scholarly journals Designing a Secure Environment for IoT Networks Using Lightweight AES Algorithm

2021 ◽  
pp. 2759-2770
Author(s):  
Meryam Saad

In recent years, the rapid development in the field of wireless technologies leaded to appear a new topic known as the Internet of things (IoT). The IoT applications can be found in various fields of our life such as smart home, health care, smart building, and etc. In all these applications the data collected from the real world are transmitted through the Internet, therefore these data have become a target of many attacks and hackers. So, a secure communication must be provided to protect the transmitted data from unauthorized access. This paper focuses on designing a secure IoT system to protect the sensing data. In this system, the security is provided by the use of Lightweight AES encryption algorithm to encrypt the data received from physical environment. The hardware used in this proposal is the Raspberry Pi 3 model B and two types of sensors. The LAES algorithm was embedded inside the Raspberry in order to protect the sensing data that comes from sensors connected to the Raspberry Pi before sending it through network. The analysis results show that the proposed IoT security system consumes less time in encryption/decryption and has high throughput when compared with others from related work. Its throughput is higher in about 19.24% than one system from the related studies.

Author(s):  
Noor A. Hussein ◽  
Mohamed Ibrahim Shujaa

Internet of Things (IoT) is a rapidly developing technology that enables “devices” to communicate and share information amongst them without human control. The devices have the features of internet connectivity and networking. Due to the increasing demands of a secure environment in IoT application, security has become a crucial aspect on which researchers have been increasingly focused. Connecting devices to the internet can facilitate intruders to attack devices as they can access the data from anywhere in the globe. In this work, an encryption–decryption process-based stream cipher has been used. The messages between IoT nodes were encrypted using One Time Pad (OTP) and DNA computing. Furthermore, the required key sequence was generated using a linear feedback shift register (LFSR) as a pseudo number key generator. This key sequence was combined to generate a unique key for each message. The algorithm was implemented using source python and tested on a Raspberry pi under Linux open operation system.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Farah Tawfiq Abdul Hussien ◽  
Abdul Monem S. Rahma ◽  
Hala Bahjat Abdul Wahab

Providing security for transmitted data through the e-commerce environment requires using a fast and high secure encryption algorithm. Balancing between the speed and the security degree is a problem that many of the encryption algorithms suffer from. Increasing the security degree requires increasing the level of complexity which results in increasing encryption time. On the other hand, increasing the algorithm speed may reduce the complexity degree which affects the security level. This paper aims to design an encryption algorithm that balances time and complexity (speed and security). This is done by suggesting a security environment that depends on creating and providing an agent software to be settled into each customer device that manages the purchase and security process without customer interference. The suggested encryption algorithm is applied within this environment. Several modifications are performed on the AES encryption algorithm. The AES was chosen due to its performance (security and speed), which makes it suitable for encrypting transmitted data over the Internet. These modifications involve adding preprocessing steps (padding and zigzag), eliminating Sub Byte step, and reducing the number of rounds. The experimental results showed that the suggested algorithm provides more security and speed in the encryption and decryption process. The randomness degree has increased by 29.5%. The efficiency is increased because the encryption and decryption times are reduced, as is the CPU usage. The throughput for the suggested algorithm is increased by 10% for the encryption process and is increased by 9.3% for the decryption process.


Sensors ◽  
2019 ◽  
Vol 19 (10) ◽  
pp. 2228 ◽  
Author(s):  
Lei Hang ◽  
Do-Hyeun Kim

With the rapid development of communication technologies, the Internet of Things (IoT) is getting out of its infancy, into full maturity, and tends to be developed in an explosively rapid way, with more and more data transmitted and processed. As a result, the ability to manage devices deployed worldwide has been given more and advanced requirements in practical application performances. Most existing IoT platforms are highly centralized architectures, which suffer from various technical limitations, such as a cyber-attack and single point of failure. A new solution direction is essential to enhance data accessing, while regulating it with government mandates in privacy and security. In this paper, we propose an integrated IoT platform using blockchain technology to guarantee sensing data integrity. The aim of this platform is to afford the device owner a practical application that provides a comprehensive, immutable log and allows easy access to their devices deployed in different domains. It also provides characteristics of general IoT systems, allows for real-time monitoring, and control between the end user and device. The business logic of the application is defined by the smart contract, which contains rules and conditions. The proposed approach is backed by a proof of concept implementation in realistic IoT scenarios, utilizing Raspberry Pi devices and a permissioned network called Hyperledger Fabric. Lastly, a benchmark study using various performance metrics is made to highlight the significance of the proposed work. The analysis results indicate that the designed platform is suitable for the resource-constrained IoT architecture and is scalable to be extended in various IoT scenarios.


