359 research outputs found
Trust and obfuscation principles for quality of information in emerging pervasive environments
Non peer reviewedPostprin
Computation hierarchy for in-network processing
Explored the latency and energy tradeoffs introduced by the heterogeneity of sensor nodes in the netework
Energy Minimization of System Pipelines Using Multiple Voltages
Modem computer and communication system design has to consider
the timing constraints imposed by communication and system
pipelines, and minimize the energy consumption. We adopt the recent
proposed model for communication pipeline latency[23] and
address the problem of how to minimize the power consumption
in system-level pipelines under the latency constraints by selecting
supply voltage for each pipeline stage using the variable voltage
core-based system design methodology[l 11. We define the problem,
solve it optimally under realistic assumptions and develop algorithms
for power minimization of system pipeline designs based
on our theoretical results. We apply this new approach on the 4-
stage Myrinet GAM pipeline, with the appropriate voltage profiles,
we achieve 93.4%, 91.3% and 26.9% power reduction on three
pipeline stages over the traditional design
Non-invasive Spoofing Attacks for Anti-lock Braking Systems
This work exposes a largely unexplored vector of physical-layer attacks with demonstrated consequences in automobiles. By modifying the physical environment around analog sensors such as Antilock Braking Systems (ABS), we exploit weaknesses in wheel speed sensors so that a malicious attacker can inject arbitrary measurements to the ABS computer which in turn can cause life-threatening situations. In this paper, we describe the development of a prototype ABS spoofer to enable such attacks and the potential consequences of remaining vulnerable to these attacks. The class of sensors sensitive to these attacks depends on the physics of the sensors themselves. ABS relies on magnetic--based wheel speed sensors which are exposed to an external attacker from underneath the body of a vehicle. By placing a thin electromagnetic actuator near the ABS wheel speed sensors, we demonstrate one way in which an attacker can inject magnetic fields to both cancel the true measured signal and inject a malicious signal, thus spoofing the measured wheel speeds. The mounted attack is of a non-invasive nature, requiring no tampering with ABS hardware and making it harder for failure and/or intrusion detection mechanisms to detect the existence of such an attack. This development explores two types of attacks: a disruptive, naive attack aimed to corrupt the measured wheel speed by overwhelming the original signal and a more advanced spoofing attack, designed to inject a counter-signal such that the braking system mistakenly reports a specific velocity. We evaluate the proposed ABS spoofer module using industrial ABS sensors and wheel speed decoders, concluding by outlining the implementation and lifetime considerations of an ABS spoofer with real hardware
Synthesis Techniques for Low-Power Hard Real-Time Systems on Variable Voltage Processors
The energy efficiency of systems-on-a-chip can be much
improved if one were to vary the supply voltage dynamically
at run time. In this paper we describe the synthesis
of systems-on-a-chip based on core processors, while treating
voltage (and correspondingly, the clock frequency) as a
variable to be scheduled along with the computation tasks
during the static scheduling step. In addition to describing
the complete synthesis design flow for these variable
voltage systems, we focus on the problem of doing the voltage
scheduling while taking into account the inherent limitation
on the rates at which the voltage and clock frequency
can be changed by the power supply controllers and clock
generators. Taking these limits on rate of change into account
is crucial since changing the voltage by even a volt
may take time equivalent to 100s to 10,000s of instructions
on modern processors. We present both an exact but impractical
formulation of this scheduling problem as a set
of non-linear equations, as well as a heuristic approach
based on reduction to an optimally solvable restricted ordered
scheduling problem. Using various task mixes drawn
from a set of nine real-life applications, our results show
that we are able to reduce power consumption to within 7%
of the lower bound obtained by imposing no limit at the rate
of change of voltage and clock frequencies
Corrosion behavior of ultrafine-grained AA2024 aluminum alloy produced by cryorolling.
The objectives of this study were to produce ultrafine-grained (UFG) AA2024 aluminum alloy by cryorolling followed by aging and to evaluate its corrosion behavior. Solutionized samples were cryorolled to ~85% reduction in thickness. Subsequent aging resulted in a UFG structure with finer precipitates of Al2CuMg in the cryorolled alloy. The (1) solutionized and (2) solutionized and cryorolled samples were uniformly aged at 160°C/24 h and were designated as CGPA and CRPA, respectively; these samples were subsequently subjected to corrosion studies. Potentiodynamic polarization studies in 3.5wt% NaCl solution indicated an increase in corrosion potential and a decrease in corrosion current density for CRPA compared to CGPA. In the case of CRPA, electrochemical impedance spectroscopic studies indicated the presence of two complex passive oxide layers with a higher charge transfer resistance and lower mass loss during intergranular corrosion tests. The improved corrosion resistance of CRPA was mainly attributed to its UFG structure, uniform distribution of fine precipitates, and absence of coarse grain-boundary precipitation and associated precipitate-free zones as compared with the CGPA alloy
A framework for data quality and feedback in participatory sensing
The rapid adoption of mobile phones by society over the last decade and the increasing ability to capture, classifying, and transmit a wide variety of data (image, audio, and location) have enabled a new sensing paradigm - where humans carrying mobile devices can act as sensor systems. Human-in-the-loop sensor systems raise many new challenges in areas of sensor data quality assessment, mobility and sampling coordination, and user interaction procedures. To this end, we outline our initial steps in designing an incentive based reputation system for assessing data quality, provide an overview of techniques to obtain fine grained contextual information in mobile situations, and detail feedback mechanisms to enable more interactive and informative sensor systems
A system architecture for exploiting mission information requirement and resource allocation
In a military scenario, commanders need to determine what kinds of information will help them execute missions. The amount of information available to support each mission is constrained by the availability of information assets. For example, there may be limits on the numbers of sensors that can be deployed to cover a certain area, and limits on the bandwidth available to collect data from those sensors for processing. Therefore, options for satisfying information requirements should take into consideration constraints on the underlying information assets, which in certain cases could simultaneously support multiple missions. In this paper, we propose a system architecture for modeling missions and allocating information assets among them. We model a mission as a graph of tasks with temporal and probabilistic relations. Each task requires some information provided by the information assets. Our system suggests which information assets should be allocated among missions. Missions are compatible with each other if their needs do not exceed the limits of the information assets; otherwise, feedback is sent to the commander indicating information requirements need to be adjusted. The decision loop will eventually converge and the utilization of the resources is maximized
Coordinated Static and Mobile Sensing for Environmental Monitoring
Distributed embedded sensor networks are now being successfully deployed in environmental monitoring of natural phenomena as well as for applications in commerce and physical security. While substantial progress in sensor network performance has appeared, new challenges have also emerged as these systems have been deployed in the natural environment. First, in order to achieve minimum sensing fidelity performance, the rapid spatiotemporal variation of environmental phenomena requires impractical deployment densities. The presence of obstacles in the environment introduces sensing uncertainty and degrades the performance of sensor fusion systems in particular for the many new applications of image sensing. The physical obstacles encountered by sensing may be circumvented by a new mobile sensing method or Networked Infomechanical Systems (NIMS). NIMS integrates distributed, embedded sensing and computing systems with infrastructure-supported mobility. NIMS now includes coordinated mobility methods that exploits adaptive articulation of sensor perspective and location as well as management of sensor population to provide the greatest certainty in sensor fusion results. The architecture, applications, and implementation of NIMS will be discussed here. In addition, results of environmentally-adaptive sampling, and direct measurement of sensing uncertainty will be described
- …