scholarly journals Word-Based Systolic Processor for Field Multiplication and Squaring Suitable for Cryptographic Processors in Resource-Constrained IoT Systems

Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1777
Author(s):  
Atef Ibrahim ◽  
Fayez Gebali

Internet of things (IoT) technology provides practical solutions for a wide range of applications, including but not limited to, smart homes, smart cities, intelligent grid, intelligent transportation, and healthcare. Security and privacy issues in IoT are considered significant challenges that prohibit its utilization in most of these applications, especially relative to healthcare applications. Cryptographic protocols should be applied at the different layers of IoT framework, especially edge devices, to solve all security concerns. Finite-field arithmetic, particularly field multiplication and squaring, represents the core of most cryptographic protocols and their implementation primarily affects protocol performance. In this paper, we present a compact and combined two-dimensional word-based serial-in/serial-out systolic processor for field multiplication and squaring over GF(2m). The proposed structure features design flexibility to manage hardware utilization, execution time, and consumed energy. Application Specific Integrated Circuit (ASIC) Implementation results of the proposed word-serial design and the competitive ones at different embedded word-sizes show that the proposed structure realizes considerable saving in the area and consumed energy, up to 93.7% and 98.2%, respectively. The obtained results enable the implementation of restricted cryptographic primitives in resource-constrained IoT edge devices such as wearable and implantable medical devices, smart cards, and wireless sensor nodes.

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Insaf Ullah ◽  
Ali Alkhalifah ◽  
Muhammad Asghar Khan ◽  
Samih M. Mostafa

The Internet of things (IoT) has emerged into a revolutionary technology that enables a wide range of features and applications given the proliferation of sensors and actuators embedded in everyday objects, as well as the ubiquitous availability of high-speed Internet. When nearly everything is connected to the Internet, security and privacy concerns will become more significant. Furthermore, owing to the resource-constrained nature of IoT devices, they are unable to perform standard cryptographic computations. As a result, there is a critical need for efficient and secure lightweight cryptographic scheme that can meet the demands of resource-constrained IoT devices. In this study, we propose a lightweight proxy in which a person/party can delegate its signing authority to a proxy agent. Existing proxy signcryption security approaches are computationally costly and rely on RSA, bilinear pairing, and elliptic curves cryptography (ECC). The hyperelliptic curve cryptosystem (HECC), on the other hand, employs a smaller key size while maintaining the same level of security. When assessed using the random oracle model (ROM), the proposed scheme provides resilience against indistinguishable under adaptive chosen ciphertext attacks (IND-CCA) and unforgeable under adaptive chosen message attacks (UU-ACMA). To demonstrate the viability of the proposed scheme, security analyses and comparisons with existing schemes are performed. The findings show that the proposed scheme provides high security while reducing computational and communication costs.


2021 ◽  
Vol 2021 ◽  
pp. 1-20
Author(s):  
Pranav Ratta ◽  
Amanpreet Kaur ◽  
Sparsh Sharma ◽  
Mohammad Shabaz ◽  
Gaurav Dhiman

Internet of Things (IoT) is one of the recent innovations in Information Technology, which intends to interconnect the physical and digital worlds. It introduces a vision of smartness by enabling communication between objects and humans through the Internet. IoT has diverse applications in almost all sectors like Smart Health, Smart Transportation, and Smart Cities, etc. In healthcare applications, IoT eases communication between doctors and patients as the latter can be diagnosed remotely in emergency scenarios through body sensor networks and wearable sensors. However, using IoT in healthcare systems can lead to violation of the privacy of patients. Thus, security should be taken into consideration. Blockchain is one of the trending research topics nowadays and can be applied to the majority of IoT scenarios. Few major reasons for using the Blockchain in healthcare systems are its prominent features, i.e., Decentralization, Immutability, Security and Privacy, and Transparency. This paper’s main objective was to enhance the functionality of healthcare systems using emerging and innovative computer technologies like IoT and Blockchain. So, initially, a brief introduction to the basic concepts of IoT and Blockchain is provided. After this, the applicability of IoT and Blockchain in the medical sector is explored in three major areas—drug traceability, remote patient-monitoring, and medical record management. At last, the challenges of deploying IoT and Blockchain in healthcare systems are discussed.


