Pub Date : 2023-06-06DOI: 10.1109/MECO58584.2023.10154913
Luca Cuomo, Claudio Scordino, A. Ottaviano, Nils Wistoff, R. Balas, L. Benini, Errico Guidieri, I. M. Savino
The complexity of automotive systems is increasing quickly due to the integration of novel functionalities such as assisted or autonomous driving. However, increasing complexity poses considerable challenges to the automotive supply chain since the continuous addition of new hardware and network cabling is not considered tenable. The availability of modern heterogeneous multi-processor chips represents a unique opportunity to reduce vehicle costs by integrating multiple functionalities into fewer Electronic Control Units (ECUs). In addition, the recent improvements in open-hardware technology allow to further reduce costs by avoiding lock-in solutions. This paper presents a mixed-criticality multi-OS architecture for automotive ECUs based on open hardware and open-source technologies. Safety-critical functionalities are executed by an AUTOSAR OS running on a RISC-V processor, while the Linux OS executes more advanced functionalities on a multi-core ARM CPU. Besides presenting the implemented stack and the communication infrastructure, this paper provides a quantitative gap analysis between an HW/SW optimized version of the RISCV processor and a COTS Arm Cortex-R in terms of real-time features, confirming that RISC-V is a valuable candidate for running AUTOSAR Classic stacks of next-generation automotive MCUs.
由于辅助或自动驾驶等新功能的集成,汽车系统的复杂性正在迅速增加。然而,不断增加的复杂性给汽车供应链带来了相当大的挑战,因为不断增加新的硬件和网络布线被认为是站不住脚的。现代异构多处理器芯片的可用性代表了通过将多种功能集成到更少的电子控制单元(ecu)中来降低车辆成本的独特机会。此外,最近开放硬件技术的改进可以通过避免锁定解决方案来进一步降低成本。提出了一种基于开放硬件和开源技术的汽车ecu混合临界多操作系统架构。安全关键功能由运行在RISC-V处理器上的AUTOSAR操作系统执行,而Linux操作系统在多核ARM CPU上执行更高级的功能。除了介绍实现的堆栈和通信基础设施外,本文还提供了硬件/软件优化版本的RISCV处理器与COTS Arm Cortex-R处理器在实时性方面的定量差距分析,证实了RISC-V是运行AUTOSAR经典堆栈的下一代汽车mcu的有价值的候选者。
{"title":"Towards a RISC-V Open Platform for Next-generation Automotive ECUs","authors":"Luca Cuomo, Claudio Scordino, A. Ottaviano, Nils Wistoff, R. Balas, L. Benini, Errico Guidieri, I. M. Savino","doi":"10.1109/MECO58584.2023.10154913","DOIUrl":"https://doi.org/10.1109/MECO58584.2023.10154913","url":null,"abstract":"The complexity of automotive systems is increasing quickly due to the integration of novel functionalities such as assisted or autonomous driving. However, increasing complexity poses considerable challenges to the automotive supply chain since the continuous addition of new hardware and network cabling is not considered tenable. The availability of modern heterogeneous multi-processor chips represents a unique opportunity to reduce vehicle costs by integrating multiple functionalities into fewer Electronic Control Units (ECUs). In addition, the recent improvements in open-hardware technology allow to further reduce costs by avoiding lock-in solutions. This paper presents a mixed-criticality multi-OS architecture for automotive ECUs based on open hardware and open-source technologies. Safety-critical functionalities are executed by an AUTOSAR OS running on a RISC-V processor, while the Linux OS executes more advanced functionalities on a multi-core ARM CPU. Besides presenting the implemented stack and the communication infrastructure, this paper provides a quantitative gap analysis between an HW/SW optimized version of the RISCV processor and a COTS Arm Cortex-R in terms of real-time features, confirming that RISC-V is a valuable candidate for running AUTOSAR Classic stacks of next-generation automotive MCUs.","PeriodicalId":187825,"journal":{"name":"2023 12th Mediterranean Conference on Embedded Computing (MECO)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123500076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-06DOI: 10.1109/MECO58584.2023.10154926
Avni Rustemi, V. Atanasovski, A. Risteski, B. Popovski
The application of blockchain in educational institutions and in particular those of higher education, is encountering numerous obstacles towards its full application. We see blockchain as a technology applied in a lot of spheres, including business, industry, health, but we see a stagnation of its application in education. In this scientific paper, we will make an overview of the educational platforms that have been created, how many applications they have, what difficulties the authors have encountered and what suggestions they have given in this regard. It is more than necessary that blockchain technology be used in institutions of higher education, since even nowadays, alongside the many sophisticated software that these institutions possess, we still see many misuses that are made either during the evaluation process, grading up to the awarding of diplomas. We will also provide a framework on how we think blockchain technology should be applied in higher education institutions. Very important is the inclusion of blockchain technology in sensitive processes in education, especially in the evaluation of students and the generation of diplomas. At the end, we give our suggestions, how we think to overcome the problems of diploma forgery and how we can contribute in this direction.
