Secure, Low-Power IoT Communication Using Edge-Coded Signaling

Secure, Low-Power IoT Communication Using Edge-Coded Signaling PDF Author: Shahzad Muzaffar
Publisher: Springer Nature
ISBN: 3030959147
Category : Technology & Engineering
Languages : en
Pages : 162

Get Book Here

Book Description
This book discusses single-channel, device-to-device communication in the Internet of Things (IoT) at the signal encoding level and introduces a new family of encoding techniques that result in significant simplifications of the communication circuitry. These simplifications translate into lower power consumption, smaller form factors, and dynamic data rates that are tolerant to clock discrepancies between transmitter and receiver. Readers will be introduced to signal encoding that uses edge-coded signaling, based on the coding of binary data as counts of transmitted pulses. The authors fully explore the far-reaching implications of these novel signal-encoding techniques and illustrate how their usage can help minimize the need for complex circuitries for either clock and data recovery or duty-cycle correction. They also provide a detailed description of a complete ecosystem of hardware and firmware built around edge-code signaling. The ecosystem comprises an application-specific processor, automatic protocol configuration, power and data rate management, cryptographic primitives, and automatic failure recovery modes. The innovative IoT communication link and its associated ecosystem are fully in line with the standard IoT requirements on power, footprint, security, robustness, and reliability.

Secure, Low-Power IoT Communication Using Edge-Coded Signaling

Secure, Low-Power IoT Communication Using Edge-Coded Signaling PDF Author: Shahzad Muzaffar
Publisher: Springer Nature
ISBN: 3030959147
Category : Technology & Engineering
Languages : en
Pages : 162

Get Book Here

Book Description
This book discusses single-channel, device-to-device communication in the Internet of Things (IoT) at the signal encoding level and introduces a new family of encoding techniques that result in significant simplifications of the communication circuitry. These simplifications translate into lower power consumption, smaller form factors, and dynamic data rates that are tolerant to clock discrepancies between transmitter and receiver. Readers will be introduced to signal encoding that uses edge-coded signaling, based on the coding of binary data as counts of transmitted pulses. The authors fully explore the far-reaching implications of these novel signal-encoding techniques and illustrate how their usage can help minimize the need for complex circuitries for either clock and data recovery or duty-cycle correction. They also provide a detailed description of a complete ecosystem of hardware and firmware built around edge-code signaling. The ecosystem comprises an application-specific processor, automatic protocol configuration, power and data rate management, cryptographic primitives, and automatic failure recovery modes. The innovative IoT communication link and its associated ecosystem are fully in line with the standard IoT requirements on power, footprint, security, robustness, and reliability.

Low-overhead Communications in IoT Networks

Low-overhead Communications in IoT Networks PDF Author: Yuanming Shi
Publisher: Springer Nature
ISBN: 9811538700
Category : Technology & Engineering
Languages : en
Pages : 152

Get Book Here

Book Description
The recent developments in wireless communications, networking, and embedded systems have driven various innovative Internet of Things (IoT) applications, e.g., smart cities, mobile healthcare, autonomous driving and drones. A common feature of these applications is the stringent requirements for low-latency communications. Considering the typical small payload size of IoT applications, it is of critical importance to reduce the size of the overhead message, e.g., identification information, pilot symbols for channel estimation, and control data. Such low-overhead communications also help to improve the energy efficiency of IoT devices. Recently, structured signal processing techniques have been introduced and developed to reduce the overheads for key design problems in IoT networks, such as channel estimation, device identification, and message decoding. By utilizing underlying system structures, including sparsity and low rank, these methods can achieve significant performance gains. This book provides an overview of four general structured signal processing models: a sparse linear model, a blind demixing model, a sparse blind demixing model, and a shuffled linear model, and discusses their applications in enabling low-overhead communications in IoT networks. Further, it presents practical algorithms based on both convex and nonconvex optimization approaches, as well as theoretical analyses that use various mathematical tools.

Security and Privacy Preserving for IoT and 5G Networks

Security and Privacy Preserving for IoT and 5G Networks PDF Author: Ahmed A. Abd El-Latif
Publisher: Springer Nature
ISBN: 3030854280
Category : Computers
Languages : en
Pages : 283

Get Book Here

Book Description
This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks.

