Loading...
Search for: internet-of-thing--iot
0.007 seconds
Total 34 records

    Towards IoT-enabled multimodal mental stress monitoring

    , Article 2020 International Conference on Omni-layer Intelligent Systems, COINS 2020, 31 August 2020 through 2 September 2020 ; 2020 Mozafari, M ; Firouzi, F ; Farahani, B ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Stress is a body's natural way of responding to any kind of demand or challenge that everyone experiences from time to time. Although short-Term stress typically does not impose a health burden, exposure to prolonged stress can lead to significant adverse physiological and behavioral changes. Coping with the impact of stress is a challenging task and in this context, stress assessment is essential in preventing detrimental long-Term effects. The public embracement of connected wearable Internet of Things (IoT) devices, as well as the proliferation of Artificial Intelligence (AI) and Machine Learning (ML) technologies, have generated new opportunities for personalized stress tracking and... 

    Towards a reliable modulation and encoding scheme for internet of things communications

    , Article 13th IEEE International Conference on Application of Information and Communication Technologies, AICT 2019, 23 October 2019 through 25 October 2019 ; 2019 ; 9781728139005 (ISBN) Sadeghi, P ; Safaei, B ; Talaei, K ; Hosseini Monazzah, A. M ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    As the emergence of Internet of Things (IoT) brings the realization of ubiquitous connectivity ever closer, our reliance on these applications gets more important. Nowadays, such connected devices could be found everywhere, from home appliances to industrial control systems and environmental monitoring applications. One of the main challenges in IoT infrastructures is that of reliability, which emboldens itself in the context of Low-power and Lossy Networks (LLN) as they are inherently prone to packet loss as a result of their environmental and design constraints. Therefore, reliability of IoT devices becomes crucially important. With communication, the most important consideration in these... 

    Three-hop untrusted relay networks with hardware imperfections and channel estimation errors for internet of things

    , Article IEEE Transactions on Information Forensics and Security ; Volume 15 , March , 2020 , Pages 2856-2868 Letafati, M ; Kuhestani, A ; Behroozi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Cooperative relaying can be introduced as a promising approach for data communication in the Internet of Things (IoT), where the source and the destination may be placed far away. In this paper, by taking a variety of realistic hardware imperfections (HWIs) and channels estimation errors (CEEs) into account, the secrecy performance of a three-hop cooperative network with a source, a destination and two consecutive amplify-and-forward (AF) relays is investigated. The relays are considered to be untrusted, i.e., while they are mandatory helpers for data transmission, they may overhear the received signals. We adopt the artificial noise injection scheme, to keep the source message secret from... 

    Secrecy throughput maximization for full-duplex wireless powered IOT networks under fairness constraints

    , Article IEEE Internet of Things Journal ; Volume 6, Issue 4 , 2019 , Pages 6964-6976 ; 23274662 (ISSN) Rezaei, R ; Sun, S ; Kang, X ; Guan, Y. L ; Pakravan, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we study the secrecy throughput of a full-duplex wireless powered communication network (WPCN) for Internet of Things (IoT). The WPCN consists of a full-duplex multiantenna base station (BS) and a number of sensor nodes. The BS transmits energy all the time, and each node harvests energy prior to its transmission time slot. The nodes sequentially transmit their confidential information to the BS, and the other nodes are considered as potential eavesdroppers. We first aim to optimize the sum secrecy throughput of the nodes. The optimization variables are the duration of the time slots and the BS beamforming vectors in different time slots. The optimization problem is shown to... 

    Routing in internet of things using cellular automata

    , Article 3rd International Conference on Innovative Computing and Communication, ICICC 2020, 21 February 2020 through 23 February 2020 ; Volume 1165 , 2021 , Pages 875-884 ; 21945357 (ISSN) ; 9789811551123 (ISBN) Heidari, E ; Movaghar, A ; Motameni, H ; Homayun, E ; Sharif University of Technology
    Springer  2021
    Abstract
    The Internet of Things (IoT) is a new model that contributes to connect heterogeneous objects and devices. It can share information with any device globally. Furthermore, the sensor technologies, communications, networks, and cloud computing technology in the IoT are expected to be integrated into large-scale monitored spaces. The main infrastructure of monitoring in the IoT is based on wireless sensor networks. Saving energy and expanding the lifetime are significant properties of the sensor’s nodes in these systems. The efficient energy saving projects should develop appropriate energy consumption’s algorithms to improve the lifetime of the networks in the IoT systems. In this paper, a... 

