Loading...
Search for: internet-of-things
0.008 seconds
Total 127 records

    A New Analytical Simulator for the Provisioning Stage of IoT-based WSNs

    , Article 3rd CSI/CPSSI International Symposium on Real-Time and Embedded Systems and Technologies, RTEST 2020, 10 June 2020 through 11 June 2020 ; 2020 Sadeghi, P ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    With IoT devices becoming abundant and WSN applications becoming evermore present, the once dream of ubiquitous connectivity is closer to realization than ever before. but this realization is hindered by many technical problems and lengthy time to markets. Currently, our best practice of feasibility analysis relies in the same simulators used to model and develop the network applications. Because of their broad range and immense usability challenges, these jack-of-all-trades simulators tend to be computation-intensive and hard to work with.Here, we propose a relatively light-weight simulator based on the analytical models of different parts of the network to aid in rapid development and ease... 

    A meta-heuristic clustering method to reduce energy consumption in internet of things

    , Article International Journal of Nonlinear Analysis and Applications ; Volume 12, Issue 1 , 2021 , Pages 45-58 ; 20086822 (ISSN) Heidari, E ; Motameni, H ; Movaghar, A ; Sharif University of Technology
    Semnan University, Center of Excellence in Nonlinear Analysis and Applications  2021
    Abstract
    The Internet of Things (IoT) is an emerging phenomenon in the field of communication, in which smart objects communicate with each other and respond to user requests. The IoT provides an integrated framework providing interoperability across various platforms. One of the most essential and necessary components of IoT is wireless sensor networks. Sensor networks play a vital role in the lowest level of IoT. Sensors in sensor networks use batteries which are not replaceable, and hence, energy consumption becomes of great importance. For this reason, many algorithms have been recently proposed to reduce energy consumption. In this paper, a meta-heuristic method called whale optimization... 

    A lightweight hierarchical authentication scheme for internet of things

    , Article Journal of Ambient Intelligence and Humanized Computing ; Volume 10, Issue 7 , 2019 , Pages 2607-2619 ; 18685137 (ISSN) Akbarzadeh, A ; Bayat, M ; Zahednejad, B ; Payandeh, A ; Aref, M. R ; Sharif University of Technology
    Springer Verlag  2019
    Abstract
    The Internet of Things (IoT) technology enables numerous things with different processing power and storage capacity to communicate and share data with each other. Considering the constrained devices of the IoT network in terms of processing and storage, designing a lightweight authentication scheme is quite important. So in this paper, we propose a lightweight authentication scheme based on Chebyshev Chaotic Maps. In the proposed scheme we apply a hierarchical structure to define different access controls for various entities. We then provide a formal analysis via the BAN logic to show the security of our scheme. Moreover, we compare our proposed scheme with previous ones in terms of... 

    A lightweight secure and resilient transmission scheme for the internet of things in the presence of a hostile jammer

    , Article IEEE Internet of Things Journal ; Volume 8, Issue 6 , 2021 , Pages 4373-4388 ; 23274662 (ISSN) Letafati, M ; Kuhestani, A ; Wong, K. K ; Piran, M. J ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    In this article, we propose a lightweight security scheme for ensuring both information confidentiality and transmission resiliency in the Internet-of-Things (IoT) communication. A single-Antenna transmitter communicates with a half-duplex single-Antenna receiver in the presence of a sophisticated multiple-Antenna-Aided passive eavesdropper and a multiple-Antenna-Assisted hostile jammer (HJ). A low-complexity artificial noise (AN) injection scheme is proposed for drowning out the eavesdropper. Furthermore, for enhancing the resilience against HJ attacks, the legitimate nodes exploit their own local observations of the wireless channel as the source of randomness to agree on shared secret... 

    A Matrix factorization model for Hellinger-Based trust management in social internet of things

    , Article IEEE Transactions on Dependable and Secure Computing ; 2021 ; 15455971 (ISSN) Aalibagi, S ; Mahyar, H ; Movaghar, A ; Stanley, H. E ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    The Social Internet of Things (SIoT), integration of the Internet of Things and Social Networks paradigms, has been introduced to build a network of smart nodes that are capable of establishing social links. In order to deal with misbehaving service provider nodes, service requestor nodes must evaluate their trustworthiness levels. In this paper, we propose a novel trust management mechanism in the SIoT to predict the most reliable service providers for each service requestor, which leads to reduce the risk of being exposed to malicious nodes. We model the SIoT with a flexible bipartite graph, then build a social network among the service requestor nodes, using the Hellinger distance.... 

