57 research outputs found

    Elliptic curve cryptosystem over optimal extension fields for computationally constrained devices

    Get PDF
    Data security will play a central role in the design of future IT systems. The PC has been a major driver of the digital economy. Recently, there has been a shift towards IT applications realized as embedded systems, because they have proved to be good solutions for many applications, especially those which require data processing in real time. Examples include security for wireless phones, wireless computing, pay-TV, and copy protection schemes for audio/video consumer products and digital cinemas. Most of these embedded applications will be wireless, which makes the communication channel vulnerable. The implementation of cryptographic systems presents several requirements and challenges. For example, the performance of algorithms is often crucial, and guaranteeing security is a formidable challenge. One needs encryption algorithms to run at the transmission rates of the communication links at speeds that are achieved through custom hardware devices. Public-key cryptosystems such as RSA, DSA and DSS have traditionally been used to accomplish secure communication via insecure channels. Elliptic curves are the basis for a relatively new class of public-key schemes. It is predicted that elliptic curve cryptosystems (ECCs) will replace many existing schemes in the near future. The main reason for the attractiveness of ECC is the fact that significantly smaller parameters can be used in ECC than in other competitive system, but with equivalent levels of security. The benefits of having smaller key size include faster computations, and reduction in processing power, storage space and bandwidth. This makes ECC ideal for constrained environments where resources such as power, processing time and memory are limited. The implementation of ECC requires several choices, such as the type of the underlying finite field, algorithms for implementing the finite field arithmetic, the type of the elliptic curve, algorithms for implementing the elliptic curve group operation, and elliptic curve protocols. Many of these selections may have a major impact on overall performance. In this dissertation a finite field from a special class called the Optimal Extension Field (OEF) is chosen as the underlying finite field of implementing ECC. OEFs utilize the fast integer arithmetic available on modern microcontrollers to produce very efficient results without resorting to multiprecision operations or arithmetic using polynomials of large degree. This dissertation discusses the theoretical and implementation issues associated with the development of this finite field in a low end embedded system. It also presents various improvement techniques for OEF arithmetic. The main objectives of this dissertation are to --Implement the functions required to perform the finite field arithmetic operations. -- Implement the functions required to generate an elliptic curve and to embed data on that elliptic curve. -- Implement the functions required to perform the elliptic curve group operation. All of these functions constitute a library that could be used to implement any elliptic curve cryptosystem. In this dissertation this library is implemented in an 8-bit AVR Atmel microcontroller.Dissertation (MEng (Computer Engineering))--University of Pretoria, 2006.Electrical, Electronic and Computer Engineeringunrestricte

    Accurate and efficient localisation in wireless sensor networks using a best-reference selection

    Get PDF
    Many wireless sensor network (WSN) applications depend on knowing the position of nodes within the network if they are to function efficiently. Location information is used, for example, in item tracking, routing protocols and controlling node density. Configuring each node with its position manually is cumbersome, and not feasible in networks with mobile nodes or dynamic topologies. WSNs, therefore, rely on localisation algorithms for the sensor nodes to determine their own physical location. The basis of several localisation algorithms is the theory that the higher the number of reference nodes (called “references”) used, the greater the accuracy of the estimated position. However, this approach makes computation more complex and increases the likelihood that the location estimation may be inaccurate. Such inaccuracy in estimation could be due to including data from nodes with a large measurement error, or from nodes that intentionally aim to undermine the localisation process. This approach also has limited success in networks with sparse references, or where data cannot always be collected from many references (due for example to communication obstructions or bandwidth limitations). These situations require a method for achieving reliable and accurate localisation using a limited number of references. Designing a localisation algorithm that could estimate node position with high accuracy using a low number of references is not a trivial problem. As the number of references decreases, more statistical weight is attached to each reference’s location estimate. The overall localisation accuracy therefore greatly depends on the robustness of the selection method that is used to eliminate inaccurate references. Various localisation algorithms and their performance in WSNs were studied. Information-fusion theory was also investigated and a new technique, rooted in information-fusion theory, was proposed for defining the best criteria for the selection of references. The researcher chose selection criteria to identify only those references that would increase the overall localisation accuracy. Using these criteria also minimises the number of iterations needed to refine the accuracy of the estimated position. This reduces bandwidth requirements and the time required for a position estimation after any topology change (or even after initial network deployment). The resultant algorithm achieved two main goals simultaneously: accurate location discovery and information fusion. Moreover, the algorithm fulfils several secondary design objectives: self-organising nature, simplicity, robustness, localised processing and security. The proposed method was implemented and evaluated using a commercial network simulator. This evaluation of the proposed algorithm’s performance demonstrated that it is superior to other localisation algorithms evaluated; using fewer references, the algorithm performed better in terms of accuracy, robustness, security and energy efficiency. These results confirm that the proposed selection method and associated localisation algorithm allow for reliable and accurate location information to be gathered using a minimum number of references. This decreases the computational burden of gathering and analysing location data from the high number of references previously believed to be necessary.Thesis (PhD(Eng))--University of Pretoria, 2011.Electrical, Electronic and Computer Engineeringunrestricte

