Enhance Energy-efficiency and Security of IoT Using Hardware-oriented Approaches

Enhance Energy-efficiency and Security of IoT Using Hardware-oriented Approaches PDF Author: Teng Xu
Publisher:
ISBN:
Category :
Languages : en
Pages : 162

Get Book Here

Book Description
The rapid growth of Internet of things (IoT) including mobile phones, portable devices, and remote sensor network systems have imposed both conceptually and technically new challenges. Among them, the most demanding requirements for the widespread realization of many IoT visions are security and low power. In terms of security, IoT applications include tasks that are rarely addressed before such as trusted sensing, secure computation and communication, privacy, and data right management. These tasks ask for new and better techniques for the protection of hardware, software, and data. On the other hand, most of the IoT systems suffer from the problem of limited power sources, which in turn require the security on IoT devices to be lightweight. While low energy design is crucial for the successful deployment of resource-constrained IoT devices, their often physically accessible nature, as well as low energy budget restriction, have also contributed to rendering traditional cryptographic approaches insufficient to address all the security concerns. In this dissertation, we present hardware-oriented security designs and synthesis techniques with the aim to reduce the system energy overhead while maintaining the security and reliability. We first demonstrate our work to analyze and enhance the properties of hardware security primitives. We emphasize on physical unclonable functions (PUFs) and use them to enable a wide range of applications, including private/public key communication, authentication, and multi-party communication. We then present a unique system reliability design with the use of non-volatile memory (NVM) to create a fault-tolerance application specific architecture with almost no timing overhead and low energy overhead. Finally, we demonstrate novel energy reduction and synthesis techniques applied on integrated circuit subsystems of IoT applications. The techniques we have applied and improved include near-threshold computing, dual-supply voltage optimization, and pipelining.

Enhance Energy-efficiency and Security of IoT Using Hardware-oriented Approaches

Enhance Energy-efficiency and Security of IoT Using Hardware-oriented Approaches PDF Author: Teng Xu
Publisher:
ISBN:
Category :
Languages : en
Pages : 162

Get Book Here

Book Description
The rapid growth of Internet of things (IoT) including mobile phones, portable devices, and remote sensor network systems have imposed both conceptually and technically new challenges. Among them, the most demanding requirements for the widespread realization of many IoT visions are security and low power. In terms of security, IoT applications include tasks that are rarely addressed before such as trusted sensing, secure computation and communication, privacy, and data right management. These tasks ask for new and better techniques for the protection of hardware, software, and data. On the other hand, most of the IoT systems suffer from the problem of limited power sources, which in turn require the security on IoT devices to be lightweight. While low energy design is crucial for the successful deployment of resource-constrained IoT devices, their often physically accessible nature, as well as low energy budget restriction, have also contributed to rendering traditional cryptographic approaches insufficient to address all the security concerns. In this dissertation, we present hardware-oriented security designs and synthesis techniques with the aim to reduce the system energy overhead while maintaining the security and reliability. We first demonstrate our work to analyze and enhance the properties of hardware security primitives. We emphasize on physical unclonable functions (PUFs) and use them to enable a wide range of applications, including private/public key communication, authentication, and multi-party communication. We then present a unique system reliability design with the use of non-volatile memory (NVM) to create a fault-tolerance application specific architecture with almost no timing overhead and low energy overhead. Finally, we demonstrate novel energy reduction and synthesis techniques applied on integrated circuit subsystems of IoT applications. The techniques we have applied and improved include near-threshold computing, dual-supply voltage optimization, and pipelining.

