Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. The advantage is that PUFs have the potential to ...provide fundamentally higher security than traditional cryptographic methods by preventing the cloning of devices and the extraction of secret keys. Most PUF designs focus on exploiting process variations in Complementary Metal Oxide Semiconductor (CMOS) technology. In recent years, progress in nanoelectronic devices such as memristors has demonstrated the prevalence of process variations in scaling electronics down to the nano region. In this paper, we exploit the extremely large information density available in nanocrossbar architectures and the significant resistance variations of memristors to develop an on-chip memristive device based strong PUF (mrSPUF). Our novel architecture demonstrates desirable characteristics of PUFs, including uniqueness, reliability, and large number of challenge-response pairs (CRPs) and desirable characteristics of strong PUFs. More significantly, in contrast to most existing PUFs, our PUF can act as a reconfigurable PUF (rPUF) without additional hardware and is of benefit to applications needing revocation or update of secure key information.
Full text
Available for:
IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
Falls in hospitals are common, therefore strategies to minimize the impact of these events in older patients and needs to be examined. In this pilot study, we investigate a movement monitoring sensor ...system for identifying bed and chair exits using a wireless wearable sensor worn by hospitalized older patients. We developed a movement monitoring sensor system that recognizes bed and chair exits. The system consists of a machine learning based activity classifier and a bed and chair exit recognition process based on an activity score function. Twenty-six patients, aged 71 to 93 years old, hospitalized in the Geriatric Evaluation and Management Unit participated in the supervised trials. They wore over their attire a battery-less, lightweight and wireless sensor and performed scripted activities such as getting off the bed and chair. We investigated the system performance in recognizing bed and chair exits in hospital rooms where RFID antennas and readers were in place. The system's acceptability was measured using two surveys with 0-10 likert scales. The first survey measured the change in user perception of the system before and after a trial; the second survey, conducted only at the end of each trial, measured user acceptance of the system based on a multifactor sensor acceptance model. The performance of the system indicated an overall recall of 81.4%, precision of 66.8% and F-score of 72.4% for joint bed and chair exit recognition. Patients demonstrated improved perception of the system after use with overall score change from 7.8 to 9.0 and high acceptance of the system with score ≥ 6.7 for all acceptance factors. The present pilot study suggests the use of wireless wearable sensors is feasible for detecting bed and chair exits in a hospital environment.
Full text
Available for:
DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
Physical unclonable functions (PUFs) are increasingly used for authentication and identification applications as well as the cryptographic key generation. An important feature of a PUF is the ...reliance on minute random variations in the fabricated hardware to derive a trusted random key. Currently, most PUF designs focus on exploiting process variations intrinsic to the CMOS technology. In recent years, progress in emerging nanoelectronic devices has demonstrated an increase in variation as a consequence of scaling down to the nanoregion. To date, emerging PUFs with nanotechnology have not been fully established, but they are expected to emerge. Initial research in this area aims to provide security primitives for emerging integrated circuits with nanotechnology. In this paper, we review emerging nanotechnology-based PUFs.
Adding sense to the Internet of Things Sánchez López, Tomás; Ranasinghe, Damith C.; Harrison, Mark ...
Personal and ubiquitous computing,
03/2012, Volume:
16, Issue:
3
Journal Article
Peer reviewed
The Internet of Things (IoT) concept is being widely presented as the next revolution toward massively distributed information, where any real-world object can automatically participate in the ...Internet and thus be globally discovered and queried. Despite the consensus on the great potential of the concept and the significant progress in a number of enabling technologies, there is a general lack of an integrated vision on how to realize it. This paper examines the technologies that will be fundamental for realizing the IoT and proposes an architecture that integrates them into a single platform. The architecture introduces the use of the Smart Object framework to encapsulate radio-frequency identification (RFID), sensor technologies, embedded object logic, object ad-hoc networking, and Internet-based information infrastructure. We evaluate the architecture against a number of energy-based performance measures, and also show that it outperforms existing industry standards in metrics such as network throughput, delivery ratio, or routing distance. Finally, we demonstrate the feasibility and flexibility of the architecture by detailing an implementation using Wireless Sensor Networks and Web Services, and describe a prototype for the real-time monitoring of goods flowing through a supply chain.
Full text
Available for:
EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
We consider the challenging problem of tracking multiple objects using a distributed network of sensors. In the practical setting of nodes with limited field of views (FoVs), computing power and ...communication resources, we develop a novel distributed multi-object tracking algorithm . To accomplish this, we first formalise the concept of label consistency, determine a sufficient condition to achieve it and develop a novel label consensus approach that reduces label inconsistency caused by objects' movements from one node's limited FoV to another. Second, we develop a distributed multi-object fusion algorithm that fuses local multi-object state estimates instead of local multi-object densities. This algorithm: i) requires significantly less processing time than multi-object density fusion methods; ii) achieves better tracking accuracy by considering Optimal Sub-Pattern Assignment (OSPA) tracking errors over several scans rather than a single scan; iii) is agnostic to local multi-object tracking techniques, and only requires each node to provide a set of estimated tracks. Thus, it is not necessary to assume that the nodes maintain multi-object densities, and hence the fusion outcomes do not modify local multi-object densities. Numerical experiments demonstrate our proposed solution's real-time computational efficiency and accuracy compared to state-of-the-art solutions in challenging scenarios.