    An updated survey on the convergence of distributed ledger technology and artificial intelligence : current state, major challenges and future direction

    Get PDF
    In recent times, Artificial Intelligence (AI) and Distributed Ledger Technology (DLT) have become two of the most discussed sectors in Information Technology, with each having made a major impact. This has generated space for further innovation to occur in the convergence of the two technologies. In this paper, we gather, analyse, and present a detailed review of the convergence of AI and DLT in a vice versa manner. We review how AI is impacts DLT by focusing on AI-based consensus algorithms, smart contract security, selfish mining, decentralized coordination, DLT fairness, non-fungible tokens, decentralized finance, decentralized exchanges, decentralized autonomous organizations, and blockchain oracles. In terms of the impact DLT has on AI, the areas covered include AI data privacy, explainable AI, smart contract-based AIs, parachains, decentralized neural networks, Internet of Things, 5G technology and data markets, and sharing. Furthermore, we identify research gaps and discuss open research challenges in developing future directions.https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639Electrical, Electronic and Computer Engineerin

    Adaptive threshold techniques for cognitive radio‐based low power wide area network

    Get PDF
    Some low power wide area network (LPWAN) developers such as Sigfox, Weightless, and Nwave, have recently commenced the integration of cognitive radio (CR) techniques in their respective LPWAN technologies, generally termed CR‐LPWAN systems. Their objective is to overcome specific limitations associated with LPWANs such as spectra congestion and interference, which in turn will improve the performance of many Internet of Things (IoT)‐based applications. However, in order to be effective under dynamic sensing conditions, CR‐LPWAN systems are typically required to adopt adaptive threshold techniques (ATTs) in order to improve their sensing performance. Consequently, in this article, we have investigated some of these notable ATTs to determine their suitability for CR‐LPWAN systems. To accomplish this goal, first, we describe a network architecture and physical layer model suitable for the effective integration of CR in LPWAN. Then, some specific ATTs were investigated following this model based on an experimental setup constructed using the B200 Universal Software Radio Peripheral kit. Several tests were conducted, and our findings suggest that no single ATT was able to perform best under all sensing conditions. Thus, CR‐LPWAN developers may be required to select a suitable ATT only based on the specific condition(s) for which the IoT application is designed. Nevertheless, some ATTs such as the forward consecutive mean excision algorithm, the histogram partitioning algorithm and the nonparametric amplitude quantization method achieved noteworthy performances under a broad range of tested conditions. Our findings will be beneficial to developers who may be interested in deploying effective ATTs for CR‐LPWAN systems.http://wileyonlinelibrary.com/journal/ett2021-04-01hj2020Electrical, Electronic and Computer Engineerin

    A hybrid multi-class MAC protocol for IoT-enabled WBAN systems

    Get PDF
    This study proposes a hybrid MAC protocol that can efficiently and effectively optimize the communication channel access of a WBAN multi-class system. The proposed protocol consists of two major processes that include the contention phase (CP) and the transmission phase (TP). In the CP, only the biomedical devices that have health packets to transmit randomly contend with equal probabilities using a slotted ALOHA scheme for transmission opportunities and the successful biomedical devices are allocated a transmission time-slot by employing a reservation-based time division multiple access (TDMA) scheme in the transmission phase. A multi-objective optimization problem was formulated to maximize the system sum-throughput, packet success-access-ratio, as well as the reservation ratio, and solved by the controller (i.e., access point) to determine the optimal length of the CP and the number of biomedical devices that can transmit in the TP. Monte Carlo simulation was performed and the optimization solution improved the proposed protocol's performances. For validation purposes, the simulated results in MATLAB revealed that the proposed protocol performs better than the contemporary system in the context of the system sum-throughput, reservation ratio, and the average health packet delay with performance gains of about 9.2%, 9.5%, and 9.6% respectively.This work was supported in part by the Council for Scientific and Industrial Research, Pretoria, South Africa, through the Smart Networks collaboration initiative and IoT-Factory Program (funded by the Department of Science and Innovation).https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=7361hj2021Electrical, Electronic and Computer Engineerin

