Traffic Analysis Using IoT for Improving Secured Communication

Author(s):  
Lakshman Narayana Vejendla ◽  
Alapati Naresh ◽  
Peda Gopi Arepalli

Internet of things can be simply referred to as internet of entirety, which is the network of things enclosed with software, sensors, electronics that allows them to gather and transmit the data. Because of the various and progressively malevolent assaults on PC systems and frameworks, current security apparatuses are frequently insufficient to determine the issues identified with unlawful clients, unwavering quality, and to give vigorous system security. Late research has demonstrated that in spite of the fact that system security has built up, a significant worry about an expansion in illicit interruptions is as yet happening. Addressing security on every occasion or in every place is a really important and sensitive matter for many users, businesses, governments, and enterprises. In this research work, the authors propose a secret IoT architecture for routing in a network. It aims to locate the malicious users in an IoT routing protocols. The proposed mechanism is compared with the state-of-the-art work and compared results show the proposed work performs well.

Electronics ◽  
2019 ◽  
Vol 8 (5) ◽  
pp. 480 ◽  
Author(s):  
Andrea Ballo ◽  
Alfio Dario Grasso ◽  
Gaetano Palumbo

With the aim of providing designer guidelines for choosing the most suitable solution, according to the given design specifications, in this paper a review of charge pump (CP) topologies for the power management of Internet of Things (IoT) nodes is presented. Power management of IoT nodes represents a challenging task, especially when the output of the energy harvester is in the order of few hundreds of millivolts. In these applications, the power management section can be profitably implemented, exploiting CPs. Indeed, presently, many different CP topologies have been presented in literature. Finally, a data-driven comparison is also provided, allowing for quantitative insight into the state-of-the-art of integrated CPs.


Author(s):  
Robert Cerna Duran ◽  
◽  
Brian Meneses Claudio ◽  
Alexi Delgado

The increase in garbage production today is due to the exponential growth of the population worldwide, due to the fact that thousands of tons of garbage are generated daily around the world, but the mismanagement that gives them has become an environmental problem since 33% of all the garbage generated is not recycled, for that reason it is estimated that within the next three decades the amount of waste worldwide will increase to 70%. That is why in the present research work it is proposed to make an intelligent system based on the Internet of Things (IoT) that allows monitoring the garbage containers in real time representing with percentages the state of these containers and these can be collected in time by garbage trucks, and thus avoid the increase of garbage in the streets and the various types of problems that these would cause. As a result, it was obtained that the System does comply with the established conditions because it allows to monitor in real time representing by percentages the state of the garbage container, which indicates 40% as almost full and 80% indicates that it is already available for collection. Finally, it is concluded that using the Garbage Container Monitoring System will allow to better optimize the collection process and, in addition, the problems that are usually perceived today due to the amount of garbage that are registered in the streets will decrease. Keywords-- Internet of Things; Intelligent system; Real time; Environmental Problem; Monitoror; Percentage.


2021 ◽  
Vol 12 (1) ◽  
pp. 155
Author(s):  
Chaeyeon Oh ◽  
Joonseo Ha ◽  
Heejun Roh

Recently, a majority of security operations centers (SOCs) have been facing a critical issue of increased adoption of transport layer security (TLS) encryption on the Internet, in network traffic analysis (NTA). To this end, in this survey article, we present existing research on NTA and related areas, primarily focusing on TLS-encrypted traffic to detect and classify malicious traffic with deployment scenarios for SOCs. Security experts in SOCs and researchers in academia can obtain useful information from our survey, as the main focus of our survey is NTA methods applicable to malware detection and family classification. Especially, we have discussed pros and cons of three main deployment models for encrypted NTA: TLS interception, inspection using cryptographic functions, and passive inspection without decryption. In addition, we have discussed the state-of-the-art methods in TLS-encrypted NTA for each component of a machine learning pipeline, typically used in the state-of-the-art methods.


Complexity ◽  
2019 ◽  
Vol 2019 ◽  
pp. 1-12 ◽  
Author(s):  
David Gil ◽  
Magnus Johnsson ◽  
Higinio Mora ◽  
Julian Szymański

There is a growing awareness that the complexity of managing Big Data is one of the main challenges in the developing field of the Internet of Things (IoT). Complexity arises from several aspects of the Big Data life cycle, such as gathering data, storing them onto cloud servers, cleaning and integrating the data, a process involving the last advances in ontologies, such as Extensible Markup Language (XML) and Resource Description Framework (RDF), and the application of machine learning methods to carry out classifications, predictions, and visualizations. In this review, the state of the art of all the aforementioned aspects of Big Data in the context of the Internet of Things is exposed. The most novel technologies in machine learning, deep learning, and data mining on Big Data are discussed as well. Finally, we also point the reader to the state-of-the-art literature for further in-depth studies, and we present the major trends for the future.


Frequenz ◽  
2017 ◽  
Vol 71 (9-10) ◽  
pp. 473-484
Author(s):  
Paolo Valerio Testa ◽  
Bernhard Klein ◽  
Ronny Hahnel ◽  
Dirk Plettemeier ◽  
Corrado Carta ◽  
...  

Abstract This paper presents an overview of the research work currently being performed within the frame of project DAAB and its successor DAAB-TX towards the integration of ultra-wideband transceivers operating at mm-wave frequencies and capable of data rates up to 100 Gbits $^{-1}$. Two basic system architectures are being considered: integrating a broadband antenna with a distributed amplifier and integrate antennas centered at adjacent frequencies with broadband active combiners or dividers. The paper discusses in detail the design of such systems and their components, from the distributed amplifiers and combiners, to the broadband silicon antennas and their single-chip integration. All components are designed for fabrication in a commercially available SiGe:C BiCMOS technology. The presented results represent the state of the art in their respective areas: 170 GHz is the highest reported bandwidth for distributed amplifiers integrated in Silicon; 89 GHz is the widest reported bandwidth for integrated-system antennas; the simulated performance of the two antenna integrated receiver spans 105 GHz centered at 148GHz, which would improve the state of the art by a factor in excess of 4 even against III-V implementations, if confirmed by measurements.


Sign in / Sign up

Export Citation Format

Share Document