891 research outputs found

    A Novel TRNG Based on Traditional ADC Nonlinear Effect and Chaotic Map for IoT Security and Anticollision

    Get PDF
    In the rapidly developing Internet of Things (IoT) applications, how to achieve rapid identification of massive devices and secure the communication of wireless data based on low cost and low power consumption is the key problem to be solved urgently. This paper proposes a novel true random number generator (TRNG) based on ADC nonlinear effect and chaotic map, which can be implemented by traditional processors with built-in ADCs, such as MCU, DSP, ARM, and FPGA. The processor controls the ADC to sample the changing input signal to obtain the digital signal DADC and then extracts some bits of DADC to generate the true random number (TRN). At the same time, after a delay based on DADC, the next time ADC sampling is carried out, and the cycle continues until the processor stops generating the TRN. Due to the nonlinear effect of ADC, the DADC obtained from each sampling is stochastic, and the changing input signal will sharply change the delay time, thus changing the sampling interval (called random interval sampling). As the input signal changes, DADC with strong randomness is obtained. The whole operation of the TRNG resembles a chaotic map, and this method also eliminates the pseudorandom property of chaotic map by combining the variable input signal (including noise) with the nonlinear effect of ADC. The simulation and actual test data are verified by NIST, and the verification results show that the random numbers generated by the proposed method have strong randomness and can be used to implement TRNG. The proposed TRNG has the advantages of low cost, low power consumption, and strong compatibility, and the rate of generating true random number is more than 1.6 Mbps (determined by ADC sampling rate and processor frequency), which is very suitable for IoT sensor devices for security encryption algorithms and anticollision

    ANGELAH: A Framework for Assisting Elders At Home

    Get PDF
    The ever growing percentage of elderly people within modern societies poses welfare systems under relevant stress. In fact, partial and progressive loss of motor, sensorial, and/or cognitive skills renders elders unable to live autonomously, eventually leading to their hospitalization. This results in both relevant emotional and economic costs. Ubiquitous computing technologies can offer interesting opportunities for in-house safety and autonomy. However, existing systems partially address in-house safety requirements and typically focus on only elder monitoring and emergency detection. The paper presents ANGELAH, a middleware-level solution integrating both ”elder monitoring and emergency detection” solutions and networking solutions. ANGELAH has two main features: i) it enables efficient integration between a variety of sensors and actuators deployed at home for emergency detection and ii) provides a solid framework for creating and managing rescue teams composed of individuals willing to promptly assist elders in case of emergency situations. A prototype of ANGELAH, designed for a case study for helping elders with vision impairments, is developed and interesting results are obtained from both computer simulations and a real-network testbed

    Multi-Protocol Sensor Node for Internet of Things (IoT) Applications

    Get PDF
    This paper will describe the implementation of an end-to-end IoT solution, focusing specifically in the multi-protocol sensor node using Pycom's FiPy board. A performance assessment will be presented, addressing a comparison between the different protocols (LoRa vs. Wi-Fi) in terms radio coverage, timing issues, power consumption/battery usage, among others. Further, it will be investigated the integration onto the sensor node different sensor/actuator circuit blocks for energy metering on industrial machinery as a way to optimize energy efficiency metrics. This will provide a practical use case in the field of Industry 4.0, leading to insights for power quality monitoring

    Location based services in wireless ad hoc networks

    Get PDF
    In this dissertation, we investigate location based services in wireless ad hoc networks from four different aspects - i) location privacy in wireless sensor networks (privacy), ii) end-to-end secure communication in randomly deployed wireless sensor networks (security), iii) quality versus latency trade-off in content retrieval under ad hoc node mobility (performance) and iv) location clustering based Sybil attack detection in vehicular ad hoc networks (trust). The first contribution of this dissertation is in addressing location privacy in wireless sensor networks. We propose a non-cooperative sensor localization algorithm showing how an external entity can stealthily invade into the location privacy of sensors in a network. We then design a location privacy preserving tracking algorithm for defending against such adversarial localization attacks. Next we investigate secure end-to-end communication in randomly deployed wireless sensor networks. Here, due to lack of control on sensors\u27 locations post deployment, pre-fixing pairwise keys between sensors is not feasible especially under larger scale random deployments. Towards this premise, we propose differentiated key pre-distribution for secure end-to-end secure communication, and show how it improves existing routing algorithms. Our next contribution is in addressing quality versus latency trade-off in content retrieval under ad hoc node mobility. We propose a two-tiered architecture for efficient content retrieval in such environment. Finally we investigate Sybil attack detection in vehicular ad hoc networks. A Sybil attacker can create and use multiple counterfeit identities risking trust of a vehicular ad hoc network, and then easily escape the location of the attack avoiding detection. We propose a location based clustering of nodes leveraging vehicle platoon dispersion for detection of Sybil attacks in vehicular ad hoc networks --Abstract, page iii

