scholarly journals A novel approach for identification of sensor devices through Acoustic PUF

Author(s):  
Girish Vaidya ◽  
Prabhakar T.V. ◽  
Nithish Gnani ◽  
Ryan Shah ◽  
Shishir Nagaraja

The supply chain traceability of components from a production facility to deployment and maintenance depends upon its irrefutable identity. There are two well-known methods for identification which includes an identity code stored in the memory and embedding a custom identification hardware. While storing the identity code is susceptible to malicious and unintentional attacks, the approach of embedding a custom identification hardware is infeasible for sensor nodes assembled with Commercially-Off-the-Shelf (COTS) devices. We propose a novel identifier - Acoustic PUF based on the innate properties of the sensor node. Acoustic PUF combines the uniqueness component and the position component of the sensor device signature. The uniqueness component is derived by exploiting the manufacturing tolerances, thus making the signature unclonable. The position component is derived through acoustic fingerprinting, thus giving a sticky identity to the sensor device. We evaluate Acoustic PUF for Uniqueness, Repeatability and Position identity with a deployment spanning several weeks. Through our experimental evaluation and further numerical analysis, we prove that Acoustic PUF can uniquely identify thousands of devices with 99% accuracy while simultaneously detecting the change in position.

Author(s):  
Anitha Krishna Gowda ◽  
Ananda Babu Jayachandra ◽  
Raviprakash Madenur Lingaraju ◽  
Vinay Doddametikurke Rajkumar

<p><span>Hybrid medium access control (MAC) scheme is one of the prominent mechanisms to offer energy efficiency in wireless sensor network where the potential features for both contention-based and schedule-based approaches are mechanized. However, the review of existing hybrid MAC scheme shows many loopholes where mainly it is observed that there is too much inclusion of time-slotting or else there is an inclusion of sophisticated mechanism not meant for offering flexibility to sensor node towards extending its services for upcoming applications of it. Therefore, this manuscript introduces a novel hybrid MAC scheme which is meant for offering cost effective and simplified scheduling operation in order to balance the performance of energy efficiency along with data aggregation performance. The simulated outcome of the study shows that proposed system offers better energy consumption, better throughput, reduced memory consumption, and faster processing in contrast to existing hybrid MAC protocols.</span></p>


Author(s):  
Yang Wang ◽  
Feifan Wang ◽  
Yujun Zhu ◽  
Yiyang Liu ◽  
Chuanxin Zhao

AbstractIn wireless rechargeable sensor network, the deployment of charger node directly affects the overall charging utility of sensor network. Aiming at this problem, this paper abstracts the charger deployment problem as a multi-objective optimization problem that maximizes the received power of sensor nodes and minimizes the number of charger nodes. First, a network model that maximizes the sensor node received power and minimizes the number of charger nodes is constructed. Second, an improved cuckoo search (ICS) algorithm is proposed. This algorithm is based on the traditional cuckoo search algorithm (CS) to redefine its step factor, and then use the mutation factor to change the nesting position of the host bird to update the bird’s nest position, and then use ICS to find the ones that maximize the received power of the sensor node and minimize the number of charger nodes optimal solution. Compared with the traditional cuckoo search algorithm and multi-objective particle swarm optimization algorithm, the simulation results show that the algorithm can effectively increase the receiving power of sensor nodes, reduce the number of charger nodes and find the optimal solution to meet the conditions, so as to maximize the network charging utility.


Electronics ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 218
Author(s):  
Ala’ Khalifeh ◽  
Khalid A. Darabkh ◽  
Ahmad M. Khasawneh ◽  
Issa Alqaisieh ◽  
Mohammad Salameh ◽  
...  

