Loading...
Search for: internet-of-thing--iot
0.005 seconds
Total 34 records

    A lightweight anonymous authentication protocol for IoT wireless sensor networks

    , Article 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2019, 28 August 2019 through 29 August 2019 ; 2019 , Pages 39-44 ; 9781728143736 (ISBN) Rahnama, A ; Beheshti Atashgah, M ; Eghlidos, T ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    Lightweight authentication protocols are crucial for privacy preserving in Internet of Things (IoT). Authentication protocols should be implementable for devices with constrained memory and computational power in this area, in addition to resistance against cryptographic threats. On the other hand, these protocols should not impose a heavy computational load on such devices. In this paper we proposed an authentication protocol that properly meets these features. Our protocol is suitable for wireless sensor networks (WSNs). In this protocol, authentication is fulfilled with low communication and computational loads between sensors and users through the gateway interface using a hash function... 

    Post-quantum cryptoprocessors optimized for edge and resource-constrained devices in IoT

    , Article IEEE Internet of Things Journal ; Volume 6, Issue 3 , 2019 , Pages 5500-5507 ; 23274662 (ISSN) Ebrahimi, S ; Bayat Sarmadi, S ; Mosanaei Boorani, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    By exponential increase in applications of the Internet of Things (IoT), such as smart ecosystems or e-health, more security threats have been introduced. In order to resist known attacks for IoT networks, multiple security protocols must be established among nodes. Thus, IoT devices are required to execute various cryptographic operations, such as public key encryption/decryption. However, classic public key cryptosystems, such as Rivest-Shammir-Adlemon and elliptic curve cryptography are computationally more complex to be efficiently implemented on IoT devices and are vulnerable regarding quantum attacks. Therefore, after complete development of quantum computing, these cryptosystems will... 

    Breaking anonymity of some recent lightweight RFID authentication protocols

    , Article Wireless Networks ; Volume 25, Issue 3 , 2019 , Pages 1235-1252 ; 10220038 (ISSN) Baghery, K ; Abdolmaleki, B ; Khazaei, S ; Aref, M. R ; Sharif University of Technology
    Springer New York LLC  2019
    Abstract
    Due to their impressive advantages, Radio Frequency IDentification (RFID) systems are ubiquitously found in various novel applications. These applications are usually in need of quick and accurate authentication or identification. In many cases, it has been shown that if such systems are not properly designed, an adversary can cause security and privacy concerns for end-users. In order to deal with these concerns, impressive endeavors have been made which have resulted in various RFID authentications being proposed. In this study, we analyze three lightweight RFID authentication protocols proposed in Wireless Personal Communications (2014), Computers & Security (2015) and Wireless Networks... 

    A low-power signal-dependent sampling technique: analysis, implementation, and applications

    , Article IEEE Transactions on Circuits and Systems I: Regular Papers ; Volume 67, Issue 12 , 2020 , Pages 4334-4347 Hadizadeh Hafshejani, E ; Elmi, M ; Taherinejad, N ; Fotowat Ahmady, A ; Mirabbasi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Sensors are among essential building blocks of any Cyber-Physical Systems (CPSs). Acquisition and processing of their sensory data contribute to the power consumption and computation load of the overall CPSs. For data acquisition, the conventional fixed frequency sampling in many such systems is sub-optimal since a sizable number of samples do not contain important information. In this work, we propose a Signal-Dependent Sampling (SDS) method and present its associated circuit implementation. Using the proposed SDS method, the number of retained samples is significantly reduced with little or negligible compromise in the quality of the (reconstructed) signal. The associated error and added... 

    Jamming-resilient frequency hopping-aided secure communication for internet-of-things in the presence of an untrusted relay

    , Article IEEE Transactions on Wireless Communications ; Volume 19, Issue 10 , July , 2020 , Pages 6771-6785 Letafati, M ; Kuhestani, A ; Behroozi, H ; Ng, D. W. K ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    In this paper, we propose a light-weight jamming-resistant scheme for the Internet-of-Things (IoT) in 5G networks to ensure high-quality communication in a two-hop cooperative network. In the considered system model, a source communicates with a destination in the presence of an untrusted relay and a powerful multi-Antenna adversary jammer. The untrusted relay is an authorized necessary helper who may wiretap the confidential information. Meanwhile, the jammer is an external attacker who tries to damage both the training and transmission phases. Different from traditional frequency hopping spread spectrum (FHSS) techniques that require a pre-determined pattern between communicating nodes, in... 

