Skip to main content

2016 | OriginalPaper | Buchkapitel

Signal Processing Techniques for Energy Efficiency, Security, and Reliability in the IoT Domain

verfasst von : Alexandros Fragkiadakis, Elias Tragos, Antonis Makrogiannakis, Stefanos Papadakis, Pavlos Charalampidis, Manolis Surligas

Erschienen in: Internet of Things (IoT) in 5G Mobile Technologies

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The next generation of communication networks, known as 5G technologies, is envisioned to address several major technical challenges like increased data rates, efficient spectral use, higher capacity, etc. One of the core pillars of the 5G technologies is the Internet of Things (IoT) use-case. This employs hundreds or even thousands of smart objects serving numerous applications (e.g. environmental monitoring, smart homes, smart traffic management, etc.). Typical IoT applications become feasible through the use of large-scale Wireless Sensor Networks deployed using a number of miniature devices called as sensors or motes. In this chapter, we demonstrate how two popular signal processing techniques, namely Compressive Sensing and Matrix Completion can be used to make feasible energy efficiency, lightweight encryption, and packet loss mitigation. Furthermore, we present an IoT platform based on a Software Defined Radio that provides multiple channel support for both IEEE 802.11 and IEEE 802.15.4 standards.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat IEEE 802.11 Working Group and others, IEEE Standard for Information technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11-2007 (Revision of IEEE Std 802.11-1999), p. C1 (2009) IEEE 802.11 Working Group and others, IEEE Standard for Information technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11-2007 (Revision of IEEE Std 802.11-1999), p. C1 (2009)
2.
Zurück zum Zitat Siris, V., Stamatakis, G., Tragos, E.: A simple end-to-end throughput model for 802.11 multi-radio multi-rate wireless mesh networks. IEEE Commun. Lett. 635–637 (2011) Siris, V., Stamatakis, G., Tragos, E.: A simple end-to-end throughput model for 802.11 multi-radio multi-rate wireless mesh networks. IEEE Commun. Lett. 635–637 (2011)
3.
Zurück zum Zitat Chaari, L., Kamoun, L.: Performance analysis of ieee 802.15.4/zigbee standard under real time constraints. Int. J. Comput. Netw. Commun. 3, 235–251 (2011) Chaari, L., Kamoun, L.: Performance analysis of ieee 802.15.4/zigbee standard under real time constraints. Int. J. Comput. Netw. Commun. 3, 235–251 (2011)
4.
Zurück zum Zitat Candes, E., Wakin, M.: An introduction to compressive sampling. IEEE Signal Process. Mag. 25(2), 21–30 (2008)CrossRef Candes, E., Wakin, M.: An introduction to compressive sampling. IEEE Signal Process. Mag. 25(2), 21–30 (2008)CrossRef
5.
Zurück zum Zitat Tropp, J., Gilbert, A.: Signal recovery from random measurements via orthogonal matching pursuit. IEEE Trans. Inf. Theory 53, 4655–4666 (2007)MathSciNetCrossRefMATH Tropp, J., Gilbert, A.: Signal recovery from random measurements via orthogonal matching pursuit. IEEE Trans. Inf. Theory 53, 4655–4666 (2007)MathSciNetCrossRefMATH
6.
Zurück zum Zitat Candes, E., Plan, Y.: Matrix completion with noise. Proc. IEEE 98(6), 925–936 (2010)CrossRef Candes, E., Plan, Y.: Matrix completion with noise. Proc. IEEE 98(6), 925–936 (2010)CrossRef
8.
Zurück zum Zitat Eisenberg, M.: Hill ciphers and modular linear algebra. University of Massachusetts, Mimeographed notes (1998) Eisenberg, M.: Hill ciphers and modular linear algebra. University of Massachusetts, Mimeographed notes (1998)
9.
Zurück zum Zitat Rachlin, Y., Baron, D.: The secrecy of compressed sensing measurements. In: Proceedings of Allerton Conference on Communication, Control, and Computing, pp. 813–817 (2008) Rachlin, Y., Baron, D.: The secrecy of compressed sensing measurements. In: Proceedings of Allerton Conference on Communication, Control, and Computing, pp. 813–817 (2008)