Robust and Energy Efficient Hardware-Oriented Security for IoT Systems and Applications

Robust and Energy Efficient Hardware-Oriented Security for IoT Systems and Applications PDF Author: Hongxiang Gu
Publisher:
ISBN:
Category :
Languages : en
Pages : 185

Get Book Here

Book Description
Internet of Things (IoT) is a revolutionary network that is envisioned to connect physical entities to the cyber world. IoT technology has fundamentally changed how we interact with our world. Worldwide spending on IoT is forecast to reach $745 Billion in 2019, and it is expected that investments in the technology will maintain double-digit growth rate for years to come. Despite wide adoption and strong anticipation in the technology, two major obstacles heavily constrained the further development in IoT, respectively security and energy challenges. From the security perspective, the entire lifecycle of an IoT device could potentially be vulnerable to various types of attacks. Since many devices are deployed in an insecure environment, attackers could gain unauthorized access to the exposed hardware, which invalidates many security assumptions made in traditional security research. From the energy perspective, many IoT devices are incapable of affording traditional cryptographical protection due to low energy and computation budget. Energy efficiency is therefore crucial for designs and establishments of IoT. To address IoT security problems, we explore and propose novel hardware-oriented security primitive designs and optimization techniques in this thesis. We first investigate the vulnerabilities of physically unclonable function (PUF), a popular low power hardware security primitive used in IoT devices, through the creation of a hardware emulation platform using programmable delay lines (PDL). To address vulnerabilities in PUFs, we propose a novel security primitive, Interconnected PUF Network (IPN), that interconnects small segments of strong PUFs in a reconfigurable network, limiting the single-bit prediction accuracy to as low as 53.19% against a wide range of modeling attacks. We demonstrated that the interconnections in an IPN can be optimized to maximize output randomness and stability using our proposed evolution-strategies-based algorithm. Looking beyond PUF-based security, we designed content-driven injective functions (CRIF) that rearrange compositions of hardware injective functions based on previous messages, providing secure message encryption/decryption between IoT devices. Facing the energy challenges, we propose ``computing while racing" technique that reduces 40.4% of area overhead and 7.69% of power when implementing arbiter PUF and arbitrary logic on field-programmable-gate-arrays (FPGAs). This is achieved through encoding digital signals in analog forms and achieves a high percentage of hardware sharing, suggesting resource sharing could potentially be a promising direction for power/energy reduction in IoT devices. Eventually, we propose two practical IoT applications. We first design a device anomaly detection utilizing the inconsistency in environmentally sensitive PUF challenge-response pairs. We show that our detector is more flexible and more power-efficient compared to state-of-the-art system monitors. Secondly, we demonstrate that our proposal of PUF-assisted group key management protocol securely protects IoT group communications while reducing global energy consumption by 47.3% compared to cryptographic key management solutions.

Internet of Things

Internet of Things PDF Author: Arun Kumar Rana
Publisher: CRC Press
ISBN: 1000450481
Category : Computers
Languages : en
Pages : 331

Get Book Here

Book Description
Reviews IoT software architecture and middleware, data processing and management, security, privacy and reliability, architectures, protocols, technologies, algorithms, and smart objects, sensors, and actuators Explores IoT as it applies to energy, including energy efficiency and management, intelligent energy management, smart energy through blockchain and energy-efficient/aware routing/scheduling challenges and issues Examines IoT as it applies to healthcare including biomedical image and signal analysis, and disease prediction and diagnosis Examines IoT as it applies to smart industry including architecture, blockchain, and Industry 4.0 Discusses different ways to create a better IoT network or IoT platform

Energy Conservation for IoT Devices

Energy Conservation for IoT Devices PDF Author: Mamta Mittal
Publisher: Springer
ISBN: 981137399X
Category : Technology & Engineering
Languages : en
Pages : 356

Get Book Here

Book Description
This book addresses the Internet of Things (IoT), an essential topic in the technology industry, policy, and engineering circles, and one that has become headline news in both the specialty press and the popular media. The book focuses on energy efficiency concerns in IoT and the requirements related to Industry 4.0. It is the first-ever “how-to” guide on frequently overlooked practical, methodological, and moral questions in any nations’ journey to reducing energy consumption in IoT devices. The book discusses several examples of energy-efficient IoT, ranging from simple devices like indoor temperature sensors, to more complex sensors (e.g. electrical power measuring devices), actuators (e.g. HVAC room controllers, motors) and devices (e.g. industrial circuit-breakers, PLC for home, building or industrial automation). It provides a detailed approach to conserving energy in IoT devices, and comparative case studies on performance evaluation metrics, state-of-the-art approaches, and IoT legislation.

