The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The exponentially increasing number of ubiquitous wireless devices connected to the Internet in Internet of Things (IoT) networks highlights the need for a new paradigm of data flow management in such large-scale networks under software defined wireless networking (SDWN). The limited power and computation capability available at IoT devices as well as the centralized management and decision making...
The objective of the PKA encryption scheme is to complement, or replace, existing Public Key Infrastructures (PKI) [1]. In this scheme, the initialization step is based on the secure exchange of addressable cryptographic tables between the communicating parties. These tables are generated either with random numbers, or with arrays of addressable Physical Unclonable Function (PUFs). The subsequent...
The rapidly increasing number of intelligent, cloud-connected things that are embedded in our daily lives raises legitimate concerns about the privacy costs paid for the benefits these technologies provide. In this paper, we argue that this is a false choice, and motivate and describe a technology that enables citizens to effectively and conveniently monitor data collected about them. Our overarching...
We are presenting a method to design reliable physical unclonable functions (PUFs), with silver based conductive-bridge random access memory (CB-RAM) arrays, to protect the internet of things (loT). The arrays that we fabricated in our pilot line, and characterized, operate at extremely low power which is highly desirable for security applications, and to protect cryptographic primitives. The experimental...
We argue that the processor microarchitectures of today's microcontrollers are poorly matched to the computational workloads of IoT edge nodes, where largely independent chains of processes manage a dynamic mixture of periodic and sporadic tasks that must be executed in real time. Hardware support of priorities for some tasks and software support of priorities for others impedes efficient, correct...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.