Kriptografi Audio MP3 Menggunakan RSA dan Transposisi Kolom

2021 ◽  
Vol 5 (3) ◽  
pp. 483-488
Author(s):  
Cinantya Paramita ◽  
Usman Sudibyo

Mp3 is one form of audio file extension that is widely used today. With a variety of uses in a variety of mp3 systems become one of the audio extensions that are commonly found in technology systems of the Internet of Things era. However, with the many uses of the .mp3 file extension, there is a new problem, namely the security of the data itself. From these problems, the author aims to examine the security of the mp3 file by designing cryptographic science-based applications. The cryptographic algorithm used in the application is a combination of the asymmetric RSA 2048 algorithm and symmetric columnic transpositions. RSA 2048 algorithm was chosen because it has a key length in accordance with NIST standards in securing data. By combining the two algorithms, the application system will have the ability to manage mp3 files and encrypt mp3 files with the results of data that cannot be played like mp3 files in general. This application system will be developed by prototype method which is the best method in developing a system with trial and error in algorithm development.  

2019 ◽  
Vol 8 (2S8) ◽  
pp. 1809-1812

The significance of Internet of Things (IoT) makes different objects connected and it has also been known as the tech revolution. One of the many applications of IoT is in healthcare to examine the patient’s health report, internet of things makes medical technology more efficient and less complicated by giving access to real-time analysis of the patient’s health, in which it focuses on acquiring the data regarding the patient’s health and eliminate the possible human flaws. In the internet of things, a patient’s health statistics get transmitted through various medical equipment through a gateway, where they are stored and monitored. The main challenges in the implementation of the internet of things for healthcare services are checking all patients from different places. Therefore, the internet of things in the healthcare field gives the basic solutions for effective patient monitoring at less cost and also reduces the tensions between patient outcomes and disease management. This paper gives emphases on the different techniques used to monitor the patients while working for the healthcare department.


2020 ◽  
Vol 2020 (3) ◽  
pp. 276-1-276-15
Author(s):  
Franziska Schwarz ◽  
Klaus Schwarz ◽  
Reiner Creutzburg

Since its invention, the Internet has changed the world, but above all, it has connected people. With the advent of the Internet of Things, the Internet connects things today much more than people do. A large part of the Internet of Things consists of IoT controlled Smart Home devices. The Internet of Things and the Smart Home have become an increasingly important topic in recent years. The growing popularity of Smart Home devices such as Smart TVs, Smart Door Locks, Smart Light Bulbs, and others is causing a rapid increase in vulnerable areas. In the future, many IoT devices could be just as many targets. The many new and inexperienced manufacturers and the absence of established uniform standards also contribute to the precarious situation. Therefore, new methods are needed to sensitize and detect these threats. In this paper, different existing approaches like those of the National Institute of Standards and Technology (NIST) and the Open Web Application Security Project (OWASP) are combined with concepts of this work like the Smart Home Device Life Cycle. In the context of this paper, a universal 31-page question-based test procedure is developed that can be applied to any Smart Home device. Based on this new, innovative security checklist, the communication between device, app, and the manufacturer's servers, as well as the firmware of IoT devices, can be analyzed and documented in detail. In the course of this paper, also a handout in the abbreviated form will be created, which serves the same purpose.


Author(s):  
Tommy Prayoga ◽  
Juneman Abraham

There are at least two complementary levels in the Internet of Things. The first (back) end comes from the big data companies that mine and analyze every log of activities through every device that are attached to the second (front) end, i.e., the many aspects of our lives. However, what keeps this wheel of innovation going forward is actually the front end user. Technology, however improved and innovative, will not fulfill its full potential if users do not adopt and accept it as part of their lives. They must be willing to work with the technology - sold as way to ease and improve lives - for the machine to work and be meaningful. By then the big data companies can gather information about what users want and how they behave to grasp a better understanding and make better decisions about next technology improvement. Users' acceptance and decisions to appropriate shape how big data companies work and innovate. Acceptance and appropriation are the two of the most important areas to explore in the field of IoT optimization in the business world.


The Internet of Things (IoT) being a promising innovation of things to come and is required to associate billions of gadgets. Web of things (IoT) gadgets have been generally utilized, and Electronic correspondence is expanded quickly. The expanded number of correspondence is required to create piles of information and the security of information can be a danger. Information gathered by the IoT gadgets and the information which IoT gadget send might be the portal for an assailant to break client security. To guarantee secure correspondence between IoT centers and central point(server), a cryptographic plan for lightweight gadgets is proposed. In this plan, we make utilize pseudo stream cipher with key generation for rearranging key synchronization and improving security.. The common verification, secret key for meeting synchronization and refreshing secret key for session are finished by trading scrambled messages. Likewise, the key length and update cycle for mystery key for meeting are adaptable as indicated by application. Keys are created from mystery key for meeting for improving the security. We contrasted the plan's security and execution and some lightweight plans. As indicated by the investigation, the proposed plan can give greater security includes low overhead of correspondence which is correct for IoT Node with restricted resource and power. Encryption and decoding is finished utilizing trigonometric ideas and by utilizing the idea of stream figure. Trigonometric ideas are lightweight and improve the security up by an extraordinary degree by diminishing the odds of cryptanalysis. When contrasted with different calculations like Hill figure, RC4, RSA and Present(Lightweight square figure) and so forth, the proposed calculation gives better execution.


Author(s):  
Tommy Prayoga ◽  
Juneman Abraham

There are at least two complementary levels in the Internet of Things. The first (back) end comes from the big data companies that mine and analyze every log of activities through every device that are attached to the second (front) end, i.e., the many aspects of our lives. However, what keeps this wheel of innovation going forward is actually the front end user. Technology, however improved and innovative, will not fulfill its full potential if users do not adopt and accept it as part of their lives. They must be willing to work with the technology - sold as way to ease and improve lives - for the machine to work and be meaningful. By then the big data companies can gather information about what users want and how they behave to grasp a better understanding and make better decisions about next technology improvement. Users' acceptance and decisions to appropriate shape how big data companies work and innovate. Acceptance and appropriation are the two of the most important areas to explore in the field of IoT optimization in the business world.


2013 ◽  
Vol 427-429 ◽  
pp. 1052-1055
Author(s):  
Hong Jian Zheng ◽  
Qiang Li ◽  
Peng Fei Zhang

in the current days of the fast developed internet of things (IoT), the IoT technology is gradually extended to the construction of livestock cultivation industry. In order to advance the intensive level of the livestock cultivation and accelerate the construction of livestock cultivation IoT in our country, this paper presents the IoT system suitable for livestock healthy cultivation in our country and introduces the system from three aspects: system requirements, technical framework and system function, in which the main focus is the application system and the key technology involved in each system modules is analyzed.


2021 ◽  
Vol 11 (2) ◽  
pp. 59-66
Author(s):  
Apoorva Ganapathy

An edge computing system is a shared IT (Information Technology) system where customer data can be processed at the edge of the network to as close as possible to the originating source. The Internet of Things connects the various things on the internet, making it easier to live and allow jobs to be done more smartly. It also gives total control to the users. The combination of Edge computing and the Internet of Things can potentially result in huge possibilities for users. This work accessed edge computing and the benefits of using edge computing. It also looked into how to edge the many possibilities that can result in the use of edge computing. Various similar concepts like fog and cloud computing were also considered as closely related terms. This article provides insights into the use of edge computing in several industries.


Sign in / Sign up

Export Citation Format

Share Document