54 research outputs found

    High-performance long NoC link using delay-insensitive current-mode signaling

    Get PDF
    High-performance long-range NoC link enables efficient implementation of network-on-chip topologies which inherently require high-performance long-distance point-to-point communication such as torus and fat-tree structures. In addition, the performance of other topologies, such as mesh, can be improved by using high-performance link between few selected remote nodes.We presented novel implementation of high-performance long-range NoC link based onmultilevel current-mode signaling and delayinsensitive two-phase 1-of-4 encoding. Current-mode signaling reduces the communication latency of long wires significantlycompared to voltage-mode signaling, making it possible to achieve high throughput without pipelining and/or using repeaters. The performance of the proposed multilevel current-mode interconnect is analyzed and compared with two reference voltage mode interconnects. These two reference interconnects are designed using two-phase 1-of-4 encoded voltage-mode signaling, one with pipeline stages and the other using optimal repeater insertion. The proposed multilevel current-mode interconnect achieves higher throughput and lower latency than the two reference interconnects. Its throughput at 8mm wire length is 1.222GWord/swhich is 1.58 and 1.89 times higher than the pipelined and optimal repeater insertion interconnects, respectively. Furthermore, its power consumption is less than the optimal repeater insertion voltage-mode interconnect, at 10mm wire length its power consumption is 0.75mW while the reference repeater insertion interconnect is 1.066 mW. The effect of crosstalk is analyzed using four-bit parallel data transfer with the best-case and worst-case switching patterns and a transmission line model which has both capacitive coupling and inductive coupling.</p

    Utterance-initial Duration of Finnish Non-plosive Consonants

    Get PDF
    Proceedings of the 16th Nordic Conference of Computational Linguistics NODALIDA-2007. Editors: Joakim Nivre, Heiki-Jaan Kaalep, Kadri Muischnek and Mare Koit. University of Tartu, Tartu, 2007. ISBN 978-9985-4-0513-0 (online) ISBN 978-9985-4-0514-7 (CD-ROM) pp. 160-166

    Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3

    Get PDF
    Autonomous “Things” is becoming the future trend as the role, and responsibility of IoT keep diversifying. Its applicability and deployment need to re-stand technological advancement. The versatile security interaction between IoTs in human-to-machine and machine-to-machine must also endure mathematical and computational cryptographic attack intricacies. Quantum cryptography uses the laws of quantum mechanics to generate a secure key by manipulating light properties for secure end-to-end communication. We present a proof-of-principle via a communication architecture model and implementation to simulate these laws of nature. The model relies on the BB84 quantum key distribution (QKD) protocol with two scenarios, without and with the presence of an eavesdropper via the interception-resend attack model from a theoretical, methodological, and practical perspective. The proposed simulation initiates communication over a quantum channel for polarized photon transmission after a pre-agreed configuration over a Classic Channel with parameters. Simulation implementation results confirm that the presence of an eavesdropper is detectable during key generation due to Heisenberg’s uncertainty and no-cloning principles. An eavesdropper has a 0.5 probability of guessing transmission qubit and 0.25 for the polarization state. During simulation re-iterations, a base-mismatch process discarded about 50 percent of the total initial key bits with an Error threshold of 0.11 percent.</p

    Understanding dynamics of initial trust and its antecedents in password managers adoption intention among young adults

    Get PDF
    Security professionals often suggest password managers as one of the best measures for the end-users. However, the end-users have shown reluctance in adopting them, mostly due to the trust factor. The purpose of the paper was to examine the relationship of initial trust, and it’s antecedents with the password manager’s adoption intention. In this regard, using the Initial Trust Model as a framework, data from 289 respondents (age 18-35) were collected through a crowdsourcing website and analyzed using structural equation modeling (SEM) in SmartPLS 3.2. Results show that initial trust has a significant effect on the intention to adopt a password manager. In initial trust formation, firm reputation and structural assurances play a significant role, whereas personal propensity to trust does not significantly relate to initial trust. Moreover, firm reputation and structural assurances indirectly affect intention to adopt password managers

    Understanding the Impact of Information Sources on COVID-19 related Preventive Measures in Finland

    Get PDF
    The COVID-19 pandemic amplified the influence of information reporting on human behavior, as people were forced to quickly adapt to a new health threatening situation by relying on new information. Drawing from protection-motivation and cognitive load theories, we formulated a structural model eliciting the impact of the three online information sources: (1) social media, (2) official websites, and (3) other online news sources; on motivation to adopt recommended COVID-19 preventive measures. The model was tested with the data collected from university employees and students (n=225) in March 2020 through an online survey and analyzed using partial least square structural equation modeling (PLS-SEM). We observed that social media and other online news sources increased information overload amongst the online information sources. This, in turn, negatively affected individuals' self-isolation intention by increasing perceived response costs and decreasing response efficacy. The study highlights the role of online information sources on preventive behaviors during pandemics.</p

    Understanding the impact of information sources on COVID-19 related preventive measures in Finland

