Loading...
Search for: internet-of-things--iot
0.009 seconds
Total 34 records

    A New Analytical Simulator for the Provisioning Stage of IoT-based WSNs

    , Article 3rd CSI/CPSSI International Symposium on Real-Time and Embedded Systems and Technologies, RTEST 2020, 10 June 2020 through 11 June 2020 ; 2020 Sadeghi, P ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    With IoT devices becoming abundant and WSN applications becoming evermore present, the once dream of ubiquitous connectivity is closer to realization than ever before. but this realization is hindered by many technical problems and lengthy time to markets. Currently, our best practice of feasibility analysis relies in the same simulators used to model and develop the network applications. Because of their broad range and immense usability challenges, these jack-of-all-trades simulators tend to be computation-intensive and hard to work with.Here, we propose a relatively light-weight simulator based on the analytical models of different parts of the network to aid in rapid development and ease... 

    A lightweight secure and resilient transmission scheme for the internet of things in the presence of a hostile jammer

    , Article IEEE Internet of Things Journal ; Volume 8, Issue 6 , 2021 , Pages 4373-4388 ; 23274662 (ISSN) Letafati, M ; Kuhestani, A ; Wong, K. K ; Piran, M. J ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    In this article, we propose a lightweight security scheme for ensuring both information confidentiality and transmission resiliency in the Internet-of-Things (IoT) communication. A single-Antenna transmitter communicates with a half-duplex single-Antenna receiver in the presence of a sophisticated multiple-Antenna-Aided passive eavesdropper and a multiple-Antenna-Assisted hostile jammer (HJ). A low-complexity artificial noise (AN) injection scheme is proposed for drowning out the eavesdropper. Furthermore, for enhancing the resilience against HJ attacks, the legitimate nodes exploit their own local observations of the wireless channel as the source of randomness to agree on shared secret... 

    Breaking anonymity of some recent lightweight RFID authentication protocols

    , Article Wireless Networks ; Volume 25, Issue 3 , 2018 , Pages 1-18 ; 10220038 (ISSN) Baghery, K ; Abdolmaleki, B ; Khazaei, S ; Aref, M. R ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    Due to their impressive advantages, Radio Frequency IDentification (RFID) systems are ubiquitously found in various novel applications. These applications are usually in need of quick and accurate authentication or identification. In many cases, it has been shown that if such systems are not properly designed, an adversary can cause security and privacy concerns for end-users. In order to deal with these concerns, impressive endeavors have been made which have resulted in various RFID authentications being proposed. In this study, we analyze three lightweight RFID authentication protocols proposed in Wireless Personal Communications (2014), Computers & Security (2015) and Wireless Networks... 

    Lightweight and DPA-resistant post-quantum cryptoprocessor based on binary ring-LWE

    , Article 20th International Symposium on Computer Architecture and Digital Systems, CADS 2020, 19 August 2020 through 20 August 2020 ; 2020 Ebrahimi, S ; Bayat Sarmadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    With the exponential growth in the internet of things (IoT) applications such as smart city and e-health, more embedded devices and smart nodes are connected to the network. In order to provide security for such resource-constrained devices, different cryptographic schemes such as public key encryption (PKE) are required. However, considering the high complexity and vulnerability of classic PKE schemes against quantum attacks, it is necessary to consider other possible options. Recently, lattice-based cryptography and especially learning with errors (LWE) have gained high attention due to resistance against quantum attacks and relatively low-complexity operations. During the past decade,... 

    Lightweight and fault-resilient implementations of binary ring-lwe for iot devices

    , Article IEEE Internet of Things Journal ; Volume 7, Issue 8 , 2020 , Pages 6970-6978 Ebrahimi, S ; Bayat Sarmadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    While the Internet of Things (IoT) shapes the future of the Internet, communications among nodes must be secured by employing cryptographic schemes such as public-key encryption (PKE). However, classic PKE schemes, such as RSA and elliptic curve cryptography (ECC) suffer from both high complexity and vulnerability to quantum attacks. During the past decade, post-quantum schemes based on the learning with errors (LWEs) problem have gained high attention due to the lower complexity among PKE schemes. In addition to resistance against theoretical (quantum and classic) attacks, every practical implementation of any cryptosystem must also be evaluated against different side-channel attacks such... 