The advent of various wireless technologies has paved the way for the realization of new infrastructures and applications for smart cities. Wireless Sensor Networks (WSNs) are one of the most important among these technologies. WSNs are widely used in various applications in our daily lives. Due to their cost effectiveness and rapid deployment, WSNs can be used for securing smart cities by providing remote monitoring and sensing for many critical scenarios including hostile environments, battlefields, or areas subject to natural disasters such as earthquakes, volcano eruptions, and floods or to large-scale accidents such as nuclear plants explosions or chemical plumes. The purpose of this paper is to propose a new framework where WSNs are adopted for remote sensing and monitoring in smart city applications. We propose using Unmanned Aerial Vehicles to act as a data mule to offload the sensor nodes and transfer the monitoring data securely to the remote control center for further analysis and decision making. Furthermore, the paper provides insight about implementation challenges in the realization of the proposed framework. In addition, the paper provides an experimental evaluation of the proposed design in outdoor environments, in the presence of different types of obstacles, common to typical outdoor fields. The experimental evaluation revealed several inconsistencies between the performance metrics advertised in the hardware-specific data-sheets. In particular, we found mismatches between the advertised coverage distance and signal strength with our experimental measurements. Therefore, it is crucial that network designers and developers conduct field tests and device performance assessment before designing and implementing the WSN for application in a real field setting.


Sensors ◽  
2021 ◽  
Vol 21 (3) ◽  
pp. 953 ◽  
Author(s):  
Yuanchu Yin ◽  
Jiefan Qiu ◽  
Zhiqiang Li ◽  
Mingsheng Cao

When a wireless sensor node’s wireless communication fails after being deployed in an inaccessible area, the lost node cannot be repaired through a debugging interaction that relies on that communication. Visible light communication (VLC) as a supplement of radio wave communication can improve the transmission security at the physical layer due to its unidirectional propagation characteristic. Therefore, we implemented a VLC-based hybrid communication debugging system (HCDS) based on VLC using smartphone and sensor node. For the system’s downlink, the smartphone is taken as the VLC gateway and sends the debugging codes to the sensor node by the flashlight. To improve the transmission efficiency of the downlink, we also propose a new coding method for source coding and channel coding, respectively. For the source coding, we analyze the binary instructions and compress the operands using bitmask techniques. The average compression rate of the binary structure reaches 84.11%. For the channel coding, we optimize dual-header pulse interval (DH-PIM) and propose overlapped DH-PIM (ODH-PIM) by introducing a flashlight half-on state. The flashlight half-on state can improve the representation capability of individual symbols. For the uplink of HCDS, we use the onboard LED of the sensor node to transmit feedback debugging information to the smartphone. At the same time, we design a novel encoding format of DH-PIM to optimize uplink transmission. Experimental results show that the optimized uplink transmission time and BER are reduced by 10.71% and 22%, compared with the original DH-PIM.


2019 ◽  
Vol 11 (21) ◽  
pp. 6171 ◽  
Author(s):  
Jangsik Bae ◽  
Meonghun Lee ◽  
Changsun Shin

With the expansion of smart agriculture, wireless sensor networks are being increasingly applied. These networks collect environmental information, such as temperature, humidity, and CO2 rates. However, if a faulty sensor node operates continuously in the network, unnecessary data transmission adversely impacts the network. Accordingly, a data-based fault-detection algorithm was implemented in this study to analyze data of sensor nodes and determine faults, to prevent the corresponding nodes from transmitting data; thus, minimizing damage to the network. A cloud-based “farm as a service” optimized for smart farms was implemented as an example, and resource management of sensors and actuators was provided using the oneM2M common platform. The effectiveness of the proposed fault-detection model was verified on an integrated management platform based on the Internet of Things by collecting and analyzing data. The results confirm that when a faulty sensor node is not separated from the network, unnecessary data transmission of other sensor nodes occurs due to continuous abnormal data transmission; thus, increasing energy consumption and reducing the network lifetime.


Omega ◽  
2009 ◽  
Vol 37 (2) ◽  
pp. 358-379 ◽  
Author(s):  
Bogdan C. Bichescu ◽  
Michael J. Fry

Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2568 ◽  
Author(s):  
Ruisong Wang ◽  
Gongliang Liu ◽  
Wenjing Kang ◽  
Bo Li ◽  
Ruofei Ma ◽  
...  

