, remote crop monitoring, infrastructure monitoring, water quality monitoring, and remote sensor deployment

    Design and implementation of an open framework for ubiquitous carbon footprint calculator applications

    Get PDF
    As climate change is becoming an important global issue, more and more people are beginning to pay attention to reducing greenhouse gas emissions. To measure personal or household carbon dioxide emission, there are already plenty of carbon footprint calculators available on the web. Most of these calculators use quantitative models to estimate carbon emission caused by a user\u27s activities. Although these calculators can promote public awareness regarding carbon emission due to an individual\u27s behavior, there are concerns about the consistency and transparency of these existing CO2 calculators. Apart from a small group of smart phone based carbon footprint calculator applications, most of the existing CO2 calculators require users to input data manually. This not only provides a poor user experience but also makes the calculation less accurate. The use of a standard framework for various carbon footprint application developments can increase the accuracy of overall calculations, which in turn may increase energy awareness at the individual human level. We aim for developing a carbon footprint calculation framework that can serve as a platform for various carbon footprint calculator applications. Therefore, in this paper, we propose a platform-agnostic Open Carbon Footprint Framework (OCFF) that will provide the necessary interfaces for software developers to incorporate the latest scientific knowledge regarding climate change into their applications. OCFF will maintain a clouded knowledge base that will give developers access to a dynamic source of computational information that can be brought to bear on real-time sensor data. Based on the OCFF platform, we developed a Ubiquitous Carbon Footprint Calculator application (UCFC) that allows the user to be aware of their personal carbon footprint based on their ubiquitous activity and act accordingly. The major contribution of this paper is the presentation of the quantitative model of the platform along with the entire design and implementation of UCFC application. We also present the results, analysis, and findings of an extensive survey that has been conducted to find users’ awareness of increased carbon footprint, feature requirements, and expectations and desires to alleviate CO2 emissions by using a footprint calculator. The design of UCFC application incorporates the analysis and inferences of the survey results. We are also developing a fuel efficient mobile GPS application for iPhone suggesting the greenest/most fuel efficient route to the user. In this paper, we also point out some important features of such an application

    Mementos: System support for long-running computation on RFID-scale devices

    Get PDF
    Abstract Many computing systems include mechanisms designed to defend against sudden catastrophic losses of computational state, but few systems treat such losses as the common case rather than exceptional events. On the other end of the spectrum are transiently powered computing devices such as RFID tags and smart cards; these devices are typically paired with code that must complete its task under tight time constraints before running out of energy. Mementos is a software system that transforms general-purpose programs into interruptible computations that are protected from frequent power losses by automatic, energy-aware state checkpointing. Mementos comprises a collection of optimization passes for the LLVM compiler infrastructure and a linkable library that exercises hardware support for energy measurement while managing state checkpoints stored in nonvolatile memory. We evaluate Mementos against diverse test cases and find that, although it introduces time overhead of up to 60% in our tests versus uninstrumented code executed without power failures, it effectively spreads program execution across zero or more complete losses of power and state. Other contributions of this work include

    Internet of Things Strategic Research Roadmap

    Get PDF
    Internet of Things (IoT) is an integrated part of Future Internet including existing and evolving Internet and network developments and could be conceptually defined as a dynamic global network infrastructure with self configuring capabilities based on standard and interoperable communication protocols where physical and virtual “things” have identities, physical attributes, and virtual personalities, use intelligent interfaces, and are seamlessly integrated into the information network

    Internet das Coisas (IoT) para a produção de tomate rasteiro no sul goiano

    Get PDF
    Trabalho de Conclusão de Curso (graduação)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia de Produção, 2019.As tecnologias disruptivas têm alterado a forma como as pessoas se relacionam com os objetos do cotidiano, com o trabalho e com outros indivíduos. Neste contexto surge um novo conceito de utilização da Internet, denominada Internet das Coisas (IoT), que interconecta os objetos físicos a rede virtual. Desta forma, o presente trabalho tem como objetivo compreender o processo de adoção da Internet das Coisas na produção de tomate industrial no sul do Estado de Goiás. Por meio de uma pesquisa exploratória e qualitativa, foram investigados produtores de grande porte na região. Ao total, foram realizadas 7 entrevistas semi-estruturadas ao longo do segundo semestre de 2019, e as entrevistas foram baseadas em categorias pré-estabelecidas pelo autor a partir das orientações de alguns teóricos como Wisdom et., al (2014) e Damanpour (2001). As categorias estabelecidas foram: tendências de mercado, escolhas tecnológicas dos produtores, características na adoção de tecnologias, desafios enfrentados, mão de obra, participação das instituições públicas e privadas, resultados de inovação e resultados econômicos, e a interpretação dos dados foi realizada a partir da análise de conteúdo. Deste modo, foi possível constatar que a implementação da Internet das Coisas nesta região ainda está em um estágio muito inicial, visto que, apenas um dos entrevistados está em processo de adesão da tecnologia. Outro fato importante identificado foi que apenas dois empreendimentos possuíam algum conhecimento sobre a IoT, e o empreendimento C, que é o que está implementado esta inovação na produção não é um deles. Por tanto, ela é pouco conhecida na região. Além disso, o papel das instituições públicas e privadas é fundamental, já que os produtores não identificaram nenhum apoio externo que incentivem investimentos em tecnologia e relataram que a mão de obra desqualificada e péssimo sinal de internet, dificultam a implementação. Em relação aos resultados econômicos os produtores acreditam que a IoT trará grandes benefícios, principalmente, em relação ao aumento da qualidade dos processos e produtos, otimização do trabalho, aumento da produtividade e eficiência em custos, eles se basearam nas tecnologias que já aplicaram. Conclui-se, por tanto, que para aplicar de forma eficaz esta tecnologia na região, e neste tipo de produção, serão necessários diversos esforços por parte de todos os setores envolvidos, proporcionando uma maior competitividade para os produtores e aumentando a qualidade dos produtos.Disruptive technologies have changed the way people relate to everyday objects, work, and other individuals. In this context comes a new concept of Internet use, called Internet of Things (IoT), which interconnects physical objects to virtual network. In this way, the present work aims to understand the process of adoption of the Internet of Things in the production of industrial tomato in the south of the State of Goiás. Through an exploratory and qualitative research, large producers were investigated in the region. A total of 7 semi-structured interviews were carried out during the second semester of 2019, and the interviews were based on categories pre-established by the author based on the orientations of some theorists such as Wisdom et al. (2014) and Damanpour (2001) ). The categories established were: market trends, technological choices of producers, characteristics in the adoption of technologies, challenges faced, labor, participation of public and private institutions, innovation results and economic results, and interpretation of data was made from of content analysis. In this way, it was possible to verify that the implementation of the Internet of Things in this region is still at a very early stage, since only one of the interviewees is in the process of adhering to the technology. Another important fact identified was that only two enterprise had some knowledge about IoT, and enterprise C, which is what is implemented this innovation in production is not one of them. Therefore, it is little known in the region. In addition, the role of public and private institutions is crucial, as producers have identified no external support to encourage technology investments and have reported that the disqualified workforce and poor internet signal hamper implementation. Regarding the economic results, the producers believe that IoT will bring great benefits, mainly in relation to the increase of the quality of the processes and products, optimization of the work, increase of the productivity and efficiency in costs, they were based on the technologies that already applied. It is concluded, therefore, that in order to effectively apply this technology in the region and in this type of production, a number of efforts will be required from all sectors involved, providing greater competitiveness for producers and increasing the quality of products
    corecore