Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (2)

Search Parameters:
Keywords = unidirectional gateways

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
28 pages, 3011 KB  
Review
Unidirectional Communications in Secure IoT Systems—A Survey
by Lucian Gaina, Cristina Sorina Stangaciu, Daniela Stanescu, Bianca Gusita and Mihai Victor Micea
Sensors 2024, 24(23), 7528; https://doi.org/10.3390/s24237528 - 25 Nov 2024
Cited by 2 | Viewed by 3755
Abstract
The security of Internet of Things (IoT) systems has consistently been a challenge, particularly in the context of critical infrastructure. One particular approach not yet employed in this domain is the unidirectional communication paradigm. This survey presents an analysis of the most prevalent [...] Read more.
The security of Internet of Things (IoT) systems has consistently been a challenge, particularly in the context of critical infrastructure. One particular approach not yet employed in this domain is the unidirectional communication paradigm. This survey presents an analysis of the most prevalent unidirectional communication solutions, namely, data diodes, network pumps, unidirectional gateways, and unidirectional protocols. The objective of the survey is to present an analysis of the unidirectional communication methods that meet the requirements of IoT security. These methods are classified according to their implementation and operational mode. The survey analyzes the unidirectional communication solutions based on their performance, the level of security offered, the cost-effectiveness, and their cost of implementation. Additionally, it includes an analysis of the existing off-the-shelf unidirectional communication implementations found in the industry. Furthermore, it identifies some of the most important current issues and development directions. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

14 pages, 4140 KB  
Article
Research on Secure Debugging Interaction of Sensor Nodes Based on Visible Light Communication
by Yuanchu Yin, Jiefan Qiu, Zhiqiang Li and Mingsheng Cao
Sensors 2021, 21(3), 953; https://doi.org/10.3390/s21030953 - 1 Feb 2021
Cited by 2 | Viewed by 3261
Abstract
When a wireless sensor node’s wireless communication fails after being deployed in an inaccessible area, the lost node cannot be repaired through a debugging interaction that relies on that communication. Visible light communication (VLC) as a supplement of radio wave communication can improve [...] Read more.
When a wireless sensor node’s wireless communication fails after being deployed in an inaccessible area, the lost node cannot be repaired through a debugging interaction that relies on that communication. Visible light communication (VLC) as a supplement of radio wave communication can improve the transmission security at the physical layer due to its unidirectional propagation characteristic. Therefore, we implemented a VLC-based hybrid communication debugging system (HCDS) based on VLC using smartphone and sensor node. For the system’s downlink, the smartphone is taken as the VLC gateway and sends the debugging codes to the sensor node by the flashlight. To improve the transmission efficiency of the downlink, we also propose a new coding method for source coding and channel coding, respectively. For the source coding, we analyze the binary instructions and compress the operands using bitmask techniques. The average compression rate of the binary structure reaches 84.11%. For the channel coding, we optimize dual-header pulse interval (DH-PIM) and propose overlapped DH-PIM (ODH-PIM) by introducing a flashlight half-on state. The flashlight half-on state can improve the representation capability of individual symbols. For the uplink of HCDS, we use the onboard LED of the sensor node to transmit feedback debugging information to the smartphone. At the same time, we design a novel encoding format of DH-PIM to optimize uplink transmission. Experimental results show that the optimized uplink transmission time and BER are reduced by 10.71% and 22%, compared with the original DH-PIM. Full article
(This article belongs to the Collection Intelligent Security Sensors in Cloud Computing)
Show Figures

Figure 1

Back to TopTop