This paper considers the single source shortest path (SSSP) problem, which is the key for many applications such as navigation, mapping, routing, and social networking. Existing SSSP algorithms are designed mostly for shared-memory systems. Nevertheless, with the prevalence of diverse smart devices like drones, there is a growing interest in deploying SSSP algorithms over distributed computing systems so that they can run efficiently onboard of smart devices via Mobile Ad Hoc Computing or at the network edges via Mobile Edge Computing. In this paper, we introduce a communication-efficient ∆-stepping algorithm for distributed computing systems. The proposed algorithm is featured by 1) a message coordination architecture for reducing message exchanges between workers, 2) a pruning technique for reducing redundant computations, and 3) an aggregation technique for further reducing message exchanges when communication delay is significant. Theoretical analyses and experimental studies on real-world graph datasets demonstrate the promising performance of proposed algorithm.
more »
« less
Leveraging RF Power for Intelligent Tag Networks
A novel framework and related methodologies are described to leverage RF power for building intelligent and battery-free devices with communication and computation capabilities. These passive devices are envisioned to make significant impact for the popular vision of smart dust due to extreme low power operation. The communication framework relies on tag-to-tag backscattering with very limited energy resources. The computing framework relies on a novel AC computing methodology that facilitates local data processing with an order of magnitude less power consumption. These enabling technologies, as described in this paper, revitalize the concept of smart dust with significant impact on various application domains such as smart spaces, implantable devices, and environmental/structural monitoring.
more »
« less
- Award ID(s):
- 1646318
- PAR ID:
- 10073298
- Date Published:
- Journal Name:
- Proceedings of the Great Lakes Symposium on VLSI
- Page Range / eLocation ID:
- 329 to 334
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Large scale networks of intelligent sensors that can function without any batteries will have enormous implications in applications that range from smart spaces to structural and environmental monitoring. RF tags present an amenable platform for sensor integration as the backscatter communication offers low energy cost of communication. Current RF tags either use extremely low-power sensors or perform tasks of tag localization and identification based on the strength of the backscatter signal. We present a technique for estimation of amplitude and phase of the tag-to-tag channel that can be performed with very limited computational and energy resources. This enables monitoring of the interactions between tagged objects and activities around tags, as well as assessment of a variety of engineering structures. Experimental results demonstrate high resolution in the amplitude and phase channel measurement at a distances ranging from 22 cm to 1.34 m.more » « less
-
There is a growing interest in wireless and batteryless implants for long-term sensing of organ movements, core pressure, glucose levels, or other biometrics [1]. Most research on such implants has focused on ultrasonic [2] and nearfield inductive [3-4] methods for power and communication, which require direct contact or close proximity (<1-5cm) to the human body. Recently, RF backscatter has emerged as a promising alternative due to its ability to communicate with far-field (> 10cm) wireless devices at ultra-low-power [5]. While multiple proposals have demonstrated far-field RF backscatter in deep tissues, these proposals have been limited to tag identification and could neither perform biometric sensing nor secure the wireless communication links, which is critical for ensuring the confidentiality of the sensed biometrics and for responding to commands only from authorized users [6]. Moreover, such far-field RF implants are susceptible to tissue variations which impact their resonance and hence their efficiency in RF backscatter and energy harvesting.more » « less
-
The fast-growing installation of solar PVs has a significant impact on the operation of distribution systems. Grid-tied solar inverters provide reactive power capability to support the voltage profile in a distribution system. In comparison with traditional inverters, smart inverters have the capability of real time remote control through digital communication interfaces. However, cyberattack has become a major threat with the deployment of Information and Communications Technology (ICT) in a smart grid. The past cyberattack incidents have demonstrated how attackers can sabotage a power grid through digital communication systems. In the worst case, numerous electricity consumers can experience a major and extended power outage. Unfortunately, tracking techniques are not efficient for today’s advanced communication networks. Therefore, a reliable cyber protection system is a necessary defense tool for the power grid. In this paper, a signature-based Intrusion Detection System (IDS) is developed to detect cyber intrusions of a distribution system with a high level penetration of solar energy. To identify cyberattack events, an attack table is constructed based on the Temporal Failure Propagation Graph (TFPG) technique. It includes the information of potential cyberattack patterns in terms of attack types and time sequence of anomaly events. Once the detected anomaly events are matched with any of the predefined attack patterns, it is judged to be a cyberattack. Since the attack patterns are distinguishable from other system failures, it reduces the false positive rate. To study the impact of cyberattacks on solar devices and validate the performance of the proposed IDS, a realistic Cyber-Physical System (CPS) simulation environment available at Virginia Tech (VT) is used to develop an interconnection between the cyber and power system models. The CPS model demonstrates how communication system anomalies can impact the physical system. The results of two example cyberattack test cases are obtained with the IEEE 13 node test feeder system and the power system simulator, DIgSILENT PowerFactory.more » « less
-
Commodity ultra-high-frequency (UHF) RFID authentication systems only provide weak user authentication, as RFID tags can be easily stolen, lost, or cloned by attackers. This paper presents the design and evaluation of SmartRFID, a novel UHF RFID authentication system to promote commodity crypto-less UHF RFID tags for security-sensitive applications. SmartRFID explores extremely popular smart devices and requires a legitimate user to enroll his smart device along with his RFID tag. Besides authenticating the RFID tag as usual, SmartRFID verifies whether the user simultaneously possesses the associated smart device with both feature-based machine learning and deep learning techniques. The user is considered authentic if and only if passing the dual verifications. Comprehensive user experiments on commodity smartwatches and RFID devices confirmed the high security and usability of SmartRFID. In particular, SmartRFID achieves a true acceptance rate of above 97.5% and a false acceptance rate of less than 0.7% based on deep learning. In addition, SmartRFID can achieve an average authentication latency of less than 2.21s, which is comparable to inputting a PIN on a door keypad or smartphone.more » « less
An official website of the United States government

