enter search term and/or author name
Low-Cost Standard Signatures for Energy-Harvesting Wireless Sensor Networks
Giuseppe Ateniese, Giuseppe Bianchi, Angelo T. Capossele, Chiara Petrioli, Dora Spenza
Article No.: 64
This work is motivated by a general question: can micro-scale energy-harvesting techniques be exploited to support low-cost standard security solutions on resource-constrained devices? We focus on guaranteeing integrity and authentication...
Energy-Aware Memory Mapping for Hybrid FRAM-SRAM MCUs in Intermittently-Powered IoT Devices
Hrishikesh Jayakumar, Arnab Raha, Jacob R. Stevens, Vijay Raghunathan
Article No.: 65
Forecasts project that by 2020, there will be around 50 billion devices connected to the Internet of Things (IoT), most of which will operate untethered and unplugged. While environmental energy harvesting is a promising solution to power these...
Axiom: DTLS-Based Secure IoT Group Communication
Marco Tiloca, Kirill Nikitin, Shahid Raza
Article No.: 66
This article presents Axiom, a DTLS-based approach to efficiently secure multicast group communication among IoT-constrained devices. Axiom provides an adaptation of the DTLS record layer, relies on key material commonly shared among the group...
A PUF-Based Secure Communication Protocol for IoT
Urbi Chatterjee, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay
Article No.: 67
Security features are of paramount importance for the Internet of Things (IoT), and implementations are challenging given the resource-constrained IoT setup. We have developed a lightweight identity-based cryptosystem suitable for IoT to enable...
Data-Driven Synchronization for Internet-of-Things Systems
Terrell R. Bennett, Nicholas Gans, Roozbeh Jafari
Article No.: 69
The Internet of Things (IoT) is fueled by the growth of sensors, actuators, and services that collect and process raw sensor data. Wearable and environmental sensors will be a major component of the IoT and provide context about people and...
A Multi-Quadcopter Cooperative Cyber-Physical System for Timely Air Pollution Localization
Zhaoyan Shen, Zhijian He, Shuai Li, Qixin Wang, Zili Shao
Article No.: 70
We propose a cyber-physical system of unmanned quadcopters to locate air pollution sources in a timely manner. The system consists of a physical part and a cyber part. The physical part includes unmanned quadcopters equipped with multiple sensors....
Section: Special Issue on Embedded Computing for IoT
Guest Editorial for ACM TECS Special Issue on Effective Divide-and-Conquer, Incremental, or Distributed Mechanisms of Embedded Designs for Extremely Big Data in Large-Scale Devices
Bo-Wei Chen, Wen Ji, Zhu Li
Article No.: 72
Section: Special Issue on Embedded Computing for IoT
Hardware Architectures for Embedded Speaker Recognition Applications: A Survey
Hasna Bouraoui, Chadlia Jerad, Anupam Chattopadhyay, Nejib Ben Hadj-Alouane
Article No.: 78
Authentication technologies based on biometrics, such as speaker recognition, are attracting more and more interest thanks to the elevated level of security offered by these technologies. Despite offering many advantages, such as remote use and...
AdaFT: A Framework for Adaptive Fault Tolerance for Cyber-Physical Systems
Ye Xu, Israel Koren, C. Mani Krishna
Article No.: 79
Cyber-physical systems (CPS) frequently have to use massive redundancy to meet application requirements for high reliability. While such redundancy is required, it can be activated adaptively, based on the current state of the controlled plant....
Algorithms used in microwave imaging for breast cancer detection require hardware acceleration to speed up execution time and reduce power consumption. In this article, we present the hardware implementation of two accelerators for two alternative...
Code discovery has been a main challenge for static binary translation, especially when the source instruction set architecture has variable-length instructions, such as the x86 architectures. Due to embedded data such as PC (program...
Repeatable and accurate tests are important when designing hardware and algorithms for solar-powered wireless sensor networks (WSNs). Since no two days are exactly alike with regard to energy harvesting, tests must be carried out indoors. Solar...
On Space Utilization Enhancement of File Systems for Embedded Storage Systems
Tseng-Yi Chen, Yuan-Hao Chang, Shuo-Han Chen, Nien-I Hsu, Hsin-Wen Wei, Wei-Kuan Shih
Article No.: 83
Since the mid-2000s, mobile/embedded computing systems conventionally have limited computing power, Random Access Memory (RAM) space, and storage capacity due to the consideration of their cost, energy consumption, and physical size. Recently,...
In this article, we consider clustered wireless sensor networks where the nodes harvest energy from the environment. We target performance-sensitive applications that have to collectively send their information to a cluster head by a predefined...
Fault-Tolerant Preemptive Aperiodic RT Scheduling by Supervisory Control of TDES on Multiprocessors
Rajesh Devaraj, Arnab Sarkar, Santosh Biswas
Article No.: 87
Safety-critical real-time systems must meet stringent timing and fault-tolerance requirements. This article proposes a methodology for synthesizing an optimal preemptive multiprocessor aperiodic task scheduler using a formal supervisory control...
Silent Data Corruption (SDC) is a serious reliability issue in many domains, including embedded systems. However, current protection techniques are brittle and do not allow programmers to trade off performance for SDC coverage. Further, many...
LiBrA-CAN: Lightweight Broadcast Authentication for Controller Area Networks
Bogdan Groza, Stefan Murvay, Anthony Van Herrewege, Ingrid Verbauwhede
Article No.: 90
Despite realistic concerns, security is still absent from vehicular buses such as the widely used Controller Area Network (CAN). We design an efficient protocol based on efficient symmetric primitives, taking advantage of two innovative...