Sensors ◽  
2021 ◽  
Vol 21 (24) ◽  
pp. 8332
Author(s):  
Iman Izadgoshasb

Information and communication technologies (ICT) are major features of smart cities. Smart sensing devices will benefit from 5 G and the Internet of Things, which will enable them to communicate in a safe and timely manner. However, the need for sustainable power sources and self-powered active sensing devices will continue to be a major issue in this sector. Since their discovery, piezoelectric energy harvesters have demonstrated a significant ability to power wireless sensor nodes, and their application in a wide range of systems, including intelligent transportation, smart healthcare, human-machine interfaces, and security systems, has been systematically investigated. Piezoelectric energy-harvesting systems are promising candidates not only for sustainably powering wireless sensor nodes but also for the development of intelligent and active self-powered sensors with a wide range of applications. In this paper, the various applications of piezoelectric energy harvesters in powering Internet of Things sensors and devices in smart cities are discussed and reviewed.


Author(s):  
Noel Toy ◽  
Senthilnathan T

Wireless Sensor Network (WSN) is a spatially distributed network. It contains many numbers of distributed, self-directed, small, battery powered devices called sensor nodes or motes. In recent years the deployment of WSN in various application domains are growing in a rapid pace as with the upcoming boom of Internet of Things (IoT) and Internet of Everything (IoE). However, the effectiveness of the WSN deployment is restricted due to the constrained computation and power source. Hence, many researchers have been proposing new approaches and models to improve the efficiency of the domain specific WSN deployment procedures. Though, many research communities addressing various issues in WSN deployment, still the privacy and security of such networks are susceptible to various network attacks. Thus, it is necessary to practice different models for authentication and privacy preservation in a highly dynamic resource constrained WSN environment to realize the effectiveness and efficiency of the deployment. Hence, this paper addressing an authentication scheme that can reduce energy consumption without compromising on security and privacy. In order to provide a light weight authentication mechanism, this paper proposing an authentication mechanism for WSN deployment by combining the features of Elliptic Curve Cryptography (ECC) and Hexagonal numbers. The feature of ECC is used to reduce the key size and the effectiveness of generating hexagonal numbers is used for minimizing the energy consumption in a resource constrained WSN environment. The results of the proposed approach are evaluated with the different authentication models and the results were indicating that the proposed approach can perform better than the other approaches.


2021 ◽  
Vol 11 (4) ◽  
pp. 4913-4930
Author(s):  
Akshat Goyal ◽  
Mugdha S Kulkarni

Home automation is now extremely common in Internet of things services and devices with a range of assurances to improve health, lifestyle, and customer wellbeing. In terms of its success and apparent utility for humans, intelligent homes possess various safety concerns resulting from the diversified, vast-range, and nuanced nature of IoT. Previous studies have talked about security and privacy issues. However, we observe that they have not addressed the risk assessment of each smart home component and corresponding security objective along with additional factors that affect a smart home security posture. In this study, we have proposed a framework defining a standard level of security and then analyzing each component concerning it. There are so many vulnerabilities, but all cannot be assessed due to the heterogeneity of devices and their connection in a small network. IoT can support a wide range of technologies and programs in various domains, including smart cities and smart houses. For monitoring, data exchange, and other operations in the given service, IoT smart objects communicate with other elements such as proxies, mobile devices, and data collectors. While such components help solve various social issues and provide consumers with modern advanced services, their restricted computing capacities render them vulnerable to well-known protection and privacy risks.


2020 ◽  
Vol 14 ◽  
Author(s):  
M. Sivaram ◽  
V. Porkodi ◽  
Amin Salih Mohammed ◽  
S. Anbu Karuppusamy