    Analyzing IoT System Using Location-Base Data

    , M.Sc. Thesis Sharif University of Technology Ghandi Jalvani, Ali (Author) ; Gholampour, Iman (Supervisor)
    Abstract
    Nowadays, using different types of data has shown significant impacts on analyzing the related systems. Growth in data volume, systems complexity and existence of error and obscurity in collecting the data, increased the necessity of inventing new data analysis methods. Location-based data is an important data type for such analyses which are collected from sensors in different places. These data besides other official organization's information like municipality or Google … provide us a bulk volume of raw data. Such collections of raw data are mostly diverse, heterogeneous, bulk and outspread. Inspite of that, raw data with machine learning algorithms lead to considerable practical... 

    A Framework For Situation Recognition in IOT Environments

    , M.Sc. Thesis Sharif University of Technology Rajaby Faghihi, Hossein (Author) ; Habibi, Jafar (Supervisor) ; Fazli, Mohammad Amin (Supervisor) ; Movaghar, Ali (Co-Supervisor)
    Abstract
    According to the increase of interest in the internet of things, the importance of understanding the ongoing situation in an environment and acting upon them is largely considered. Due to the massive size of sensors used in a smart environment, there are plenty of data manufactured every second. Therefore, an interpretation of this data is mandatory to obtain valuable information to comprehend the situation ongoing in an environment. Situation recognition can bring a better understanding of the interaction between the smart actuators and sensors with the living agents in the environments.This will enable the system to help people do their routines, save energy, and accomplish more... 

    Designing a Shared Local Data Storage for IoT

    , M.Sc. Thesis Sharif University of Technology Batman Ghelich, Emran (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    The basic idea of this paper is about sharing the extra space of the local storage with other devices in an IoT network, and on the other hand, using the corresponding space from devices that don’t utilize their storage enough.As a result, all IoT devices in the network can access a larger (and of course a bit slower) unified storage and each device can consume nearly as much space as needed, regardless of its limited local storage.This paper demonstrates a design to achieve such a shared storage in local IoT network. Furthurmore, a minimal (yet complete) system is implemented in the form of an SDK as a proof of concept.As an example for the effect of the current design on an IoT network, in... 

    Authentication phase of security bootstrapping in the internet of things networks based on a trusted zone

    , Article Journal of Scientific and Industrial Research ; Volume 78, Issue 11 , 2019 , Pages 751-754 ; 00224456 (ISSN) Nazemi, N ; Manzuri, M. T ; Sharif University of Technology
    Scientific Publishers  2019
    Abstract
    Internet of Things (IoT) represents enabling all things in such a smart way that those things be accessed any time and anywhere through the Internet. Presence of IoT as a novel way of networking, opens up new concernsaround the communication and network world. A secure establishing in such a diffused network is a great concerns of the researchers. Due to Smart things' resource-constraints and power-limitation the former ways of securing networks cannot be applicable in IoT. Thus, security bootstrapping has introduced a solution for establishing security in the first instance of deploying the network. In this study, we have proposed a security bootstrapping solution which can be applied in... 

    REFER: A reliable and energy-efficient RPL for mobile IoT applications

    , Article 3rd CSI/CPSSI International Symposium on Real-Time and Embedded Systems and Technologies, RTEST 2020, 10 June 2020 through 11 June 2020 ; July , 2020 Rezagholi Lalani, S ; Salehi, A. A. M ; Taghizadeh, H ; Safaei, B ; Hosseini Monazzah, A. M ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Recently, IoT has been massively applied in different areas of human life. Meanwhile, in many of the IoT applications, e.g., the remote patient health-care monitoring systems, the reliability of communications, and the consumed energy in IoT devices, which are mostly battery-operated, are very challenging. Since IoT devices are typically operated in lossy environments, providing a reliable transmission for the packets imposes a noticeable amount of energy consumption. In addition, the runtime movement of the IoT devices in mobile networks further intensifies these issues. Therefore, the applied policies in the IPv6 RPL as the standard routing mechanism in IoT networks, play an important role... 

