scholarly journals Software Optimisation of Lightweight Klein Encryption in IoT

2021 ◽  
Vol 4 (2) ◽  
pp. 55-68
Author(s):  
Seyed Ghorashi

The Internet of Things (IoT) and Wireless Sensor Network (WSN) devices are prone to security vulnerabilities, especially when they are resource-constrained. Lightweight cryptography is a promising encryption concept for IoT and WSN devices, that can mitigate these vulnerabilities. For example, Klein encryption is a lightweight block cipher, which has achieved popularity for the trade-off between performance and security. In this paper, we propose one novel method to enhance the efficiency of the Klein block cipher and the effects on the Central Processing Unit (CPU), memory usage, and processing time. Furthermore, we evaluate another approach on the performance of the Klein encryption iterations. These approaches were implemented in the Python language and ran on the Raspberry PI 3. We evaluated and analyzed the results of two modified encryption algorithms and confirmed that two enhancing techniques lead to significantly improved performance compared to the original algorithm

2020 ◽  
Vol 9 (1) ◽  
pp. 2792-2794

Different Technologies are emerging in the field of Home Surveillance now a days. Surveillance systems are being used to reduce man power and to increase security of a home. Technologies like Computer Vision and Internet of Things (IOT) are one of them. In this project a surveillance system has been implemented employing a single board computer i.e. Raspberry Pi 3 which will act like a central processing unit with the help of python language and a module named as Open Source Computer Vision(Open CV).To make it more automated a local database of authorized persons has been made. It will store the images of the different authorized persons who can enter in that security area. Camera will be always in surveillance mode and it will be searching for a face persistently. It’ll act as Computer Vision. This will lead to more accurate system with high efficiency. Therefore it’ll capture the image of the person automatically and compare it with the local database. In the case of match, door will be open automatically otherwise in the case of unauthorized person, system will send the image of the unauthorized person to owner of the home via SMTP(Simple Mail Transfer Protocol). A local library in Python - "smtplib" is being press into service to send messages. The smtplib module characterizes a SMTP customer meeting object that can be utilized to send messages to any Web machine with SMTP( Simple Mail Transfer Protocol). Also a webpage has been made with the help of apache server to store the images of unauthorized persons.


Author(s):  
Dana Khwailleh ◽  
Firas Al-balas

The rapid growth of internet of things (IoT) in multiple areas brings research challenges closely linked to the nature of IoT technology. Therefore, there has been a need to secure the collected data from IoT sensors in an efficient and dynamic way taking into consideration the nature of collected data due to its importance. So, in this paper, a dynamic algorithm has been developed to distinguish the importance of data collected and apply the suitable security approach for each type of data collected. This was done by using hybrid system that combines block cipher and stream cipher systems. After data classification using machine learning classifiers the less important data are encrypted using stream cipher (SC) that use rivest cipher 4 algorithm, and more important data encrypted using block cipher (BC) that use advanced encryption standard algorithm. By applying a performance evaluation using simulation, the proposed method guarantees that it encrypts the data with less central processing unit (CPU) time with improvement in the security over the data by using the proposed hybrid system.


2020 ◽  
Author(s):  
Shamim Muhammad ◽  
Inderveer Chana ◽  
Supriya Thilakanathan

Edge computing is a technology that allows resources to be processed or executed close to the edge of the internet. The interconnected network of devices in the Internet of Things has led to an increased amount of data, increasing internet traffic usage every year. Also, edge computing is driving applications and computing power away from the integrated points to areas close to users, leading to improved performance of the application. Despite the explosive growth of the edge computing paradigm, there are common security vulnerabilities associated with the Internet of Things applications. This paper will evaluate and analyze some of the most common security issues that pose a serious threat to the edge computing paradigm.


In the present age, the Internet of Things (IoT) is turning into an essential part of our day by day existence with the new innovative improvements. The objective of this project is to utilize the IoT with a smart system of wireless sensors to observe plant healthiness and watch larvae populace in a remote yield field. A wireless sensor network is proposed in this setting to recognize larvae and calculate certain gadget parameters, namely, the Acoustic Complexity Index (ACI), temperature, humidity and soil moisture. The information of the sensors is gathered through a serial port through the front end sensing node built with a STM32F407VG board. The leading group of STM32F407VG depends on the processor of Advanced RISC Machine (ARM). Utilizing a remote ZigBee protocol, the node information is transmitted to a base station. Information from a gathering of sensor nodes is obtained by the base station. This information is transmitted by means of the Universal Serial Bus (USB) association between the base station and the Central Processing Unit (CPU). On the CPU, this information is examined utilizing the clearly planned application dependent on MATLAB. The discoveries will be shown and put away on the CPU and logged by means of Thingspeak liaison on the cloud too. At any moment, it requires access to this data globally. An auspicious contact and healing of the arranged yield field is accomplished. To accomplish the effective combination and execution of the modules, the unit parameters are changed. An experimental setup is used to test the proposed system operation. The results confirmed the proper functionality of the system.