10.
Zurück zum Zitat Orsdemir, A., Altun, H., Sharma, G., Bocko, M.: On the security and robustness of encryption via compressed sensing. In: Proceedings of MILCOM, pp. 1–7 (2008) Orsdemir, A., Altun, H., Sharma, G., Bocko, M.: On the security and robustness of encryption via compressed sensing. In: Proceedings of MILCOM, pp. 1–7 (2008)
12.
Zurück zum Zitat Fragkiadakis, A., Tragos, E., Traganitis, A.: Lightweight and secure encryption using channel measurements. In: Proceedings of Vitae, pp. 1–5 (2014) Fragkiadakis, A., Tragos, E., Traganitis, A.: Lightweight and secure encryption using channel measurements. In: Proceedings of Vitae, pp. 1–5 (2014)
13.
Zurück zum Zitat Premnath, S., Jana, S., Croft, J., Gowda, P., Clark, M., Kasera, S., Patwari, N., Krishnamurthy, S.: Secret key extraction from wireless signal strength in real environments. IEEE Trans. Mob. Comput. 12(5), 917–930 (2013)CrossRef Premnath, S., Jana, S., Croft, J., Gowda, P., Clark, M., Kasera, S., Patwari, N., Krishnamurthy, S.: Secret key extraction from wireless signal strength in real environments. IEEE Trans. Mob. Comput. 12(5), 917–930 (2013)CrossRef
14.
Zurück zum Zitat Jakes, W.: Microwave Mobile Communications. Wiley (1974) Jakes, W.: Microwave Mobile Communications. Wiley (1974)
15.
Zurück zum Zitat Ye, C., Reznik, A., Shah, Y.: Extracting secrecy from jointly gaussian random variables. In: Proceedings of ISIT, pp. 2593–2597 (2006) Ye, C., Reznik, A., Shah, Y.: Extracting secrecy from jointly gaussian random variables. In: Proceedings of ISIT, pp. 2593–2597 (2006)
16.
Zurück zum Zitat Aumassony, J., Henzenz, L., Plasencia, W.M.M.: Quark: a lightweight hash. J. Cryptol. 26(2), 313–339 (2013)MathSciNetCrossRef Aumassony, J., Henzenz, L., Plasencia, W.M.M.: Quark: a lightweight hash. J. Cryptol. 26(2), 313–339 (2013)MathSciNetCrossRef
17.
Zurück zum Zitat Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)MathSciNetCrossRefMATH Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)MathSciNetCrossRefMATH
19.
Zurück zum Zitat Tragos, E., Fragkiadakis, A., Askoxylakis, I., Siris, V.: The impact of interference on the performance of a multi-path metropolitan wireless mesh network. In: Proceedings of ISCC, pp. 199–204 (2011) Tragos, E., Fragkiadakis, A., Askoxylakis, I., Siris, V.: The impact of interference on the performance of a multi-path metropolitan wireless mesh network. In: Proceedings of ISCC, pp. 199–204 (2011)
21.
Zurück zum Zitat Osterlind, F., Dunkels, A., Eriksson, J., Finne, N., Voigt, T.: Cross-level sensor network simulation with cooja. In: Proceedings of 31st IEEE Conference on Local Computer Networks, pp. 641–648 (2006) Osterlind, F., Dunkels, A., Eriksson, J., Finne, N., Voigt, T.: Cross-level sensor network simulation with cooja. In: Proceedings of 31st IEEE Conference on Local Computer Networks, pp. 641–648 (2006)
22.
Zurück zum Zitat Cai, J., Candes, E., Shen, Z.: A singular value thresholding algorithm for matrix completion. SIAM J. Optim. 20, 1956–1982 (2010)MathSciNetCrossRefMATH Cai, J., Candes, E., Shen, Z.: A singular value thresholding algorithm for matrix completion. SIAM J. Optim. 20, 1956–1982 (2010)MathSciNetCrossRefMATH
23.
Zurück zum Zitat Malioutov, D.M., Sanghavi, S.R., Willsky, A.S.: Sequential compressed sensing. IEEE J. Sel. Top. Sign. Proces. 4(2), 435–444 (2010)CrossRef Malioutov, D.M., Sanghavi, S.R., Willsky, A.S.: Sequential compressed sensing. IEEE J. Sel. Top. Sign. Proces. 4(2), 435–444 (2010)CrossRef
24.
