• Title/Summary/Keyword: IoT (internet of things)

Search Result 1,916, Processing Time 0.026 seconds

Selecting a Synthesizable RISC-V Processor Core for Low-cost Hardware Devices

  • Gookyi, Dennis Agyemanh Nana;Ryoo, Kwangki
    • Journal of Information Processing Systems
    • /
    • v.15 no.6
    • /
    • pp.1406-1421
    • /
    • 2019
  • The Internet-of-Things (IoT) has been deployed in almost every facet of our day to day activities. This is made possible because sensing and data collection devices have been given computing and communication capabilities. The devices implement System-on-Chips (SoCs) that incorporate a lot of functionalities, yet they are severely constrained in terms of memory capacitance, hardware area, and power consumption. With the increase in the functionalities of sensing devices, there is a need for low-cost synthesizable processors to handle control, interfacing, and error processing. The first step in selecting a synthesizable processor core for low-cost devices is to examine the hardware resource utilization to make sure that it fulfills the requirements of the device. This paper gives an analysis of the hardware resource usage of ten synthesizable processors that implement the Reduced Instruction Set Computer Five (RISC-V) Instruction Set Architecture (ISA). All the ten processors are synthesized using Vivado v2018.02. The maximum frequency, area, and power reports are extracted and a comparison is made to determine which processor is ideal for low-cost hardware devices.

A Study on Pipeline Implementation of LEA Encryption·Decryption Block (LEA 암·복호화 블록 파이프라인 구현 연구)

  • Yoon, Gi Ha;Park, Seong Mo
    • Smart Media Journal
    • /
    • v.6 no.3
    • /
    • pp.9-14
    • /
    • 2017
  • This paper is a study on the hardware implementation of the encryption and decryption block of the lightweight block cipher algorithm LEA which can be used for tiny devices in IoT environment. It accepts all secret keys with 128 bit, 192 bit, and 256 bit sizes and aims at the integrated implementation of encryption and decryption functions. It describes design results of applying pipeline method for performance enhancement. When a decryption function is executed, round keys are used in reverse order of encryption function. An efficient hardware implementation method for minimizing performance degradation are suggested. Considering the number of rounds are 24, 28, or 32 times according to the size of secret keys, pipeline of LEA is implemented so that 4 round function operations are executed in each pipeline stage.

Research Trends and Considerations of Invasion Threat and Countermeasures for Connected Car Security (커넥티드 카 보안을 위한 침해 위협 분석 및 대응방안 연구)

  • Lee, Young Hun;Ryu, Jung Hyun;Kim, Nam Yong;Park, Jong Hyuk
    • Annual Conference of KIPS
    • /
    • 2018.10a
    • /
    • pp.253-256
    • /
    • 2018
  • 최근 4차 산업혁명은 기존에 한정적이던 사물들의 역할을 끝없이 확장시키는 특징을 가진다. 인터넷을 기반으로 인간, 사물, 환경 등 모든 것은 연결이 가능한 Internet of Things(IoT) 시대가 다가오고 있다. 사람과 사물, 사물과 사물 간의 정보를 상호 소통하여 안전기능과 사용자의 편의성을 향상시키고 있으며, ICT의 융복합의 발전에 따라 자동차도 기존과 다르게 IoT 환경에 포함된다. 커넥티드 카는 차량, 인프라, 모바일 디바이스, 주변 환경 간의 통신을 통해 실시간으로 다양한 정보를 자동차를 중심으로 수집할 수 있게 되었으며 이를 기반으로 커넥티드 카 산업이 발전하고 있다. 그러나 이러한 발전 과정 속에서 커넥티드 카의 보안성의 문제는 반드시 해결되어야 한다. 보안성이 확보되지 않는다면, 자동차에서 발생하는 운전자에 대한 악의적인 공격을 통해 일반적인 보안 침해사고 수준을 넘어 사고를 유발시킬 경우 인명과 재산상의 큰 피해를 발생시킬 수 있다. 본 논문에서는 커넥티드 카의 통신구조를 알아보고 취약점 분석과 이에 대한 대응 방안을 제안하여 안전한 커넥티드 카의 활용 방안을 연구한다.

Efficient Implementation of Simeck Family Block Cipher on 8-Bit Processor

  • Park, Taehwan;Seo, Hwajeong;Bae, Bongjin;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.14 no.3
    • /
    • pp.177-183
    • /
    • 2016
  • A lot of Internet of Things devices has resource-restricted environment, so it is difficult to implement the existing block ciphers such as AES, PRESENT. By this reason, there are lightweight block ciphers, such as SIMON, SPECK, and Simeck, support various block/key sizes. These lightweight block ciphers can support the security on the IoT devices. In this paper, we propose efficient implementation methods and performance results for the Simeck family block cipher proposed in CHES 2015 on an 8-bit ATmega128-based STK600 board. The proposed methods can be adapted in the 8-bit microprocessor environment such as Arduino series which are one of famous devices for IoT application. The optimized on-the-fly (OTF) speed is on average 14.42 times faster and the optimized OTF memory is 1.53 times smaller than those obtained in the previous research. The speed-optimized encryption and the memory-optimized encryption are on average 12.98 times faster and 1.3 times smaller than those obtained in the previous studies, respectively.

