Integrated security for data transfer and access control using authentication and cryptography technique for Internet of things

Author(s):  
Santosh Kumar Sharma ◽  
Bonomali Khuntia

The entire world is running behind the smart technology to accomplish the daily needs in a smart way such as smart farming, smart irrigation system, smart transportation system, smart medical management, handling of smart home appliances, smart security, etc. Smart technology is the soul property of internet services and accessing data from virtual servers, which raises the alarm of security vulnerability and threats. In recommended system we have focused on application layer security which are concerned with application interface and queue manager for service exchange. As application layer is the closest to end user and produces the big threat to the application platform it motivates us to recommend strong multilevel security system to identify the different activity of handlers and identify their roles to enroute of accessing confidential data services. Subsequently, our work is to assure that every user should have an authentication key with specific privileges to get the desired information. In focus, we see the security management by integrating the Kerberos authentication protocol with honey encryption technique to provide strong multilevel security system.

2011 ◽  
Vol 22 (5) ◽  
pp. 1020-1030
Author(s):  
Zhi YANG ◽  
Shu-Yuan JIN ◽  
Mi-Yi DUAN ◽  
Bin-Xing FANG

2016 ◽  
Vol 1 (1) ◽  
pp. 7-16
Author(s):  
Muhammad Rofiq ◽  
Bambang Tri Wahjo Utomo

Most of Safes lock system is still using conventional methods nowadays. The conventional method leads to the safes’ burglary. Some of the causes are the safes’ code that can be tracked easily and the key can be duplicated. Previous research on safes’ security has ever been done. The weakness of the study is there is no security system using cryptographic algorithms for data security. The development of a safes security system by implementing ElGamal algorithms is done by following the engineering approach with the stages of methods analysis and design system, implementation and testing of the analysis and the discussion of the overall system. In the analysis and design of mathematical models using ElGamal algorithms, uses fast powering theorems and applications design uses Object OrientedProgramming. In the analysis of hardware refers to the datasheet and calculation of the value of electrical characteristics of the circuit. In the safes lock system, the outcome of the research is a safes prototype which is equipped with enhancements that include a series of processing algorithms, the data viewer, a wireless data transfer device, the Android smartphone as a system of user authorization. For the lock safes systems is using a locked solenoid. The control system is done by a lock safes android smartphone via Bluetooth communication. The test results also indicate the system will open the safes if the code and the public key is entered correctly, and the system will not open if one of the codes or the public-keys are wrong or both are wrong.  


2018 ◽  
Vol 12 (12) ◽  
pp. 8 ◽  
Author(s):  
Hamzah M. Marhoon ◽  
Mohammed I. Mahdi ◽  
Ehab Dh. Hussein ◽  
Ahmed R. Ibrahim

Smart house or automation house and security system has been developed in the recent years because its importance to provides the energy saving, comfort for the elderly and security to the house owners. This paper proposed to design a low cost and flexible home prototype system for controlling and monitoring. The proposed design based on two parts; first part, automation system was building by using Arduino UNO microcontroller which responsible on reading and processing the different types of sensor values that's used in the design such as gas leak, flame and temperature as well as the remote control used in automatic garage door. The second part is security system and outdoor lighting the NodeMCU will be used to monitor the state of the house security from anywhere through a special GUI was programming by HTML language that allows the user to monitor the house security as well as extinguishing and operating the outdoor light via specific IP address granted by the NodeMCU.


SinkrOn ◽  
2022 ◽  
Vol 7 (1) ◽  
pp. 147-154
Author(s):  
Deuis Nur Astrida ◽  
Agung Restu Saputra ◽  
Akhmad Ikhza Assaufi

The use of computer networks in an agency aims to facilitate communication and data transfer between devices. The network that can be applied can be using wireless media or LAN cable. At SMP XYZ, most of the computers still use wireless networks. Based on the findings in the field, it was found that there was no user management problem. Therefore, an analysis and audit of the network security system is needed to ensure that the network security system at SMP XYZ is safe and running well. In conducting this analysis, a tool is needed which will be used as a benchmark to determine the security of the wireless network. The tools used are Penetration Testing Execution Standard (PTES) which is one of the tools to become a standard in analyzing or auditing network security systems in a company in this case, namely analyzing and auditing wireless network security systems. After conducting an analysis based on these tools, there are still many security holes in the XYZ wireless SMP that allow outsiders to illegally access and obtain vulnerabilities in terms of WPA2 cracking, DoS, wireless router password cracking, and access point isolation so that it can be said that network security at SMP XYZ is still not safe


2021 ◽  
Vol 328 ◽  
pp. 04013
Author(s):  
Hajar Hadad Sitna ◽  
Arief Assaf ◽  
Latif Lita Asyarif

There are many concepts to smart cities, but in general, a smart city is a combination of the use of Information and Technology (IT) with various dimensions to increase efficiency, transparency and service quality. The dimensions of smart cities most popular are six dimensions, namely smart mobility, smart living, smart environment, smart people, smart government, and smart economy. Some literature only mentions the role of IT in the smart technology dimension but has not explained the level of achievement indicators for the smart technology dimension. The dimensions of smart technology and indicators of achievement level are carried out using a Systematic Review (SR), where more than 7.302 papers were found that match the topic and then divided into the 20 main studies based on SR protocol. The indicator of the level of achievement of the smart technology dimension in a smart city is divided into four parts, namely the use of sensors in the smart city, integration between applications (application layer), the use of technological innovations in the intelligent layer such as the IoT, big data, and cloud computing etc., and to improving the quality and scope of applications, increasing the use of AI and engagement with all public stakeholders.


2012 ◽  
Vol 588-589 ◽  
pp. 1593-1597
Author(s):  
Jia Lin Hou ◽  
Rui Hou ◽  
Dong Sheng Gao ◽  
Huai Rui Shu

Combining with the modern orchards’ large-scale development mode and requirements of precision agriculture construction, we designed an orchard long-distance intelligent irrigation system. GPRS network and ZigBee wireless sensor network composed of microcontroller, soil moisture sensor, zero-pressure solenoid valve and CC2430 are used in this system to transmits and control the data. By analyzing the soil’s water content of the sample and combining the advanced setting threshold, the system can send order to control the zero-pressure solenoid valve so that the long-distance control and intelligent irrigation are achieved. When puts into practice, the system shows a stable performance. It meets the design requirements in data acquisition, data transfer and long-distance control and deserves better promotion.


Sign in / Sign up

Export Citation Format

Share Document