    A lightweight hierarchical authentication scheme for internet of things

    , Article Journal of Ambient Intelligence and Humanized Computing ; 2018 , Pages 1-13 ; 18685137 (ISSN) Akbarzadeh, A ; Bayat, M ; Zahednejad, B ; Payandeh, A ; Aref, M. R ; Sharif University of Technology
    Springer Verlag  2018
    Abstract
    The Internet of Things (IoT) technology enables numerous things with different processing power and storage capacity to communicate and share data with each other. Considering the constrained devices of the IoT network in terms of processing and storage, designing a lightweight authentication scheme is quite important. So in this paper, we propose a lightweight authentication scheme based on Chebyshev Chaotic Maps. In the proposed scheme we apply a hierarchical structure to define different access controls for various entities. We then provide a formal analysis via the BAN logic to show the security of our scheme. Moreover, we compare our proposed scheme with previous ones in terms of... 

    A framework for reliable and ubiquitous inference in wireless sensor network

    , Article CSI International Symposium on Real-Time and Embedded Systems and Technologies, RTEST 2018 ; 26 June , 2018 , Pages 63-70 ; 9781538614754 (ISBN) Shamsaie, A ; Abdi, E ; Habibi, J ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Development of Internet of things (IoT) applications brings a new movement to the functionality of wireless sensor networks (WSNs) from only environment sensing and data gathering to collaborative inferring and ubiquitous intelligence. In intelligent WSNs, nodes collaborate to exchange the information needed to achieve the required inference or smartness. Efficiency or correctness of many smart applications rely on efficient, timely, reliable, and ubiquitous inference of information which may continually change in interaction with other nodes. In this paper, we introduce a framework which provides a generic solution for such common ubiquitous inferences. This framework brings the reliability... 

    Fast write operations in non-volatile memories using latency masking

    , Article CSI International Symposium on Real-Time and Embedded Systems and Technologies, RTEST 2018, 9 May 2018 through 10 May 2018 ; 2018 , Pages 1-7 ; 9781538614754 (ISBN) Hoseinghorban, A ; Bazzaz, M ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Energy consumption is an important issue in designing embedded systems and the emerging Internet of Things (IoT). The use of non-volatile memories instead of SRAM in these systems improves their energy consumption since non-volatile memories consume much less leakage power and provide better capacity given the same die area as SRAM. However, this can impose significant performance overhead because the write operation latency of non-volatile memories is more than that of SRAM. In this paper we presented an NVM-based data memory architecture for embedded systems which improves the performance of the system at the cost of a slight energy consumption overhead. The architecture employs... 

    Towards a reliable modulation and encoding scheme for internet of things communications

    , Article 13th IEEE International Conference on Application of Information and Communication Technologies, AICT 2019, 23 October 2019 through 25 October 2019 ; 2019 ; 9781728139005 (ISBN) Sadeghi, P ; Safaei, B ; Talaei, K ; Hosseini Monazzah, A. M ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    As the emergence of Internet of Things (IoT) brings the realization of ubiquitous connectivity ever closer, our reliance on these applications gets more important. Nowadays, such connected devices could be found everywhere, from home appliances to industrial control systems and environmental monitoring applications. One of the main challenges in IoT infrastructures is that of reliability, which emboldens itself in the context of Low-power and Lossy Networks (LLN) as they are inherently prone to packet loss as a result of their environmental and design constraints. Therefore, reliability of IoT devices becomes crucially important. With communication, the most important consideration in these... 

    Secrecy throughput maximization for full-duplex wireless powered IOT networks under fairness constraints

    , Article IEEE Internet of Things Journal ; Volume 6, Issue 4 , 2019 , Pages 6964-6976 ; 23274662 (ISSN) Rezaei, R ; Sun, S ; Kang, X ; Guan, Y. L ; Pakravan, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we study the secrecy throughput of a full-duplex wireless powered communication network (WPCN) for Internet of Things (IoT). The WPCN consists of a full-duplex multiantenna base station (BS) and a number of sensor nodes. The BS transmits energy all the time, and each node harvests energy prior to its transmission time slot. The nodes sequentially transmit their confidential information to the BS, and the other nodes are considered as potential eavesdroppers. We first aim to optimize the sum secrecy throughput of the nodes. The optimization variables are the duration of the time slots and the BS beamforming vectors in different time slots. The optimization problem is shown to... 

