scholarly journals A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT

2017 ◽  
Vol 2017 ◽  
pp. 1-12 ◽  
Author(s):  
Guoyin Zhang ◽  
Liang Kou ◽  
Liguo Zhang ◽  
Chao Liu ◽  
Qingan Da ◽  
...  

Since its introduction, IoT (Internet of Things) has enjoyed vigorous support from governments and research institutions around the world, and remarkable achievements have been obtained. The perception layer of IoT plays an important role as a link between the IoT and the real world; the security has become a bottleneck restricting the further development of IoT. The perception layer is a self-organizing network system consisting of various resource-constrained sensor nodes through wireless communication. Accordingly, the costly encryption mechanism cannot be applied to the perception layer. In this paper, a novel lightweight data integrity protection scheme based on fragile watermark is proposed to solve the contradiction between the security and restricted resource of perception layer. To improve the security, we design a position random watermark (PRW) strategy to calculate the embedding position by temporal dynamics of sensing data. The digital watermark is generated by one-way hash function SHA-1 before embedding to the dynamic computed position. In this way, the security vulnerabilities introduced by fixed embedding position can not only be solved effectively, but also achieve zero disturbance to the data. The security analysis and simulation results show that the proposed scheme can effectively ensure the integrity of the data at low cost.

Author(s):  
Zeydin Pala

Wireless sensor networks (WSNs) still attract the attention of researchers, users and the private sector despite their low power and low range tendency for malfunction. This attraction towards WSNs results from their low cost structure and the solutions they offer for many prevalent problems. Many conditions, which remain unforeseen or unexpected during the design of the system, may arise after the initialization of the system. Similarly, many situations where security vulnerabilities take place may emerge in time in WSNs operating normally. In this study, we called nodes which enter sleeping mode without any further waking up and causing a sparser number of nodes in the network without any function in data transmission as Long-Term Sleep Nodes (LT-SN); and considered energy spaces caused by such nodes as a problem; and established two Linear Programming (LP) models based on the efficiency of the present nodes. We offered two different models which present the effect of sensor nodes, which were initially operating in wireless sensor network environment and did not wake up following sleep mode, on network lifetime. The results of the present study report that as the number of LT-SN increases, the lifetime of the network decreases.


2019 ◽  
Vol 8 (3) ◽  
pp. 2937-2942

Introduction of IoT (Internet of Things) has enjoyed vigorous support from governments and research institutions around the world, and remarkable achievements have been obtained till date. IoT systems collect the voluminous amount of data in real time from hospitals, battlefield and daily living environment which is related to privacy and security of people. So, securing collected sensitive data is one of the major challenges in the development of IoT systems. Authenticating the source of collected data is utmost important because the adversary may act as a source which may lead to a breach in security and privacy of people using the IoT network. IoT devices are resource scarce so lightweight methods for network security and privacy need to develop to achieve future development goals. In this paper, a novel lightweight node to node authentication scheme based on watermark is proposed to solve the contradiction between the security and restricted resources of perception layer. To improve the security, Proposed scheme usage node identity and the number of neighbours as input to generate the watermark and use the watermark to calculate the embedding positions which makes node authentication based on temporal dynamics of sensing network. The generated watermark is embedded in fixed size message digest generated using the variable message as input into a low-cost one-way hashing algorithm LOCHA. The embedded bits of watermark extracted at the receiving node and matched to check the authenticity of the sender node. The security analysis and simulations of the proposed scheme show that it can be a good candidate to ensure the authentication of the resource constraint devices which are integral part of Internet of Things at low cost


2022 ◽  
Vol 18 (1) ◽  
pp. 1-23
Author(s):  
Mahabub Hasan Mahalat ◽  
Dipankar Karmakar ◽  
Anindan Mondal ◽  
Bibhash Sen

The deployment of wireless sensor networks (WSN) in an untended environment and the openness of the wireless channel bring various security threats to WSN. The resource limitations of the sensor nodes make the conventional security systems less attractive for WSN. Moreover, conventional cryptography alone cannot ensure the desired security against the physical attacks on sensor nodes. Physically unclonable function (PUF) is an emerging hardware security primitive that provides low-cost hardware security exploiting the unique inherent randomness of a device. In this article, we have proposed an authentication and key sharing scheme for the WSN integrating Pedersen’s verifiable secret sharing (Pedersen’s VSS) and Shamir’s secret sharing (Shamir’s SS) scheme with PUF which ensure the desired security with low overhead. The security analysis depicts the resilience of the proposed scheme against different active, passive and physical attacks. Also, the performance analysis shows that the proposed scheme possesses low computation, communication and storage overhead. The scheme only needs to store a polynomial number of PUF challenge-response pairs to the user node. The sink or senor nodes do not require storing any secret key. Finally, the comparison with the previous protocols establishes the dominance of the proposed scheme to use in WSN.


Author(s):  
Karan S Belsare ◽  
Gajanan D Patil

A low cost and reliable protection scheme has been designed for a three phase induction motor against unbalance voltages, under voltage, over voltage, short circuit and overheating protection. Taking the cost factor into consideration the design has been proposed using microcontroller Atmega32, MOSFETs, relays, small CTs and PTs. However the sensitivity of the protection scheme has been not compromised. The design has been tested online in the laboratory for small motors and the same can be implemented for larger motors by replacing the i-v converters and relays of suitable ratings.


