power adaptive
Recently Published Documents


TOTAL DOCUMENTS

164
(FIVE YEARS 24)

H-INDEX

13
(FIVE YEARS 2)

Electronics ◽  
2021 ◽  
Vol 10 (16) ◽  
pp. 1989
Author(s):  
Maha Aboelmaged ◽  
Ali Shisha ◽  
Mohamed A. Abd El Ghany

IoT technology is evolving at a quick pace and is becoming an important part of everyday life. Consequently, IoT systems hold large amounts of data related to the user of the system that is vulnerable to security breaches. Thus, data collected by IoT systems need to be secured efficiently without affecting the IoT systems’ performance and without compromising security as well. In this paper, a high-performance dynamic security system is introduced. The system makes use of the ZedBoard’s dynamic partial reconfiguration capability to shift between three distinct cipher algorithms: AEGIS, ASCON, and DEOXYS-II. The switching between the three algorithms is performed using two different techniques: the algorithm hopping technique or the power adaptive technique. The choice of which technique to be used is dependent on whether the system needs to be focused on performance or power saving. The ciphers used are the CAESAR competition finalists that achieved the greatest results in each of the three competition categories, where each cipher algorithm has its own set of significant characteristics. The proposed design seeks to reduce the FPGA reconfiguration time by the application of LZ4 (Lempel-Ziv4) compression and decompression techniques on the ciphers’ bitstream files. The reconfiguration time decreased by a minimum of 38% in comparison to the state-of-the-art design, while the resource utilization increased by approximately 2%.


2021 ◽  
Vol 231 ◽  
pp. 113799
Author(s):  
Chenyu Liu ◽  
Xuemin Zhang ◽  
Shengwei Mei ◽  
Feng Liu

2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Ling-Ao Zhou

With the rapid development and maturity of unconnected communication technology, effector technology, embedded computing technology, and distributed information processing technology, as well as the rapid advancement of digital processing and computing capabilities, unconnected effector Internet has received more and more attention. It is a new type of self-organizing unconnected multihop Internet. With the development and progress of technology and society, the development of unconnected effector Internet is also advancing by leaps and bounds, and it has a wide range of applications in many fields such as military, civil, environmental, medical, and industrial. At present, the research on unconnected effector Internet mainly focuses on the communication protocol, but there is almost no research on input review of unconnected effector Internet. Due to the limited energy of the effector and the limitation of the transmission signal bandwidth, the use of limited resources for input review research in effector Internet is of great significance to the development of unconnected effector Internet. Therefore, this paper studies the input review of unconnected effector Internet based on the L-A model on the on-chip embedded tune system. Because the classic low-power adaptive cluster layering protocol (LEACH) has the problems of unbalanced energy consumption and short node life cycle, this paper uses the embedded tune technology based on the L-A model and analyzes the remaining energy and location of the unconnected effector Internet node. Parameters are tested and studied. Through the research on the input review of unconnected effector Internet, the simulation results obtained show that the research in this paper is feasible and reasonable.


Sign in / Sign up

Export Citation Format

Share Document