With the continuous dimension shrinkage, the communication channels of networks-on-chip (NoCs) are often vulnerable to many logic level manufacturing faults resulting in miscellaneous system-level failures. Correspondingly, their effects on the system performance are widely visible. A new distributed, online, test solution that addresses stuck-at and open faults in NoC channels in view of maintaining system reliability and yield, is presented here. Considering a suitable test scheduling scheme, the test time and associated performance overhead are lowered. The evaluation of the proposed scheme on a 33 mesh NoC details its runtime performance. It is observed that the proposed solution saves up to 125% test time. Further, average packet latency is improved by 31.93% while energy consumption is reduced by 27.88%.
{"title":"Heaping of Sorrow Upon Sorrow","authors":"B. Bhowmik","doi":"10.1109/ISES.2018.00046","DOIUrl":"https://doi.org/10.1109/ISES.2018.00046","url":null,"abstract":"With the continuous dimension shrinkage, the communication channels of networks-on-chip (NoCs) are often vulnerable to many logic level manufacturing faults resulting in miscellaneous system-level failures. Correspondingly, their effects on the system performance are widely visible. A new distributed, online, test solution that addresses stuck-at and open faults in NoC channels in view of maintaining system reliability and yield, is presented here. Considering a suitable test scheduling scheme, the test time and associated performance overhead are lowered. The evaluation of the proposed scheme on a 33 mesh NoC details its runtime performance. It is observed that the proposed solution saves up to 125% test time. Further, average packet latency is improved by 31.93% while energy consumption is reduced by 27.88%.","PeriodicalId":447663,"journal":{"name":"2018 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127183192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Thapliyal, Nathan Ratajczak, O. Wendroth, Carson Labrado
Ever-driven by technological innovation, the Internet of Things (IoT) is continuing its exceptional evolution and growth into the common consumer space. In the wake of these developments, this paper proposes a framework for an IoT home security system that is secure, expandable, and accessible. Congruent with the ideals of the IoT, we are proposing a system utilizing an ultra-low-power wireless sensor network which would interface with a central hub via Bluetooth 4, commonly referred to as Bluetooth Low Energy (BLE), to monitor the home. Additionally, the system would interface with an Amazon Echo to accept user voice commands. The aforementioned central hub would also act as a web server and host an internet accessible configuration page from which users could monitor and customize their system. An internet-connected system would carry the capability to notify the users of system alarms via SMS or email. Finally, this proof of concept is intended to demonstrate expandability into other areas of home automation or building monitoring functions in general.
{"title":"Amazon Echo Enabled IoT Home Security System for Smart Home Environment","authors":"H. Thapliyal, Nathan Ratajczak, O. Wendroth, Carson Labrado","doi":"10.1109/ises.2018.00017","DOIUrl":"https://doi.org/10.1109/ises.2018.00017","url":null,"abstract":"Ever-driven by technological innovation, the Internet of Things (IoT) is continuing its exceptional evolution and growth into the common consumer space. In the wake of these developments, this paper proposes a framework for an IoT home security system that is secure, expandable, and accessible. Congruent with the ideals of the IoT, we are proposing a system utilizing an ultra-low-power wireless sensor network which would interface with a central hub via Bluetooth 4, commonly referred to as Bluetooth Low Energy (BLE), to monitor the home. Additionally, the system would interface with an Amazon Echo to accept user voice commands. The aforementioned central hub would also act as a web server and host an internet accessible configuration page from which users could monitor and customize their system. An internet-connected system would carry the capability to notify the users of system alarms via SMS or email. Finally, this proof of concept is intended to demonstrate expandability into other areas of home automation or building monitoring functions in general.","PeriodicalId":447663,"journal":{"name":"2018 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116797930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The goal in non-intrusive load monitoring (NILM) is to design a system/method which accepts aggregate data of energy consumption measured using smart meters as its input and provide an appliance level breakdown of aggregated energy consumption as its output. For practical usefulness of NILM solution there is an additional mandatory requirement viz. to map its output to appliance name recognized by humans. In this paper we adapt CNN architecture of deep neural nets for non-intrusive appliance identification which is a sub-problem for practically useful NILM. Further energy informatics, NILM and energy disaggregation terms have been heavily used in literature but to the best of our knowledge no concrete distinction between them has been specified. This is first work to synthesize the link between energy informatics, NILM and energy disaggregation. We have proposed NILM as one subject under the research subfield of energy informatics and energy disaggregation as a method for implementing NILM. Further, we also give a representation of method for Energy Disaggregation, which uniquely defines whole method, and is also coherently able to represent ideas of previous work.
