scholarly journals Use of Thermistor Temperature Sensors for Cyber-Physical System Security

Sensors ◽  
2019 ◽  
Vol 19 (18) ◽  
pp. 3905 ◽  
Author(s):  
Carson Labrado ◽  
Himanshu Thapliyal ◽  
Stacy Prowell ◽  
Teja Kuruganti

The last few decades have seen a large proliferation in the prevalence of cyber-physical systems. This has been especially highlighted by the explosive growth in the number of Internet of Things (IoT) devices. Unfortunately, the increasing prevalence of these devices has begun to draw the attention of malicious entities which exploit them for their own gain. What makes these devices especially attractive is the various resource constraints present in these devices that make it difficult to add standard security features. Therefore, one intriguing research direction is creating security solutions out of already present components such as sensors. Physically Unclonable Functions (PUFs) are one potential solution that use intrinsic variations of the device manufacturing process for provisioning security. In this work, we propose a novel weak PUF design using thermistor temperature sensors. Our design uses the differences in resistance variation between thermistors in response to temperature change. To generate a PUF that is reliable across a range of temperatures, we use a response-generation algorithm that helps mitigate the effects of temperature variation on the thermistors. We tested the performance of our proposed design across a range of environmental operating conditions. From this we were able to evaluate the reliability of the proposed PUF with respect to variations in temperature and humidity. We also evaluated the PUF’s uniqueness using Monte Carlo simulations.

2021 ◽  
Vol 10 (1) ◽  
pp. 13
Author(s):  
Claudia Campolo ◽  
Giacomo Genovese ◽  
Antonio Iera ◽  
Antonella Molinaro

Several Internet of Things (IoT) applications are booming which rely on advanced artificial intelligence (AI) and, in particular, machine learning (ML) algorithms to assist the users and make decisions on their behalf in a large variety of contexts, such as smart homes, smart cities, smart factories. Although the traditional approach is to deploy such compute-intensive algorithms into the centralized cloud, the recent proliferation of low-cost, AI-powered microcontrollers and consumer devices paves the way for having the intelligence pervasively spread along the cloud-to-things continuum. The take off of such a promising vision may be hurdled by the resource constraints of IoT devices and by the heterogeneity of (mostly proprietary) AI-embedded software and hardware platforms. In this paper, we propose a solution for the AI distributed deployment at the deep edge, which lays its foundation in the IoT virtualization concept. We design a virtualization layer hosted at the network edge that is in charge of the semantic description of AI-embedded IoT devices, and, hence, it can expose as well as augment their cognitive capabilities in order to feed intelligent IoT applications. The proposal has been mainly devised with the twofold aim of (i) relieving the pressure on constrained devices that are solicited by multiple parties interested in accessing their generated data and inference, and (ii) and targeting interoperability among AI-powered platforms. A Proof-of-Concept (PoC) is provided to showcase the viability and advantages of the proposed solution.


2021 ◽  
Vol 1 (2) ◽  
pp. 041-048
Author(s):  
Benson Chinweuba Udeh

This study is on the production of quicklime from Ashaka limestone through calcination process. Effects of temperature, particle size and time on quicklime yield were determined. The experiment was carried out at temperatures of 800, 900, 1000, 1100 and 1200 0C, particle sizes of 80mm, 90mm, 100mm, 300mm and 425mm and times of 0.5hr, 1hr, 2hrs, 3hrs and 4hrs. Analyses of the results showed that quicklime was successfully produced from Ashaka limestone through the calcination process. Quadratic model adequately described the relationship between quicklime yield and calcination factors of temperature, particle size and time. Recorded model F-value of 134.35 implies that the model is significant. The predicted R² of 0.9597 is in reasonable agreement with the adjusted R² of 0.9844; the difference is less than the critical value of 0.2. Optimum yield of 73.48% was obtained at optima operating conditions; temperature of 1000 0C, particle size of 90 µm and time of 3 hrs.


T-Comm ◽  
2020 ◽  
Vol 14 (12) ◽  
pp. 45-50
Author(s):  
Mikhail E. Sukhoparov ◽  
◽  
Ilya S. Lebedev ◽  

The development of IoT concept makes it necessary to search and improve models and methods for analyzing the state of remote autonomous devices. Due to the fact that some devices are located outside the controlled area, it becomes necessary to develop universal models and methods for identifying the state of low-power devices from a computational point of view, using complex approaches to analyzing data coming from various information channels. The article discusses an approach to identifying IoT devices state, based on parallel functioning classifiers that process time series received from elements in various states and modes of operation. The aim of the work is to develop an approach for identifying the state of IoT devices based on time series recorded during the execution of various processes. The proposed solution is based on methods of parallel classification and statistical analysis, requires an initial labeled sample. The use of several classifiers that give an answer "independently" from each other makes it possible to average the error by "collective" voting. The developed approach is tested on a sequence of classifying algorithms, to the input of which the time series obtained experimentally under various operating conditions were fed. Results are presented for a naive Bayesian classifier, decision trees, discriminant analysis, and the k nearest neighbors method. The use of a sequence of classification algorithms operating in parallel allows scaling by adding new classifiers without losing processing speed. The method makes it possible to identify the state of the Internet of Things device with relatively small requirements for computing resources, ease of implementation, and scalability by adding new classifying algorithms.