Zurück zum Zitat Boufounos, P., Duarte, M.F., Baraniuk, R.G.: Sparse signal reconstruction from noisy compressive measurements using cross validation. In: IEEE/SP 14th Workshop on Statistical Signal Processing SSP’07, pp. 299–303. IEEE (2007) Boufounos, P., Duarte, M.F., Baraniuk, R.G.: Sparse signal reconstruction from noisy compressive measurements using cross validation. In: IEEE/SP 14th Workshop on Statistical Signal Processing SSP’07, pp. 299–303. IEEE (2007)
25.
Zurück zum Zitat Chen, W., Wassell, I.: Energy efficient signal acquisition via compressive sensing in wireless sensor networks. In: Proceedings of ISWPC (2011) Chen, W., Wassell, I.: Energy efficient signal acquisition via compressive sensing in wireless sensor networks. In: Proceedings of ISWPC (2011)
26.
Zurück zum Zitat Wang, J., Tang, S., Yin, B., Li, X.: Data gathering in wireless sensor networks through intelligent compressive sensing. In: Proceedings of Infocom, pp. 603–611 (2012) Wang, J., Tang, S., Yin, B., Li, X.: Data gathering in wireless sensor networks through intelligent compressive sensing. In: Proceedings of Infocom, pp. 603–611 (2012)
27.
Zurück zum Zitat Shen, Y., Hu, W., Rana, R., Chou, C.: Non-uniform compressive sensing in wireless sensor networks: feasibility and application. In: Proceedings of ISSNIP, pp. 271–276 (2011) Shen, Y., Hu, W., Rana, R., Chou, C.: Non-uniform compressive sensing in wireless sensor networks: feasibility and application. In: Proceedings of ISSNIP, pp. 271–276 (2011)
28.
Zurück zum Zitat Fragkiadakis, A., Charalampidis, P., Papadakis, S., Tragos, E.: Experiences with deploying compressive sensing and matrix completion techniques in iot devices. In: Proceedings of CAMAD, pp. 213–217 (2014) Fragkiadakis, A., Charalampidis, P., Papadakis, S., Tragos, E.: Experiences with deploying compressive sensing and matrix completion techniques in iot devices. In: Proceedings of CAMAD, pp. 213–217 (2014)
29.
Zurück zum Zitat Fragkiadakis, A., Nikitaki, S., Tsakalides, P.: Physical-layer intrusion detection for wireless networks using compressed sensing. In: Proceedings of WiMob, pp. 845–852 (2012) Fragkiadakis, A., Nikitaki, S., Tsakalides, P.: Physical-layer intrusion detection for wireless networks using compressed sensing. In: Proceedings of WiMob, pp. 845–852 (2012)
30.
Zurück zum Zitat Do, T., Gan, L., Nguyen, N., Tran, T.: Fast and efficient compressive sensing using structurally random matrices. IEEE Trans. Signal Process. 60(1), 139–154 (2012) Do, T., Gan, L., Nguyen, N., Tran, T.: Fast and efficient compressive sensing using structurally random matrices. IEEE Trans. Signal Process. 60(1), 139–154 (2012)
31.
Zurück zum Zitat Donoho, D., Tanner, J.: Precise undersampling theorems. Proceedings of the IEEE 98(6), 913–924 (2010) Donoho, D., Tanner, J.: Precise undersampling theorems. Proceedings of the IEEE 98(6), 913–924 (2010)
32.
34.
Zurück zum Zitat Yeo, E., Augsburger, S., Davis, W., Nikolic, B.: A 500-mb/s soft-output viterbi decoder. IEEE J. Solid-State Circuits 38, 1234–1241 (2003)CrossRef Yeo, E., Augsburger, S., Davis, W., Nikolic, B.: A 500-mb/s soft-output viterbi decoder. IEEE J. Solid-State Circuits 38, 1234–1241 (2003)CrossRef
35.
Zurück zum Zitat Schmid, T.: GNU Radio 802.15.4 En- and Decoding (2006) Schmid, T.: GNU Radio 802.15.4 En- and Decoding (2006)
38.
Zurück zum Zitat Tragos, E., Angelakis, V.: Cognitive radio inspired m2m communications. In: Proceedings of WPMC, pp. 1–5 (2013) Tragos, E., Angelakis, V.: Cognitive radio inspired m2m communications. In: Proceedings of WPMC, pp. 1–5 (2013)
Metadaten
Titel
Signal Processing Techniques for Energy Efficiency, Security, and Reliability in the IoT Domain
verfasst von
Alexandros Fragkiadakis
Elias Tragos
Antonis Makrogiannakis
Stefanos Papadakis
Pavlos Charalampidis
Manolis Surligas
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-30913-2_18

Neuer Inhalt