{"title":"Analysis of Blockchain Platforms for Generation and Verification of Diplomas","authors":"Avni Rustemi, V. Atanasovski, A. Risteski, B. Popovski","doi":"10.1109/MECO58584.2023.10154926","DOIUrl":"https://doi.org/10.1109/MECO58584.2023.10154926","url":null,"abstract":"The application of blockchain in educational institutions and in particular those of higher education, is encountering numerous obstacles towards its full application. We see blockchain as a technology applied in a lot of spheres, including business, industry, health, but we see a stagnation of its application in education. In this scientific paper, we will make an overview of the educational platforms that have been created, how many applications they have, what difficulties the authors have encountered and what suggestions they have given in this regard. It is more than necessary that blockchain technology be used in institutions of higher education, since even nowadays, alongside the many sophisticated software that these institutions possess, we still see many misuses that are made either during the evaluation process, grading up to the awarding of diplomas. We will also provide a framework on how we think blockchain technology should be applied in higher education institutions. Very important is the inclusion of blockchain technology in sensitive processes in education, especially in the evaluation of students and the generation of diplomas. At the end, we give our suggestions, how we think to overcome the problems of diploma forgery and how we can contribute in this direction.","PeriodicalId":187825,"journal":{"name":"2023 12th Mediterranean Conference on Embedded Computing (MECO)","volume":"331 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113986983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-06DOI: 10.1109/MECO58584.2023.10154943
M. Hagara, Alexander Šatka, O. Ondrácek, R. Stojanovic
Real time edge detection of objects in images implemented in FPGA circuits is often based on gradient calculation using appropriate convolutional masks. The resulting edge map is obtained by thresholding the gradient image. The key issue is determining the threshold value. In practice, Otsu's and Rosin's methods are most often used to determine the threshold value. Using images from three databases, we compared these two methods and the results are presented in our paper.
{"title":"Comparison of Otsu's and Rosin's Methods for Threshold Determination","authors":"M. Hagara, Alexander Šatka, O. Ondrácek, R. Stojanovic","doi":"10.1109/MECO58584.2023.10154943","DOIUrl":"https://doi.org/10.1109/MECO58584.2023.10154943","url":null,"abstract":"Real time edge detection of objects in images implemented in FPGA circuits is often based on gradient calculation using appropriate convolutional masks. The resulting edge map is obtained by thresholding the gradient image. The key issue is determining the threshold value. In practice, Otsu's and Rosin's methods are most often used to determine the threshold value. Using images from three databases, we compared these two methods and the results are presented in our paper.","PeriodicalId":187825,"journal":{"name":"2023 12th Mediterranean Conference on Embedded Computing (MECO)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115714896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-06DOI: 10.1109/MECO58584.2023.10154972
Orges Cico, B. Çiço, Andja Cico
The research in Artificial Intelligence (AI) and its applications across the software engineering (SE) domain has progressed significantly in the last decade, evidenced by an increase in systematic literature reviews. Our study aims to provide an overview of existing systematic reviews within this research area and synthesize the findings related to AI subfields (Machine Learning, Search-based, Evolutionary Computation, Vision, Robotics, Expert Systems, Speech Processing, Natural Language Processing, and Planning) supporting the five main SE processes: requirements, design, development, testing, and maintenance. For our tertiary study, we used the methodology based on Kitchenham's guidelines. We selected 11 reviews published between 2000 and 2021, including results from 513 primary studies. The selected reviews cover the AI subfields across the five main SE processes. Studies have covered Machine Learning, Natural Language Processing, and Evolutionary Computations as AI subfields assisting SE processes. We have found that reviews in AI-assisted software testing are the most common, followed by software maintenance and development. Our study can help researchers identify missing reviews on AI-assisted SE topics to help further consolidate this research area.