Network Coding-Based Information Sharing Strategy for Reducing Energy Consumption in IoT Environments (사물인터넷 환경에서 에너지 소모량을 줄이기 위한 네트워크 부호화 기반 정보 공유 방식)

  • Kim, Jung-Hyun;Park, Dabin;Song, Hong-Yeop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.4
    • /
    • pp.433-440
    • /
    • 2016
  • This paper proposes a method of minimizing total energy consumption of IoT environment when communication devices in the network share the information directly. The proposed method reduces total number of transmission for the information sharing by using an effective network coding-based technique which dynamically selects a node and a data packet for each transmission. Simulation results show that the proposed method has better performance than an existing network coding-based method selecting transmission node in fixed order, a network coding-based method selecting transmission node in random order, and a uncoded method selecting transmission node in random order.

Lightweight DTLS Message Authentication Based on a Hash Tree (해시 트리 기반의 경량화된 DTLS 메시지 인증)

  • Lee, Boo-Hyung;Lee, Sung-Bum;Moon, Ji-Yeon;Lee, Jong-Hyouk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1969-1975
    • /
    • 2015
  • The Internet of Things (IoT), in which resource constrained devices communicate with each other, requires a lightweight security protocol. In this paper, we propose a new message authentication scheme using a hash tree for lightweight message authentication in the Datagram Transport Layer Security (DTLS) protocol. The proposed scheme provides lightweight secure operations compared with those of the DTLS protocol. Besides, it provides more suitable performance than the DTLS protocol for an IoT environment, thanks to the reduced use of message authentication code.

Development of NCS-Based Technical Education Program for Analog Signal Processing (아날로그 신호처리를 위한 NCS 기반 기술교육 프로그램 개발)

  • Cho, Choon-Nam
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.33 no.6
    • /
    • pp.510-514
    • /
    • 2020
  • Vocational education needs to be transformed to cultivate talents with diverse fusion competencies, which is in line with the recent changes that have become a part of the complex technological developments in the 4th Industrial Revolution. Therefore, it is very important for college graduates to obtain employment skills as they are required to prepare for careers within the complex environments of future societies. With the transition to the Internet of Things (IoT)-based control in the manufacturing industry, the development of technological education and related training programs is required to cultivate practical talents for students who have acquired not only the information on existing programmable logic controller (PLC)-based technology, but also that on embedded programming technology. Therefore, to develop an NCS-based education program for analog signal processing to ensure that programming can easily be learned for cultivating practical talent, this study summarizes the opinions of field experts, selects the appropriate NCS competency unit, and designs an adequate technology education training program.

3D Segmentation for High-Resolution Image Datasets Using a Commercial Editing Tool in the IoT Environment

  • Kwon, Koojoo;Shin, Byeong-Seok
    • Journal of Information Processing Systems
    • /
    • v.13 no.5
    • /
    • pp.1126-1134
    • /
    • 2017
  • A variety of medical service applications in the field of the Internet of Things (IoT) are being studied. Segmentation is important to identify meaningful regions in images and is also required in 3D images. Previous methods have been based on gray value and shape. The Visible Korean dataset consists of serially sectioned high-resolution color images. Unlike computed tomography or magnetic resonance images, automatic segmentation of color images is difficult because detecting an object's boundaries in colored images is very difficult compared to grayscale images. Therefore, skilled anatomists usually segment color images manually or semi-automatically. We present an out-of-core 3D segmentation method for large-scale image datasets. Our method can segment significant regions in the coronal and sagittal planes, as well as the axial plane, to produce a 3D image. Our system verifies the result interactively with a multi-planar reconstruction view and a 3D view. Our system can be used to train unskilled anatomists and medical students. It is also possible for a skilled anatomist to segment an image remotely since it is difficult to transfer such large amounts of data.

Optimal Implementation of Lightweight Block Cipher PIPO on CUDA GPGPU (CUDA GPGPU 상에서 경량 블록 암호 PIPO의 최적 구현)

  • Kim, Hyun-Jun;Eum, Si-Woo;Seo, Hwa-Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1035-1043
    • /
    • 2022
  • With the spread of the Internet of Things (IoT), cloud computing, and big data, the need for high-speed encryption for applications is emerging. GPU optimization can be used to validate cryptographic analysis results or reduced versions theoretically obtained by the GPU in a reasonable time. In this paper, PIPO lightweight encryption implemented in various environments was implemented on GPU. Optimally implemented considering the brute force attack on PIPO. In particular, the optimization implementation applying the bit slicing technique and the GPU elements were used as much as possible. As a result, the implementation of the proposed method showed a throughput of about 19.5 billion per second in the RTX 3060 environment, achieving a throughput of about 122 times higher than that of the previous study.

Safety Monitoring Sensor for Underground Subsidence Risk Assessment Surrounding Water Pipeline (상수도관로의 주변 지반침하 위험도 평가를 위한 안전감시 센서)

  • Kwak, Pill-Jae;Park, Sang-Hyuk;Choi, Chang-Ho;Lee, Hyun-Dong
    • Journal of Sensor Science and Technology
    • /
    • v.24 no.5
    • /
    • pp.306-310
    • /
    • 2015
  • IoT(Internet of Things) based underground risk assessment system surrounding water pipeline enables an advanced monitoring and prediction for unexpected underground hazards such as abrupt road-side subsidence and urban sinkholes due to a leak in water pipeline. For the development of successful assessment technology, the PSU(Water Pipeline Safety Unit) which detects the leakage and movement of water pipes. Then, the IoT-based underground risk assessment system surrounding water pipeline will be proposed. The system consists of early detection tools for underground events and correspondence services, by analyzing leakage and movement data collected from PSU. These methods must be continuous and reliable, and cover certain block area ranging a few kilometers, for properly applying to regional water supply changes.