Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 11 de 11
Filtrar
Mais filtros

Base de dados
Tipo de documento
Intervalo de ano de publicação
2.
Sensors (Basel) ; 23(16)2023 Aug 15.
Artigo em Inglês | MEDLINE | ID: mdl-37631717

RESUMO

The rapid development of the Internet of Things (IoT) has brought about the processing and storage of sensitive information on resource-constrained devices, which are susceptible to various hardware attacks. Fault injection attacks (FIAs) stand out as one of the most widespread. Particularly, voltage-based FIAs (V-FIAs) have gained popularity due to their non-invasive nature and high effectiveness in inducing faults by pushing the IoT hardware to its operational limits. Improving the security of devices and gaining a comprehensive understanding of their vulnerabilities is of utmost importance. In this study, we present a novel fault injection method and employ it to target an 8-bit AVR microcontroller. We identify the optimal attack parameters by analyzing the detected failures and their trends. A case study is conducted to validate the efficacy of this new method in a more realistic scenario, focusing on a simple authentication method using the determined optimal parameters. This analysis not only demonstrates the feasibility of the V-FIA but also elucidates the primary characteristics of the resulting failures and their propagation in resource-constrained devices. Additionally, we devise a hardware/software countermeasure that can be integrated into any resource-constrained device to thwart such attacks in IoT scenarios.

3.
Sensors (Basel) ; 23(15)2023 08 03.
Artigo em Inglês | MEDLINE | ID: mdl-37571681

RESUMO

The Internet of Things (IoT) is a key technology to interconnect the real and digital worlds, enabling the development of smart cities and services. The timely collection of data is essential for IoT services. In scenarios such as agriculture, industry, transportation, public safety, and health, wireless sensor networks (WSNs) play a fundamental role in fulfilling this task. However, WSNs are commonly deployed in sensitive and remote environments, thus facing the challenge of jamming attacks. Therefore, these networks need to have the ability to detect such attacks and adopt countermeasures to guarantee connectivity and operation. In this work, we propose a novel clustering-based self-healing strategy to overcome jamming attacks, in which we denominate fairness cooperation with power allocation (FCPA). The proposed strategy, aware of the presence of the jammer, clusters the network and designates a cluster head that acts as a sink node to collect information from its cluster. Then, the most convenient routes to overcome the jamming are identified and the transmit power is adjusted to the minimum value required to guarantee the reliability of each link. Finally, through the weighted use of the relays, the lifetime of each subnetwork is extended. To show the impact of each capability of FCPA, we compare it with multiple benchmarks that only partially possess these capabilities. In the proposal evaluation, we consider a WSN composed of 64 static nodes distributed in a square area. Meanwhile, to assess the impact of the jamming attack, we consider seven different locations of the attacker. All experiments started with each node's battery full and stopped after one of these batteries was depleted. In these scenarios, FCPA outperforms all other strategies by more than 50% of the information transmitted, due to the efficient use of relay power, through the weighted balance of cooperative routes. On average, FCPA permits 967,961 kb of information transmitted and 63% of residual energy, as energy efficiency, from all the analyzed scenarios. Additionally, the proposed clustering-based self-healing strategy adapts to the change of jammer location, outperforming the rest of the strategies in terms of information transmitted and energy efficiency in all evaluated scenarios.

4.
Sensors (Basel) ; 23(17)2023 Aug 30.
Artigo em Inglês | MEDLINE | ID: mdl-37688001

RESUMO

The expectation for communication systems beyond 5G/6G is to provide high reliability, high throughput, low latency, and high energy efficiency services. The integration between systems based on radio frequency (RF) and visible light communication (VLC) promises the design of hybrid systems capable of addressing and largely satisfying these requirements. Hybrid network design enables complementary cooperation without interference between the two technologies, thereby increasing the overall system data rate, improving load balancing, and reducing non-coverage areas. VLC/RF hybrid networks can offer reliable and efficient communication solutions for Internet of Things (IoT) applications such as smart lighting, location-based services, home automation, smart healthcare, and industrial IoT. Therefore, hybrid VLC/RF networks are key technologies for next-generation communication systems. In this paper, a comprehensive state-of-the-art study of hybrid VLC/RF networks is carried out, divided into four areas. First, indoor scenarios are studied considering lighting requirements, hybrid channel models, load balancing, resource allocation, and hybrid network topologies. Second, the characteristics and implementation of these hybrid networks in outdoor scenarios with adverse conditions are analyzed. Third, we address the main applications of hybrid VLC/RF networks in technological, economic, and socio-environmental domains. Finally, we outline the main challenges and future research lines of hybrid VLC/RF networks.