Energy Optimization Protocol Design for Sensor Networks in IoT Domains

Energy Optimization Protocol Design for Sensor Networks in IoT Domains PDF Author: Sanjeev J. Wagh
Publisher: CRC Press
ISBN: 1000629570
Category : Computers
Languages : en
Pages : 249

Get Book Here

Book Description
This book provides an essential overview of IoT, energy-efficient topology control protocols, motivation, and challenges for topology control for Wireless Sensor Networks, and the scope of the research in the domain of IoT. Further, it discusses the different design issues of topology control and energy models for IoT applications, different types of simulators with their advantages and disadvantages. It also discusses extensive simulation results and comparative analysis for various algorithms. The key point of this book is to present a solution to minimize energy and extend the lifetime of IoT networks using optimization methods to improve the performance. Features: Describes various facets necessary for energy optimization in IoT domain. Covers all aspects to achieve energy optimization using latest technologies and algorithms, in wireless sensor networks. Presents various IoT and Topology Control Methods and protocols, various network models, and model simulation using MATLAB®. Reviews methods and results of optimization with Simulation Hardware architecture leading to prolonged life of IoT networks. First time introduces bio-inspired algorithms in the IoT domain for performance optimization This book aims at Graduate Students, Researchers in Information Technology, Computer Science and Engineering, Electronics and Communication Engineering.

Energy-Efficient and Reliability-Driven Management of IoT Systems

Energy-Efficient and Reliability-Driven Management of IoT Systems PDF Author: Kazim Ergun
Publisher:
ISBN:
Category :
Languages : en
Pages : 0

Get Book Here

Book Description
The Internet of Things (IoT) integrates heterogeneous devices, ranging from sensors to smartphones, tablets and edge servers, and can provide a variety of services, beyond the traditional Internet. Unfortunately, due to its unprecedented scale and ubiquity, IoT faces a maintainability challenge and a set of interrelated problems. With the emergence of edge computing, IoT devices execute various tasks that consume a significant amount of power to deliver high quality of service, which can drain their battery in short time. High peak power increases the device temperature stress, which worsens the impact of transistors and interconnects reliability degradation mechanisms. Such mechanisms lead to early device failures and are costly to fix. In this dissertation, we focus on novel solutions for energy-efficient and reliability-driven management of IoT systems. We introduce a simulation framework called RelIoT to enable reliability evaluation and analysis in IoT networks, which paves the way for the development of new network management solutions. We develop a dynamic reliability management technique based on computation offloading for IoT edge computing architectures. Our approach achieves 20.5% longer mean time to failure than the next best network management solution. We also present an adaptive and distributed reliability-aware routing protocol using reinforcement learning. We show that our routing protocol can improve reliability of a network up to 73.2% compared to state-of-the-art routing approaches. The main focus inall our solutions is to use device batteries efficiently, satisfy QoS requirements, and improve overall network lifetime by mitigating reliability degradation. Lastly, we complement this to specifically study battery health and associated degradation mechanisms, as the traditional techniques developed for optimizing the energy consumption of networks do not yield optimal battery life. An improvement in network lifetime up to 68.5% can be achieved with our approach compared to energy consumption optimization approaches.