Author(s):  
O. R. Schmoch ◽  
B. Deblon

The peripheral speeds of the rotors of large heavy-duty gas turbines have reached levels which place extremely high demands on material strength properties. The particular requirements of gas turbine rotors, as a result of the cycle, operating conditions and the ensuing overall concepts, have led different gas turbine manufacturers to produce special structural designs to resolve these problems. In this connection, a report is given here on a gas turbine rotor consisting of separate discs which are held together by a center bolt and mutually centered by radial serrations in a manner permitting expansion and contraction in response to temperature changges. In particular, the experience gained in the manufacture, operation and servicing are discussed.


2019 ◽  
Vol 15 (02) ◽  
pp. 371-402 ◽  
Author(s):  
Pradeep Kumar Hota ◽  
Sumit Mitra ◽  
Israr Qureshi

ABSTRACTSocial enterprises (SEs) primarily aim to create social value, that is, to generate benefits or reduce costs for society, while maintaining financial sustainability. Owing to their unique operating conditions and organizational characteristics, SEs face more severe resource challenges than their commercial counterparts. These challenges are exacerbated for SEs operating in emerging economies with complex social contexts. Overcoming these resource constraints and social challenges is vital for SEs to achieve their mission. Using an inductive multiple case-study approach, we identify a unique bricolage solution for achieving the dual objectives of SEs. Our findings suggest that identifying locally embedded village level entrepreneurs is a bricolage activity that social entrepreneurs leverage in the resource constrained environment of emerging economies, especially for the social enterprises that are active in the villages but were founded by social entrepreneurs who are not from these villages. This article therefore contributes to both social entrepreneurship literature as well as entrepreneurial bricolage literature and has important implications for future research and practice.


1996 ◽  
Vol 32 (1) ◽  
pp. 29-40 ◽  
Author(s):  
P. Q. Craufurd ◽  
A. Qi ◽  
R. J. Summerfield ◽  
R. H. Ellis ◽  
E. H. Roberts

SUMMARYSeventeen photoperiod-sensitive genotypes of cowpea (Vigna unguiculata) were grown in approximately 30 photothermal environments in Nigeria. Photoperiods ranged from 10 to 16 h d−1, mean temperatures from 19° to 30°C and times from sowing to flowering (f) from 32 to 140 d. Rate of progress towards flowering (1/f) was related to mean pre-flowering values of temperature and photoperiod using simple linear rate models comprising one, two or three planes (thermal, photothermal and insensitive). There were no significant differences (p > 0.25) among genotypes in response to temperature within the thermal plane and the common base temperature was estimated to be 7.6°C. Photoperiod-sensitivity varied by a factor of 15 among genotypes, and the critical and ceiling photoperiods varied from 12.2 to 13.4 and from 13.8 to more than 16 h d−1 at a mean temperature of 27°C, respectively. These simple models satisfactorily predicted f in an independent data set (R2 = 0.62) for plants grown in the main cowpea growing seasons at latitudes between 7° and 13°N. The utility of photothermal models and methods to screen for photothermal responses are discussed.


2020 ◽  
Vol 8 (6) ◽  
pp. 5021-5027

Internet of Things (IoT) growing at a rate of exponential numbers in recent years has received extensive attention with BlockChain (BC) technology which provide trust to IoT with its immutable nature, decentralization in computing, resource constraints, security and privacy. The distributed ledger of transactions in BC is path leading technology for addressing Cyber Threats in the form of data theft; it provides secure application architecture which has proven track of record for securing data. IoT devices using BC enabled to communicate between objects, share data, decide based on business criteria and act as a medium to securely transmit information. This work provides lightweight BlockChain with two prominent consensus mechanism PoW – Proof of Work and PoS – Proof of Stake for smart IoT devices. Next, Smart Home Device (SMD) is ensures providing best-in-class Security and Privacy for smart home Appliances. Further provides future advances in the Approach.


Author(s):  
Guangbin Yu ◽  
Mingxin Yu ◽  
Bing Dai

Background: The collection of temperature is very important in life. Thermistor temperature sensors are an important part of the temperature acquisition system. Thermistor temperature sensors can convert the temperature signal into an electrical signal for output. Due to the different application fields and technical requirements, the shape, function and structure of thermistor temperature sensors are very different. Objective: The purpose of this study is to summarize and analyze the advantages and disadvantages of various devices from a large number of documents and patents. Methods: In this paper, the patents and the latest research of thermistor temperature sensors are reviewed. Results: By summarizing the characteristics of a large number of thermistor temperature sensors and analyzing the problems, the development of thermistor temperature sensors are prospected. Conclusion: Thermistor temperature sensors are widely used. Therefore, it is necessary to carry out special structural design and technical research for thermistor temperature sensors in different application fields. At the same time, with the development of technology, intelligent sensors and multi-functional sensors are an inevitable development trend.


Author(s):  
Ishfaq Sultan ◽  
Mohammad Tariq Banday

The spatial ubiquity and the huge number of employed nodes monitoring the surroundings, individuals, and devices makes security a key challenge in IoT. Serious security apprehensions are evolving in terms of data authenticity, integrity, and confidentiality. Consequently, IoT requires security to be assured down to the hardware level, as the authenticity and the integrity need to be guaranteed in terms of the hardware implementation of each IoT node. Physically unclonable functions recreate the keys only while the chip is being powered on, replacing the conventional key storage which requires storing information. Compared to extrinsic key storage, they are able to generate intrinsic keys and are far less susceptible against physical attacks. Physically unclonable functions have drawn considerable attention due to their ability to economically introduce hardware-level security into individual silicon dice. This chapter introduces the notion of physically unclonable functions, their scenarios for hardware security in IoT devices, and their interaction with traditional cryptography.


Sign in / Sign up

Export Citation Format

Share Document