    Post-quantum cryptoprocessors optimized for edge and resource-constrained devices in IoT

    , Article IEEE Internet of Things Journal ; Volume 6, Issue 3 , 2019 , Pages 5500-5507 ; 23274662 (ISSN) Ebrahimi, S ; Bayat Sarmadi, S ; Mosanaei Boorani, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    By exponential increase in applications of the Internet of Things (IoT), such as smart ecosystems or e-health, more security threats have been introduced. In order to resist known attacks for IoT networks, multiple security protocols must be established among nodes. Thus, IoT devices are required to execute various cryptographic operations, such as public key encryption/decryption. However, classic public key cryptosystems, such as Rivest-Shammir-Adlemon and elliptic curve cryptography are computationally more complex to be efficiently implemented on IoT devices and are vulnerable regarding quantum attacks. Therefore, after complete development of quantum computing, these cryptosystems will... 

    Offloading coalition formation for scheduling scientific workflow ensembles in fog environments

    , Article Journal of Grid Computing ; Volume 19, Issue 3 , 2021 ; 15707873 (ISSN) Siar, H ; Izadi, M ; Sharif University of Technology
    Springer Science and Business Media B.V  2021
    Abstract
    Fog computing provides a distributed computing paradigm that executes interactive and distributed applications, such as the Internet of Things (IoT) applications. Large-scale scientific applications, often in the form of workflow ensembles, have a distributed and interactive nature that demands a dispersed execution environment like fog computing. However, handling a large-scale application in heterogeneous environment of fog computing requires harmonizing heterologous resources over the continuum from the IoT to the cloud. This paper investigates offloading and task allocation problems for orchestrating the resources in a fog computing environment where the IoT application is considered in... 

    Objective function: a key contributor in internet of things primitive properties

    , Article CSI International Symposium on Real-Time and Embedded Systems and Technologies, RTEST 2018 ; 26 June , 2018 , Pages 39-46 ; 9781538614754 (ISBN) Safaei, B ; Hosseini Monazzah, A. M ; Shahroodi, T ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    With the widespread use of Internet of Things (IoT) in every aspect of human's daily life, communications of such an enormous amount of existing embedded devices in these systems arise many new challenges from power consumption, performance, and reliability perspectives. Communications in an IoT infrastructure are managed by a set of policies which are determined by Objective Functions (OFs). Thus, OFs are the most important contributors in facing with the mentioned challenges. In this paper, due to the lack of information on how OFs affect the primary properties of an IoT infrastructure, we have compared three well-known OFs (OF0, MRHOF, and OFFL) from power consumption, performance, and... 

    Measurement and control of nonlinear dynamic systems over the internet (IoT): Applications in remote control of autonomous vehicles

    , Article Automatica ; Volume 95 , 2018 , Pages 93-103 ; 00051098 (ISSN) Parsa, A ; Farhadi, A ; Sharif University of Technology
    Elsevier Ltd  2018
    Abstract
    This paper presents a new technique for almost sure asymptotic state tracking, stability and reference tracking of nonlinear dynamic systems by remote controller over the packet erasure channel, which is an abstract model for transmission via WiFi and the Internet. By implementing a suitable linearization method, a proper encoder and decoder are presented for tracking the state trajectory of nonlinear systems at the end of communication link when the measurements are sent through the packet erasure channel. Then, a controller for reference tracking of the system is designed. In the proposed technique linearization is applied when the error between the states and an estimate of these states... 

    Lightweight fuzzy extractor based on LPN for device and biometric authentication in IoT

    , Article IEEE Internet of Things Journal ; Volume 8, Issue 13 , 2021 , Pages 10706-10713 ; 23274662 (ISSN) Ebrahimi, S ; Bayat Sarmadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    User and device biometrics are proven to be a reliable source for authentication, especially for the Internet-of-Things (IoT) applications. One of the methods to employ biometric data in authentication are fuzzy extractors (FE) that can extract cryptographically secure and reproducible keys from noisy biometric sources with some entropy loss. It has been shown that one can reliably build an FE based on the learning parity with noise (LPN) problem with higher error-tolerance than previous FE schemes. However, the only available LPN-based FE implementation suffers from extreme resource demands that are not practical for IoT devices. This article proposes a lightweight hardware/software (HW/SW)... 