{"title":"AI-assisted Software Engineering: a tertiary study","authors":"Orges Cico, B. Çiço, Andja Cico","doi":"10.1109/MECO58584.2023.10154972","DOIUrl":"https://doi.org/10.1109/MECO58584.2023.10154972","url":null,"abstract":"The research in Artificial Intelligence (AI) and its applications across the software engineering (SE) domain has progressed significantly in the last decade, evidenced by an increase in systematic literature reviews. Our study aims to provide an overview of existing systematic reviews within this research area and synthesize the findings related to AI subfields (Machine Learning, Search-based, Evolutionary Computation, Vision, Robotics, Expert Systems, Speech Processing, Natural Language Processing, and Planning) supporting the five main SE processes: requirements, design, development, testing, and maintenance. For our tertiary study, we used the methodology based on Kitchenham's guidelines. We selected 11 reviews published between 2000 and 2021, including results from 513 primary studies. The selected reviews cover the AI subfields across the five main SE processes. Studies have covered Machine Learning, Natural Language Processing, and Evolutionary Computations as AI subfields assisting SE processes. We have found that reviews in AI-assisted software testing are the most common, followed by software maintenance and development. Our study can help researchers identify missing reviews on AI-assisted SE topics to help further consolidate this research area.","PeriodicalId":187825,"journal":{"name":"2023 12th Mediterranean Conference on Embedded Computing (MECO)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123478858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-06DOI: 10.1109/MECO58584.2023.10154997
Lavdim Kurtaj, Vjosa Shatri, Caner Topko
This abstract discusses the integration of virtual and physical worlds in Programmable Logic Controller (PLC) programming using virtual plants with a physical interface. The combination of virtual and physical elements allows for efficient PLC program development and testing in a safe and controlled environment. The physical interface provides a realistic interconnection with the PLC, while the virtual plant allows for easy modification and experimentation, with different levels of detail. This approach not only benefits industry professionals by streamlining PLC development and reducing costs but also holds great potential for educational purposes. It provides students with practical and immersive learning experience in programming and troubleshooting. This provides a more comprehensive understanding of PLC programming and the plants they control. Ultimately, the integration of virtual and physical worlds in PLC programming offers a promising solution to the challenges faced in PLC program development, testing, and education, while also providing practical learning experiences for students.
{"title":"Integrating Virtual and Physical Worlds in PLC Programming with Virtual Plants Featuring a Physical Interface","authors":"Lavdim Kurtaj, Vjosa Shatri, Caner Topko","doi":"10.1109/MECO58584.2023.10154997","DOIUrl":"https://doi.org/10.1109/MECO58584.2023.10154997","url":null,"abstract":"This abstract discusses the integration of virtual and physical worlds in Programmable Logic Controller (PLC) programming using virtual plants with a physical interface. The combination of virtual and physical elements allows for efficient PLC program development and testing in a safe and controlled environment. The physical interface provides a realistic interconnection with the PLC, while the virtual plant allows for easy modification and experimentation, with different levels of detail. This approach not only benefits industry professionals by streamlining PLC development and reducing costs but also holds great potential for educational purposes. It provides students with practical and immersive learning experience in programming and troubleshooting. This provides a more comprehensive understanding of PLC programming and the plants they control. Ultimately, the integration of virtual and physical worlds in PLC programming offers a promising solution to the challenges faced in PLC program development, testing, and education, while also providing practical learning experiences for students.","PeriodicalId":187825,"journal":{"name":"2023 12th Mediterranean Conference on Embedded Computing (MECO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129747988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-06DOI: 10.1109/MECO58584.2023.10154982
Dejan Shishkovski, Damjan Pecioski, M. Anachkova, Hristijan Mickoski, Z. Pandilov
The working body usually called the gripper in manipulators is an essential component of industrial automation systems. They are designed to hold and manipulate objects with precision, speed, and reliability. Robotic applications and the creation of functional organs are both widespread. The working body may be incorporated into the robot's overall design or added to its fundamental framework. The design is determined by the robot's function, the object it must grasp, the task it must complete, and its working environment. Force control is an essential feature of robotic grippers that allows them to handle delicate or fragile objects without causing damage. This paper outlines the many decisions that are made when designing and selecting the robot's gripper. Aspects of the process and environment are covered first. Power, joint adaptability, load capacity, and connections are all included. Following is a section that offers an overview of the various working bodies and their constructive directions. The sensors and elements of the control system are also featured.
