Discussion on Secure Standard Network of Sensors Powered by Microbial Fuel Cells

被引:1
作者
da Rocha, Helbert [1 ,2 ]
Caruso, Paolo [3 ]
Pereira, Joao [1 ,2 ]
Serra, Pedro [1 ]
Santo, Antonio Espirito [1 ,2 ]
机构
[1] Univ Beira Interior, Dept Electromech Engn, P-6200001 Covilha, Portugal
[2] Inst Telecomunicacoes, Delegacao Covilha, P-1049001 Lisbon, Portugal
[3] Univ Salerno, Dept Ind Engn, I-84084 Fisciano, Italy
关键词
energy harvesting; low-power security; IEEE 1451 family of standards; LIGHTWEIGHT CRYPTOGRAPHY; ENERGY; OPERATION; MODE;
D O I
10.3390/s23198227
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Everyday tasks use sensors to monitor and provide information about processes in different scenarios, such as monitoring devices in manufacturing or homes. Sensors need to communicate, with or without wires, while providing secure information. Power can be derived from various energy sources, such as batteries, electrical power grids, and energy harvesting. Energy harvesting is a promising way to provide a sustainable and renewable source to power sensors by scavenging and converting energy from ambient energy sources. However, low energy is harvested through these methods. Therefore, it is becoming a challenge to design and deploy wireless sensor networks while ensuring the sensors have enough power to perform their tasks and communicate with each other through careful management and optimization, matching energy supply with demand. For this reason, data cryptography and authentication are needed to protect sensor communication. This paper studies how energy harvested with microbial fuel cells can be employed in algorithms used in data protection during sensor communication.
引用
收藏
页数:26
相关论文
共 82 条
  • [1] A Survey on the Security of Low Power Wide Area Networks: Threats, Challenges, and Potential Solutions
    Adefemi Alimi, Kuburat Oyeranti
    Ouahada, Khmaies
    Abu-Mahfouz, Adnan M.
    Rimer, Suvendi
    [J]. SENSORS, 2020, 20 (20) : 1 - 19
  • [2] [Anonymous], 2007, IEEE STD 14515 2007, pC1
  • [3] [Anonymous], 2007, 145102007 IEEE, P1, DOI [10.1109/IEEESTD.2007.4338161, DOI 10.1109/IEEESTD.2007.4338161]
  • [4] [Anonymous], 2000, IEEE Std 1451.1-1999, P1, DOI DOI 10.1109/IEEESTD.2000.91313
  • [5] Impacts of wastewater treatment plants on benthic macroinvertebrate communities in summer and winter
    Aristone, Chelsea
    Mehdi, Hossein
    Hamilton, Jonathan
    Bowen, Kelly L.
    Currie, Warren J. S.
    Kidd, Karen A.
    Balshine, Sigal
    [J]. SCIENCE OF THE TOTAL ENVIRONMENT, 2022, 820
  • [6] Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications
    Aslan, Bora
    Yavuzer Aslan, Fusun
    Sakalli, M. Tolga
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [7] Bafandehkar M, 2013, INT CONF IT CONVERGE
  • [8] Midori: A Block Cipher for Low Energy
    Banik, Subhadeep
    Bogdanov, Andrey
    Isobe, Takanori
    Shibutani, Kyoji
    Hiwatari, Harunaga
    Akishita, Toru
    Regazzoni, Francesco
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 : 411 - 436
  • [9] Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
  • [10] Borghoff J, 2012, LECT NOTES COMPUT SC, V7658, P208, DOI 10.1007/978-3-642-34961-4_14