    Artificial intelligence-driven intrusion detection in software-defined wireless sensor networks : towards secure IoT-enabled healthcare systems

    Get PDF
    Wireless Sensor Networks (WSNs) are increasingly deployed in Internet of Things (IoT) systems for applications such as smart transportation, telemedicine, smart health monitoring and fall detection systems for the elderly people. Given that huge amount of data, vital and critical information can be exchanged between the different parts of a WSN, good management and protection schemes are needed to ensure an efficient and secure operation of the WSN. To ensure an efficient management of WSNs, the Software-Defined Wireless Sensor Network (SDWSN) paradigm has been recently introduced in the literature. In the same vein, Intrusion Detection Systems, have been used in the literature to safeguard the security of SDWSN-based IoTs. In this paper, three popular Artificial Intelligence techniques (Decision Tree, Naïve Bayes, and Deep Artificial Neural Network) are trained to be deployed as anomaly detectors in IDSs. It is shown that an IDS using the Decision Tree-based anomaly detector yields the best performances metrics both in the binary classification and in the multinomial classification. Additionally, it was found that an IDS using the Naïve Bayes-based anomaly detector was only adapted for binary classification of intrusions in low memory capacity SDWSN-based IoT (e.g., wearable fitness tracker). Moreover, new state-of-the-art accuracy (binary classification) and F-scores (multinomial classification) were achieved by introducing an end-to-end feature engineering scheme aimed at obtaining 118 features from the 41 features of the Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD) dataset. The state-of-the-art accuracy was pushed to 0.999777 using the Decision Tree-based anomaly detector. Finally, it was found that the Deep Artificial Neural Network should be expected to become the next default anomaly detector in the light of its current performance metrics and the increasing abundance of training data.This research was supported by the Council for Scientific and Industrial Research, Pretoria, South Africa, through the Smart Networks collaboration initiative and IoT-Factory Program (Funded by the Department of Science and Innovation (DSI), South Africa).The Council for Scientific and Industrial Research, Pretoria, South Africa, through the Smart Networks collaboration initiative and IoT-Factory Program (Funded by the Department of Science and Innovation (DSI), South Africa).https://www.mdpi.com/journal/ijerphElectrical, Electronic and Computer Engineerin

    Building upon NB-IoT networks : a roadmap towards 5G new radio networks

    Get PDF
    Narrowband Internet of Things (NB-IoT) is a type of low-power wide-area (LPWA) technology standardized by the 3rd-Generation Partnership Project (3GPP) and based on long-term evolution (LTE) functionalities. NB-IoT has attracted significant interest from the research community due to its support for massive machine-type communication (mMTC) and various IoT use cases that have stringent specifications in terms of connectivity, energy efficiency, reachability, reliability, and latency. However, as the capacity requirements for different IoT use cases continue to grow, the various functionalities of the LTE evolved packet core (EPC) system may become overladen and inevitably suboptimal. Several research efforts are ongoing to meet these challenges; consequently, we present an overview of these efforts, mainly focusing on the Open System Interconnection (OSI) layer of the NB-IoT framework. We present an optimized architecture of the LTE EPC functionalities, as well as further discussion about the 3GPP NB-IoT standardization and its releases. Furthermore, the possible 5G architectural design for NB-IoT integration, the enabling technologies required for 5G NB-IoT, the 5G NR coexistence with NB-IoT, and the potential architectural deployment schemes of NB-IoT with cellular networks are introduced. In this article, a description of cloud-assisted relay with backscatter communication, a comprehensive review of the technical performance properties and channel communication characteristics from the perspective of the physical (PHY) and medium-access control (MAC) layer of NB-IoT, with a focus on 5G, are presented. The different limitations associated with simulating these systems are also discussed. The enabling market for NB-IoT, the benefits for a few use cases, and possible critical challenges related to their deployment are also included. Finally, present challenges and open research directions on the PHY and MAC properties, as well as the strengths, weaknesses, opportunities, and threats (SWOT) analysis of NB-IoT, are presented to foster the prospective research activities.http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639pm2021Electrical, Electronic and Computer Engineerin

    Amplitude quantization method for autonomous threshold estimation in self-reconfigurable cognitive radio systems