When reconfigured into a cohesive system, a series of existing digital technologies may facilitate disassembly, take back and reuse of structural steel components, thereby improving resource ...efficiency and opening up new business paradigms. The paper examines whether Radio Frequency Identification (RFID) technology coupled with Building Information Modelling (BIM) may enable components and/or assemblies to be tracked and imported into virtual models for new buildings at the design stage. The addition of stress sensors to components, which provides the capability of quantifying the stress properties of steel over its working life, may also support best practice reuse of resources. The potential to improve resource efficiency in many areas of production and consumption, emerging from a novel combination of such technologies, is highlighted using a theoretical case study scenario. In addition, a case analysis of the demolition/deconstruction of a former industrial building is conducted to illustrate potential savings in energy consumption and greenhouse gas emissions (GGE) from reuse when compared with recycling. The paper outlines the reasoning behind the combination of the discussed technologies and alludes to some possible applications and new business models. For example, a company that currently manufactures and 'sells' steel, or a third party, could find new business opportunities by becoming a 'reseller' of reused steel and providing a 'steel service'. This could be facilitated by its ownership of the database that enables it to know the whereabouts of the steel and to be able to warrant its properties and appropriateness for reuse in certain applications.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
Autonomous aerial robots provide new possibilities to study the habitats and behaviors of endangered species through the efficient gathering of location information at temporal and spatial ...granularities not possible with traditional manual survey methods. We present a novel autonomous aerial vehicle system—TrackerBots—to track and localize multiple radio‐tagged animals. The simplicity of measuring the received signal strength indicator (RSSI) values of very high frequency (VHF) radio‐collars commonly used in the field is exploited to realize a low‐cost and lightweight tracking platform suitable for integration with unmanned aerial vehicles (UAVs). Due to uncertainty and the nonlinearity of the system based on RSSI measurements, our tracking and planning approaches integrate a particle filter for tracking and localizing and a partially observable Markov decision process for dynamic path planning. This approach allows autonomous navigation of a UAV in a direction of maximum information gain to locate multiple mobile animals and reduce exploration time and, consequently, conserve on‐board battery power. We also employ the concept of search termination criteria to maximize the number of located animals within power constraints of the aerial system. We validated our real‐time and online approach through both extensive simulations and field experiments with five VHF radio‐tags on a grassland plain.
Full text
Available for:
BFBNIB, FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
A physical unclonable function (PUF), like a fingerprint, exploits manufacturing randomness to endow each physical item with a unique identifier. One primary PUF application is the secure derivation ...of volatile cryptographic keys using a fuzzy extractor (FE) comprising: 1) a secure sketch and 2) an entropy extractor. Although the entropy extractor can be lightweight, the overhead of the secure sketch responsible for correcting naturally noisy PUF responses is usually high. We observe that, in general, response unreliability with respect to an enrolled reference measurement increases with increasing differences between the in-the-field PUF operating condition and the operating condition used in evaluating the enrolled reference response. For the first time, we exploit such an inadvertent but important observation. In contrast to the conventional single reference response enrollment, we propose enrolling multiple reference responses (MRRs) subject to the same challenge but under multiple distinct operating conditions. The critical observation here is that one of the reference operating conditions is likely to be closer to the operating condition of the field deployed PUF, thus resulting in minimizing the expected unreliability when compared to the single reference under the nominal condition. As a consequence, MRR greatly reduces the demand for the expected number of erroneous bits requiring correction and, subsequently, achieves a significant reduction in the error correction overhead. The significant implementation efficiency gains from the proposed MRR method are demonstrated from software implementations of FEs on batteryless resource constraint computational radio frequency identification devices, where realistic PUF data are collected from intrinsic static random access memory PUFs.
Deep neural networks (DNNs), regardless of their impressive performance, are vulnerable to attacks from adversarial inputs and, more recently, Trojans to misguide or hijack the decision of the model. ...We expose the existence of an intriguing class of spatially bounded, physically realizable, adversarial examples- Universal NaTuralistic adversarial paTches-we call TnTs, by exploring the super set of the spatially bounded adversarial example space and the natural input space within generative adversarial networks. Now, an adversary can arm themselves with a patch that is naturalistic, less malicious-looking, physically realizable, highly effective-achieving high attack success rates, and universal. A TnT is universal because any input image captured with a TnT in the scene will: i) misguide a network (untargeted attack); or ii) force the network to make a malicious decision (targeted attack). Interestingly, now, an adversarial patch attacker has the potential to exert a greater level of control-the ability to choose a location independent, natural-looking patch as a trigger in contrast to being constrained to noisy perturbations-an ability is thus far shown to be only possible with Trojan attack methods needing to interfere with the model building processes to embed a backdoor at the risk discovery; but, still realize a patch deployable in the physical world. Through extensive experiments on the large-scale visual classification task, ImageNet with evaluations across its entire validation set of 50,000 images, we demonstrate the realistic threat from TnTs and the robustness of the attack. We show a generalization of the attack to create patches achieving higher attack success rates than existing state-of-the-art methods. Our results show the generalizability of the attack to different visual classification tasks ( CIFAR-10 , GTSRB , PubFig ) and multiple state-of-the-art deep neural networks such as WideResnet50, Inception-V3 and VGG-16.
Autonomous robots for gathering information on objects of interest has numerous real-world applications because of they improve efficiency, performance and safety. Realising autonomy demands online ...planning algorithms to solve sequential decision making problems under uncertainty ; because, objects of interest are often dynamic, object state, such as location is not directly observable and are obtained from noisy measurements. Such planning problems are notoriously difficult due to the combinatorial nature of predicting the future to make optimal decisions. For information theoretic planning algorithms, we develop a computationally efficient and effective approximation for the difficult problem of predicting the likely sensor measurements from uncertain belief states . The approach more accurately predicts information gain from information gathering actions. Our theoretical analysis proves the proposed formulation achieves a lower prediction error than the current efficient-method. We demonstrate improved performance gains in radio-source tracking and localisation problems using extensive simulated and field experiments with a multirotor aerial robot.