2021 ◽  
Vol 13 (1) ◽  
Author(s):  
Ziqi Wang ◽  
Liubing Dong ◽  
Weiyuan Huang ◽  
Hao Jia ◽  
Qinghe Zhao ◽  
...  

AbstractOwing to the merits of low cost, high safety and environmental benignity, rechargeable aqueous Zn-based batteries (ZBs) have gained tremendous attention in recent years. Nevertheless, the poor reversibility of Zn anodes that originates from dendrite growth, surface passivation and corrosion, severely hinders the further development of ZBs. To tackle these issues, here we report a Janus separator based on a Zn-ion conductive metal–organic framework (MOF) and reduced graphene oxide (rGO), which is able to regulate uniform Zn2+ flux and electron conduction simultaneously during battery operation. Facilitated by the MOF/rGO bifunctional interlayers, the Zn anodes demonstrate stable plating/stripping behavior (over 500 h at 1 mA cm−2), high Coulombic efficiency (99.2% at 2 mA cm−2 after 100 cycles) and reduced redox barrier. Moreover, it is also found that the Zn corrosion can be effectively retarded through diminishing the potential discrepancy on Zn surface. Such a separator engineering also saliently promotes the overall performance of Zn|MnO2 full cells, which deliver nearly 100% capacity retention after 2000 cycles at 4 A g−1 and high power density over 10 kW kg−1. This work provides a feasible route to the high-performance Zn anodes for ZBs.


Entropy ◽  
2021 ◽  
Vol 23 (7) ◽  
pp. 848
Author(s):  
Karla Miriam Reyes Leiva ◽  
Milagros Jaén-Vargas ◽  
Miguel Ángel Cuba ◽  
Sergio Sánchez Lara ◽  
José Javier Serrano Olmedo

The rehabilitation of a visually impaired person (VIP) is a systematic process where the person is provided with tools that allow them to deal with the impairment to achieve personal autonomy and independence, such as training for the use of the long cane as a tool for orientation and mobility (O&M). This process must be trained personally by specialists, leading to a limitation of human, technological and structural resources in some regions, especially those with economical narrow circumstances. A system to obtain information about the motion of the long cane and the leg using low-cost inertial sensors was developed to provide an overview of quantitative parameters such as sweeping coverage and gait analysis, that are currently visually analyzed during rehabilitation. The system was tested with 10 blindfolded volunteers in laboratory conditions following constant contact, two points touch, and three points touch travel techniques. The results indicate that the quantification system is reliable for measuring grip rotation, safety zone, sweeping amplitude and hand position using orientation angles with an accuracy of around 97.62%. However, a new method or an improvement of hardware must be developed to improve gait parameters’ measurements, since the step length measurement presented a mean accuracy of 94.62%. The system requires further development to be used as an aid in the rehabilitation process of the VIP. Now, it is a simple and low-cost technological aid that has the potential to improve the current practice of O&M.


Author(s):  
Bochao Chen ◽  
Ming Liang ◽  
Qingzhao Wu ◽  
Shan Zhu ◽  
Naiqin Zhao ◽  
...  

AbstractThe development of sodium-ion (SIBs) and potassium-ion batteries (PIBs) has increased rapidly because of the abundant resources and cost-effectiveness of Na and K. Antimony (Sb) plays an important role in SIBs and PIBs because of its high theoretical capacity, proper working voltage, and low cost. However, Sb-based anodes have the drawbacks of large volume changes and weak charge transfer during the charge and discharge processes, thus leading to poor cycling and rapid capacity decay. To address such drawbacks, many strategies and a variety of Sb-based materials have been developed in recent years. This review systematically introduces the recent research progress of a variety of Sb-based anodes for SIBs and PIBs from the perspective of composition selection, preparation technologies, structural characteristics, and energy storage behaviors. Moreover, corresponding examples are presented to illustrate the advantages or disadvantages of these anodes. Finally, we summarize the challenges of the development of Sb-based materials for Na/K-ion batteries and propose potential research directions for their further development.


Sensors ◽  
2021 ◽  
Vol 21 (3) ◽  
pp. 727
Author(s):  
Rahul Mourya ◽  
Mauro Dragone ◽  
Yvan Petillot

Underwater acoustic sensor networks (UWASNs) can revolutionize the subsea domain by enabling low-cost monitoring of subsea assets and the marine environment. Accurate localization of the UWASNs is essential for these applications. In general, range-based localization techniques are preferred for their high accuracy in estimated locations. However, they can be severely affected by variable sound speed, multipath spreading, and other effects of the acoustic channel. In addition, an inefficient localization scheme can consume a significant amount of energy, reducing the effective life of the battery-powered sensor nodes. In this paper, we propose robust, efficient, and practically implementable localization schemes for static UWASNs. The proposed schemes are based on the Time-Difference-of-Arrival (TDoA) measurements and the nodes are localized passively, i.e., by just listening to beacon signals from multiple anchors, thus saving both the channel bandwidth and energy. The robustness in location estimates is achieved by considering an appropriate statistical noise model based on a plausible acoustic channel model and certain practical assumptions. To overcome the practical challenges of deploying and maintaining multiple permanent anchors for TDoA measurements, we propose practical schemes of using a single or multiple surface vehicles as virtual anchors. The robustness of localization is evaluated by simulations under realistic settings. By combining a mobile anchor(s) scheme with a robust estimator, this paper presents a complete package of efficient, robust, and practically usable localization schemes for low-cost UWASNs.


Sign in / Sign up

Export Citation Format

Share Document