    A lightweight hierarchical authentication scheme for internet of things

    , Article Journal of Ambient Intelligence and Humanized Computing ; Volume 10, Issue 7 , 2019 , Pages 2607-2619 ; 18685137 (ISSN) Akbarzadeh, A ; Bayat, M ; Zahednejad, B ; Payandeh, A ; Aref, M. R ; Sharif University of Technology
    Springer Verlag  2019
    Abstract
    The Internet of Things (IoT) technology enables numerous things with different processing power and storage capacity to communicate and share data with each other. Considering the constrained devices of the IoT network in terms of processing and storage, designing a lightweight authentication scheme is quite important. So in this paper, we propose a lightweight authentication scheme based on Chebyshev Chaotic Maps. In the proposed scheme we apply a hierarchical structure to define different access controls for various entities. We then provide a formal analysis via the BAN logic to show the security of our scheme. Moreover, we compare our proposed scheme with previous ones in terms of... 

    Towards IoT-enabled multimodal mental stress monitoring

    , Article 2020 International Conference on Omni-layer Intelligent Systems, COINS 2020, 31 August 2020 through 2 September 2020 ; 2020 Mozafari, M ; Firouzi, F ; Farahani, B ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Stress is a body's natural way of responding to any kind of demand or challenge that everyone experiences from time to time. Although short-Term stress typically does not impose a health burden, exposure to prolonged stress can lead to significant adverse physiological and behavioral changes. Coping with the impact of stress is a challenging task and in this context, stress assessment is essential in preventing detrimental long-Term effects. The public embracement of connected wearable Internet of Things (IoT) devices, as well as the proliferation of Artificial Intelligence (AI) and Machine Learning (ML) technologies, have generated new opportunities for personalized stress tracking and... 

    A hybrid deep learning architecture for privacy-preserving mobile analytics

    , Article IEEE Internet of Things Journal ; Volume 7, Issue 5 , 2020 , Pages 4505-4518 Osia, S. A ; Shamsabadi, A. S ; Sajadmanesh, S ; Taheri, A ; Katevas, K ; Rabiee, H. R ; Lane, N. D ; Haddadi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Internet-of-Things (IoT) devices and applications are being deployed in our homes and workplaces. These devices often rely on continuous data collection to feed machine learning models. However, this approach introduces several privacy and efficiency challenges, as the service operator can perform unwanted inferences on the available data. Recently, advances in edge processing have paved the way for more efficient, and private, data processing at the source for simple tasks and lighter models, though they remain a challenge for larger and more complicated models. In this article, we present a hybrid approach for breaking down large, complex deep neural networks for cooperative, and... 

    A Scalable architecture for monitoring IOT devices using ethereum and fog computing

    , Article 4th International Conference on Smart Cities, Internet of Things and Applications, SCIoT 2020, 16 September 2020 through 17 September 2020 ; 2020 , Pages 66-76 Tahmasebi, S ; Habibi, J ; Shamsaie, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    With recent considerable developments in the Internet of Things (IoT), billions of resource-constrained devices are interconnected through the Internet. Monitoring this huge number of IoT devices which are heterogeneous in terms of underlying communication protocols and data format is challenging. The majority of existing IoT device monitoring solutions heavily rely on centralized architectures. Since using centralized architectures comes at the expense of trusting an authority, it has several inherent drawbacks, including vulnerability to security attacks, lack of data privacy, and unauthorized data manipulation. Hence, a new decentralized approach is crucial to remedy these drawbacks. One... 

    Lightweight fuzzy extractor based on LPN for device and biometric authentication in IoT

    , Article IEEE Internet of Things Journal ; Volume 8, Issue 13 , 2021 , Pages 10706-10713 ; 23274662 (ISSN) Ebrahimi, S ; Bayat Sarmadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    User and device biometrics are proven to be a reliable source for authentication, especially for the Internet-of-Things (IoT) applications. One of the methods to employ biometric data in authentication are fuzzy extractors (FE) that can extract cryptographically secure and reproducible keys from noisy biometric sources with some entropy loss. It has been shown that one can reliably build an FE based on the learning parity with noise (LPN) problem with higher error-tolerance than previous FE schemes. However, the only available LPN-based FE implementation suffers from extreme resource demands that are not practical for IoT devices. This article proposes a lightweight hardware/software (HW/SW)... 

