scholarly journals Data Encryption and Fragmentation in Autonomous Vehicles Using Raspberry Pi 3

Author(s):  
Sahand Murad ◽  
Asiya Khan ◽  
Stavros Shiaeles ◽  
Giovani Masala
2019 ◽  
Vol 8 (4) ◽  
pp. 5539-5542

The automobile industries are concentrating to develop the design for self-driving cars. Nowadays they are many possibilities to implement the automated vehicle, but the drawbacks for implementing are also very high. In this paper, the miniature model of self-driving robot is created and demonstrated using the Raspberry pi with supporting sensors and motor drivers. So, this was mainly because of the security concerns that have raised in the initial testing stages. So, this paper could best describe an application that deals with the safety measures of the autonomous vehicles that are going to be dealt with in the nearer future. This paper tells us about how an application can be implemented using Raspberry Pi, camera module and the ultrasonic Sensor. Considering the different features and the cost, on a small scale a two-wheel vehicular robotic prototype has been designed. In the Autonomous car Raspberry pi is the central processor. Different type of images are captured by the camera module, and if these images have captured the color of traffic lights, then if the captured image is of the Red light then the motors of the vehicle should stop such that breaks of the car in real world should work. If the captured image is of Green light then the motors of the car should run and the vehicle should start to move in the direction it want to move and also using the Ultrasonic sensor if any of the objects that are nearby to the vehicle, then the vehicle should change the direction from which it is moving and this is well described throughout the paper.


2020 ◽  
Vol 7 (2) ◽  
pp. 13-16
Author(s):  
Julkar Nine ◽  
Shanmugapriyan Manoharan ◽  
Wolfram Hardt

This paper introduces a concept for the perception level of situation awareness through image processing applications. The perception of the information from the environment is lacking to achieve highly autonomous vehicles. This approach mainly focuses on collecting information from the environment using camera sensors. The frames from the camera are processed using multiple image processing algorithms, outputs converted into CAN message, and sent to the expert system. CE-Box custom hardware that consists of a Raspberry Pi 3b model counted with PiCAN 2 used to implement and evaluate this approach. The goal of this paper is to provide a conceptual method to make decisions based on the extracted information from the environment using image processing algorithms.


2020 ◽  
Vol 11 (2) ◽  
pp. 55-59
Author(s):  
Erick Fernando ◽  
Dina Fitria Murad ◽  
Hetty Rohayani ◽  
Fachruddin Fachruddin ◽  
Pandapotan Siagian

Tujuan artikel ini untuk menyajikan enkripsi DES pada pc mini Raspberry Pi. Implementasi ini juga bertujuan untuk menggambarkan bahwa algoritma DES ini dapat diterapkan dengan sumber daya yang kecil. Penelitian ini dilakukan dengan pendekatan eksperimental, yang melakukan proses implementasi dalam perangkat keras pc mini dan perangkat lunak xampp. Algoritma DES di implementasikan berbasis web dengan pemrograman PHP dan server web Apache dengan menggunakan inputan data teks. Hasil penelitian, bahwa algoritma DES dapat berjalan dengan baik dengan perangkat keras minimum, seperti raspberry mini pc dengan waktu yang sangat cepat dalam proses, kecepatan dalam proses dan banyak data teks dari proses. Jadi, algoritma DES dapat diadopsi secara luas untuk berbagai aplikasi dari raspberry PI mini dengan menghasilkan informasi yang kuat dalam keamanan dan keandalan.


Author(s):  
Abdelkader Khobzaoui ◽  
Kadda Benyahia ◽  
Boualem Mansouri ◽  
Sofiane Boukli-Hacene

Internet of Things (IoT) is a set of connected smart devices providing and sharing rich data in real-time without involving a human being. However, IoT is a security nightmare because like in the early computer systems, security issues are not considered in the design step. Thereby, each IoT system could be susceptible to malicious users and uses. To avoid these types of situations, many approaches and techniques are proposed by both academic and industrial researches.DNA computing is an emerging and relatively new field dealing with data encryption using a DNA computing concepts. This technique allows rapid and secure data transfer between connected objects with low power consumption. In this paper, authors propose a symmetric cryptography method based on DNA. This method consists in cutting the message to encrypt/decrypt in blocks of characters and use a symmetric key extracted from a chromosome for encryption and decryption. Implemented on the embedded platform of a Raspberry Pi, the proposed method shows good performances in terms of robustness, complexity and attack resistance.


