Performance Evaluation of 802.11 IoT Devices for Data Collection in the Forest with Drones

Author(s):  
Caroline Maul de A. Lima ◽  
Eduardo A. da Silva ◽  
Pedro B. Velloso
2021 ◽  
Vol 170 ◽  
pp. 151-163
Author(s):  
Pericle Perazzo ◽  
Francesca Righetti ◽  
Michele La Manna ◽  
Carlo Vallati

2018 ◽  
Vol 7 (2.6) ◽  
pp. 231
Author(s):  
Teyi Yann Cedric Lawson ◽  
Senthilnathan T

Elliptic Curves when compared to other encryptions scheme such as RSA etc., provides an equivalent security, smaller key sizes, less power consumption, faster calculations, less bandwidth used and is more suitable for Internet of Things devices. In addition of encrypting the data, the devices in the network should also be able to authenticate themselves, which can be achieved with the implementation of “Non-Interactive Zero Knowledge protocol” (NIZKP). This protocol involves two parties: The prover and the Verifier. Prover party should prove to the Verifier that they have the knowledge of something, without revealing what is it. In this paper, a study of Schnorr protocol or ∑- protocol over Elliptic Curves is done and the protocol is implemented in Python using the Python Cryptography Toolkit PyCrypto which is a collection of cryptographic modules implementing various algorithms and protocols. Finally, the results were compared with Elliptic Curve Diffie-Hellmann(ECDH) and present a performance evaluation of the protocols on the Raspberry Pi 3B model, a credit-card sized computer used for the development of IoT devices hence the perfect platforms to test the protocol.  


Author(s):  
Hassan B. Hassan ◽  
Qusay I. Sarham

Introduction: With the rapid deployment of embedded databases across a wide range of embedded devices such as mobile devices, Internet of Things (IoT) devices, etc., the amount of data generated by such devices is also growing increasingly. For this reason, the performance is considered as a crucial criterion in the process of selecting the most suitable embedded database management system to be used to store/retrieve data of these devices. Currently, many embedded databases are available to be utilized in this context. Materials and Methods: In this paper, four popular open-source relational embedded databases; namely, H2, HSQLDB, Apache Derby, and SQLite have been compared experimentally with each other to evaluate their operational performance in terms of creating database tables, retrieving data, inserting data, updating data, deleting data. Results and Discussion: The experimental results of this paper have been illustrated in Table 4. Conclusions: The experimental results and analysis showed that HSQLDB outperformed other databases in most evaluation scenarios.


2021 ◽  
Vol 2 (1) ◽  
pp. 88-96
Author(s):  
Sitti Husna Noviana Djou ◽  
Imam Mashudi

The purpose of this study is: 1) to find out and analyze how the implementation of employee performance appraisal at the Bina Mandiri Gorontalo Foundation; 2) to find out what factors are hampering the implementation of employee performance appraisal at the Bina Mandiri Gorontalo Foundation. This research uses a qualitative approach and the type of research used is descriptive qualitative. Data sources used are primary data sources and secondary data sources. Data collection techniques used are observation, interviews, and documentation. Data analysis techniques used: data collection, data reduction, data presentation, and concluding. The result of the research shows that the implementation of employee performance appraisal at the Bina Mandiri Gorontalo Foundation based on 7 (seven) performance evaluation indicators can be said to be not yet fully appropriate. Three categorized indicators are by performance appraisal, namely obedience, honesty, and cooperation. Meanwhile, the indicators of leadership, responsibility, and achievement are not appropriate because in the performance evaluation that indicators still less influential. And, the initiative is categorized as inappropriate because in the performance evaluation it does not become a benchmark in performance appraisal. The factors that hampered the implementation of performance appraisal at the Bina Mandiri Gorontalo Foundation were seen from seven factors. Based on the results of the research five factors hinder the performance evaluation, are lack of objectivity, halo effect, Leniency, Strictness, and Personal Prejudices. While the other two factors, i.e. Central Tendency and Recent Behavior Bias is inappropriate because these two factors did not hamper the implementation of performance appraisal at the Bina Mandiri Gorontalo Foundation.  


Author(s):  
Hayoung Oh

Cognitive IoT is exponentially increased because of various real time and robust applications with sensor networks and big data analysis. Each IoT protocol of network layer can be RPL, COAP and so on based on IETF standards. But still collision problems and security-aware fair transmission on top of scalable IoT devices were not solved enough. In the open wireless LAN system based cognitive IoTs, IoT node that is continuously being stripped of its transmission opportunity will continue to accumulate packets to be sent in the butter and spoofing attacks will not allow the data transfer opportunities to be fair. Therefore, in this paper, we propose a method to reduce the average wait time of all packets in the system by dynamically controlling the contention window (CW) in a wireless LAN based cognitive IoT environment where there are nodes that do not have fair transmission opportunities due to spoofing attacks. Through the performance evaluation, we have proved that the proposed technique improves up to 80% in terms of various performance evaluation than the basic WLAN 802.11 based IoT.


Sign in / Sign up

Export Citation Format

Share Document