    Lightweight and fault-resilient implementations of binary ring-lwe for iot devices

    , Article IEEE Internet of Things Journal ; Volume 7, Issue 8 , 2020 , Pages 6970-6978 Ebrahimi, S ; Bayat Sarmadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    While the Internet of Things (IoT) shapes the future of the Internet, communications among nodes must be secured by employing cryptographic schemes such as public-key encryption (PKE). However, classic PKE schemes, such as RSA and elliptic curve cryptography (ECC) suffer from both high complexity and vulnerability to quantum attacks. During the past decade, post-quantum schemes based on the learning with errors (LWEs) problem have gained high attention due to the lower complexity among PKE schemes. In addition to resistance against theoretical (quantum and classic) attacks, every practical implementation of any cryptosystem must also be evaluated against different side-channel attacks such... 

    Lightweight and DPA-resistant post-quantum cryptoprocessor based on binary ring-LWE

    , Article 20th International Symposium on Computer Architecture and Digital Systems, CADS 2020, 19 August 2020 through 20 August 2020 ; 2020 Ebrahimi, S ; Bayat Sarmadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    With the exponential growth in the internet of things (IoT) applications such as smart city and e-health, more embedded devices and smart nodes are connected to the network. In order to provide security for such resource-constrained devices, different cryptographic schemes such as public key encryption (PKE) are required. However, considering the high complexity and vulnerability of classic PKE schemes against quantum attacks, it is necessary to consider other possible options. Recently, lattice-based cryptography and especially learning with errors (LWE) have gained high attention due to resistance against quantum attacks and relatively low-complexity operations. During the past decade,... 

    Jamming-resilient frequency hopping-aided secure communication for internet-of-things in the presence of an untrusted relay

    , Article IEEE Transactions on Wireless Communications ; Volume 19, Issue 10 , July , 2020 , Pages 6771-6785 Letafati, M ; Kuhestani, A ; Behroozi, H ; Ng, D. W. K ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    In this paper, we propose a light-weight jamming-resistant scheme for the Internet-of-Things (IoT) in 5G networks to ensure high-quality communication in a two-hop cooperative network. In the considered system model, a source communicates with a destination in the presence of an untrusted relay and a powerful multi-Antenna adversary jammer. The untrusted relay is an authorized necessary helper who may wiretap the confidential information. Meanwhile, the jammer is an external attacker who tries to damage both the training and transmission phases. Different from traditional frequency hopping spread spectrum (FHSS) techniques that require a pre-determined pattern between communicating nodes, in... 

    High-Speed post-quantum cryptoprocessor based on RISC-V architecture for IoT

    , Article IEEE Internet of Things Journal ; Volume 9, Issue 17 , 2022 , Pages 15839-15846 ; 23274662 (ISSN) Hadayeghparast, S ; Bayat Sarmadi, S ; Ebrahimi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    Public-key plays a significant role in today's communication over the network. However, current state-of-the-art public-key encryption (PKE) schemes are too complex to be efficiently employed in resource-constrained devices. Moreover, they are vulnerable to quantum attacks and soon will not have the required security. In the last decade, lattice-based cryptography has been a progenitor platform of the post-quantum cryptography (PQC) due to its lower complexity, which makes it more suitable for Internet of Things applications. In this article, we propose an efficient implementation of the binary learning with errors over ring (Ring-BinLWE) on the reduced instruction set computer-five (RISC-V)... 

    Fast write operations in non-volatile memories using latency masking

    , Article CSI International Symposium on Real-Time and Embedded Systems and Technologies, RTEST 2018, 9 May 2018 through 10 May 2018 ; 2018 , Pages 1-7 ; 9781538614754 (ISBN) Hoseinghorban, A ; Bazzaz, M ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Energy consumption is an important issue in designing embedded systems and the emerging Internet of Things (IoT). The use of non-volatile memories instead of SRAM in these systems improves their energy consumption since non-volatile memories consume much less leakage power and provide better capacity given the same die area as SRAM. However, this can impose significant performance overhead because the write operation latency of non-volatile memories is more than that of SRAM. In this paper we presented an NVM-based data memory architecture for embedded systems which improves the performance of the system at the cost of a slight energy consumption overhead. The architecture employs... 