Energies ◽  
2020 ◽  
Vol 13 (11) ◽  
pp. 2910
Author(s):  
Carlos Cruz ◽  
Esther Palomar ◽  
Ignacio Bravo ◽  
Alfredo Gardel

Demand response (DR) is emerging as the workhorse of achieving energy efficiency and reducing our carbon footprint, which persists as a major challenge amongst all the different energy-chain players, i.e., the utility providers, policy makers, consumers, and the technology sector. For instance, the Internet-of-Things (IoT) paradigm and network-enabled appliances/devices have escalated the expectations of what technology could do for the acceptance of DR programs. In this work, we design, deploy on a scalable pilot testbed, and evaluate a collaboration-based approach to the demand-side management of a community of electricity consumers that jointly targets green consumption. The design of the framework architecture is centralized via the so-called aggregator, which optimizes the demand scheduled by consumers along with their time frame preferences towards the maximization of the consumption of renewables. On the pilot, we opt for lightweight, yet efficient platforms such as Raspberry Pi boards, and evaluate them over a series of network protocols, i.e., MQTT-TLS and CoAP-DTLS, paying special attention to the security and privacy of the communications over Z-Wave, ZigBee, and WiFi. The experiments conducted are configured using two active Living Labs datasets from which we extract three community scenarios that vary according to the flexibility or rigidity of the appliances’ operation time frame demand. During the performance evaluation, processing and communication overheads lie within feasible ranges, i.e., the aggregator requires less than 2 s to schedule a small consumer community with four appliances, whereas the latency of its link to households’ controllers adds less than 100 ms. In addition, we demonstrate that our implementations running over WiFi links and UDP sockets on Raspberry Pi 4 boards are fast, though insecure. By contrast, secure CoAP (with DTLS) offers data encryption, automatic key management, and integrity protection, as well as authentication with acceptable overheads.


2021 ◽  
Vol 20 (1) ◽  
pp. 27-34
Author(s):  
Feliks Wida Satyamarda ◽  
Novembri Priyadmaji Widi Nugroho ◽  
Banu Wirawan Yohanes

The Internet of Things (IoT) connecting many electronic devices via internet has been ubiquitous in the last decade. For instance, electric or hybrid cars and autonomous vehicles which are supported by many automotive and IT companies. IoT does not only provide internal monitoring service of the devices, but also the environmental situation. Meanwhile, smartphones are equipped with embedded built-in sensors, and also providing wireless communications. In consequence, vehicular telematics based on smartphone is growing rapidly. This paper proposes a vehicular smartphone docking prototype. It aims not only to provide an affordable alternative to Android Auto and CarPlay, but also to complement them, particularly in vision and security cases. The main issue is that the driver should not be distracted while driving. Such distraction may cause road accident which can lead to severe injuries and even death. Therefore, it is important to design a vehicle smartphone docking to guarantee distraction avoidance and to provide multimedia and localization services. This vehicular smartphone docking architecture consists of an Android smartphone and a Raspberry Pi. Several test drives were conducted with perfect results. Based on the experiment results, this system is able to reduce the number of modules required within a smart vehicle.


2020 ◽  
Vol 2020 ◽  
pp. 1-22
Author(s):  
Robert A. Sowah ◽  
Dale E. Boahene ◽  
Dalton C. Owoh ◽  
Rexford Addo ◽  
Godfrey A. Mills ◽  
...  

There is rapid interest growing in the use of smart, connected devices. The developing world market for smart technology is evolving to adopt and adapt to the interconnected world of devices leading to the Internet of Things (IoT) everywhere. This research paper presents the design, development, and deployment of a prototype for the secure wireless home automation system with OpenHAB 2. We employed the use of two (2) high-performance microcontrollers, namely, the Arduino Mega 2560, interfaced with a 16-channel relay, and Raspberry Pi Model B, running the OpenHAB software. The Raspberry Pi functioned as the server to develop a prototype of an automated smart home that is remotely controllable from both a web application and an Android mobile app. In designing a wireless controlled switch for home appliances, two security procedures were implemented, namely, the token-based JSON Web Token (JWT) interface and Advanced Encryption Standard (AES) procedures for authentication and data encryption. Our system delivered a home automation system that leverages on the power of the latest version of OpenHAB to maximize productivity and overall home security while making it adaptable to the management of individual devices. When tested, both the developed hardware and software modules performed extremely well to meet the goal of a secured home automation system. Industry-standard penetration testing tools and frameworks, including Aircrack-ng, were utilized; wireless network audit began with a full sweep of the wireless frequencies with excellent results. It also ensures the efficient use of energy in the home as devices are intelligently controlled from both mobile and web applications. The results of the design and implementation of the additional layer for the security of the OpenHAB framework provide various theoretical and practical implications for home automation.


Sign in / Sign up

Export Citation Format

Share Document