A Secure and Low-power Consumption Communication Mechanism for IoT (Internet of Things) and Wireless Sensor Networks

A Secure and Low-power Consumption Communication Mechanism for IoT (Internet of Things) and Wireless Sensor Networks PDF Author: Ashutosh Bandekar
Publisher:
ISBN:
Category : Internet of things
Languages : en
Pages : 58

Get Book Here

Book Description
Internet of Things (IoT), the newer generation of traditional wireless sensor network devices, offer wide variety of applications in various areas including military, medicine, home automation, remote monitoring, etc. Due to their wide usage and recent large-scale DDoS (distributed denial of service) attacks using millions of these devices, security of these devices have become an important aspect to address. Additionally, security implementation needs to be power efficient considering the limited power resource available to these wireless devices. Since users, as well as attackers, can control or access IoT devices remotely using smartphone or a computer, any attack on these devices can result in disasters. This thesis is directed towards development and implementation of a secure and power-efficient communication mechanism on these low-power devices. First, we performed a detailed analysis of the power consumption of these devices for different environment variables including temperature, lighting and location (in/outdoor), to understand effects of these parameters on device power consumption. Second, we proposed and implemented a novel security algorithm to detect and mitigate RPL (routing protocol layer) attacks in IoT networks. We evaluated changes in the behavior of IoT devices before and after the implementation of our proposed algorithm in terms of the change in battery life and power consumption. The proposed security implementation has the novel approach of using the RSSI (received signal strength indicator) tunneling to detect and mitigate RPL (routing protocol layer) attacks. Finally, we conducted experiments in simulation as well as on first generation real-world sensor nodes (Zolertia Z1 motes) to evaluate the power efficiency of our proposed algorithm. We conclude the thesis with insights on (a) the effect of interference present in the atmosphere on battery life, (b) security provided by the proposed algorithm, and (c) power-efficiency of the proposed security algorithm for IoT devices.

Wireless IOT Communications and Networking

Wireless IOT Communications and Networking PDF Author: Hossein Pirayesh
Publisher:
ISBN:
Category : Electronic dissertations
Languages : en
Pages : 0

Get Book Here

Book Description
While interest in Internet of Things (IoT) applications has surged in recent years, the broad diversity in their constraints, such as power consumption, channel bandwidth, link robustness, and packet latency, still challenges state-of-the-art technologies to enable efficient and ubiquitous wireless connectivity for IoT devices in many practical scenarios. In this thesis, we study three sets of primary constraints in developing IoT networks: energy efficiency, spectral efficiency, and physical-layer security.First, this thesis introduces EE-IoT, an energy-efficient wireless communication scheme for IoT networks. The key enabler of EE-IoT is an asymmetric physical-layer design that allows low-complex and single-carrier IoT devices to communicate with multi-carrier-based wireless local-area network (WLAN) access point (AP) at a very low sampling rate, leading to a significant reduction of IoT devices' hardware complexity and power consumption. This thesis further introduces a practical design, termed WiFi-IoT, to enable a transparent coexistence of IoT devices and legacy Wi-Fi devices. WiFi-IoT design allows a multi-antenna AP to simultaneously serve Wi-Fi and IoT devices.℗ Second, to improve the spectral efficiency of dense IoT networks, this thesis presents a practical uplink distributed multiple-input multiple-output (MIMO) scheme, termed UD-MIMO, for WLANs that enables concurrent data transmissions from multiple users to multiple APs in the absence of fine-grained inter-node synchronization. UD-MIMO leverages new co-channel interference management and data decoding techniques that allow WLANs' APs to decode concurrent data packets from asynchronous users. This thesis further introduces a first-of-its-kind multi-antenna long-range (LoRa) gateway, termed MaLoRaGW, that enables multi-user MIMO LoRa communications, marking a significant advancement in LoRa network capabilities. MaLoRaGW features a joint design for uplink packet detection and downlink beamforming, enabling it to concurrently serve multiple LoRa user devices in both uplink and downlink. The key component of MaLoRaGW is a baseband signal design for uplink packet collision recovery, accurate channel estimation, and implicit beamforming.Third, this thesis proposes two jamming-resilient receiver architectures to secure delay-constrained IoT networks against jamming attacks. The proposed schemes leverage multi-antenna technology and new signal detection methods to suppress jamming signals and decode desired signals. It first introduces JammingBird, a multi-antenna receiver design for vehicular ad hoc networks that can tolerate high-power and in-band constant jamming attacks. JammingBird uses two MIMO-based modules, a jamming-resistant synchronizer and a jamming suppressor module, in its physical-layer design. Jamming-resistant synchronizer employs a spatial projection filter that alleviates the impact of jamming signal and allows JammingBird to conduct packet timing and frequency synchronizations. The jamming suppressor module leverages the spatial degrees of freedom provided by multiple antennas to cancel the jamming signal and recover the signal of interest. This thesis further proposes a MIMO-based receiver design to secure ZigBee communications against constant jamming attacks. The enabler of the proposed scheme is a learning-based jamming mitigation method, which can mitigate unknown interference using an optimized neural network.This thesis provides details on the system implementation, experimental setup, and performance evaluation of the proposed schemes in real-world environments. It further delves into an in-depth analysis of the lessons learned and highlights the open issues in the design of efficient and secure wireless IoT communications and networks.