    Analysis of Security Attacks & Taxonomy in Underwater Wireless Sensor Networks

    Get PDF
    Abstract: Underwater Wireless Sensor Networks (UWSN) have gained more attention from researchers in recent years due to their advancement in marine monitoring, deployment of various applications, and ocean surveillance. The UWSN is an attractive field for both researchers and the industrial side. Due to the harsh underwater environment, own capabilities, open acoustic channel, it's also vulnerable to malicious attacks and threats. Attackers can easily take advantage of these characteristics to steal the data between the source and destination. Many review articles are addressed some of the security attacks and Taxonomy of the Underwater Wireless Sensor Networks. In this study, we have briefly addressed the Taxonomy of the UWSNs from the most recent research articles related to the well-known research databases. This paper also discussed the security threats on each layer of the Underwater Wireless sensor networks. This study will help the researcher’s design the routing protocols to cover the known security threats and help industries manufacture the devices to observe these threats and security issues

    Milestones in Autonomous Driving and Intelligent Vehicles Part \uppercase\expandafter{\romannumeral1}: Control, Computing System Design, Communication, HD Map, Testing, and Human Behaviors

    Get PDF
    Interest in autonomous driving (AD) and intelligent vehicles (IVs) is growing at a rapid pace due to the convenience, safety, and economic benefits. Although a number of surveys have reviewed research achievements in this field, they are still limited in specific tasks and lack systematic summaries and research directions in the future. Our work is divided into 3 independent articles and the first part is a Survey of Surveys (SoS) for total technologies of AD and IVs that involves the history, summarizes the milestones, and provides the perspectives, ethics, and future research directions. This is the second part (Part \uppercase\expandafter{\romannumeral1} for this technical survey) to review the development of control, computing system design, communication, High Definition map (HD map), testing, and human behaviors in IVs. In addition, the third part (Part \uppercase\expandafter{\romannumeral2} for this technical survey) is to review the perception and planning sections. The objective of this paper is to involve all the sections of AD, summarize the latest technical milestones, and guide abecedarians to quickly understand the development of AD and IVs. Combining the SoS and Part \uppercase\expandafter{\romannumeral2}, we anticipate that this work will bring novel and diverse insights to researchers and abecedarians, and serve as a bridge between past and future.Comment: 18 pages, 4 figures, 3 table

    Wireless remote patient monitoring on general hospital wards.

    Get PDF
    A novel approach which has potential to improve quality of patient care on general hospital wards is proposed. Patient care is a labour-intensive task that requires high input of human resources. A Remote Patient Monitoring (RPM) system is proposed which can go some way towards improving patient monitoring on general hospital wards. In this system vital signs are gathered from patients and sent to a control unit for centralized monitoring. The RPM system can complement the role of nurses in monitoring patients’ vital signs. They will be able to focus on holistic needs of patients thereby providing better personal care. Wireless network technologies, ZigBee and Wi-Fi, are utilized for transmission of vital signs in the proposed RPM system. They provide flexibility and mobility to patients. A prototype system for RPM is designed and simulated. The results illustrated the capability, suitability and limitation of the chosen technology

    A Semantic Interoperability Model Based on the IEEE 1451 Family of Standards Applied to the Industry 4.0

