469 research outputs found

    IoT protocols, architectures, and applications

    Get PDF
    The proliferation of embedded systems, wireless technologies, and Internet protocols have made it possible for the Internet-of-things (IoT) to bridge the gap between the physical and the virtual world and thereby enabling monitoring and control of the physical environment by data processing systems. IoT refers to the inter-networking of everyday objects that are equipped with sensing, computing, and communication capabilities. These networks can collaborate to autonomously solve a variety of tasks. Due to the very diverse set of applications and application requirements, there is no single communication technology that is able to provide cost-effective and close to optimal performance in all scenarios. In this chapter, we report on research carried out on a selected number of IoT topics: low-power wide-area networks, in particular, LoRa and narrow-band IoT (NB-IoT); IP version 6 over IEEE 802.15.4 time-slotted channel hopping (6TiSCH); vehicular antenna design, integration, and processing; security aspects for vehicular networks; energy efficiency and harvesting for IoT systems; and software-defined networking/network functions virtualization for (SDN/NFV) IoT

    Metathesis of Fatty Acid Ester Derivatives in 1,1-Dialkyl and 1,2,3-Trialkyl Imidazolium Type Ionic Liquids

    Get PDF
    The self-metathesis of methyl oleate and methyl ricinoleate was carried out in the presence of ruthenium alkylidene catalysts 1–4 in [bmim] and [bdmim][X] type ionic liquids (RTILs) (X = PF6−, BF4− and NTf2−) using the gas chromatographic technique. Best catalytic performance was obtained in [bdmim][X] type ionic liquids when compared with [bmim][X] type ionic liquids. Catalyst recycling studies were also carried out in the room temperature ionic liquids (RTILs) with catalysts 1–4 in order to explore their possible industrial application

    Analysis and Improvement of the Random Delay Countermeasure of CHES 2009

    Get PDF
    Random delays are often inserted in embedded software to protect against side-channel and fault attacks. At CHES 2009 a new method for generation of random delays was described that increases the attacker's uncertainty about the position of sensitive operations. In this paper we show that the CHES 2009 method is less secure than claimed. We describe an improved method for random delay generation which does not suffer from the same security weakness. We also show that the paper's criterion to measure the security of random delays can be misleading, so we introduce a new criterion for random delays which is directly connected to the number of acquisitions required to break an implementation. We mount a power analysis attack against an 8-bit implementation of the improved method verifying its higher security in practice

    Making Password Authenticated Key Exchange Suitable For Resource-Constrained Industrial Control Devices

    Get PDF
    Connectivity becomes increasingly important also for small embedded systems such as typically found in industrial control installations. More and more use-cases require secure remote user access increasingly incorporating handheld based human machine interfaces, using wireless links such as Bluetooth. Correspondingly secure operator authentication becomes of utmost importance. Unfortunately, often passwords with all their well-known pitfalls remain the only practical mechanism. We present an assessment of the security requirements for the industrial setting, illustrating that offline attacks on passwords-based authentication protocols should be considered a significant threat. Correspondingly use of a Password Authenticated Key Exchange protocol becomes desirable. We review the signif-icant challenges faced for implementations on resource-constrained devices. We explore the design space and shown how we succeeded in tailoring a partic-ular variant of the Password Authenticated Connection Establishment (PACE) protocol, such that acceptable user interface responsiveness was reached even for the constrained setting of an ARM Cortex-M0+ based Bluetooth low-energy transceiver running from a power budget of 1.5 mW without notable energy buffers for covering power peak transients

    Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme

    Get PDF
    International audienceA common countermeasure against side-channel attacks consists in using the masking scheme originally introduced by Ishai, Sahai and Wagner (ISW) at Crypto 2003, and further generalized by Rivain and Prouff at CHES 2010. The countermeasure is provably secure in the probing model, and it was showed by Duc, Dziembowski and Faust at Eurocrypt 2014 that the proof can be extended to the more realistic noisy leakage model. However the extension only applies if the leakage noise σ increases at least linearly with the masking order n, which is not necessarily possible in practice. In this paper we investigate the security of an implementation when the previous condition is not satisfied, for example when the masking order n increases for a constant noise σ. We exhibit two (template) horizontal side-channel attacks against the Rivain-Prouff's secure multiplication scheme and we analyze their efficiency thanks to several simulations and experiments. Eventually, we describe a variant of Rivain-Prouff's multiplication that is still provably secure in the original ISW model, and also heuristically secure against our new attacks

    A study protocol for applying the co-creating knowledge translation framework to a population health study

    Get PDF
    BACKGROUND: Population health research can generate significant outcomes for communities, while Knowledge Translation (KT) aims to expressly maximize the outcomes of knowledge producing activity. Yet the two approaches are seldom explicitly combined as part of the research process. A population health study in Port Lincoln, South Australia offered the opportunity to develop and apply the co-KT Framework to the entire research process. This is a new framework to facilitate knowledge formation collaboratively between researchers and communities throughout a research to intervention implementation process. DESIGN: This study employs a five step framework (the co-KT Framework) that is formulated from engaged scholarship and action research principles. By following the steps a knowledge base will be cumulatively co-created with the study population that is useful to the research aims. Step 1 is the initiating of contact between the researcher and the study contexts, and the framing of the research issue, achieved through a systematic data collection tool. Step 2 refines the research issue and the knowledge base by building into it context specific details and conducting knowledge exchange events. Step 3 involves interpreting and analysing the knowledge base, and integrating evidence to inform intervention development. In Step 4 the intervention will be piloted and evaluated. Step 5 is the completion of the research process where outcomes for improvement will be instituted as regular practice with the facilitation of the community. In summary, the model uses an iterative knowledge construction mechanism that is complemented by external evidence to design interventions to address health priorities within the community. DISCUSSION: This is a systematic approach that operationalises the translational cycle using a framework for KT practice. It begins with the local context as its foundation for knowledge creation and ends with the development of contextually applicable interventions. It will be of interest to those involved in KT research, participatory action research, population health research and health care systems studies. The co-KT Framework is a method for embedding the principles of KT into all stages of a community-based research process, in which research questions are framed by emergent data from each previous stage.Kathryn Powell, Alison Kitson, Elizabeth Hoon, Jonathan Newbury, Anne Wilson and Justin Beilb
    • …
    corecore