    Get PDF
    The COVID-19 pandemic amplified the influence of information reporting on human behavior, as people were forced to quickly adapt to a new health threatening situation by relying on new information. Drawing from protection-motivation and cognitive load theories, we formulated a structural model eliciting the impact of the three online information sources: (1) social media, (2) official websites, and (3) other online news sources; on motivation to adopt recommended COVID-19 preventive measures. The model was tested with the data collected from university employees and students (n = 225) in March 2020 through an online survey and analyzed using partial least square structural equation modeling (PLS-SEM). We observed that social media and other online news sources increased information overload amongst the online information sources. This, in turn, negatively affected individuals' self-isolation intention by increasing perceived response costs and decreasing response efficacy. The study highlights the role of online information sources on preventive behaviors during pandemics

    Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation

    Get PDF
    We present a hybrid internal anomaly detection system that shares detection tasks between router and nodes. It allows nodes to react instinctively against the anomaly node by enforcing temporary communication ban on it. Each node monitors its own neighbors and if abnormal behavior is detected, the node blocks the packets of the anomaly node at link layer and reports the incident to its parent node. A novel RPL control message, Distress Propagation Object (DPO), is formulated and used for reporting the anomaly and network activities to the parent node and subsequently to the router. The system has configurable profile settings and is able to learn and differentiate between the nodes normal and suspicious activities without a need for prior knowledge. It has different subsystems and operation phases that are distributed in both the nodes and router, which act on data link and network layers. The system uses network fingerprinting to be aware of changes in network topology and approximate threat locations without any assistance from a positioning subsystem. The developed system was evaluated using test-bed consisting of Zolertia nodes and in-house developed PandaBoard based gateway as well as emulation environment of Cooja. The evaluation revealed that the system has low energy consumption overhead and fast response. The system occupies 3.3 KB of ROM and 0.86 KB of RAM for its operations. Security analysis confirms nodes reaction against abnormal nodes and successful detection of packet flooding, selective forwarding, and clone attacks. The system’s false positive rate evaluation demonstrates that the proposed system exhibited 5% to 10% lower false positive rate compared to simple detection system

    Towards autonomic Internet of Things: recent advances, evaluation criteria, and future research directions

    Get PDF
    With the rise of the Internet of Things (IoT), tiny devices capable of computation and data transmission are being deployed across various technological domains. Due to the wide deployment of these devices, manual setup and management are infeasible and inefficient. To address this inefficiency, intelligent procedures must be established to enable autonomy that allows devices and networks to operate efficiently with minimal human intervention. In the traditional client-server paradigm, autonomic computing has been proven effective in minimising user intervention in computer systems management and will benefit IoT networks. However, IoT networks tend to be heterogeneous, distributed and resource-constrained, mandating the need for new approaches to implement autonomic principles compared to traditional approaches. We begin by introducing the basic principles of autonomic computing and its significance in IoT. We then discuss the self-* paradigm and MAPE loop from an IoT perspective, followed by recent works in IoT and key enabling technologies for enabling autonomic properties in IoT. Based on the self-* paradigm and MAPE loop analysis from the existing literature, we propose a set of qualitative characteristics for evaluating the autonomy of the IoT network. Lastly, we provide a comprehensive list of challenges associated with achieving autonomic IoT and directions for future research

    The 9th International Conference on Ambient Systems, Networks and Technologies (ANT 2018)

    Get PDF
    In this paper, we analyze the performance of the state-of-the-art end-to-end security schemes in healthcare Internet of Things (IoT) systems. We identify that the essential requirements of robust security solutions for healthcare IoT systems comprise of (i) low-latency secure key generation approach using patients’ Electrocardiogram (ECG) signals, (ii) secure and efficient authentication and authorization for healthcare IoT devices based on the certificate-based datagram Transport Layer Security (DTLS), and (iii) robust and secure mobility-enabled end-to-end communication based on DTLS session resumption. The performance of the state-of-the-art security solutions including our end-to-end security scheme is tested by developing a prototype healthcare IoT system. The prototype is built of a Pandaboard, a TI SmartRF06 board and WiSMotes. The Pandaboard along with the CC2538 module acts as a smart gateway and the WisMotes act as medical sensor nodes. Based on the analysis, we found out that our solution has the most extensive set of performance features in comparison to related approaches found in the literature. The performance evaluation results show that compared to the existing approaches, the cryptographic key generation approach proposed in our end-to-end security scheme is on average 1.8 times faster than existing key generation approaches while being more energy-efficient. In addition, the scheme reduces the communication overhead by 26% and the communication latency between smart gateways and end users by 16%. Our scheme is also approximately 97% faster than certificate based and 10% faster that symmetric key-based DTLS. Certificate based DTLS requires about 2.9 times more ROM and 2.2 times more RAM resources. On the other hand, the ROM and RAM requirements of our scheme are almost as low as in symmetric key-based DTLS.</p

    Low-latency Approach for Secure ECG Feature Based Cryptographic Key Generation

    Get PDF
    corecore