{"title":"Non-Intrusive Appliance Identification for Energy Disaggregation of Indian Households–An Use Case for Energy Informatics","authors":"Anirudh Kumar, P. Bhattacharjee","doi":"10.1109/ises.2018.00059","DOIUrl":"https://doi.org/10.1109/ises.2018.00059","url":null,"abstract":"The goal in non-intrusive load monitoring (NILM) is to design a system/method which accepts aggregate data of energy consumption measured using smart meters as its input and provide an appliance level breakdown of aggregated energy consumption as its output. For practical usefulness of NILM solution there is an additional mandatory requirement viz. to map its output to appliance name recognized by humans. In this paper we adapt CNN architecture of deep neural nets for non-intrusive appliance identification which is a sub-problem for practically useful NILM. Further energy informatics, NILM and energy disaggregation terms have been heavily used in literature but to the best of our knowledge no concrete distinction between them has been specified. This is first work to synthesize the link between energy informatics, NILM and energy disaggregation. We have proposed NILM as one subject under the research subfield of energy informatics and energy disaggregation as a method for implementing NILM. Further, we also give a representation of method for Energy Disaggregation, which uniquely defines whole method, and is also coherently able to represent ideas of previous work.","PeriodicalId":447663,"journal":{"name":"2018 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128854420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Copyright notice]","authors":"","doi":"10.1109/ises.2018.00003","DOIUrl":"https://doi.org/10.1109/ises.2018.00003","url":null,"abstract":"","PeriodicalId":447663,"journal":{"name":"2018 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133960791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Title page i]","authors":"","doi":"10.1109/ises.2018.00001","DOIUrl":"https://doi.org/10.1109/ises.2018.00001","url":null,"abstract":"","PeriodicalId":447663,"journal":{"name":"2018 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116617156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Laavanya Rachakonda, P. Sundaravadivel, S. Mohanty, E. Kougianos, M. Ganapathiraju
Psychological stress is a sense of pressure which affects the physiological parameters in a person. In this paper a novel stress detection system, iStress is proposed which monitors stress levels through body temperature, rate of motion and sweat during physical activity. The implementation of the iStress system uses a neural network approach utilizing a Mamdani-type fuzzy logic controller with more than 150 instances as the model. The collected data are sent and stored in the cloud, which can help in real time monitoring of the person's stress level thereby reducing risks to health. This system consumes low energy although operating in real time. The proposed system has an ability to produce results with 97% accuracy, low system complexity and moderate cost.
