EMBEDDED SYSTEMS RESEARCH PROJECTS
System-on-Chip capability has presented a very interesting problem in FPGAs. Embedded processors have now been implemented on the Xilinx FPGAs changing the traditional view of the FPGA. An application can now be implemented to exploit the potential performance gains offered by the hardware and yet enjoy the capability of the software based computations. Existing projects have not shown how to exploit these benefits offered by System-on-Chip.

 

 
 
Jamie Lin's project involved porting Linux onto the Xilinx's Virtex-II Pro Development system. With two embedded power PCs, the software based processor (MicroBlaze) we are poised to run a distributed real-time application on the board, grapple with the issues involving task synchronization, testing, debugging and monitoring in a distributed real-time environment. Jamie has also developed several laboratory modules showing step-by-step procedures on building the base system on the board using the handy tools such as embedded development kit (EDK) and ISE
 
 
Kamini Prajapati worked on the aspect of security in sensor networks. It is widely accepted that as sensor networks gain widespread usage and sensitive information is transmitted there is a desperate need to maintain the confidentiality of such information. The limited resources (memory, computing power, sustainable power etc) make it difficult to employ the security mechanisms of standard networked computing systems. Given the ability of the hardware (subthreshold circuits) to dissipate minute amounts of energy it then becomes feasible to maintain the miniaturized form of these sensors while affording improved computational power. We present a key update scheme that enables each sensor node to update its key minimizing the possibilities by intruders to acquire and decode sensor keys. The scheme requires a very small amount of time  to perform the key update allowing the sensor node to perform its  designated functions with minimal burden from the updating procedure. Unlike current approaches that depend on intruding nodes exhausting a node's power source while trying to infiltrate this scheme offers some resilience.