Robust and Energy Efficient Hardware-Oriented Security for IoT Systems and Applications

Robust and Energy Efficient Hardware-Oriented Security for IoT Systems and Applications PDF Author: Hongxiang Gu
Publisher:
ISBN:
Category :
Languages : en
Pages : 185

Get Book Here

Book Description
Internet of Things (IoT) is a revolutionary network that is envisioned to connect physical entities to the cyber world. IoT technology has fundamentally changed how we interact with our world. Worldwide spending on IoT is forecast to reach $745 Billion in 2019, and it is expected that investments in the technology will maintain double-digit growth rate for years to come. Despite wide adoption and strong anticipation in the technology, two major obstacles heavily constrained the further development in IoT, respectively security and energy challenges. From the security perspective, the entire lifecycle of an IoT device could potentially be vulnerable to various types of attacks. Since many devices are deployed in an insecure environment, attackers could gain unauthorized access to the exposed hardware, which invalidates many security assumptions made in traditional security research. From the energy perspective, many IoT devices are incapable of affording traditional cryptographical protection due to low energy and computation budget. Energy efficiency is therefore crucial for designs and establishments of IoT. To address IoT security problems, we explore and propose novel hardware-oriented security primitive designs and optimization techniques in this thesis. We first investigate the vulnerabilities of physically unclonable function (PUF), a popular low power hardware security primitive used in IoT devices, through the creation of a hardware emulation platform using programmable delay lines (PDL). To address vulnerabilities in PUFs, we propose a novel security primitive, Interconnected PUF Network (IPN), that interconnects small segments of strong PUFs in a reconfigurable network, limiting the single-bit prediction accuracy to as low as 53.19% against a wide range of modeling attacks. We demonstrated that the interconnections in an IPN can be optimized to maximize output randomness and stability using our proposed evolution-strategies-based algorithm. Looking beyond PUF-based security, we designed content-driven injective functions (CRIF) that rearrange compositions of hardware injective functions based on previous messages, providing secure message encryption/decryption between IoT devices. Facing the energy challenges, we propose ``computing while racing" technique that reduces 40.4% of area overhead and 7.69% of power when implementing arbiter PUF and arbitrary logic on field-programmable-gate-arrays (FPGAs). This is achieved through encoding digital signals in analog forms and achieves a high percentage of hardware sharing, suggesting resource sharing could potentially be a promising direction for power/energy reduction in IoT devices. Eventually, we propose two practical IoT applications. We first design a device anomaly detection utilizing the inconsistency in environmentally sensitive PUF challenge-response pairs. We show that our detector is more flexible and more power-efficient compared to state-of-the-art system monitors. Secondly, we demonstrate that our proposal of PUF-assisted group key management protocol securely protects IoT group communications while reducing global energy consumption by 47.3% compared to cryptographic key management solutions.