2021 ◽  
Vol 2 (Oktober) ◽  
pp. 1-10
Author(s):  
Melkianus Penu ◽  
Petrus Gunawan ◽  
Muhamat Maariful Huda

Abstract - Along with the rapid development of science and technology, including robot technology. It can lighten and help the work done by humans. In the military world, the role of robots is indispensable both in peace and in war. This research was carried out using a pure experimental method on the Design of a Propulsion System for Combat Robots using the Internet of Things (IoT) Based on Raspberry 4.0. The working principle of this combat robot is based on data sent using MiFi (Tx) which will then be processed using Raspberry 4.0 and transmitted to MiFi (Rx) via the Internet of Things (IoT). Furthermore, the data received will be processed so that the driving system will produce driving force using a differential drive system, the difference in rotation of the driving motor is regulated by the microprocessor to the MY 1061 speed control, the pulse signal sent by the Raspberry Pi will regulate the amount of current sent to the DC motor so that the motor can turn left and right.


Author(s):  
Tetyana Jezhyzhanska

In the information society the status of information is changing: this main value of global civilization becomes an important resource of socio- economic, technological and cultural development. The rapid development of virtual technologies and the growing number of Internet users in Ukraine and in the world causes the new challenges to communication of each organization. The book publishers are also obliged to respond to these processes. However, the works devoted directly to publishers’ communication in the modern media space are still lacking in Ukraine. The objective of the article is to clarify peculiarities and conditions of the activities of Ukrainian book publishers in today’s media space which is an important issue today. It is analyzed the literature and sources on this issue and it is ascertained the theoretical and practical possibilities to take into account the trends in the world of modern media in the PR-activity of book publishers. Also the prospects for further scientific study and practical use of PR-communications in the activity of publishers are determined. The analysis of current changes in the modern information space allows us to trace the general tendencies: the new subject and object areas are formed; the number of subjects is expanded; the new formats of interaction within the system of communications of the organization and in society as a whole are created. That means that publishing house’s PR-communications are complicated by the emergence of new elements, such as active audience, social networks as communication channels, promotions on the Internet and others. PR communication in the Internet space is the most effective and inexpensive tool for interaction of publishers with active audiences. Thus, the activation of PR communication in the modern media space is associated with the emergence of the latest information technologies, online media as well as development of Internet. The use of online channels of Internet for communication with the target audience of publishing organizations has certain advantages over traditional media. At the same time, it is necessary to take into account the information saturation of media space, which complicates the way of PR-messages of book publishers to the reader.


2019 ◽  
Author(s):  
Kejimu Sunzi ◽  
Cheng Lei ◽  
Zhuoyuanyuan Chen ◽  
Baolu Zhang

BACKGROUND The rapid development of health information technology has an increasingly significant impact on nursing work. The development of informatization also puts forward higher requirements for nurses under standardized training (NUST). Informatics knowledge and skills are essential if clinicians are to master the large volume of information generated in healthcare today. Nurses with competent nursing informatics competencies (NIC) will be able to better adapt to the needs of work and the development of the times. OBJECTIVE This study aimed to explore, analyze, and discuss the current situation of NIC of NUST in China, and analyze the influencing factors, to provide references for improving the NIC of NUST. METHODS We conducted a cross-sectional survey of standard training nurses' NIC in a tertiary hospital in Sichuan Province, China, with convenience sampling. The study consists of two parts included socio-demographic characteristics and NIC, a self-designed general information questionnaire, and a Self-Assessment Nursing Informatics Competency Scale-SF28 were used as survey tools. An online survey collected the data, and the scores of nurses' NIC were analyzed, and the factors were determined by linear regression statistical analysis. RESULTS Overall 191 target population responded to the questionnaire, including 22 males (11.52%) and 169 females (88.48%), the age range was 21 to 28 years, the average age was 24.64 (SD 1.43). 53 persons without computer level certificate (27.75%), 138 persons with computer level certificate (72.25%), the total score of Self-Assessment Nursing Informatics Competency Scale was 68.65 (SD 10.47), the scores of each dimension were role of clinical information 10.12 (SD 2.17), basic computer knowledge and skills 26.64 (SD 4.96), application ability of computer skills 7.16 (SD 1.82), wireless equipment skills 8.02 (SD 2.04), nursing information attitude 16.73 (SD 3.25). In the analysis of influencing factors of NIC, “whether learned professional knowledge through the internet” is the influencing factor of NIC (P< .05). CONCLUSIONS The clinical nursing informatics (NC) of nurses was at a medium level, mainly influenced by “whether learned professional knowledge through the internet.” In the future regulation process, it is necessary to strengthen further the capacity training of information to improve their clinical information decision-making ability and better serve patients.