    Design and implementation of an ultralow-power Ecg patch and smart cloud-based platform

    , Article IEEE Transactions on Instrumentation and Measurement ; Volume 71 , 2022 ; 00189456 (ISSN) Baraeinejad, B ; Shayan, M. F ; Vazifeh, A. R ; Rashidi, D ; Hamedani, M. S ; Tavolinejad, H ; Gorji, P ; Razmara, P ; Vaziri, K ; Vashaee, D ; Fakharzadeh, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    This article reports the development of a new smart electrocardiogram (ECG) monitoring system, consisting of the related hardware, firmware, and Internet of Things (IoT)-based web service for artificial intelligence (AI)-assisted arrhythmia detection and a complementary Android application for data streaming. The hardware aspect of this article proposes an ultralow power patch sampling ECG data at 256 samples/s with 16-bit resolution. The battery life of the device is two weeks per charging, which alongside the flexible and slim (193.7 mm times62.4 mm times8.6 mm) and lightweight (43 g) allows the user to continue real-life activities while the real-time monitoring is being done without... 

    Design & Implementation of high dynamic range current measurement system for Iot applications

    , Article IEEE Transactions on Instrumentation and Measurement ; Volume 71 , 2022 ; 00189456 (ISSN) Tehrani, Y.H ; Atarodi, S. M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    Internet-of-Things (IoT) devices have a strict necessity for power consumption to achieve the expected battery life. Therefore, measuring and optimizing the energy consumption of IoT nodes are essential. IoT nodes feature extreme current consumption range over 100 dB between their operating modes. The main focus of this article is to design and implement a low-power and low-cost current measurement circuit, which can be integrated into IoT nodes. A new pass element is introduced for measuring the current consumption. This element is placed in the current path to measure current over a high dynamic range with a constant voltage drop. The introduced pass element consists of a capacitor and... 

    Design & implementation of a high precision & high dynamic range power consumption measurement system for smart energy IoT applications

    , Article Measurement: Journal of the International Measurement Confederation ; Volume 146 , 2019 , Pages 458-466 ; 02632241 (ISSN) Tehrani, Y. H ; Atarodi, S. M ; Sharif University of Technology
    Elsevier B.V  2019
    Abstract
    Internet of Things (IoT) devices have strict necessity for power consumption in order to achieve expected battery life. IoT nodes feature extreme power consumption range over 100 dB, between their operating modes. The main focus of this paper is to design and implement a high precision, high dynamic range, low power, and flexible power measurement system, which can be applied to different applications. The proposed system consists of a voltage regulating control loop, zero offset amplifiers, high precision analog to digital converters, and reference voltage. The proper operation of the proposed circuit are verified numerically with simulations and experimental measurements. The implemented... 

    Cloud-Based Global Supply Chain: A Conceptual Model and Multilayer Architecture

    , Article Journal of Manufacturing Science and Engineering, Transactions of the ASME ; Volume 137, Issue 4 , 2015 ; 10871357 (ISSN) Akbaripour, H ; Houshmand, M ; Valilai, O. F ; Sharif University of Technology
    American Society of Mechanical Engineers (ASME)  2015
    Abstract
    The cloud manufacturing (C-Manufacturing) paradigm, as an advanced form of networked manufacturing, has recently been proposed based on a combination of existing manufacturing systems and emerging technologies, such as cloud computing, virtual manufacturing, agile manufacturing, manufacturing grid, Internet-of-things (IOT), and service-oriented technologies. In this study, through investigating the main goals of C-Manufacturing and today's hyper-competitive global marketplace circumstances, a prospective conceptual model called cloud-based global supply chain (CBGSC) has been developed which can overcome or mitigate the issues and risks associated with supply chain processes on a global... 

    Breaking anonymity of some recent lightweight RFID authentication protocols

    , Article Wireless Networks ; Volume 25, Issue 3 , 2018 , Pages 1-18 ; 10220038 (ISSN) Baghery, K ; Abdolmaleki, B ; Khazaei, S ; Aref, M. R ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    Due to their impressive advantages, Radio Frequency IDentification (RFID) systems are ubiquitously found in various novel applications. These applications are usually in need of quick and accurate authentication or identification. In many cases, it has been shown that if such systems are not properly designed, an adversary can cause security and privacy concerns for end-users. In order to deal with these concerns, impressive endeavors have been made which have resulted in various RFID authentications being proposed. In this study, we analyze three lightweight RFID authentication protocols proposed in Wireless Personal Communications (2014), Computers & Security (2015) and Wireless Networks...