Research Anthology on Edge Computing Protocols, Applications, and Integration

Research Anthology on Edge Computing Protocols, Applications, and Integration PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1668457016
Category : Computers
Languages : en
Pages : 719

Get Book Here

Book Description
Edge computing is quickly becoming an important technology throughout a number of fields as businesses and industries alike embrace the benefits it can have in their companies. The streamlining of data is crucial for the development and evolution of businesses in order to keep up with competition and improve functions overall. In order to appropriately utilize edge computing to its full potential, further study is required to examine the potential pitfalls and opportunities of this innovative technology. The Research Anthology on Edge Computing Protocols, Applications, and Integration establishes critical research on the current uses, innovations, and challenges of edge computing across disciplines. The text highlights the history of edge computing and how it has been adapted over time to improve industries. Covering a range of topics such as bandwidth, data centers, and security, this major reference work is ideal for industry professionals, computer scientists, engineers, practitioners, researchers, academicians, scholars, instructors, and students.

Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks

Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks PDF Author: Sahoo, Biswa Mohan
Publisher: IGI Global
ISBN: 1668439239
Category : Computers
Languages : en
Pages : 328

Get Book Here

Book Description
Information security practices are the backbone of smart factories, which dynamically coordinate and optimize production processes based on data produced and collected by the underlying cyber-physical systems, in terms of resource usage. Recent advances in the best practices, opportunities, challenges, and benefits of information security must be studied and considered for businesses across sectors to successfully utilize the practices in their internet of things, 5G, and next-generation wireless networks. Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks highlights research on secure communication of 5G, internet of things, and next-generation wireless networks along with related areas to ensure secure and internet-compatible internet of things systems. The book also discusses the effects of the internet of things technologies on various situations in smart city design. Covering a range of topics such as secure communications and security evaluations, this reference work is ideal for industry professionals, business owners, engineers, researchers, scholars, practitioners, academicians, instructors, and students.

Intelligent IoT for the Digital World

Intelligent IoT for the Digital World PDF Author: Yang Yang
Publisher: John Wiley & Sons
ISBN: 1119593557
Category : Technology & Engineering
Languages : en
Pages : 336

Get Book Here

Book Description
Discover how the Internet of Things will change the information and communication technology industry in the next decade The Intelligent Internet of Things explores a unique type of Internet of Things (IoT) architecture, for example, the Web of Things (WoT) with its open character that breaks the barriers among various IoT vertical applications. The authors—noted experts on the topic—examine and compare key technologies from physical to platform level, especially the Narrow Band Internet of Things (NB-IoT) technology. They discuss applications with different data transmission requirements that are typical to IoT. The text also describes the requirements of WoT applications on 5G and includes detailed information on WoT technologies. The Intelligent Internet of Things examines three typical WoT applications: the monitoring application of south-to-north water diversion projects; smart driving applications; and network optimization applications. In addition, the text explores testing and authentication of IoT key technologies, with the required equipment, platform, and outdoor environment development. This important book: Provides information on what IoT/WoT is, when to use it, how to provide IoT services with certain technologies, and more Discusses restful architecture, main protocols (ZigBee, 6lowpan, CoAP, HTML5) Explores key technologies on different layers (sensing, gathering, application) Examines how IoT will change the information and communication technology industry Written for professionals working in IoT development, management and big data analytics, Intelligent Internet of Things offers an overview of IoT architecture, key technology, current applications and future development of the technology.

Practical Artificial Intelligence for Internet of Medical Things

Practical Artificial Intelligence for Internet of Medical Things PDF Author: Ben Othman Soufiene
Publisher: CRC Press
ISBN: 1000831361
Category : Computers
Languages : en
Pages : 346

Get Book Here

Book Description
This book covers the fundamentals, applications, algorithms, protocols, emerging trends, problems, and research findings in the field of AI and IoT in smart healthcare. It includes case studies, implementation and management of smart healthcare systems using AI. Chapters focus on AI applications in Internet of Healthcare Things, provide working examples on how different types of healthcare data can be used to develop models and predict diseases using machine learning and AI, with the real-world examples. This book is aimed at Researchers and graduate students in Computer Engineering, Artificial Intelligence and Machine Learning, Biomedical Engineering, and Bioinformatics. Features: Focus on the Internet of Healthcare Things and innovative solutions developed for use in the application of healthcare services Discusses artificial intelligence applications, experiments, core concepts, and cutting-edge themes Demonstrates new approaches to analyzing medical data and identifying ailments using AI to improve overall quality of life Introduces fundamental concepts for designing the Internet of Healthcare Things solutions Includes pertinent case studies and applications This book is aimed at researchers and graduate students in Computer Engineering, Artificial Intelligence and Machine Learning, Biomedical Engineering, and Bioinformatics.