    Get PDF
    The Internet of Things (IoT) has been growing recently. It is a concept for connecting billions of smart devices through the Internet in different scenarios. One area being developed inside the IoT in industrial automation, which covers Machine-to-Machine (M2M) and industrial communications with an automatic process, emerging the Industrial Internet of Things (IIoT) concept. Inside the IIoT is developing the concept of Industry 4.0 (I4.0). That represents the fourth industrial revolution and addresses the use of Internet technologies to improve the production efficiency of intelligent services in smart factories. I4.0 is composed of a combination of objects from the physical world and the digital world that offers dedicated functionality and flexibility inside and outside of an I4.0 network. The I4.0 is composed mainly of Cyber-Physical Systems (CPS). The CPS is the integration of the physical world and its digital world, i.e., the Digital Twin (DT). It is responsible for realising the intelligent cross-link application, which operates in a self-organised and decentralised manner, used by smart factories for value creation. An area where the CPS can be implemented in manufacturing production is developing the Cyber-Physical Production System (CPPS) concept. CPPS is the implementation of Industry 4.0 and CPS in manufacturing and production, crossing all levels of production between the autonomous and cooperative elements and sub-systems. It is responsible for connecting the virtual space with the physical world, allowing the smart factories to be more intelligent, resulting in better and smart production conditions, increasing productivity, production efficiency, and product quality. The big issue is connecting smart devices with different standards and protocols. About 40% of the benefits of the IoT cannot be achieved without interoperability. This thesis is focused on promoting the interoperability of smart devices (sensors and actuators) inside the IIoT under the I4.0 context. The IEEE 1451 is a family of standards developed to manage transducers. This standard reaches the syntactic level of interoperability inside Industry 4.0. However, Industry 4.0 requires a semantic level of communication not to exchange data ambiguously. A new semantic layer is proposed in this thesis allowing the IEEE 1451 standard to be a complete framework for communication inside the Industry 4.0 to provide an interoperable network interface with users and applications to collect and share the data from the industry field.A Internet das Coisas tem vindo a crescer recentemente. É um conceito que permite conectar bilhões de dispositivos inteligentes através da Internet em diferentes cenários. Uma área que está sendo desenvolvida dentro da Internet das Coisas é a automação industrial, que abrange a comunicação máquina com máquina no processo industrial de forma automática. Essa interligação, representa o conceito da Internet das Coisas Industrial. Dentro da Internet das Coisas Industrial está a desenvolver o conceito de Indústria 4.0 (I4.0). Isso representa a quarta revolução industrial que aborda o uso de tecnologias utilizadas na Internet para melhorar a eficiência da produção de serviços em fábricas inteligentes. A Indústria 4.0 é composta por uma combinação de objetos do mundo físico e do mundo da digital que oferece funcionalidade dedicada e flexibilidade dentro e fora de uma rede da Indústria 4.0. O I4.0 é composto principalmente por Sistemas Ciberfísicos. Os Sistemas Ciberfísicos permitem a integração do mundo físico com seu representante no mundo digital, por meio do Gémeo Digital. Sistemas Ciberfísicos são responsáveis por realizar a aplicação inteligente da ligação cruzada, que opera de forma auto-organizada e descentralizada, utilizada por fábricas inteligentes para criação de valor. Uma área em que o Sistema Ciberfísicos pode ser implementado na produção manufatureira, isso representa o desenvolvimento do conceito Sistemas de Produção Ciberfísicos. Esse sistema é a implementação da Indústria 4.0 e Sistema Ciberfísicos na fabricação e produção. A cruzar todos os níveis desde a produção entre os elementos e subsistemas autónomos e cooperativos. Ele é responsável por conectar o espaço virtual com o mundo físico, permitindo que as fábricas inteligentes sejam mais inteligentes, resultando em condições de produção melhores e inteligentes, aumentando a produtividade, a eficiência da produção e a qualidade do produto. A grande questão é como conectar dispositivos inteligentes com diferentes normas e protocolos. Cerca de 40% dos benefícios da Internet das Coisas não podem ser alcançados sem interoperabilidade. Esta tese está focada em promover a interoperabilidade de dispositivos inteligentes (sensores e atuadores) dentro da Internet das Coisas Industrial no contexto da Indústria 4.0. O IEEE 1451 é uma família de normas desenvolvidos para gerenciar transdutores. Esta norma alcança o nível sintático de interoperabilidade dentro de uma indústria 4.0. No entanto, a Indústria 4.0 requer um nível semântico de comunicação para não haver a trocar dados de forma ambígua. Uma nova camada semântica é proposta nesta tese permitindo que a família de normas IEEE 1451 seja um framework completo para comunicação dentro da Indústria 4.0. Permitindo fornecer uma interface de rede interoperável com utilizadores e aplicações para recolher e compartilhar os dados dentro de um ambiente industrial.This thesis was developed at the Measurement and Instrumentation Laboratory (IML) in the University of Beira Interior and supported by the portuguese project INDTECH 4.0 – Novas tecnologias para fabricação, que tem como objetivo geral a conceção e desenvolvimento de tecnologias inovadoras no contexto da Indústria 4.0/Factories of the Future (FoF), under the number POCI-01-0247-FEDER-026653

    A Medical Records Managing and Securing Blockchain Based System Supported by a Genetic Algorithm and Discrete Wavelet Transform

    Get PDF
    The privacy of patients is jeopardised when medical records and data are spread or shared beyond the protected cloud of institutions. This is because breaches force them to the brink that they start abstaining from full disclosure of their condition. This type of condition has a negative effect on scientific research, patients and all stakeholders. A blockchain-based data sharing system is proposed to tackle this issue, which employs immutability and autonomy properties of the blockchain to sufficiently resolve challenges associated with access control and handle sensitive data. Our proposed system is supported by a Discrete Wavelet Transform to enhance the overall security, and a Genetic Algorithm technique to optimise the queuing optimization technique as well. Introducing this cryptographic key generator enhances the immunity and system access control, which allows verifying users securely in a fast way. This design allows further accountability since all users involved are already known and the blockchain records a log of their actions. Only when the users' cryptographic keys and identities are confirmed, the system allows requesting data from the shared queuing requests. The achieved execution time per node, confirmation time per node and robust index for block number of 0.19 s, 0.17 s and 20 respectively that based on system evaluation illustrates that our system is robust, efficient, immune and scalable
    corecore