356 research outputs found

    Computation hierarchy for in-network processing

    Get PDF
    Explored the latency and energy tradeoffs introduced by the heterogeneity of sensor nodes in the netework

    Computation hierarchy for in-network processing

    Get PDF

    Energy Minimization of System Pipelines Using Multiple Voltages

    Get PDF
    Modem computer and communication system design has to consider the timing constraints imposed by communication and system pipelines, and minimize the energy consumption. We adopt the recent proposed model for communication pipeline latency[23] and address the problem of how to minimize the power consumption in system-level pipelines under the latency constraints by selecting supply voltage for each pipeline stage using the variable voltage core-based system design methodology[l 11. We define the problem, solve it optimally under realistic assumptions and develop algorithms for power minimization of system pipeline designs based on our theoretical results. We apply this new approach on the 4- stage Myrinet GAM pipeline, with the appropriate voltage profiles, we achieve 93.4%, 91.3% and 26.9% power reduction on three pipeline stages over the traditional design

    Non-invasive Spoofing Attacks for Anti-lock Braking Systems

    Get PDF
    This work exposes a largely unexplored vector of physical-layer attacks with demonstrated consequences in automobiles. By modifying the physical environment around analog sensors such as Antilock Braking Systems (ABS), we exploit weaknesses in wheel speed sensors so that a malicious attacker can inject arbitrary measurements to the ABS computer which in turn can cause life-threatening situations. In this paper, we describe the development of a prototype ABS spoofer to enable such attacks and the potential consequences of remaining vulnerable to these attacks. The class of sensors sensitive to these attacks depends on the physics of the sensors themselves. ABS relies on magnetic--based wheel speed sensors which are exposed to an external attacker from underneath the body of a vehicle. By placing a thin electromagnetic actuator near the ABS wheel speed sensors, we demonstrate one way in which an attacker can inject magnetic fields to both cancel the true measured signal and inject a malicious signal, thus spoofing the measured wheel speeds. The mounted attack is of a non-invasive nature, requiring no tampering with ABS hardware and making it harder for failure and/or intrusion detection mechanisms to detect the existence of such an attack. This development explores two types of attacks: a disruptive, naive attack aimed to corrupt the measured wheel speed by overwhelming the original signal and a more advanced spoofing attack, designed to inject a counter-signal such that the braking system mistakenly reports a specific velocity. We evaluate the proposed ABS spoofer module using industrial ABS sensors and wheel speed decoders, concluding by outlining the implementation and lifetime considerations of an ABS spoofer with real hardware

    Synthesis Techniques for Low-Power Hard Real-Time Systems on Variable Voltage Processors

    Get PDF
    The energy efficiency of systems-on-a-chip can be much improved if one were to vary the supply voltage dynamically at run time. In this paper we describe the synthesis of systems-on-a-chip based on core processors, while treating voltage (and correspondingly, the clock frequency) as a variable to be scheduled along with the computation tasks during the static scheduling step. In addition to describing the complete synthesis design flow for these variable voltage systems, we focus on the problem of doing the voltage scheduling while taking into account the inherent limitation on the rates at which the voltage and clock frequency can be changed by the power supply controllers and clock generators. Taking these limits on rate of change into account is crucial since changing the voltage by even a volt may take time equivalent to 100s to 10,000s of instructions on modern processors. We present both an exact but impractical formulation of this scheduling problem as a set of non-linear equations, as well as a heuristic approach based on reduction to an optimally solvable restricted ordered scheduling problem. Using various task mixes drawn from a set of nine real-life applications, our results show that we are able to reduce power consumption to within 7% of the lower bound obtained by imposing no limit at the rate of change of voltage and clock frequencies

    Corrosion behavior of ultrafine-grained AA2024 aluminum alloy produced by cryorolling.

    Get PDF
    The objectives of this study were to produce ultrafine-grained (UFG) AA2024 aluminum alloy by cryorolling followed by aging and to evaluate its corrosion behavior. Solutionized samples were cryorolled to ~85% reduction in thickness. Subsequent aging resulted in a UFG structure with finer precipitates of Al2CuMg in the cryorolled alloy. The (1) solutionized and (2) solutionized and cryorolled samples were uniformly aged at 160°C/24 h and were designated as CGPA and CRPA, respectively; these samples were subsequently subjected to corrosion studies. Potentiodynamic polarization studies in 3.5wt% NaCl solution indicated an increase in corrosion potential and a decrease in corrosion current density for CRPA compared to CGPA. In the case of CRPA, electrochemical impedance spectroscopic studies indicated the presence of two complex passive oxide layers with a higher charge transfer resistance and lower mass loss during intergranular corrosion tests. The improved corrosion resistance of CRPA was mainly attributed to its UFG structure, uniform distribution of fine precipitates, and absence of coarse grain-boundary precipitation and associated precipitate-free zones as compared with the CGPA alloy

    A framework for data quality and feedback in participatory sensing

    Full text link
    The rapid adoption of mobile phones by society over the last decade and the increasing ability to capture, classifying, and transmit a wide variety of data (image, audio, and location) have enabled a new sensing paradigm - where humans carrying mobile devices can act as sensor systems. Human-in-the-loop sensor systems raise many new challenges in areas of sensor data quality assessment, mobility and sampling coordination, and user interaction procedures. To this end, we outline our initial steps in designing an incentive based reputation system for assessing data quality, provide an overview of techniques to obtain fine grained contextual information in mobile situations, and detail feedback mechanisms to enable more interactive and informative sensor systems

    A system architecture for exploiting mission information requirement and resource allocation

    Full text link
    In a military scenario, commanders need to determine what kinds of information will help them execute missions. The amount of information available to support each mission is constrained by the availability of information assets. For example, there may be limits on the numbers of sensors that can be deployed to cover a certain area, and limits on the bandwidth available to collect data from those sensors for processing. Therefore, options for satisfying information requirements should take into consideration constraints on the underlying information assets, which in certain cases could simultaneously support multiple missions. In this paper, we propose a system architecture for modeling missions and allocating information assets among them. We model a mission as a graph of tasks with temporal and probabilistic relations. Each task requires some information provided by the information assets. Our system suggests which information assets should be allocated among missions. Missions are compatible with each other if their needs do not exceed the limits of the information assets; otherwise, feedback is sent to the commander indicating information requirements need to be adjusted. The decision loop will eventually converge and the utilization of the resources is maximized

    Coordinated Static and Mobile Sensing for Environmental Monitoring

    Full text link
    Distributed embedded sensor networks are now being successfully deployed in environmental monitoring of natural phenomena as well as for applications in commerce and physical security. While substantial progress in sensor network performance has appeared, new challenges have also emerged as these systems have been deployed in the natural environment. First, in order to achieve minimum sensing fidelity performance, the rapid spatiotemporal variation of environmental phenomena requires impractical deployment densities. The presence of obstacles in the environment introduces sensing uncertainty and degrades the performance of sensor fusion systems in particular for the many new applications of image sensing. The physical obstacles encountered by sensing may be circumvented by a new mobile sensing method or Networked Infomechanical Systems (NIMS). NIMS integrates distributed, embedded sensing and computing systems with infrastructure-supported mobility. NIMS now includes coordinated mobility methods that exploits adaptive articulation of sensor perspective and location as well as management of sensor population to provide the greatest certainty in sensor fusion results. The architecture, applications, and implementation of NIMS will be discussed here. In addition, results of environmentally-adaptive sampling, and direct measurement of sensing uncertainty will be described
    corecore