    A new frequency hopping-aided secure communication in the presence of an adversary jammer and an untrusted relay

    , Article 2020 IEEE International Conference on Communications Workshops, ICC Workshops 2020, 7 June 2020 through 11 June 2020 ; July , 2020 Letafati, M ; Kuhestani, A ; Ng, D. W. K ; Behroozi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    The Internet-of-Things (IoT) spans various applications in healthcare filed, from smart wearable or implantable sensors to remote monitoring of elderly, and medical device networking. In this paper, a jamming-resistant scheme for the healthcare IoT is proposed to provide secure and reliable data transmission in a two-hop cooperative network, where a source communicates with a destination in the presence of an untrusted relay and an active adversary. The untrusted relay is an authorized necessary helper who may wiretap the confidential information, e.g., the secret measured data of a patient, while the jammer is an external attacker who tries to interrupt the communication. Different from... 

    Three-hop untrusted relay networks with hardware imperfections and channel estimation errors for internet of things

    , Article IEEE Transactions on Information Forensics and Security ; Volume 15 , March , 2020 , Pages 2856-2868 Letafati, M ; Kuhestani, A ; Behroozi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Cooperative relaying can be introduced as a promising approach for data communication in the Internet of Things (IoT), where the source and the destination may be placed far away. In this paper, by taking a variety of realistic hardware imperfections (HWIs) and channels estimation errors (CEEs) into account, the secrecy performance of a three-hop cooperative network with a source, a destination and two consecutive amplify-and-forward (AF) relays is investigated. The relays are considered to be untrusted, i.e., while they are mandatory helpers for data transmission, they may overhear the received signals. We adopt the artificial noise injection scheme, to keep the source message secret from... 

    Routing in internet of things using cellular automata

    , Article 3rd International Conference on Innovative Computing and Communication, ICICC 2020, 21 February 2020 through 23 February 2020 ; Volume 1165 , 2021 , Pages 875-884 ; 21945357 (ISSN) ; 9789811551123 (ISBN) Heidari, E ; Movaghar, A ; Motameni, H ; Homayun, E ; Sharif University of Technology
    Springer  2021
    Abstract
    The Internet of Things (IoT) is a new model that contributes to connect heterogeneous objects and devices. It can share information with any device globally. Furthermore, the sensor technologies, communications, networks, and cloud computing technology in the IoT are expected to be integrated into large-scale monitored spaces. The main infrastructure of monitoring in the IoT is based on wireless sensor networks. Saving energy and expanding the lifetime are significant properties of the sensor’s nodes in these systems. The efficient energy saving projects should develop appropriate energy consumption’s algorithms to improve the lifetime of the networks in the IoT systems. In this paper, a... 

    Design & Implementation of high dynamic range current measurement system for Iot applications

    , Article IEEE Transactions on Instrumentation and Measurement ; Volume 71 , 2022 ; 00189456 (ISSN) Tehrani, Y.H ; Atarodi, S. M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    Internet-of-Things (IoT) devices have a strict necessity for power consumption to achieve the expected battery life. Therefore, measuring and optimizing the energy consumption of IoT nodes are essential. IoT nodes feature extreme current consumption range over 100 dB between their operating modes. The main focus of this article is to design and implement a low-power and low-cost current measurement circuit, which can be integrated into IoT nodes. A new pass element is introduced for measuring the current consumption. This element is placed in the current path to measure current over a high dynamic range with a constant voltage drop. The introduced pass element consists of a capacitor and... 

