scholarly journals Data Message

2020 ◽  
Author(s):  
Keyword(s):  
Author(s):  
I Made Sukarsa ◽  
I Made Rama Pradana ◽  
Putu Wira Buana

Communication via sockets is used to transmit information between applications or between processes over network or locally. ZeroMQ is a library for sending messages using sockets that are quite well known. Talking about sending data, message security is an important part that needs to be taken into account, especially when sending data over a network. ZeroMQ sends messages openly without securing the messages sent. This is evidenced by research which states that ZeroMQ does not have a security layer for sending messages over the network and direct observation of message packets using the wireshark application. Therefore, this study creates a method of securing and authenticating message delivery using AES (Advanced Encryption Standard) CBC (Cipher Block Chaining) mode combined with an authentication method. The AES CBC mode was chosen because it is faster than other methods and has strong encryption. This encryption and authentication are used so that the sender and recipient of the message are both valid senders and recipients so that no message changes during message delivery and messages can only be opened by the message recipient and the sender of the message. Tests are conducted to measure the effect of encryption and authentication on message delivery performance. Based on the tests conducted, there is an increase of 7% from normal delivery speed and the potential for messages is not up to 0.3% - 1.5%.


Electronics ◽  
2020 ◽  
Vol 9 (8) ◽  
pp. 1320
Author(s):  
Joong-Hwa Jung ◽  
Moneeb Gohar ◽  
Seok-Joo Koh

The Constrained Application Protocol (CoAP) is a representative messaging protocol for Internet of Things (IoT) applications. It is noted that a lot of IoT-based streaming applications have been recently deployed. Typically, CoAP uses User Datagram Protocol (UDP) as its underlying protocol for lightweight messaging. However, it cannot provide reliability, since it is based on UDP. Thus, the CoAP over Transmission Control Protocol (TCP) was recently proposed so as to provide reliability. However, the existing schemes do not provide the error handling and flow controls suitably for IoT-based streaming applications. This tends to induce throughput degradation in wireless lossy networks. In this paper, we propose a CoAP-based streaming control (CoAP-SC) scheme, which is an extension of CoAP over UDP with error handling and flow control for throughput enhancement. The proposed CoAP-SC scheme is designed by considering the sequence number of data message, the use of ACK messages, and the buffer size of sending buffer. To do this, a new CoAP option is defined. For performance analysis, the proposed scheme is implemented and compared with the existing schemes. From the testbed experimentations in various network environments, we see that the proposed CoAP-SC scheme can provide better throughput than the existing CoAP-based schemes by performing the error handling and flow control operations effectively.


2020 ◽  
Vol 6 (1) ◽  
pp. 109-116
Author(s):  
Abdul Jalil

Tujuan penelitian ini adalah membangun sistem deteksi gerak objek berbasis teknik pengolahan citra menggunakan metode Binary-Image Comparison (BIC). Fungsi metode BIC pada penelitian ini adalah sebagai pengambil keputusan pada saat sistem mengirim data message sebagai hasil dari deteksi gerak objek. Adapun gerak objek yang dideteksi pada penelitian ini adalah objek dengan warna merah, kuning, hijau, dan biru. Pada penelitian ini, proses segmentasi citra biner diproses menggunakan perangkat lunak Library OpenCV yang dieksekusi didalam node Robot Operating System 2 (ROS2). Terdapat beberapa node ROS2 yang digunakan untuk membangun sistem deteksi gerak objek pada penelitian ini, yaitu node untuk membaca input kamera RGB, node untuk mendeteksi gerak objek warna merah, node untuk mendeteksi gerak objek warna kuning, node untuk mendeteksi gerak objek warna hijau, node untuk mendeteksi gerak objek berwarna biru, dan node untuk menerima hasil proses deteksi warna. Setiap node pada sistem tersebut dapat saling terhubung melalui topic untuk dapat saling bertukar data message menggunakan protokol Data Distribution Service (DDS) yang ada pada ROS2. Hasil dari penelitian ini adalah sistem dapat mendeteksi gerak objek warna merah, kuning, hijau, dan biru kemudian mengirimnya sebagai data message berdasarkan hasil keputusan dari metode BIC.


Author(s):  
G. Golovko ◽  
A. Matiashenko ◽  
N. Solopihin

This article offers an example of using an application whose main task is to encrypt data such as files and private messages. Data encryption is performed using an encryption algorithm - xor. The XOR cipher is a data encryption algorithm using exclusive disjunction. Acquired widespread use in computer networks in the 90's due to the ease of implementation. Used to encrypt Microsoft Word documents in Windows. The XOR encryption algorithm is to "overlay" a sequence of random numbers on the text to be encrypted. A sequence of random numbers is called a gamma sequence, and is used to encrypt and decrypt data. If you use a key with a length at least equal to the length of the message, the XOR cipher becomes much more crypto-resistant than when using a duplicate key. For cryptological protection of information of the travel company Rest & Travel, EDcrypt software has been created, which performs the following functions: account login; inability to use the system without logging in to the account; notification of entering incorrect user data; message encryption; decryption of messages; the ability to select the recipient of the message; encryption of text files; decryption of text files; sending text files to selected recipients; three interface languages: English, Russian, Ukrainian


Sensors ◽  
2019 ◽  
Vol 19 (5) ◽  
pp. 1238 ◽  
Author(s):  
Seyed Darroudi ◽  
Raül Caldera-Sànchez ◽  
Carles Gomez

The recent publication of the Bluetooth Mesh standard is a remarkable milestone in the evolution of Bluetooth Low Energy (BLE). As a new technology in the Internet of Things (IoT) market, it is crucial to investigate the performance of Bluetooth Mesh. However, while a fundamental feature of Bluetooth Mesh is its suitability for energy-constrained devices, this aspect has not yet been properly considered in the literature. In this paper, we model the current consumption, lifetime and energy cost per delivered bit of a battery-operated Bluetooth Mesh sensor node. The model is based on measurements performed on a real hardware platform. Evaluation results quantify the impact of crucial Bluetooth Mesh parameters. Among others, we have found that a sensor device running on a simple 235 mAh battery, and sending a data message every 10 s, can achieve a lifetime of up to 15.6 months, whereas the asymptotic lifetime is 21.4 months.


Sign in / Sign up

Export Citation Format

Share Document