32 research outputs found

    Novel Area-Efficient and Flexible Architectures for Optimal Ate Pairing on FPGA

    Full text link
    While FPGA is a suitable platform for implementing cryptographic algorithms, there are several challenges associated with implementing Optimal Ate pairing on FPGA, such as security, limited computing resources, and high power consumption. To overcome these issues, this study introduces three approaches that can execute the optimal Ate pairing on Barreto-Naehrig curves using Jacobean coordinates with the goal of reaching 128-bit security on the Genesys board. The first approach is a pure software implementation utilizing the MicroBlaze processor. The second involves a combination of software and hardware, with key operations in FpF_{p} and Fp2F_{p^{2}} being transformed into IP cores for the MicroBlaze. The third approach builds on the second by incorporating parallelism to improve the pairing process. The utilization of multiple MicroBlaze processors within a single system offers both versatility and parallelism to speed up pairing calculations. A variety of methods and parameters are used to optimize the pairing computation, including Montgomery modular multiplication, the Karatsuba method, Jacobean coordinates, the Complex squaring method, sparse multiplication, squaring in Gϕ6Fp12G_{\phi 6}F_{p^{12}}, and the addition chain method. The proposed systems are designed to efficiently utilize limited resources in restricted environments, while still completing tasks in a timely manner.Comment: 13 pages, 8 figures, and 5 table

    Energy Efficiency in Security of 5G-Based IoT: An End-to-End Adaptive Approach

    No full text
    The challenging problem of energy efficiency in security of the Internet of Things (IoT) is tackled in this article. The authors consider the upcoming generation of mobile networks, 5G, as a communication architecture for the IoT. The concept of adaptive security is adopted, which is based on adjusting the security level as per the changing context. It has the potential of reducing energy consumption by adapting security rather than always considering the worst case, which is energy consuming. The consideration of 5G introduces new dynamics that can be exploited to perform more adaptation. The proposed solution introduces an intelligence in the application of security, from the establishment phase to the use phase (end-to-end). The security level related to the used cryptographic algorithm/key is adapted for each node during the establishment phase, so to match with the duration of the provided services. A new strategy is formulated that considers both IoT and 5G characteristics. In addition, a solution basedon the framework of the coalitional game is proposed in order to associate the deployed objects with the optimized security levels. Moreover, the application of security is also adapted during the use phase according to the threat level. Trust management is used to evaluate the threat level among the network nodes, while existing works focus on performing the adaptation during the use phase. The proposed approach achieves more adaptation through the consideration of both IoT and 5G dynamics. The analysis and performance evaluations are conducted to show the effectiveness of the proposed end-to-end approach.Peer reviewe

    TAS-IoT: Trust-Based Adaptive Security in the IoT

    No full text
    International audienc

    Adaptive failure detection in low power lossy wireless sensor networks

    No full text
    International audienceIn this paper, we investigate the use of failure detectors (FD) in Wireless Sensor Networks (WSN). We provide a classification of FD with respect to some WSN criteria. The focus will be on energy depletion and lossy links. We propose then a new general FD model tailored to WSN constraints, called Adaptive Neighborhood Failure Detector for Low-power lossy WSN (AFDEL). AFDEL provides adaptive local failure detection robust against packet loss (intermittent failures) and saves the use of energy, bandwidth and memory storage. Furthermore, we introduce in AFDEL model an adaptive timer strategy. This strategy offers the possibility to customize the dynamic timer pattern with respect to application requirements in terms of completeness and accuracy. We illustrate the use of this strategy by proposing three failure detection techniques based on AFDEL general model. As a pat of this work, we give a stochastic based approach for timer adaptation. We evaluat

    Threats models on biometri systems: A comparative study

    No full text
    Several biometric threats systems models have been proposed to facilitate the design, implementation and validation techniques for securing these systems. Some models classify threats by type of attacks, others by specific attacks and other by using vulnerabilities and threat agent. Each model proposes a vision and a different approach to identify these threats. For example, to design security techniques for wireless biometric card, one should identify all threats facing this kind of device. In this paper, a comparative study and synthesis to help choose the most fitting model, depending on the security problems addressed, is given

    Context Aware MWSN Optimal Redeployment Strategies for Air Pollution Timely Monitoring

    Get PDF
    International audienceAir pollution has major negative effects on both human health and environment. Thus, air quality monitoring is a main issue in our days. In this paper, we focus on the use of mobile WSN to generate high spatio-temporal resolution air quality maps. We address the sensors' online redeployment problem and we propose three redeployment models allowing to assess, with high precision, the air pollution concentrations. Unlike most of existing movement assisted deployment strategies based on network generic characteristics such as coverage and connectivity, our approaches take into account air pollution properties and dispersion models to offer an efficient air quality estimation. First, we introduce our proposition of an optimal integer linear program based on air pollution dispersion characteristics to minimize estimation errors. Then, we propose a local iterative integer linear programming model and a heuristic technique that offer a lower execution time with acceptable estimation quality. We evaluate our models in terms of execution time and estimation quality using a real data set of Lyon City in France. Finally, we compare our models' performances to existing generic redeployment strategies. Results show that our algorithms outperform the existing generic solutions while reducing the maximum estimation error up to 3 times

    Product Quality Assessment in the Internet of Things: A Consumer-Oriented Approach

    No full text
    This paper proposes a consumer-oriented approach to IoT product recommendations. It is designed to help new consumers choose high-quality IoT products that best meet their needs. We used hybrid techniques to implement the proposed approach. Experiments were also conducted to implement an intelligent IoT marketing system at the Rehab marketplace. The system has shown good results in its performance, usability, and user satisfaction. These results confirm the applicability and effectiveness of the approach in assessing and recommending IoT products

    Optimized multi‐biometric enhancement analysis

    No full text
    International audienc

    Multi-Agent Architecture for the Design of WSN Applications

    No full text
    International audienc
    corecore