    Design and implementation of an ultralow-power Ecg patch and smart cloud-based platform

    , Article IEEE Transactions on Instrumentation and Measurement ; Volume 71 , 2022 ; 00189456 (ISSN) Baraeinejad, B ; Shayan, M. F ; Vazifeh, A. R ; Rashidi, D ; Hamedani, M. S ; Tavolinejad, H ; Gorji, P ; Razmara, P ; Vaziri, K ; Vashaee, D ; Fakharzadeh, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    This article reports the development of a new smart electrocardiogram (ECG) monitoring system, consisting of the related hardware, firmware, and Internet of Things (IoT)-based web service for artificial intelligence (AI)-assisted arrhythmia detection and a complementary Android application for data streaming. The hardware aspect of this article proposes an ultralow power patch sampling ECG data at 256 samples/s with 16-bit resolution. The battery life of the device is two weeks per charging, which alongside the flexible and slim (193.7 mm times62.4 mm times8.6 mm) and lightweight (43 g) allows the user to continue real-life activities while the real-time monitoring is being done without... 

    ARMOR: A reliable and mobility-aware RPL for mobile internet of things infrastructures

    , Article IEEE Internet of Things Journal ; Volume 9, Issue 2 , 2022 , Pages 1503-1516 ; 23274662 (ISSN) Mohammadsalehi, A ; Safaei, B ; Monazzah, A. M. H ; Bauer, L ; Henkel, J ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    Mobile portable embedded devices are becoming an integral part of our daily activities in the vision of Internet of Things (IoT). Nevertheless, due to lack of mobility support in the IPv6 routing protocol for low-power and lossy networks (RPLs), which is standardized for multihop IoT infrastructures, providing reliable communications in terms of packet delivery ratio (PDR) in mobile IoT applications has become significantly challenging. While several studies tried to enhance the adaptability of RPL to network dynamics, their utilized routing metrics have prevented them from establishing long-lasting reliable paths. Furthermore, the stochastic parent replacement policy in the standard version... 

    A new dynamic optimal m2m rf interface setting in relay selection algorithm (dorsa) for iot applications

    , Article IEEE Access ; Volume 10 , 2022 , Pages 5327-5342 ; 21693536 (ISSN) Ghasri, M. A. G ; Hemmatyar, A. M. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    Machine-to-Machine (M2M) communication is an important type of communication in the Internet-of-Things (IoT). How to send data in these high-density communications using relay selection can help improve the performance of this type of communication in various applications. In addition, the possibility of simultaneous use of different Radio Frequency (RF) interfaces helps to use the spectrum more efficiently. In this work, we try to further use machine communication RF equipment and improve the average data rate of networks in some applications such as the IoT, which have their own bandwidth requirements. Therefore, we provide an optimization algorithm for relay selection as well as the... 

    High-Speed post-quantum cryptoprocessor based on RISC-V architecture for IoT

    , Article IEEE Internet of Things Journal ; Volume 9, Issue 17 , 2022 , Pages 15839-15846 ; 23274662 (ISSN) Hadayeghparast, S ; Bayat Sarmadi, S ; Ebrahimi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    Public-key plays a significant role in today's communication over the network. However, current state-of-the-art public-key encryption (PKE) schemes are too complex to be efficiently employed in resource-constrained devices. Moreover, they are vulnerable to quantum attacks and soon will not have the required security. In the last decade, lattice-based cryptography has been a progenitor platform of the post-quantum cryptography (PQC) due to its lower complexity, which makes it more suitable for Internet of Things applications. In this article, we propose an efficient implementation of the binary learning with errors over ring (Ring-BinLWE) on the reduced instruction set computer-five (RISC-V)... 

    A current Re-use quadrature RF receiver front-end for low power applications: blixator circuit

    , Article IEEE Journal of Solid-State Circuits ; Volume 57, Issue 9 , 2022 , Pages 2672-2684 ; 00189200 (ISSN) Barzgari, M ; Ghafari, A ; Meghdadi, M ; Medi, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    This article presents the theory and implementation of a quadrature and differential RF front-end receiver. Combining balun, low-noise amplifier (LNA), mixer, and oscillator in a single stage, the proposed circuit, named the Blixator, is well suited for low-power applications. The baseband's transimpedance amplifier (TIA) also shares part of its dc current with the Blixator cell, resulting in sub-milliwatt power consumption. To avoid additional power and area by quadrature LO generation, the I/Q signals are generated at RF, employing the inductors already required for providing the dc current path of the LNA transistors. The expressions for gain, noise figure (NF), and phase noise of the...