{"title":"A Smart Sensor in the IoMT for Stress Level Detection","authors":"Laavanya Rachakonda, P. Sundaravadivel, S. Mohanty, E. Kougianos, M. Ganapathiraju","doi":"10.1109/ISES.2018.00039","DOIUrl":"https://doi.org/10.1109/ISES.2018.00039","url":null,"abstract":"Psychological stress is a sense of pressure which affects the physiological parameters in a person. In this paper a novel stress detection system, iStress is proposed which monitors stress levels through body temperature, rate of motion and sweat during physical activity. The implementation of the iStress system uses a neural network approach utilizing a Mamdani-type fuzzy logic controller with more than 150 instances as the model. The collected data are sent and stored in the cloud, which can help in real time monitoring of the person's stress level thereby reducing risks to health. This system consumes low energy although operating in real time. The proposed system has an ability to produce results with 97% accuracy, low system complexity and moderate cost.","PeriodicalId":447663,"journal":{"name":"2018 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123516213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile ad hoc networks (MANETs) are self-configuring, dynamic networks in which nodes are free to move. These nodes are susceptible to various malicious attacks. In this paper, we propose a distributed trust-based security scheme to prevent multiple attacks such as Probe, Denial-of-Service (DoS), Vampire, User-to-Root (U2R) occurring simultaneously. We report above 95% accuracy in data transmission and reception by applying the proposed scheme. The simulation has been carried out using network simulator ns-2 in a AODV routing protocol environment. To the best of the authors' knowledge, this is the first work reporting a distributed trust-based prevention scheme for preventing multiple attacks. We also check the scalability of the technique using variable node densities in the network.
{"title":"Distributed Trust-Based Multiple Attack Prevention for Secure MANETs","authors":"Gurveen Vaseer, Garima Ghai, D. Ghai","doi":"10.1109/ISES.2018.00032","DOIUrl":"https://doi.org/10.1109/ISES.2018.00032","url":null,"abstract":"Mobile ad hoc networks (MANETs) are self-configuring, dynamic networks in which nodes are free to move. These nodes are susceptible to various malicious attacks. In this paper, we propose a distributed trust-based security scheme to prevent multiple attacks such as Probe, Denial-of-Service (DoS), Vampire, User-to-Root (U2R) occurring simultaneously. We report above 95% accuracy in data transmission and reception by applying the proposed scheme. The simulation has been carried out using network simulator ns-2 in a AODV routing protocol environment. To the best of the authors' knowledge, this is the first work reporting a distributed trust-based prevention scheme for preventing multiple attacks. We also check the scalability of the technique using variable node densities in the network.","PeriodicalId":447663,"journal":{"name":"2018 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128264896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rapid advancement of communication technology, secure data transfer has become the primary concern for every communication system. Advanced Encryption Standard (AES) has been proved to be useful and effective for providing high security to the image processing applications. In this paper, Active Fixed Hardware Obfuscation based secure 128-bit AES algorithm is proposed for improving the security aspects of image data transfer. The proposed method adopts the classic framework of Xilinx System Generator (XSG) which uses Vivado 2016.2 and MATLAB 2015b. Hardware Software Co-simulation is done using XSG on Xilinx 7000 SoC FPGA ZedBoard. Extensive simulation results using various test cases demonstrate the effectiveness and robustness of the proposed method. Security analysis results in terms of Histogram analysis, Adjacent Pixel Auto-Correlation Test and Information Entropy Test show that the encryption quality of the proposed method reaches the current state of the arts. Simulation results show that the proposed method offers 1.49% of area overhead with respect to original AES design. The proposed method exhibits throughput of 5.48Gbps.
{"title":"Hardware Software Co-Simulation of Obfuscated 128-Bit AES Algorithm for Image Processing Applications","authors":"Surbhi Chhabra, K. Lata","doi":"10.1109/ISES.2018.00049","DOIUrl":"https://doi.org/10.1109/ISES.2018.00049","url":null,"abstract":"With the rapid advancement of communication technology, secure data transfer has become the primary concern for every communication system. Advanced Encryption Standard (AES) has been proved to be useful and effective for providing high security to the image processing applications. In this paper, Active Fixed Hardware Obfuscation based secure 128-bit AES algorithm is proposed for improving the security aspects of image data transfer. The proposed method adopts the classic framework of Xilinx System Generator (XSG) which uses Vivado 2016.2 and MATLAB 2015b. Hardware Software Co-simulation is done using XSG on Xilinx 7000 SoC FPGA ZedBoard. Extensive simulation results using various test cases demonstrate the effectiveness and robustness of the proposed method. Security analysis results in terms of Histogram analysis, Adjacent Pixel Auto-Correlation Test and Information Entropy Test show that the encryption quality of the proposed method reaches the current state of the arts. Simulation results show that the proposed method offers 1.49% of area overhead with respect to original AES design. The proposed method exhibits throughput of 5.48Gbps.","PeriodicalId":447663,"journal":{"name":"2018 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","volume":" 48","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120832731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Towards designing an on-chip harvesting system design for IoT, an inductor free methodology is proposed. The solar system behavior is analyzed and proper control algorithm for maximum power point tracking (MPPT) is adopted. The control section monitors the computational circuit and recharging of the battery. Capacitor value modulation (CVM) is used for impedance matching. The conversion efficiency of the DC-DC converter is from 87% to 97%. The resulting output is in the range of 3-3.55V.