2020 ◽  
Vol 93 (4) ◽  
pp. 16-23
Author(s):  
Song Linlin ◽  

Since the establishment of the China (Heilongjiang) pilot free trade zone, the development of cross-border e-commerce with Russia has continued to increase speed and quality. With its geographical advantages and its comparative advantages in the Internet field, Heilongjiang Province promoted the rapid development of the Internet economy in Russia, fostered a new digital trade format represented by cross-border e-commerce, and promoted online and offline collaborative promotion of customs clearance logistics and financial services. The paper expounds foundation and development status of Heilongjiang Province’s cross-border e-commerce, analyzes in integrated development of digital economy with the Heilongjiang Province’s cross-border e-commerce with Russia, and further puts forward prospects and recommendations.


Sensors ◽  
2020 ◽  
Vol 20 (22) ◽  
pp. 6546
Author(s):  
Kazi Masum Sadique ◽  
Rahim Rahmani ◽  
Paul Johannesson

The Internet of things (IoT) will accommodate several billions of devices to the Internet to enhance human society as well as to improve the quality of living. A huge number of sensors, actuators, gateways, servers, and related end-user applications will be connected to the Internet. All these entities require identities to communicate with each other. The communicating devices may have mobility and currently, the only main identity solution is IP based identity management which is not suitable for the authentication and authorization of the heterogeneous IoT devices. Sometimes devices and applications need to communicate in real-time to make decisions within very short times. Most of the recently proposed solutions for identity management are cloud-based. Those cloud-based identity management solutions are not feasible for heterogeneous IoT devices. In this paper, we have proposed an edge-fog based decentralized identity management and authentication solution for IoT devices (IoTD) and edge IoT gateways (EIoTG). We have also presented a secure communication protocol for communication between edge IoT devices and edge IoT gateways. The proposed security protocols are verified using Scyther formal verification tool, which is a popular tool for automated verification of security protocols. The proposed model is specified using the PROMELA language. SPIN model checker is used to confirm the specification of the proposed model. The results show different message flows without any error.


Inventions ◽  
2021 ◽  
Vol 6 (2) ◽  
pp. 42
Author(s):  
Worasit Sangjan ◽  
Arron H. Carter ◽  
Michael O. Pumphrey ◽  
Vadim Jitkov ◽  
Sindhuja Sankaran

Sensor applications for plant phenotyping can advance and strengthen crop breeding programs. One of the powerful sensing options is the automated sensor system, which can be customized and applied for plant science research. The system can provide high spatial and temporal resolution data to delineate crop interaction with weather changes in a diverse environment. Such a system can be integrated with the internet to enable the internet of things (IoT)-based sensor system development for real-time crop monitoring and management. In this study, the Raspberry Pi-based sensor (imaging) system was fabricated and integrated with a microclimate sensor to evaluate crop growth in a spring wheat breeding trial for automated phenotyping applications. Such an in-field sensor system will increase the reproducibility of measurements and improve the selection efficiency by investigating dynamic crop responses as well as identifying key growth stages (e.g., heading), assisting in the development of high-performing crop varieties. In the low-cost system developed here-in, a Raspberry Pi computer and multiple cameras (RGB and multispectral) were the main components. The system was programmed to automatically capture and manage the crop image data at user-defined time points throughout the season. The acquired images were suitable for extracting quantifiable plant traits, and the images were automatically processed through a Python script (an open-source programming language) to extract vegetation indices, representing crop growth and overall health. Ongoing efforts are conducted towards integrating the sensor system for real-time data monitoring via the internet that will allow plant breeders to monitor multiple trials for timely crop management and decision making.


Sign in / Sign up

Export Citation Format

Share Document