5.
Sensors (Basel) ; 22(8)2022 Apr 15.
Artigo em Inglês | MEDLINE | ID: mdl-35459025

RESUMO

The design of cooperative advanced driver assistance systems (C-ADAS) involves a holistic and systemic vision that considers the bidirectional interaction among three main elements: the driver, the vehicle, and the surrounding environment. The evolution of these systems reflects this need. In this work, we present a survey of C-ADAS and describe a conceptual architecture that includes the driver, vehicle, and environment and their bidirectional interactions. We address the remote operation of this C-ADAS based on the Internet of vehicles (IoV) paradigm, as well as the involved enabling technologies. We describe the state of the art and the research challenges present in the development of C-ADAS. Finally, to quantify the performance of C-ADAS, we describe the principal evaluation mechanisms and performance metrics employed in these systems.


Assuntos
Acidentes de Trânsito , Condução de Veículo , Equipamentos de Proteção , Inquéritos e Questionários , Tecnologia
6.
Sensors (Basel) ; 21(9)2021 Apr 22.
Artigo em Inglês | MEDLINE | ID: mdl-33922116

RESUMO

The effective deployment of Internet of Things (IoT) applications such as smart cities, smart farming and smart transport systems must ensure the network robustness, scalability and longevity. Therefore, guaranteeing the successful delivery of information and extending the lifetime of the nodes that make up a wireless sensor network (WSN) are two essential aspects for IoT applications. This work evaluates the performance of a cooperative WSN by adopting two multiantenna schemes: antenna selection (AS) and beamforming transmission using the singular value decomposition (SVD) technique. In addition, cooperation is established according to an ON-OFF probability, so that the RF receiving circuits of the relays are activated in a probabilistic way, aiming at reducing the energy consumption of the sensors, extending their useful lifetime. Our main goal is to increase the amount of information effectively transmitted by the network, keeping an outage probability constraint. The results show that, when both techniques are used, there is a significant gain in the amount of information effectively transmitted by the network, with emphasis on the AS scheme at short transmission distances. By increasing the number of antennas, it was found that a lower ON-OFF probability is required, i.e., a trade-off is established between the nodes' hardware complexity and their need for cooperation.

7.
Sensors (Basel) ; 21(21)2021 Oct 26.
Artigo em Inglês | MEDLINE | ID: mdl-34770407

RESUMO

Direct-to-satellite Internet of Things (IoT) solutions have attracted a lot of attention from industry and academia recently, as promising alternatives for large scale coverage of a massive number of IoT devices. In this work, we considered that a cluster of IoT devices was under the coverage of a constellation of low-Earth orbit (LEO) satellites, while slotted Aloha was used as a medium access control technique. Then, we analyzed the throughput and packet loss rate while considering potentially different erasure probabilities at each of the visible satellites within the constellation. We show that different combinations of erasure probabilities at the LEO satellites and the IoT traffic load can lead to considerable differences in the system's performance. Next, we introduce an intelligent traffic load distribution (ITLD) strategy, which, by choosing between a non-uniform allocation and the uniform traffic load distribution, guarantees a high overall system throughput, by allocating more appropriate amounts of traffic load at different positions (i.e., different sets of erasure probabilities) of the LEO constellation with respect to the IoT cluster. Finally, the results show that ITLD, a mechanism with low implementation complexity, allows the system to be much more scalable, intelligently exploiting the potential of the different positions of the satellite constellation.

8.
Sensors (Basel) ; 21(12)2021 Jun 13.
Artigo em Inglês | MEDLINE | ID: mdl-34199300

RESUMO

Jamming attacks in wireless sensor networks (WSNs) scenarios are detrimental to the performance of these networks and affect the security and stability of the service perceived by users. Therefore, the evaluation of the effectiveness of smart environment platforms based on WSNs has to consider the system performance when data collection is executed under jamming attacks. In this work, we propose an experimental testbed to analyze the performance of a WSN using the IEEE 802.15.4 CSMA/CA unslotted mode under jamming attacks in terms of goodput, packet receive rate (PRR), and energy consumption to assess the risk for users and the network in the smart scenario. The experimental results show that constant and reactive jamming strategies severely impact the evaluated performance metrics and the variance' of the received signal strength (RSS) for some signal-to-interference-plus-noise ratio (SINR) ranges. The measurements obtained using the experimental testbed were correlated with analytical models. The results show that in the presence of one interferer, for SINR values higher than 4.5 dB, the PRR is almost 0.99, and the goodput 3.05 Kbps, but the system performance is significantly degraded when the amount of interferers increases. Additionally, the energy efficiency associated with reactive strategies is superior to the constant attack strategy. Finally, based on the evaluated metrics and with the proposed experimental testbed, our findings offer a better understanding of jamming attacks on the sensor devices in real smart scenarios.

