/
Assignment
Assignment
Title: Analysis of cybersecurity in mote-based smart dust networks
Contents:
Useful links:
https://ts2.space/en/smart-dust-and-cybersecurity-challenges-and-solutions-in-a-connected-world/
Very interesting article describing smart dust: Digital Dust → Prof. Kris Pister Parol
https://hackaday.com/2021/10/04/snails-sensors-and-smart-dust-the-michigan-micro-mote/
TO READ
Smart dust, friend or foe?––Replacing identity with configuration trust (2004)
A probability based energy competent cluster based secured ch selection routing EC2SR protocol for smart dust (2021)
References
Introduction
% refer to the intro of " An Autonomous 16 mm3 Solar-Powered Node for Distributed Wireless Sensor Networks"
% use paper " SoC issues for RF smart dust" to introduce smart dust.
% " LAP A Lightweight Authentication Protocol for smart dust wireless sensor networks" 2009 !!!!!!!
% good introduction
% "Smart dust, friend or foe? Replacing identity with configuration trust" 2004
% VERYYYYY IMPORTANT PAPER, BEAUTIFUL INTRO TO SMART DUST SECURITY!!!!!!!!!!!
%~\cite{chivers2004smart}
% " SoC issues for RF smart dust"
% mention smart dust book
%~\cite{ilyas2018smart}
% see all downloaded papers
Background
History
% history refering to~\cite{cook2006soc}
% SoC issues for RF smart dust - copy paste
% if extended use this paper to track the development of motes
% Body Dust: Well Beyond Wearable and Implantable Sensors
% The very first paper reporting the new keywords ``Smart Dust'' was presented to a conference held in 1999~\cite{kahn1999next}, by Joseph Kahn, Randy Katz, and Kristofer Pister, from University of California, Berkeley.
% The authors elaborated about the concept in that early paper and, then, published the year later again in the Journal of Communications and Network~\cite{kahn2000emerging}.
% Indeed, Kristofer Pister, with other co-authors from the same University, clearly
% declared in 2001 the ultimate aim of this research as probing microfabrication technology’s limitations to determine whether an autonomous sensing, computing, and communication system can be packed into a cubic millimeter mote to form the basis of integrated, massively distributed sensor networks~\cite{warneke2001smart}.
% In 2000, the concept was proposed starting by
% a cube in the inch-scale and elaborating on the possibility to
% integrate corner-cube retro-reflectors of 200 $\mu$m only in lateral
% sizes [14]. Retro-reflectors have been proposed with the aim
% to transmit laser signals over distances up to 2 meters with
% a communication-rates up to 1 Kbps [16]. Then, a smaller
% communication system in a single CMOS die with area in
% only 300 by 360 $\mu$m 2 and integrating a corner cube retro-
% reflector assuring data transmission by MEMS optics was
% realized [15]. In particular, cube retro-reflector are usually real-
% ized in MEMS technology with mutually orthogonal reflective
% mirrors, e.g., by flipping and latching different leafs previously
% realized on silicon with diamond micro-chiseling and laser
% machining by also exploiting the moving mask technique [17].
% However, that kind of optical communication systems actually
% required a battery, kind of those usually used that time for
% artificial-hearing devices, which enlarged the entire system’
% sizes up to 73 mm 3 [15]. The promised power budget was
% extremely attractive, around 10 pJ (pico-Joules) per pixel with
% only 100 fJ (fempto-Joules) of optical power, with the promise
% that the total consumption per pixel might be further reduced
% in few years to 10 fJoules per bit [15]. Applications were
% proposed for several fields, starting from the idea that this
% kind of smart dust particles might be freely spread in the envi-
% ronment. Enabling then for data acquisition and transmission
% about geophysical, metrological, and planetary research, for
% both civilian and military applications [14].
Conclusion
% mention how these tools may be used for bad purposes affecing humans
% Privacy vs. Security: Smart Dust and Human Extinction
% https://www.igi-global.com/chapter/privacy-vs-security/164664
%~\cite{walker2017privacy}