{"title":"Design of a force control gripper using Matlab Simulink","authors":"Dejan Shishkovski, Damjan Pecioski, M. Anachkova, Hristijan Mickoski, Z. Pandilov","doi":"10.1109/MECO58584.2023.10154982","DOIUrl":"https://doi.org/10.1109/MECO58584.2023.10154982","url":null,"abstract":"The working body usually called the gripper in manipulators is an essential component of industrial automation systems. They are designed to hold and manipulate objects with precision, speed, and reliability. Robotic applications and the creation of functional organs are both widespread. The working body may be incorporated into the robot's overall design or added to its fundamental framework. The design is determined by the robot's function, the object it must grasp, the task it must complete, and its working environment. Force control is an essential feature of robotic grippers that allows them to handle delicate or fragile objects without causing damage. This paper outlines the many decisions that are made when designing and selecting the robot's gripper. Aspects of the process and environment are covered first. Power, joint adaptability, load capacity, and connections are all included. Following is a section that offers an overview of the various working bodies and their constructive directions. The sensors and elements of the control system are also featured.","PeriodicalId":187825,"journal":{"name":"2023 12th Mediterranean Conference on Embedded Computing (MECO)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128708540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-06DOI: 10.1109/MECO58584.2023.10154917
Rexhep Rada, Erind Bedalli, Sokol Shurdhi, B. Çiço
In the machine learning domain, clustering is a fundamental unsupervised learning operation which aims to partition the instances of a dataset into clusters (i.e, groups, subsets) such that instances within the same cluster are much similar to each other and much different from the other clusters. In the broad spectrum of clustering methods, prototype-based methods characterize each cluster through a prototype (i.e. centroid) and a relocation scheme is employed to iteratively redistribute the instances into the clusters, guided by an objective function. In this paper, several prototype-based methods are brought into focus, including K-means, K-medoids, K-medians, Fuzzy C-means and Kernel K-means. These algorithms are experimentally analyzed on several original benchmark datasets, distorted benchmark datasets and synthetic datasets. The comparative analysis is oriented in two main aspects: accuracy and sensitivity to noise and outliers.