Proceedings of UASG 2021: Wings 4 Sustainability

Proceedings of UASG 2021: Wings 4 Sustainability PDF Author: Kamal Jain
Publisher: Springer Nature
ISBN: 3031193091
Category : Technology & Engineering
Languages : en
Pages : 602

Get Book Here

Book Description
This volume gathers the latest advances, innovations, and applications in the field of geographic information systems and unmanned aerial vehicle (UAV) technologies, as presented by leading researchers and engineers at the 2nd International Conference on Unmanned Aerial System in Geomatics (UASG), held in Roorkee, India on April 2-4, 2021. It covers highly diverse topics, including photogrammetry and remote sensing, surveying, UAV manufacturing, geospatial data sensing, UAV processing, visualization, and management, UAV applications and regulations, geo-informatics and geomatics. The contributions, which were selected by means of a rigorous international peer-review process, highlight numerous exciting ideas that will spur novel research directions and foster multidisciplinary collaboration among different specialists.

Learning Techniques for the Internet of Things

Learning Techniques for the Internet of Things PDF Author: Praveen Kumar Donta
Publisher: Springer Nature
ISBN: 303150514X
Category :
Languages : en
Pages : 334

Get Book Here

Book Description


Architectures and Protocols for Secure and Energy-Efficient Integration of Wireless Sensor Networks with the Internet of Things

Architectures and Protocols for Secure and Energy-Efficient Integration of Wireless Sensor Networks with the Internet of Things PDF Author: Malisa Vucinic
Publisher:
ISBN:
Category :
Languages : en
Pages : 0

Get Book Here

Book Description
Our research explores the intersection of academic, industrial and standardization spheres to enable secure and energy-efficient Internet of Things. We study standards-based security solutions bottom-up and first observe that hardware accelerated cryptography is a necessity for Internet of Things devices, as it leads to reductions in computational time, as much as two orders of magnitude. Overhead of the cryptographic primitives is, however, only one of the factors that influences the overall performance in the networking context. To understand the energy - security tradeoffs, we evaluate the effect of link-layer security features on the performance of Wireless Sensors Networks. We show that for practical applications and implementations, link-layer security features introduce a negligible degradation on the order of a couple of percent, that is often acceptable even for the most energy-constrained systems, such as those based on harvesting.Because link-layer security puts trust on each node on the communication path consisted of multiple, potentially compromised devices, we protect the information flows by end-to-end security mechanisms. We therefore consider Datagram Transport Layer Security (DTLS) protocol, the IETF standard for end-to-end security in the Internet of Things and contribute to the debate in both the standardization and research communities on the applicability of DTLS to constrained environments. We provide a thorough performance evaluation of DTLS in different duty-cycled networks through real-world experimentation, emulation and analysis. Our results demonstrate surprisingly poor performance of DTLS in networks where energy efficiency is paramount. Because a DTLS client and a server exchange many signaling packets, the DTLS handshake takes between a handful of seconds and several tens of seconds, with similar results for different duty cycling protocols.But apart from its performance issues, DTLS was designed for point-to-point communication dominant in the traditional Internet. The novel Constrained Ap- plication Protocol (CoAP) was tailored for constrained devices by facilitating asynchronous application traffic, group communication and absolute need for caching. The security architecture based on DTLS is, however, not able to keep up and advanced features of CoAP simply become futile when used in conjunction with DTLS. We propose an architecture that leverages the security concepts both from content-centric and traditional connection-oriented approaches. We rely on secure channels established by means of DTLS for key exchange, but we get rid of the notion of “state” among communicating entities by leveraging the concept of object security. We provide a mechanism to protect from replay attacks by coupling the capability-based access control with network communication and CoAP header. OSCAR, our object-based security architecture, intrinsically supports caching and multicast, and does not affect the radio duty-cycling operation of constrained devices. Ideas from OSCAR have already found their way towards the Internet standards and are heavily discussed as potential solutions for standardization.

IoT-Enabled Energy Efficiency Assessment of Renewable Energy Systems and Micro-grids in Smart Cities

IoT-Enabled Energy Efficiency Assessment of Renewable Energy Systems and Micro-grids in Smart Cities PDF Author: Mustapha Hatti
Publisher: Springer Nature
ISBN: 3031606299
Category :
Languages : en
Pages : 517

Get Book Here

Book Description