{"title":"Energy Efficient Ultra Low Power Solar Harvesting System Design with MPPT for IOT Edge Node Devices","authors":"S. K. Ram, S. Sahoo, S. K., Kamalakanta Mahapatra","doi":"10.1109/ISES.2018.00036","DOIUrl":"https://doi.org/10.1109/ISES.2018.00036","url":null,"abstract":"Towards designing an on-chip harvesting system design for IoT, an inductor free methodology is proposed. The solar system behavior is analyzed and proper control algorithm for maximum power point tracking (MPPT) is adopted. The control section monitors the computational circuit and recharging of the battery. Capacitor value modulation (CVM) is used for impedance matching. The conversion efficiency of the DC-DC converter is from 87% to 97%. The resulting output is in the range of 3-3.55V.","PeriodicalId":447663,"journal":{"name":"2018 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122926406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Visible light communications integrated with Internet-of-Things has numerous applications in indoor wireless communications and it requires high data rates and flicker mitigation. Flicker mitigation is an important consideration since light emitting diodes are simultaneously used for illumination and communications. Several run-length limited (RLL) codes have been proposed in the literature for flicker mitigation with trade-offs between code rate, bit error performance, encoding and decoding complexities. However, there are no generalized algorithms for high rate codes generation with low complexity encoding and decoding. Hence, in this paper, we propose generalized algorithm for generating high rate RLL codes with low complexity encoding and decoding. The proposed codes can be used for flicker mitigation conditioned on maximum flickering time period (MFTP). The performance of the proposed codes is compared with existing codes in terms of various metrics like code rate, minimum Hamming distance, peak to average power ratio, run-length, and bit error rate. We show that the proposed codes mitigate flicker conditioned on MFTP and provide high data rates with low complexity encoding and decoding compared to the codes in the literature.
{"title":"Flicker Mitigating High Rate RLL Codes for VLC with Low Complexity Encoding and Decoding","authors":"Uday Thummaluri, Abhinav Kumar, L. Natarajan","doi":"10.1109/ISES.2018.00053","DOIUrl":"https://doi.org/10.1109/ISES.2018.00053","url":null,"abstract":"Visible light communications integrated with Internet-of-Things has numerous applications in indoor wireless communications and it requires high data rates and flicker mitigation. Flicker mitigation is an important consideration since light emitting diodes are simultaneously used for illumination and communications. Several run-length limited (RLL) codes have been proposed in the literature for flicker mitigation with trade-offs between code rate, bit error performance, encoding and decoding complexities. However, there are no generalized algorithms for high rate codes generation with low complexity encoding and decoding. Hence, in this paper, we propose generalized algorithm for generating high rate RLL codes with low complexity encoding and decoding. The proposed codes can be used for flicker mitigation conditioned on maximum flickering time period (MFTP). The performance of the proposed codes is compared with existing codes in terms of various metrics like code rate, minimum Hamming distance, peak to average power ratio, run-length, and bit error rate. We show that the proposed codes mitigate flicker conditioned on MFTP and provide high data rates with low complexity encoding and decoding compared to the codes in the literature.","PeriodicalId":447663,"journal":{"name":"2018 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124443505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}