{"title":"A comparative analysis on prototype-based clustering methods","authors":"Rexhep Rada, Erind Bedalli, Sokol Shurdhi, B. Çiço","doi":"10.1109/MECO58584.2023.10154917","DOIUrl":"https://doi.org/10.1109/MECO58584.2023.10154917","url":null,"abstract":"In the machine learning domain, clustering is a fundamental unsupervised learning operation which aims to partition the instances of a dataset into clusters (i.e, groups, subsets) such that instances within the same cluster are much similar to each other and much different from the other clusters. In the broad spectrum of clustering methods, prototype-based methods characterize each cluster through a prototype (i.e. centroid) and a relocation scheme is employed to iteratively redistribute the instances into the clusters, guided by an objective function. In this paper, several prototype-based methods are brought into focus, including K-means, K-medoids, K-medians, Fuzzy C-means and Kernel K-means. These algorithms are experimentally analyzed on several original benchmark datasets, distorted benchmark datasets and synthetic datasets. The comparative analysis is oriented in two main aspects: accuracy and sensitivity to noise and outliers.","PeriodicalId":187825,"journal":{"name":"2023 12th Mediterranean Conference on Embedded Computing (MECO)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127343189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-06DOI: 10.1109/MECO58584.2023.10154983
Sooraj Ravindrakumar, J. Vaishnavi, Jayakrishna Guddeti, Pankaj Moharikar
Infineon BUS Under Stress (iBUS) framework generates test scenarios for stressing various system buses and bridges inside a microcontroller. Randomization is the key approach behind iBUS. The framework is designed to be scalable, platform independent and forward compatible. Buses and Bridges enters into active state when the bus masters try to access the memories for transferring the data. A test scenario generated by iBUS enables all the BUS masters to perform parallel data transfers between various memories of the system in a purely randomized way. This framework ensures that there is no overlap of memories when accessed by different masters and also provides self-checking mechanism to verify data integrity. In this paper, we characterize the flexibility of iBUS as it can design task chains (sequences of memories handled by a master), calculation of randomized payload and assign random data lengths (based on memory type) in a single block transfer. This paper will also provide insight into how randomization will widen the range of the test coverage. As many are the tasks (transfer between a source and destination memory), that many are the possible combinations of bridges accessed inside the test. Framework provides various hooks to debug the failures and could be used in Robustness Validation, Power Cycling, Clock Shmoo and other silicon stress conditions.
Infineon BUS Under Stress (iBUS)框架生成测试场景,用于对微控制器内的各种系统总线和桥接进行压力测试。随机化是iBUS背后的关键方法。该框架被设计为可扩展、平台独立和向前兼容的。当总线主机试图访问存储器以传输数据时,总线和桥进入活动状态。由iBUS生成的测试场景使所有BUS主机能够以完全随机的方式在系统的各种存储器之间执行并行数据传输。该框架确保了不同主机访问时内存不会重叠,并提供了自检机制来验证数据的完整性。在本文中,我们描述了iBUS的灵活性,因为它可以在单个块传输中设计任务链(由主机处理的存储器序列),随机有效载荷的计算和分配随机数据长度(基于存储器类型)。本文还将提供关于随机化如何扩大测试覆盖范围的见解。由于有许多任务(在源内存和目标内存之间进行传输),因此有许多任务是在测试中访问的桥的可能组合。框架提供了各种钩子来调试故障,可用于鲁棒性验证,功率循环,时钟Shmoo和其他硅应力条件。
{"title":"Method to Generate Bus Stress Pattern Using iBUS(Infineon Bus Under Stress) framework","authors":"Sooraj Ravindrakumar, J. Vaishnavi, Jayakrishna Guddeti, Pankaj Moharikar","doi":"10.1109/MECO58584.2023.10154983","DOIUrl":"https://doi.org/10.1109/MECO58584.2023.10154983","url":null,"abstract":"Infineon BUS Under Stress (iBUS) framework generates test scenarios for stressing various system buses and bridges inside a microcontroller. Randomization is the key approach behind iBUS. The framework is designed to be scalable, platform independent and forward compatible. Buses and Bridges enters into active state when the bus masters try to access the memories for transferring the data. A test scenario generated by iBUS enables all the BUS masters to perform parallel data transfers between various memories of the system in a purely randomized way. This framework ensures that there is no overlap of memories when accessed by different masters and also provides self-checking mechanism to verify data integrity. In this paper, we characterize the flexibility of iBUS as it can design task chains (sequences of memories handled by a master), calculation of randomized payload and assign random data lengths (based on memory type) in a single block transfer. This paper will also provide insight into how randomization will widen the range of the test coverage. As many are the tasks (transfer between a source and destination memory), that many are the possible combinations of bridges accessed inside the test. Framework provides various hooks to debug the failures and could be used in Robustness Validation, Power Cycling, Clock Shmoo and other silicon stress conditions.","PeriodicalId":187825,"journal":{"name":"2023 12th Mediterranean Conference on Embedded Computing (MECO)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127630848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-06DOI: 10.1109/MECO58584.2023.10155035
Cinque S. Peggs, Tanner S. Jackson, Ashley N. Tittlebaugh, Taylor G. Olp, Joshua H. Tyler, D. Reising, T. D. Loveless
A total of 30.9 billion Internet of Things (loT) deployments are expected by 2025 with most employing weak or no encryption at all, which raises concerns about loT security. This concern is exacerbated by loT-connected critical infrastructure and the successful exploitation of this security vulnerability. This led researchers to propose a physical layer-based loT security solution coined Specific Emitter Identification (SEI). However, SEI has been shown to be sensitive to temperature changes. This sensitivity is important when considering loT deployments in highly variable temperature environments. The presented approach shows the temperature sensitivity of SEI is mitigated when the classifier is trained using RF-DNA fingerprints drawn from waveforms collected at two temperatures. In fact, SEI performance improves the most when the two temperatures are at or near the extremes of the operating temperature range. Specifically, our work shows that training SEI classifiers using the extremes of the collected temperatures improves overall classification performance across temperature ranges. The work in this paper also shows that emitters operating in a sub-ambient, exothermic state have a more consistent fingerprint than those operating in a high-temperature, endothermic state.
