Enhance Energy-efficiency and Security of IoT using Hardware-oriented Approaches

Abstract

The rapid growth of Internet of things including mobile phones, portable devices, and remote sensor network systems have imposed both conceptually and technically new challenges. Among them, the most demanding requirements for the widespread realization of many IoT visions are security and low power. In terms of security, IoT applications include tasks that are rarely addressed before such as trusted sensing, secure computation and communication, privacy, and data right management. These tasks ask for new and better techniques for the protection of hardware, software, and data.On the other hand, most of the IoT systems suffer from the problem of limited power sources, which in turn require the security on IoT devices to be lightweight. While low energy design is crucial for the successful deployment of resource-constrained IoT devices, their often physically accessible nature, as well as low energy budget restriction, have also contributed to rendering traditional cryptographic approaches insufficient to address all the security concerns.In this dissertation, we present hardware-oriented security designs and synthesis techniques with the aim to reduce the system energy overhead while maintaining the security and reliability. We first demonstrate our work to analyze and enhance the properties of hardware security primitives. We emphasize on physical unclonable functions and use them to enable a wide range of applications, including private/public key communication, authentication, and multi-party communication. We then present a unique system reliability design with the use of non-volatile memory to create a fault-tolerance application specific architecture with almost no timing overhead and low energy overhead. Finally, we demonstrate novel energy reduction and synthesis techniques applied on integrated circuit subsystems of IoT applications. The techniques we have applied and improved include near-threshold computing, dual-supply voltage optimization, and pipelining.

Other Versions

No versions found

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 101,369

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

  • Only published works are available at libraries.

Similar books and articles

OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.

Analytics

Added to PP
2017-06-07

Downloads
10 (#1,477,106)

6 months
2 (#1,691,363)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references