Information acquisition in underwater sensor networks is usually limited by energy and bandwidth. Fortunately, the received signal can be represented sparsely on some basis. Therefore, a compressed sensing method can be used to collect the information by selecting a subset of the total sensor nodes. The conventional compressed sensing scheme is to select some sensor nodes randomly. The network lifetime and the correlation of sensor nodes are not considered. Therefore, it is significant to adjust the sensor node selection scheme according to these factors for the superior performance. In this paper, an optimized sensor node selection scheme is given based on Bayesian estimation theory. The advantage of Bayesian estimation is to give the closed-form expression of posterior density function and error covariance matrix. The proposed optimization problem first aims at minimizing the mean square error (MSE) of Bayesian estimation based on a given error covariance matrix. Then, the non-convex optimization problem is transformed as a convex semidefinite programming problem by relaxing the constraints. Finally, the residual energy of each sensor node is taken into account as a constraint in the optimization problem. Simulation results demonstrate that the proposed scheme has better performance than a conventional compressed sensing scheme.


2013 ◽  
Vol 30 (05) ◽  
pp. 1350020 ◽  
Author(s):  
ZHUPING LIU ◽  
QIUHONG ZHAO ◽  
SHOUYANG WANG ◽  
JIANMING SHI

This paper investigates the impact of partial information sharing in a three-echelon supply chain. Partial information sharing means that information sharing occurs only between the distributor and the retailer, but not between the distributor and the manufacturer. This paper contributes to the literature by summarizing the circumstances in which information sharing between the retailer and the distributor benefits the manufacturer. In addition, our study points out that such information sharing does not always bring benefits to the manufacturer and that in some cases the information sharing may harm the manufacturer. We explain the reasons why this can happen and give managerial intuition for our results. Using numerical analysis, we illustrate the impact of partial information sharing on the agents in the supply chain with the change of the autoregressive coefficient in the demand process.


2019 ◽  
Vol 30 (1) ◽  
pp. 303-328 ◽  
Author(s):  
Marek Michalski ◽  
Jose Luis Montes ◽  
Ram Narasimhan

PurposeThe purpose of this paper is to examine the non-linear aspects of the asymmetry-performance relationship under varying conditions of trust and innovation. Its novel approach is useful for addressing the strategic elements of supply chain management (SCM) relationships based on trust and innovation decisions.Design/methodology/approachResults are based on a study of 90 managers from small- and medium-sized firms in Spain. Instead of a classical linear relationship analysis, the authors performed a non-linear analysis, using polynomial modeling and Warp 3 partial least squares method, which provides a more nuanced view of the data and constitutes an original approach to empirical research in SCM.FindingsThis study adds a new viewpoint on SC relationships by suggesting that not all trust and innovation development leads directly to performance improvement. The principal finding is, in varying trust and innovation contexts, that the influences of asymmetry on performance have uneven characteristics and follow non-linear paths.Research limitations/implicationsThis study focuses on only one particular institutional environment in one country. The data are also cross-sectional, which makes it difficult to empirically test causality.Practical implicationsThe findings provide rational insights to managers on when it is appropriate to reduce (or not) asymmetric relationships with partners.Originality/valueTrust and innovation are important and ones of the key requirements of supply chain relationships in any environment, this study argues that the interactions of key SCM elements that drive members to better performance are more complex and non-linear.


2021 ◽  
Author(s):  
Lismer Andres Caceres Najarro ◽  
Iickho Song ◽  
Kiseon Kim

<p> </p><p>With the advances in new technological trends and the reduction in prices of sensor nodes, wireless sensor networks</p> <p>(WSNs) and their applications are proliferating in several areas of our society such as healthcare, industry, farming, and housing. Accordingly, in recent years attention on localization has increased significantly since it is one of the main facets in any WSN. In a nutshell, localization is the process in which the position of any sensor node is retrieved by exploiting measurements from and between sensor nodes. Several techniques of localization have been proposed in the literature with different localization accuracy, complexity, and hence different applicability. The localization accuracy is limited by fundamental limitations, theoretical and practical, that restrict the localization accuracy regardless of the technique employed in the localization process. In this paper, we pay special attention to such fundamental limitations from the theoretical and practical points of view and provide a comprehensive review of the state-of-the-art solutions that deal with such limitations. Additionally, discussion on the theoretical and practical limitations together with their recent solutions, remaining challenges, and perspectives are presented.</p> <p><br></p>


Sign in / Sign up

Export Citation Format

Share Document