{"title":"Preamble-based RF-DNA Fingerprinting Under Varying Temperatures","authors":"Cinque S. Peggs, Tanner S. Jackson, Ashley N. Tittlebaugh, Taylor G. Olp, Joshua H. Tyler, D. Reising, T. D. Loveless","doi":"10.1109/MECO58584.2023.10155035","DOIUrl":"https://doi.org/10.1109/MECO58584.2023.10155035","url":null,"abstract":"A total of 30.9 billion Internet of Things (loT) deployments are expected by 2025 with most employing weak or no encryption at all, which raises concerns about loT security. This concern is exacerbated by loT-connected critical infrastructure and the successful exploitation of this security vulnerability. This led researchers to propose a physical layer-based loT security solution coined Specific Emitter Identification (SEI). However, SEI has been shown to be sensitive to temperature changes. This sensitivity is important when considering loT deployments in highly variable temperature environments. The presented approach shows the temperature sensitivity of SEI is mitigated when the classifier is trained using RF-DNA fingerprints drawn from waveforms collected at two temperatures. In fact, SEI performance improves the most when the two temperatures are at or near the extremes of the operating temperature range. Specifically, our work shows that training SEI classifiers using the extremes of the collected temperatures improves overall classification performance across temperature ranges. The work in this paper also shows that emitters operating in a sub-ambient, exothermic state have a more consistent fingerprint than those operating in a high-temperature, endothermic state.","PeriodicalId":187825,"journal":{"name":"2023 12th Mediterranean Conference on Embedded Computing (MECO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125508624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-06DOI: 10.1109/MECO58584.2023.10155037
S. Bauk, Lindani Handsome Ntshangase
This article considers blockchain technology (BCT) applications, including maritime ones, along with the impediments in this groundbreaking technology wider adoption across maritime cluster. More precisely, the Interpretive Structural Modeling (ISM) accompanied with Cross-Impact Matrix Multiplication Applied Classification (MICMAC) technique are used for assessing the barriers in BCT deployment in shipping and port management. Considered barriers are identified through previous research studies in the field. Subjectivity inherent to the applied methodology, along with the need for careful selection of the experts involved in the analysis, are highlighted.
{"title":"Maritime Blockchain Constraints' Analysis by ISM and MICMAC Techniques","authors":"S. Bauk, Lindani Handsome Ntshangase","doi":"10.1109/MECO58584.2023.10155037","DOIUrl":"https://doi.org/10.1109/MECO58584.2023.10155037","url":null,"abstract":"This article considers blockchain technology (BCT) applications, including maritime ones, along with the impediments in this groundbreaking technology wider adoption across maritime cluster. More precisely, the Interpretive Structural Modeling (ISM) accompanied with Cross-Impact Matrix Multiplication Applied Classification (MICMAC) technique are used for assessing the barriers in BCT deployment in shipping and port management. Considered barriers are identified through previous research studies in the field. Subjectivity inherent to the applied methodology, along with the need for careful selection of the experts involved in the analysis, are highlighted.","PeriodicalId":187825,"journal":{"name":"2023 12th Mediterranean Conference on Embedded Computing (MECO)","volume":"785 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116131509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}