    A matrix factorization model for hellinger-based trust management in social internet of things

    , Article IEEE Transactions on Dependable and Secure Computing ; 2021 ; 15455971 (ISSN) Aalibagi, S ; Mahyar, H ; Movaghar, A ; Stanley, H. E ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    The Social Internet of Things (SIoT), integration of the Internet of Things and Social Networks paradigms, has been introduced to build a network of smart nodes that are capable of establishing social links. In order to deal with misbehaving service provider nodes, service requestor nodes must evaluate their trustworthiness levels. In this paper, we propose a novel trust management mechanism in the SIoT to predict the most reliable service providers for each service requestor, which leads to reduce the risk of being exposed to malicious nodes. We model the SIoT with a flexible bipartite graph, then build a social network among the service requestor nodes, using the Hellinger distance.... 

    Trust Management in the Social Internet of Things

    , M.Sc. Thesis Sharif University of Technology Aalibagi, Soroush (Author) ; Movaghar, Ali (Supervisor)
    Abstract
    The Social Internet of Things (SIoT), integration of Internet of Things and Social networks paradigms, has been introduced to build a network of smart nodes which are capable of establishing social links. In order to deal with misbehavioral service provider nodes, service requestor nodes must evaluate their trustworthiness levels.In this thesis, we propose a novel trust management mechanism in the SIoT to predict the most reliable service provider for a service requestor, that leads to reduce the risk of exposing to malicious nodes. We model an SIoT with a flexible bipartite graph (containing two sets of nodes: service providers and requestors), then build the corresponding social network... 

    A lightweight hierarchical authentication scheme for internet of things

    , Article Journal of Ambient Intelligence and Humanized Computing ; 2018 , Pages 1-13 ; 18685137 (ISSN) Akbarzadeh, A ; Bayat, M ; Zahednejad, B ; Payandeh, A ; Aref, M. R ; Sharif University of Technology
    Springer Verlag  2018
    Abstract
    The Internet of Things (IoT) technology enables numerous things with different processing power and storage capacity to communicate and share data with each other. Considering the constrained devices of the IoT network in terms of processing and storage, designing a lightweight authentication scheme is quite important. So in this paper, we propose a lightweight authentication scheme based on Chebyshev Chaotic Maps. In the proposed scheme we apply a hierarchical structure to define different access controls for various entities. We then provide a formal analysis via the BAN logic to show the security of our scheme. Moreover, we compare our proposed scheme with previous ones in terms of... 

    A framework for reliable and ubiquitous inference in wireless sensor network

    , Article CSI International Symposium on Real-Time and Embedded Systems and Technologies, RTEST 2018 ; 26 June , 2018 , Pages 63-70 ; 9781538614754 (ISBN) Shamsaie, A ; Abdi, E ; Habibi, J ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Development of Internet of things (IoT) applications brings a new movement to the functionality of wireless sensor networks (WSNs) from only environment sensing and data gathering to collaborative inferring and ubiquitous intelligence. In intelligent WSNs, nodes collaborate to exchange the information needed to achieve the required inference or smartness. Efficiency or correctness of many smart applications rely on efficient, timely, reliable, and ubiquitous inference of information which may continually change in interaction with other nodes. In this paper, we introduce a framework which provides a generic solution for such common ubiquitous inferences. This framework brings the reliability... 

    Fast write operations in non-volatile memories using latency masking

    , Article CSI International Symposium on Real-Time and Embedded Systems and Technologies, RTEST 2018, 9 May 2018 through 10 May 2018 ; 2018 , Pages 1-7 ; 9781538614754 (ISBN) Hoseinghorban, A ; Bazzaz, M ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Energy consumption is an important issue in designing embedded systems and the emerging Internet of Things (IoT). The use of non-volatile memories instead of SRAM in these systems improves their energy consumption since non-volatile memories consume much less leakage power and provide better capacity given the same die area as SRAM. However, this can impose significant performance overhead because the write operation latency of non-volatile memories is more than that of SRAM. In this paper we presented an NVM-based data memory architecture for embedded systems which improves the performance of the system at the cost of a slight energy consumption overhead. The architecture employs... 

