32 research outputs found
Novel Area-Efficient and Flexible Architectures for Optimal Ate Pairing on FPGA
While FPGA is a suitable platform for implementing cryptographic algorithms,
there are several challenges associated with implementing Optimal Ate pairing
on FPGA, such as security, limited computing resources, and high power
consumption. To overcome these issues, this study introduces three approaches
that can execute the optimal Ate pairing on Barreto-Naehrig curves using
Jacobean coordinates with the goal of reaching 128-bit security on the Genesys
board. The first approach is a pure software implementation utilizing the
MicroBlaze processor. The second involves a combination of software and
hardware, with key operations in and being transformed into
IP cores for the MicroBlaze. The third approach builds on the second by
incorporating parallelism to improve the pairing process. The utilization of
multiple MicroBlaze processors within a single system offers both versatility
and parallelism to speed up pairing calculations. A variety of methods and
parameters are used to optimize the pairing computation, including Montgomery
modular multiplication, the Karatsuba method, Jacobean coordinates, the Complex
squaring method, sparse multiplication, squaring in , and
the addition chain method. The proposed systems are designed to efficiently
utilize limited resources in restricted environments, while still completing
tasks in a timely manner.Comment: 13 pages, 8 figures, and 5 table
Energy Efficiency in Security of 5G-Based IoT: An End-to-End Adaptive Approach
The challenging problem of energy efficiency in security of the Internet of Things (IoT) is tackled in this article. The authors consider the upcoming generation of mobile networks, 5G, as a communication architecture for the IoT. The concept of adaptive security is adopted, which is based on adjusting the security level as per the changing context. It has the potential of reducing energy consumption by adapting security rather than always considering the worst case, which is energy consuming. The consideration of 5G introduces new dynamics that can be exploited to perform more adaptation. The proposed solution introduces an intelligence in the application of security, from the establishment phase to the use phase (end-to-end). The security level related to the used cryptographic algorithm/key is adapted for each node during the establishment phase, so to match with the duration of the provided services. A new strategy is formulated that considers both IoT and 5G characteristics. In addition, a solution basedon the framework of the coalitional game is proposed in order to associate the deployed objects with the optimized security levels. Moreover, the application of security is also adapted during the use phase according to the threat level. Trust management is used to evaluate the threat level among the network nodes, while existing works focus on performing the adaptation during the use phase. The proposed approach achieves more adaptation through the consideration of both IoT and 5G dynamics. The analysis and performance evaluations are conducted to show the effectiveness of the proposed end-to-end approach.Peer reviewe
Adaptive failure detection in low power lossy wireless sensor networks
International audienceIn this paper, we investigate the use of failure detectors (FD) in Wireless Sensor Networks (WSN). We provide a classification of FD with respect to some WSN criteria. The focus will be on energy depletion and lossy links. We propose then a new general FD model tailored to WSN constraints, called Adaptive Neighborhood Failure Detector for Low-power lossy WSN (AFDEL). AFDEL provides adaptive local failure detection robust against packet loss (intermittent failures) and saves the use of energy, bandwidth and memory storage. Furthermore, we introduce in AFDEL model an adaptive timer strategy. This strategy offers the possibility to customize the dynamic timer pattern with respect to application requirements in terms of completeness and accuracy. We illustrate the use of this strategy by proposing three failure detection techniques based on AFDEL general model. As a pat of this work, we give a stochastic based approach for timer adaptation. We evaluat
Threats models on biometri systems: A comparative study
Several biometric threats systems models have been proposed to facilitate the design, implementation and validation techniques for securing these systems. Some models classify threats by type of attacks, others by specific attacks and other by using vulnerabilities and threat agent. Each model proposes a vision and a different approach to identify these threats. For example, to design security techniques for wireless biometric card, one should identify all threats facing this kind of device. In this paper, a comparative study and synthesis to help choose the most fitting model, depending on the security problems addressed, is given
Context Aware MWSN Optimal Redeployment Strategies for Air Pollution Timely Monitoring
International audienceAir pollution has major negative effects on both human health and environment. Thus, air quality monitoring is a main issue in our days. In this paper, we focus on the use of mobile WSN to generate high spatio-temporal resolution air quality maps. We address the sensors' online redeployment problem and we propose three redeployment models allowing to assess, with high precision, the air pollution concentrations. Unlike most of existing movement assisted deployment strategies based on network generic characteristics such as coverage and connectivity, our approaches take into account air pollution properties and dispersion models to offer an efficient air quality estimation. First, we introduce our proposition of an optimal integer linear program based on air pollution dispersion characteristics to minimize estimation errors. Then, we propose a local iterative integer linear programming model and a heuristic technique that offer a lower execution time with acceptable estimation quality. We evaluate our models in terms of execution time and estimation quality using a real data set of Lyon City in France. Finally, we compare our models' performances to existing generic redeployment strategies. Results show that our algorithms outperform the existing generic solutions while reducing the maximum estimation error up to 3 times
Product Quality Assessment in the Internet of Things: A Consumer-Oriented Approach
This paper proposes a consumer-oriented approach to IoT product recommendations. It is designed to help new consumers choose high-quality IoT products that best meet their needs. We used hybrid techniques to implement the proposed approach. Experiments were also conducted to implement an intelligent IoT marketing system at the Rehab marketplace. The system has shown good results in its performance, usability, and user satisfaction. These results confirm the applicability and effectiveness of the approach in assessing and recommending IoT products
Multi-Agent Architecture for the Design of WSN Applications
International audienc