:Graphics processing unit (GPU) is a computer programmable chip that could perform rapid mathematical operations that can be accelerated with massive parallelism. In the early days, central processing unit (CPU) was responsible for all computations irrespective of whether it is feasible for parallel computation. However, in recent years GPUs are increasingly used for massively parallel computing applications, such as training Deep Neural Networks. GPU’s performance monitoring plays a key role in this new era since GPUs serve an inevitable role in increasing the speed of analysis of the developed system. GPU administration comes in picture to efficiently utilize the GPU when we deal with multiple workloads to run on the same hardware. In this study, various GPUparameters are monitored and help to keep them in safe levels and also to keep the improved performance of the system. This study,


2018 ◽  
Vol 9 ◽  
pp. 350-358
Author(s):  
Tomasz Piotr Sajnóg ◽  
Dariusz Czerwiński

The paper presents the results of functionality analysis of application made in Microsoft .NET Core technology on Raspberry Pi 2 platform. The research was done by implementing applications using libraries provided by Microsoft and developed by .NET Core community. The focus was placed on usage of this technology in the Internet of Things applications. The comparison of the possibility of using Raspberry Pi interfaces in .NET Core, officially supported Python language and popular Node.js technology was made. The performance of these technologies was also compared


Author(s):  
Ahmed Hussein Shatti ◽  
Haider Ali Hasson ◽  
Laith Ali Abdul-Rahaim

In this paper, a monitoring and controlling process of the mobile base station shelter has been implemented. We have proposed a model that is based on a firebase cloud service and the principle of the internet of things (IoT) to carry out the process of automation. In this model, we have used Raspberry Pi 4 as the main microcontroller of our system that has interacted with a DHT11 Humidity-Temperature sensor and a PIR motion sensor. It's found that the Pi4 module provides efficient analysis, low consumption of power, and effective control of the operation. It turns ON/OFF the electrical appliances automatically inside the shelter. The main advantage of our proposed model is to maintain the temperature and humidity degrees inside the shelter within the required range of operation. Another important advantage is to diminish the tall human exertion level behind the monitoring process throughout the day. The model has been tested through a localhost server via an HTML page. The last one was created with the assistance of HTML and CSS languages to be used as a local user interface. Moreover, the Raspberry Pi 4 was programmed by Python Language to catch up on the reading of the sensors, processes the data, and sends it to the cloud service. Finally, those data will be shown in real-time to the authenticated user on the database of the firebase cloud service.


2020 ◽  
Vol 9 (1) ◽  
pp. 1502-1504

Thieves are becoming smarter day-by-day which results in increase of looting of automobiles like scooters, cars and many other. To overcome this problem there is a crucial need for an effective system that diagnoses the vehicle theft. In this paper, an IoT based agile security system by using Raspberry Pi as the central processing unit of the entire system, a lightweight, cheap and efficient system is researched, built and explored. The Linux Embedded System gathers the data from Passive Infra-Red (PIR) motion sensors, pressure sensors, gas sensors, Global Positioning System (GPS), Pi camera, buzzer, and Liquid Crystal Display (LCD). The system has generally 2 modes. They are: Owner mode and Theft mode. If the system detects any intrusion in the vehicle it gives an alarm on detection, capture the image of the person by using image processing technique and identifies who is trying to unlock the vehicle and send coordinates of the vehicle when the intruder opens the vehicle door and starts moving the car, along with images of intruder to the owner by using a GSM module. By using GPS module, we can be to get the latitude and longitude of the vehicle remotely when the intruder has theft the vehicle.


2020 ◽  
Author(s):  
Roudati jannah

Perangkat keras komputer adalah bagian dari sistem komputer sebagai perangkat yang dapat diraba, dilihat secara fisik, dan bertindak untuk menjalankan instruksi dari perangkat lunak (software). Perangkat keras komputer juga disebut dengan hardware. Hardware berperan secara menyeluruh terhadap kinerja suatu sistem komputer. Prinsipnya sistem komputer selalu memiliki perangkat keras masukan (input/input device system) – perangkat keras premprosesan (processing/central processing unit) – perangkat keras luaran (output/output device system) – perangkat tambahan yang sifatnya opsional (peripheral) dan tempat penyimpanan data (storage device system/external memory).


Sign in / Sign up

Export Citation Format

Share Document