Background: With the advent of IoT, the deployment of batteries with a limited lifetime in remote areas is a major concern. In certain conditions, the network lifetime gets restricted due to limited battery constraints. Subsequently, the collaborative approaches for key facilities help to reduce the constraint demands of the current security protocols. Aim: This work covers and combines a wide range of concepts linked by IoT based on security and energy efficiency. Specifically, this study examines the WSN energy efficiency problem in IoT and security for the management of threats in IoT through collaborative approaches and finally outlines the future. The concept of energy-efficient key protocols which clearly cover heterogeneous IoT communications among peers with different resources has been developed. Because of the low capacity of sensor nodes, energy efficiency in WSNs has been an important concern. Methods: Hence, in this paper, we present an algorithm for Artificial Bee Colony (ABC) which reviews security and energy consumption to discuss their constraints in the IoT scenarios. Results: The results of a detailed experimental assessment are analyzed in terms of communication cost, energy consumption and security, which prove the relevance of a proposed ABC approach and a key establishment. Conclusion: The validation of DTLS-ABC consists of designing an inter-node cooperation trust model for the creation of a trusted community of elements that are mutually supportive. Initial attempts to design the key methods for management are appropriate individual IoT devices. This gives the system designers, an option that considers the question of scalability.


1992 ◽  
Vol 262 (6) ◽  
pp. H1939-H1940 ◽  
Author(s):  
G. L. Freeman ◽  
J. T. Colston

In this paper we describe a simple pacing circuit which can be used to drive the heart over a wide range of rates. The circuit is an astable multivibrator, based on an LM555 integrated circuit. It is powered by a 9-V battery and is small enough for use in rabbits. The circuit is easily constructed and inexpensive, making it attractive for numerous applications in cardiovascular research.


Electronics ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 218
Author(s):  
Ala’ Khalifeh ◽  
Khalid A. Darabkh ◽  
Ahmad M. Khasawneh ◽  
Issa Alqaisieh ◽  
Mohammad Salameh ◽  
...  

The advent of various wireless technologies has paved the way for the realization of new infrastructures and applications for smart cities. Wireless Sensor Networks (WSNs) are one of the most important among these technologies. WSNs are widely used in various applications in our daily lives. Due to their cost effectiveness and rapid deployment, WSNs can be used for securing smart cities by providing remote monitoring and sensing for many critical scenarios including hostile environments, battlefields, or areas subject to natural disasters such as earthquakes, volcano eruptions, and floods or to large-scale accidents such as nuclear plants explosions or chemical plumes. The purpose of this paper is to propose a new framework where WSNs are adopted for remote sensing and monitoring in smart city applications. We propose using Unmanned Aerial Vehicles to act as a data mule to offload the sensor nodes and transfer the monitoring data securely to the remote control center for further analysis and decision making. Furthermore, the paper provides insight about implementation challenges in the realization of the proposed framework. In addition, the paper provides an experimental evaluation of the proposed design in outdoor environments, in the presence of different types of obstacles, common to typical outdoor fields. The experimental evaluation revealed several inconsistencies between the performance metrics advertised in the hardware-specific data-sheets. In particular, we found mismatches between the advertised coverage distance and signal strength with our experimental measurements. Therefore, it is crucial that network designers and developers conduct field tests and device performance assessment before designing and implementing the WSN for application in a real field setting.


2021 ◽  
Vol 54 (2) ◽  
pp. 1-42
Author(s):  
Abdullah Qasem ◽  
Paria Shirani ◽  
Mourad Debbabi ◽  
Lingyu Wang ◽  
Bernard Lebel ◽  
...  

In the era of the internet of things (IoT), software-enabled inter-connected devices are of paramount importance. The embedded systems are very frequently used in both security and privacy-sensitive applications. However, the underlying software (a.k.a. firmware) very often suffers from a wide range of security vulnerabilities, mainly due to their outdated systems or reusing existing vulnerable libraries; which is evident by the surprising rise in the number of attacks against embedded systems. Therefore, to protect those embedded systems, detecting the presence of vulnerabilities in the large pool of embedded devices and their firmware plays a vital role. To this end, there exist several approaches to identify and trigger potential vulnerabilities within deployed embedded systems firmware. In this survey, we provide a comprehensive review of the state-of-the-art proposals, which detect vulnerabilities in embedded systems and firmware images by employing various analysis techniques, including static analysis, dynamic analysis, symbolic execution, and hybrid approaches. Furthermore, we perform both quantitative and qualitative comparisons among the surveyed approaches. Moreover, we devise taxonomies based on the applications of those approaches, the features used in the literature, and the type of the analysis. Finally, we identify the unresolved challenges and discuss possible future directions in this field of research.


Sign in / Sign up

Export Citation Format

Share Document