    Offloading coalition formation for scheduling scientific workflow ensembles in fog environments

    , Article Journal of Grid Computing ; Volume 19, Issue 3 , 2021 ; 15707873 (ISSN) Siar, H ; Izadi, M ; Sharif University of Technology
    Springer Science and Business Media B.V  2021
    Abstract
    Fog computing provides a distributed computing paradigm that executes interactive and distributed applications, such as the Internet of Things (IoT) applications. Large-scale scientific applications, often in the form of workflow ensembles, have a distributed and interactive nature that demands a dispersed execution environment like fog computing. However, handling a large-scale application in heterogeneous environment of fog computing requires harmonizing heterologous resources over the continuum from the IoT to the cloud. This paper investigates offloading and task allocation problems for orchestrating the resources in a fog computing environment where the IoT application is considered in... 

    Cloud-Based Global Supply Chain: A Conceptual Model and Multilayer Architecture

    , Article Journal of Manufacturing Science and Engineering, Transactions of the ASME ; Volume 137, Issue 4 , 2015 ; 10871357 (ISSN) Akbaripour, H ; Houshmand, M ; Valilai, O. F ; Sharif University of Technology
    American Society of Mechanical Engineers (ASME)  2015
    Abstract
    The cloud manufacturing (C-Manufacturing) paradigm, as an advanced form of networked manufacturing, has recently been proposed based on a combination of existing manufacturing systems and emerging technologies, such as cloud computing, virtual manufacturing, agile manufacturing, manufacturing grid, Internet-of-things (IOT), and service-oriented technologies. In this study, through investigating the main goals of C-Manufacturing and today's hyper-competitive global marketplace circumstances, a prospective conceptual model called cloud-based global supply chain (CBGSC) has been developed which can overcome or mitigate the issues and risks associated with supply chain processes on a global... 

    Measurement and control of nonlinear dynamic systems over the internet (IoT): Applications in remote control of autonomous vehicles

    , Article Automatica ; Volume 95 , 2018 , Pages 93-103 ; 00051098 (ISSN) Parsa, A ; Farhadi, A ; Sharif University of Technology
    Elsevier Ltd  2018
    Abstract
    This paper presents a new technique for almost sure asymptotic state tracking, stability and reference tracking of nonlinear dynamic systems by remote controller over the packet erasure channel, which is an abstract model for transmission via WiFi and the Internet. By implementing a suitable linearization method, a proper encoder and decoder are presented for tracking the state trajectory of nonlinear systems at the end of communication link when the measurements are sent through the packet erasure channel. Then, a controller for reference tracking of the system is designed. In the proposed technique linearization is applied when the error between the states and an estimate of these states... 

    Objective function: a key contributor in internet of things primitive properties

    , Article CSI International Symposium on Real-Time and Embedded Systems and Technologies, RTEST 2018 ; 26 June , 2018 , Pages 39-46 ; 9781538614754 (ISBN) Safaei, B ; Hosseini Monazzah, A. M ; Shahroodi, T ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    With the widespread use of Internet of Things (IoT) in every aspect of human's daily life, communications of such an enormous amount of existing embedded devices in these systems arise many new challenges from power consumption, performance, and reliability perspectives. Communications in an IoT infrastructure are managed by a set of policies which are determined by Objective Functions (OFs). Thus, OFs are the most important contributors in facing with the mentioned challenges. In this paper, due to the lack of information on how OFs affect the primary properties of an IoT infrastructure, we have compared three well-known OFs (OF0, MRHOF, and OFFL) from power consumption, performance, and... 

    Design & implementation of a high precision & high dynamic range power consumption measurement system for smart energy IoT applications

    , Article Measurement: Journal of the International Measurement Confederation ; Volume 146 , 2019 , Pages 458-466 ; 02632241 (ISSN) Tehrani, Y. H ; Atarodi, S. M ; Sharif University of Technology
    Elsevier B.V  2019
    Abstract
    Internet of Things (IoT) devices have strict necessity for power consumption in order to achieve expected battery life. IoT nodes feature extreme power consumption range over 100 dB, between their operating modes. The main focus of this paper is to design and implement a high precision, high dynamic range, low power, and flexible power measurement system, which can be applied to different applications. The proposed system consists of a voltage regulating control loop, zero offset amplifiers, high precision analog to digital converters, and reference voltage. The proper operation of the proposed circuit are verified numerically with simulations and experimental measurements. The implemented...