9.
Sensors (Basel) ; 21(9)2021 Apr 23.
Artigo em Inglês | MEDLINE | ID: mdl-33922529

RESUMO

The opportunistic exchange of information between vehicles can significantly contribute to reducing the occurrence of accidents and mitigating their damages. However, in urban environments, especially at intersection scenarios, obstacles such as buildings and walls block the line of sight between the transmitter and receiver, reducing the vehicular communication range and thus harming the performance of road safety applications. Furthermore, the sizes of the surrounding vehicles and weather conditions may affect the communication. This makes communications in urban V2V communication scenarios extremely difficult. Since the late notification of vehicles or incidents can lead to the loss of human lives, this paper focuses on improving urban vehicle-to-vehicle (V2V) communications at intersections by using a transmission scheme able of adapting to the surrounding environment. Therefore, we proposed a neuroevolution of augmenting topologies-based adaptive beamforming scheme to control the radiation pattern of an antenna array and thus mitigate the effects generated by shadowing in urban V2V communication at intersection scenarios. This work considered the IEEE 802.11p standard for the physical layer of the vehicular communication link. The results show that our proposal outperformed the isotropic antenna in terms of the communication range and response time, as well as other traditional machine learning approaches, such as genetic algorithms and mutation strategy-based particle swarm optimization.


Assuntos
Comunicação , Aprendizado de Máquina , Humanos
10.
Sensors (Basel) ; 20(21)2020 Oct 27.
Artigo em Inglês | MEDLINE | ID: mdl-33120948

RESUMO

The use of monitoring sensors is increasingly present in the context of precision agriculture. Usually, these sensor nodes (SNs) alternate their states between periods of activation and hibernation to reduce battery usage. When employing unmanned aerial vehicles (UAVs) to collect data from SNs distributed over a large agricultural area, we must synchronize the UAV route with the activation period of each SN. In this article, we address the problem of optimizing the UAV path through all the SNs to reduce its flight time, while also maximizing the SNs' lifetime. Using the concept of timeslots for time base management combined with the idea of flight prohibition list, we propose an efficient algorithm for discovering and reconfiguring the activation time of the SNs. Experimental results were obtained through the development of our own simulator-UAV Simulator. These results demonstrate a considerable reduction in the distance traveled by the UAV and also in its flight time. In addition, the model provides a reduction in transmission time by SNs after reconfiguration, thus ensuring a longer lifetime for the SNs in the monitoring environment, as well as improving the freshness and continuity of the gathered data, which support the decision-making process.

11.
Sensors (Basel) ; 20(2)2020 Jan 09.
Artigo em Inglês | MEDLINE | ID: mdl-31936434

RESUMO

This paper proposes two solutions based on angle diversity receivers (ADRs) to mitigate inter-cell interference (ICI) in underground mining visible light communication (VLC) systems, one of them is a novel approach. A realistic VLC system based on two underground mining scenarios, termed as mining roadway and mine working face, is developed and modeled. A channel model based on the direct component in line-of-sight (LoS) and reflections of non-line-of-sight (NLoS) links is considered, as well as thermal and shot noises. The design and mathematical models of a pyramid distribution and a new hemi-dodecahedral distribution are addressed in detail. The performances of these approaches, accompanied by signal combining schemes, are evaluated with the baseline of a single photo-diode in reception. Results show that the minimum lighting standards established in both scenarios are met. As expected, the root-mean-square delay spread decreases as the distance between the transmitters and receivers increases. Furthermore, the hemi-dodecahedron ADR in conjunction with the maximum ratio combining (MRC) scheme, presents the best performance in the evaluated VLC system, with a maximum user data rate of 250 Mbps in mining roadway and 120 Mbps in mine working face, received energy per bit/noise power of 32 dB and 23 dB, respectively, when the bit error rate corresponds to 10 - 4 , and finally, values of 120 dB in mining roadway and 118 dB in mine working face for signal-to-interference-plus-noise ratio are observed in a cumulative distribution function.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA