scholarly journals Monitoring data encryption method for howitzer shell transfer arm using chaos and compressive sensing

2019 ◽  
Vol 13 ◽  
pp. 174830261987359
Author(s):  
Xi Liu ◽  
Baolin Hou ◽  
Qiangqiang Zhao

A novel data encryption method is presented for howitzer shell transfer arm using chaos and compressive sensing. Data are stored in the embedded fault diagnosis machine using chaos and compressive sensing, so the encrypted data are more secure in the embedded system and in the process of transmission with host computer. When the host computer extracts the operation data of the howitzer shell transfer arm monitored by the fault diagnosis machine, firstly, the encrypted data in the embedded diagnostic machine are read, then decrypted, and then the original signal is reconstructed by the orthogonal matching pursuit algorithm for further analysis and processing. The similarity degree between the reconstructed data and the original data is 0.947, the key space of the algorithm is [Formula: see text], and the algorithm is sensitive to the key. The result shows that the method can effectively save a large number of confidential data.

Author(s):  
DECY NATALIANA ◽  
FEBRIAN HADIATNA ◽  
AHMAD FAUZI

ABSTRAKPada penelitian ini mencoba untuk memanfaatkan tag RFID sebagai media untuk menyimpan data berupa nilai nominal uang. Metode enkripsi data Ceasar Cipher akan diterapkan ke dalam sistem yang dirancang sehingga data nominal uang pada tag merupakan data yang terenkripsi. Enkripsi data ini dilakukan untuk memperkuat sistem keamanan yang telah terdapat pada tag, sehingga proses peretasan data akan lebih sulit untuk dilakukan. Perangkat keras yang digunakan untuk merealisasikan sistem terdiri dari unit reader RFID-RC522, tag MIFARE Classic S50 1 kbyte, dan Arduino UNO R3. Dari hasil pengujian diperoleh bahwa tag dapat digunakan untuk menyimpan data berupa nilai nominal uang dan dari sistem yang telah direalisasikan nilai nominal uang tersebut dapat ditambah atau dikurang jumlahnya dari Rp 0 – Rp 4.294.967.295. Penerapan metode Ceasar Cipher berhasil mengubah nilai nominal uang menjadi data yang terenkripsi.Kata Kunci: RFID, pembayaran elektronik, sistem keamanan, enkripsi data, ceasar cipher ABSTRACTIn this research will try to utilize RFID tag as data storage for a certain value of money. Ceasar cipher as encryption method will be applied to the implemented system so that this certain value of money inside the tag turned into an encrypted data. Ecryption of the data is done to hardened the security sistem that already exists in the tag itself, so any violation behavior like data cracking will be harder to accomplish. The hardware that used on the system consist of a reader unit RFID-RC522, MIFARE Classic tag S50 1kbyte, and Arduino UNO R3. The result of this research proofed that the tag could be utilized to store a certain value of money and with a well built implemented system, the data value could be incremented or decremented ranging from Rp 0 – Rp 4.294.967.295. Implementation of Ceasar Cipher method has succesfully turn that certain value of money inside the tag into an encrypted data.Keywords: RFID, Electronic payment, security system, data encryption, ceasar cipher


TEKNOKOM ◽  
2021 ◽  
Vol 4 (1) ◽  
pp. 1-6
Author(s):  
Indra Surya Permana ◽  
Taufik Hidayat ◽  
Rahutomo Mahardiko

The development of information technology has grown exponentially and various of data collections and its method has been obtained. In the era of big data, data has now become an asset that held important values, while in the implementation of data delivery, it clearly is not always safe. One of the method to secure data delivery is data encryption using Cryptography. Cryptography provides an encryption service to secure data delivery by transforming it to random values so that it can no longer be read. The goal in this study was to produce an application that could be used to encrypt data, using ElGamal's cryptography method and hash checking using the SHA256 algorithm. After encryption, to ensure the encrypted data is still the original data without any changes or manipulation by unauthorized 3rd party then done by checking the hash generated using SHA256 algorithm. The data used in this study was a sample of raw data from the ATPWTP survey (ability to pay and willing to pay) conducted by the BPS Cirebon (Central Statistics) in 2019 and the data was in the form of Excel and txt files. The encryption process resulted in a cipher larger than the plaintext and takes longer for the data encryption process than during the data cipher decryption process.


2012 ◽  
Vol 263-266 ◽  
pp. 2097-2101
Author(s):  
Hong Fang Li ◽  
Ling Jun Yang ◽  
San Xing Cao

In cryptography, the DES algorithm is known to be advantageous by utilizing the mechanisms of grouping and symmetric private key. The algorithm is critical in the field of encryption. It is adaptive to various applications for encryption in many different systems, especially in the embedded system of Internet of Things (IOT) and the Next-generation Convergence Networks. In this paper, an improved scheme is presented in order to overcome the easily attacked shortcomings. This method is to improve the complexity of encryption key in the process and thus to enhance the ability in resisting attacks, so that we use two keys to crosswise encrypt and the safety of the algorithm is further strengthened. In this paper, the improved algorithm is applied in smartphone-based monitoring of broadcasting transmission systems, so as to realize the transmission of data encryption functions.


2019 ◽  
Vol 5 ◽  
pp. e217
Author(s):  
Ahmed Aziz ◽  
Karan Singh ◽  
Ahmed Elsawy ◽  
Walid Osamy ◽  
Ahmed M. Khedr

The recent advances in compressive sensing (CS) based solutions make it a promising technique for signal acquisition, image processing and other types of data compression needs. In CS, the most challenging problem is to design an accurate and efficient algorithm for reconstructing the original data. Greedy-based reconstruction algorithms proved themselves as a good solution to this problem because of their fast implementation and low complex computations. In this paper, we propose a new optimization algorithm called grey wolf reconstruction algorithm (GWRA). GWRA is inspired from the benefits of integrating both the reversible greedy algorithm and the grey wolf optimizer algorithm. The effectiveness of GWRA technique is demonstrated and validated through rigorous simulations. The simulation results show that GWRA significantly exceeds the greedy-based reconstruction algorithms such as sum product, orthogonal matching pursuit, compressive sampling matching pursuit and filtered back projection and swarm based techniques such as BA and PSO in terms of reducing the reconstruction error, the mean absolute percentage error and the average normalized mean squared error.


2019 ◽  
Vol 13 (4) ◽  
pp. 356-363
Author(s):  
Yuezhong Wu ◽  
Wei Chen ◽  
Shuhong Chen ◽  
Guojun Wang ◽  
Changyun Li

Background: Cloud storage is generally used to provide on-demand services with sufficient scalability in an efficient network environment, and various encryption algorithms are typically applied to protect the data in the cloud. However, it is non-trivial to obtain the original data after encryption and efficient methods are needed to access the original data. Methods: In this paper, we propose a new user-controlled and efficient encrypted data sharing model in cloud storage. It preprocesses user data to ensure the confidentiality and integrity based on triple encryption scheme of CP-ABE ciphertext access control mechanism and integrity verification. Moreover, it adopts secondary screening program to achieve efficient ciphertext retrieval by using distributed Lucene technology and fine-grained decision tree. In this way, when a trustworthy third party is introduced, the security and reliability of data sharing can be guaranteed. To provide data security and efficient retrieval, we also combine active user with active system. Results: Experimental results show that the proposed model can ensure data security in cloud storage services platform as well as enhance the operational performance of data sharing. Conclusion: The proposed security sharing mechanism works well in an actual cloud storage environment.


2019 ◽  
Vol 141 (5) ◽  
Author(s):  
Wei Xiong ◽  
Qingbo He ◽  
Zhike Peng

Wayside acoustic defective bearing detector (ADBD) system is a potential technique in ensuring the safety of traveling vehicles. However, Doppler distortion and multiple moving sources aliasing in the acquired acoustic signals decrease the accuracy of defective bearing fault diagnosis. Currently, the method of constructing time-frequency (TF) masks for source separation was limited by an empirical threshold setting. To overcome this limitation, this study proposed a dynamic Doppler multisource separation model and constructed a time domain-separating matrix (TDSM) to realize multiple moving sources separation in the time domain. The TDSM was designed with two steps of (1) constructing separating curves and time domain remapping matrix (TDRM) and (2) remapping each element of separating curves to its corresponding time according to the TDRM. Both TDSM and TDRM were driven by geometrical and motion parameters, which would be estimated by Doppler feature matching pursuit (DFMP) algorithm. After gaining the source components from the observed signals, correlation operation was carried out to estimate source signals. Moreover, fault diagnosis could be carried out by envelope spectrum analysis. Compared with the method of constructing TF masks, the proposed strategy could avoid setting thresholds empirically. Finally, the effectiveness of the proposed technique was validated by simulation and experimental cases. Results indicated the potential of this method for improving the performance of the ADBD system.


2021 ◽  
Vol 11 (3) ◽  
pp. 1331
Author(s):  
Mohammad Hossein Same ◽  
Gabriel Gleeton ◽  
Gabriel Gandubert ◽  
Preslav Ivanov ◽  
Rene Jr Landry

By increasing the demand for radio frequency (RF) and access of hackers and spoofers to low price hardware and software defined radios (SDR), radio frequency interference (RFI) became a more frequent and serious problem. In order to increase the security of satellite communication (Satcom) and guarantee the quality of service (QoS) of end users, it is crucial to detect the RFI in the desired bandwidth and protect the receiver with a proper mitigation mechanism. Digital narrowband signals are so sensitive into the interference and because of their special power spectrum shape, it is hard to detect and eliminate the RFI from their bandwidth. Thus, a proper detector requires a high precision and smooth estimation of input signal power spectral density (PSD). By utilizing the presented power spectrum by the simplified Welch method, this article proposes a solid and effective algorithm that can find all necessary interference parameters in the frequency domain while targeting practical implantation for the embedded system with minimum complexity. The proposed detector can detect several multi narrowband interferences and estimate their center frequency, bandwidth, power, start, and end of each interference individually. To remove multiple interferences, a chain of several infinite impulse response (IIR) notch filters with multiplexers is proposed. To minimize damage to the original signal, the bandwidth of each notch is adjusted in a way that maximizes the received signal to noise ratio (SNR) by the receiver. Multiple carrier wave interferences (MCWI) is utilized as a jamming attack to the Digital Video Broadcasting-Satellite-Second Generation (DVB-S2) receiver and performance of a new detector and mitigation system is investigated and validated in both simulation and practical tests. Based on the obtained results, the proposed detector can detect a weak power interference down to −25 dB and track a hopping frequency interference with center frequency variation speed up to 3 kHz. Bit error ratio (BER) performance shows 3 dB improvement by utilizing new adaptive mitigation scenario compared to non-adaptive one. Finally, the protected DVB-S2 can receive the data with SNR close to the normal situation while it is under the attack of the MCWI jammer.


Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 469
Author(s):  
Hyun Woo Oh ◽  
Ji Kwang Kim ◽  
Gwan Beom Hwang ◽  
Seung Eun Lee

Recently, advances in technology have enabled embedded systems to be adopted for a variety of applications. Some of these applications require real-time 2D graphics processing running on limited design specifications such as low power consumption and a small area. In order to satisfy such conditions, including a specific 2D graphics accelerator in the embedded system is an effective method. This method reduces the workload of the processor in the embedded system by exploiting the accelerator. The accelerator assists the system to perform 2D graphics processing in real-time. Therefore, a variety of applications that require 2D graphics processing can be implemented with an embedded processor. In this paper, we present a 2D graphics accelerator for tiny embedded systems. The accelerator includes an optimized line-drawing operation based on Bresenham’s algorithm. The optimized operation enables the accelerator to deal with various kinds of 2D graphics processing and to perform the line-drawing instead of the system processor. Moreover, the accelerator also distributes the workload of the processor core by removing the need for the core to access the frame buffer memory. We measure the performance of the accelerator by implementing the processor, including the accelerator, on a field-programmable gate array (FPGA), and ascertaining the possibility of realization by synthesizing using the 180 nm CMOS process.


Author(s):  
Yong Luo ◽  
Shuai-Bing Qin ◽  
Dong-Shu Wang

With the continuous development of engineering education accreditation in China, its concept has had a profound impact on the reform of various majors in higher education. Using the idea of engineering education accreditation, this paper discusses the main problems in the implementation of embedded experimental courses of electronic information majors and proposes related education reform programs. Taking the embedded system experiment course of the automation major and embedded system major of Zhengzhou University as examples, the course has carried out research on the aspects of teaching model, experimental course content, scientific assessment method, etc., and proposed corresponding improvement methods to achieve better effect. The practical operation result has proved that the embedded system experiment course of the automation major and embedded system major improved the students’ ability and met the requirements of professional accreditation.


Sign in / Sign up

Export Citation Format

Share Document