    Towards a reliable modulation and encoding scheme for internet of things communications

    , Article 13th IEEE International Conference on Application of Information and Communication Technologies, AICT 2019, 23 October 2019 through 25 October 2019 ; 2019 ; 9781728139005 (ISBN) Sadeghi, P ; Safaei, B ; Talaei, K ; Hosseini Monazzah, A. M ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    As the emergence of Internet of Things (IoT) brings the realization of ubiquitous connectivity ever closer, our reliance on these applications gets more important. Nowadays, such connected devices could be found everywhere, from home appliances to industrial control systems and environmental monitoring applications. One of the main challenges in IoT infrastructures is that of reliability, which emboldens itself in the context of Low-power and Lossy Networks (LLN) as they are inherently prone to packet loss as a result of their environmental and design constraints. Therefore, reliability of IoT devices becomes crucially important. With communication, the most important consideration in these... 

    Secrecy throughput maximization for full-duplex wireless powered IOT networks under fairness constraints

    , Article IEEE Internet of Things Journal ; Volume 6, Issue 4 , 2019 , Pages 6964-6976 ; 23274662 (ISSN) Rezaei, R ; Sun, S ; Kang, X ; Guan, Y. L ; Pakravan, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we study the secrecy throughput of a full-duplex wireless powered communication network (WPCN) for Internet of Things (IoT). The WPCN consists of a full-duplex multiantenna base station (BS) and a number of sensor nodes. The BS transmits energy all the time, and each node harvests energy prior to its transmission time slot. The nodes sequentially transmit their confidential information to the BS, and the other nodes are considered as potential eavesdroppers. We first aim to optimize the sum secrecy throughput of the nodes. The optimization variables are the duration of the time slots and the BS beamforming vectors in different time slots. The optimization problem is shown to... 

    A hybrid deep learning architecture for privacy-preserving mobile analytics

    , Article IEEE Internet of Things Journal ; Volume 7, Issue 5 , 2020 , Pages 4505-4518 Osia, S. A ; Shamsabadi, A. S ; Sajadmanesh, S ; Taheri, A ; Katevas, K ; Rabiee, H. R ; Lane, N. D ; Haddadi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Internet-of-Things (IoT) devices and applications are being deployed in our homes and workplaces. These devices often rely on continuous data collection to feed machine learning models. However, this approach introduces several privacy and efficiency challenges, as the service operator can perform unwanted inferences on the available data. Recently, advances in edge processing have paved the way for more efficient, and private, data processing at the source for simple tasks and lighter models, though they remain a challenge for larger and more complicated models. In this article, we present a hybrid approach for breaking down large, complex deep neural networks for cooperative, and... 

    A Scalable architecture for monitoring IOT devices using ethereum and fog computing

    , Article 4th International Conference on Smart Cities, Internet of Things and Applications, SCIoT 2020, 16 September 2020 through 17 September 2020 ; 2020 , Pages 66-76 Tahmasebi, S ; Habibi, J ; Shamsaie, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    With recent considerable developments in the Internet of Things (IoT), billions of resource-constrained devices are interconnected through the Internet. Monitoring this huge number of IoT devices which are heterogeneous in terms of underlying communication protocols and data format is challenging. The majority of existing IoT device monitoring solutions heavily rely on centralized architectures. Since using centralized architectures comes at the expense of trusting an authority, it has several inherent drawbacks, including vulnerability to security attacks, lack of data privacy, and unauthorized data manipulation. Hence, a new decentralized approach is crucial to remedy these drawbacks. One... 

    Lightweight fuzzy extractor based on LPN for device and biometric authentication in IoT

    , Article IEEE Internet of Things Journal ; Volume 8, Issue 13 , 2021 , Pages 10706-10713 ; 23274662 (ISSN) Ebrahimi, S ; Bayat Sarmadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    User and device biometrics are proven to be a reliable source for authentication, especially for the Internet-of-Things (IoT) applications. One of the methods to employ biometric data in authentication are fuzzy extractors (FE) that can extract cryptographically secure and reproducible keys from noisy biometric sources with some entropy loss. It has been shown that one can reliably build an FE based on the learning parity with noise (LPN) problem with higher error-tolerance than previous FE schemes. However, the only available LPN-based FE implementation suffers from extreme resource demands that are not practical for IoT devices. This article proposes a lightweight hardware/software (HW/SW)...