    Get PDF
    Self-adaptive threshold adjustment algorithms (SATAs) are required to reconfigure their parameters autonomously (i.e. to achieve self-parameter adjustment) at runtime and during online use for effective signal detection in cognitive radio (CR) applications. In this regard, a CR system embedded with the functionality of a SATA is termed a self-reconfigurable CR system. However, SATAs are challenging to develop owing to a lack of methods for self-parameter adjustment. Thus, a plausible approach towards realizing a functional SATA may involve developing effective non-parametric methods, which are often pliable to achieve self-parameter adjustment since they are distribution-free methods. In this article, we introduce such a method termed the non-parametric amplitude quantization method (NPAQM) designed to improve primary user signal detection in CR without requiring its parameters to be manually fine-tuned. The NPAQM works by quantizing the amplitude of an input signal and then evaluating each quantized value based on the principle of discriminant analysis. Then, the algorithm searches for an effective threshold value that maximally separates noise from signal elements in the input signal sample. Further, we propose a new heuristic, which is an algorithm designed based on a new corollary derived from the Otsu’s algorithm towards improving the NPAQM’s performance under noise-only regimes. We applied our method to the case of the energy detector and compared the NPAQM with other autonomous methods. We show that the NPAQM provides improved performance as against known methods, particularly in terms of maintaining a low probability of false alarm under different test conditions.http://www.elsevier.com/locate/phycomhj2022Electrical, Electronic and Computer Engineerin

    Low power wide area network, cognitive radio and the internet of things : potentials for integration

    Get PDF
    The Internet of Things (IoT) is an emerging paradigm that enables many beneficial and prospective application areas, such as smart metering, smart homes, smart industries, and smart city architectures, to name but a few. These application areas typically comprise end nodes and gateways that are often interconnected by low power wide area network (LPWAN) technologies, which provide low power consumption rates to elongate the battery lifetimes of end nodes, low IoT device development/purchasing costs, long transmission range, and increased scalability, albeit at low data rates. However, most LPWAN technologies are often confronted with a number of physical (PHY) layer challenges, including increased interference, spectral inefficiency, and/or low data rates for which cognitive radio (CR), being a predominantly PHY layer solution, suffices as a potential solution. Consequently, in this article, we survey the potentials of integrating CR in LPWAN for IoT-based applications. First, we present and discuss a detailed list of different state-of-the-art LPWAN technologies; we summarize the most recent LPWAN standardization bodies, alliances, and consortia while emphasizing their disposition towards the integration of CR in LPWAN.We then highlight the concept of CR in LPWAN via a PHY-layer front-end model and discuss the benefits of CR-LPWAN for IoT applications. A number of research challenges and future directions are also presented. This article aims to provide a unique and holistic overview of CR in LPWAN with the intention of emphasizing its potential benefits.This work was supported by the Council for Scientific and Industrial Research, Pretoria, South Africa, through the Smart Networks collaboration initiative and Internet of Things (IoT)-Factory Program (funded by the Department of Science and Innovation (DSI), South Africa).http://www.mdpi.com/journal/sensorsam2021Electrical, Electronic and Computer Engineerin

    A survey on the viability of confirmed traffic in a LoRaWAN

    Get PDF
    Internet of Things (IoT) deployments are on the rise globally with Low Power Wide Area Networks (LPWAN) providing the wireless networks needed for this expansion. One of these technologies namely Long Range Wide Area Network (LoRaWAN) has proven to be a very popular choice. The LoRaWAN protocol allows for confirmed traffic from the end device to the gateway (uplink) and the reverse (downlink), increasing the number of IoT use cases that it can support. However, this comes at a cost as downlink traffic severely impacts scalability due to in part a gateway's duty cycle restrictions. This paper highlights some of the use cases that require confirmed traffic, examines the recent works focused on LoRaWAN confirmed traffic and discusses the mechanism with which is implemented. It was found that confirmed traffic is viable in small networks, especially when data transfer is infrequent. Additionally, the following aspects negatively impact the viability of confirmed traffic in large networks: the duty cycle restrictions placed on gateways, the use of spreading factor 12 for receive window 2 transmissions, a high maximum number of transmissions (NbTrans) and the ACK_TIMEOUT transmission backoff interval. The paper also raises and suggests solutions to open research challenges that must be overcome to increase the viability of confirmed traffic.The Council for Scientific and Industrial Research of South Africa and Telkom.http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639am2020Electrical, Electronic and Computer Engineerin
    corecore