scholarly journals Compound Cryptography for Internet of Things Based Industrial Automation

2021 ◽  
Author(s):  
J.S. Prasath

Internet of things based industrial automation systems are widely used for process monitoring, and control applications. The security threats increase due to the internet is an open environment. This proposed work is the implementation of secure monitoring of plant information through the Supervisory Control and Data Acquisition (SCADA) system. The modified asymmetric and hash algorithm is proposed which generates the large key size of 4096-bit and 512-bit respectively. This proposed security algorithm is implemented using the ARM Cortex A53 processor which performs data encryption and decryption. It provides authentication and integrity of process information across the internet. It achieves a data transfer rate of 300 Megabits per second and more than 95 percent efficiency. This proposed work can be applied for securing the internet-enabled industrial automation process and allows secure monitoring of plant information in remote areas. The security of sensitive process parameters is enhanced through the proposed large key size in asymmetric algorithms. This proposed security algorithm prevents the damage to industrial devices from unauthorized access and modification. It assures the smooth functioning of plant operations and also provides safety to plant operators.

2021 ◽  
Author(s):  
Prasath J S

Abstract The technologies in monitoring and control of industrial process have changed due to the rapid growth of emerging technologies especially the most popular Internet of Things (IoT). The Internet is an essential part of day-to-day life and it is used to gather more information. The emerging trend in the field of industrial automation is the integration of embedded systems with wireless technologies which enables monitoring of process information through the internet. As the internet is the open environment, a lot of security issues and vulnerabilities arise to the industrial devices. The usage of internet in process monitoring enables attackers to monitor and change the process data. The unsecured industrial operations lead to failure of process equipment and safety issues to plant operators. The security mechanisms are essential in order to protect the embedded systems and wireless networks from unauthorized access. This proposed heterogeneous security algorithm includes symmetric, asymmetric and hash algorithms which strengthen the level of security. The novelty of the proposed work is it employs 128-bit key size for symmetric encryption, 1024-bit key size for asymmetric encryption along with the use of hash algorithm all together strengthens the security and it is tested in real time using embedded system with IoT. It takes less time for execution of data encryption and decryption. This proposed hybrid security algorithm is implemented and tested in an embedded system with wireless monitoring of process information through the internet. It ensures secure communication and monitoring of process data through the internet. The attacker cannot identify and modify the plant information transmitted across internet. This proposed work can be applied to industries dealing with sensitive process information.


Author(s):  
Sree Naga Raja Sekhar Mallela

Abstract: The most common buzzwords in the world is “The Internet of things” (IoT) and IOT describes the network of physical objects, so known as, "things" those are rooted with sensors in the devices, application software, technologies that is used for the resolution of connecting one end to another end and exchanging information with other devices and systems over the Internet. The IoT 5G technologies can also be used in journalism and the primary focus is to increase M2M interaction of mass communication devices. One way it is “ubiquitous computing” can occur using any device, in any location, and in any format. The Internet of Things (IoT) is all about small cost sensors grabbing data to communicate with one device to another device using cloud solutions. Coming to the 5th generation mobile network. We have already started using 4G networks and as we know that, start with 1G, 2G, 3G, and 4G networks. The 5th generation network is going to enable an upcoming new network that will associate virtually every person globally connected and everything organized including IoT devices, objects and machines. Central communication and Journalism is the activity of gathering right information, evaluating, generating, and presenting broadcast information. It is high time to start using IOT Technology using 5th generation high-speed network connectivity devices to communicate or data transfer in the area of journalism. Keywords: IOT – Internet Of Things, 5G- Fifth Generation in data network, JMC – Journalism and Mass Communications, M2M – Machine to Machine, Cloud , Artificial intelligence and Machine Learning.


Author(s):  
Kundankumar Rameshwar Saraf ◽  
Malathi P. Jesudason

This chapter explores the encryption techniques used for the internet of things (IoT). The security algorithm used for IoT should follow many constraints of an embedded system. Hence, lightweight cryptography is an optimum security solution for IoT devices. This chapter mainly describes the need for security in IoT, the concept of lightweight cryptography, and various cryptographic algorithms along with their shortcomings given IoT. This chapter also describes the principle of operation of all the above algorithms along with their security analysis. Moreover, based on the algorithm size (i.e., the required number of gate equivalent, block size, key size, throughput, and execution speed of the algorithm), the chapter reports the comparative analysis of their performance. The chapter discusses the merits and demerits of these algorithms along with their use in the IoT system.


2019 ◽  
Vol 7 (2) ◽  
pp. 21-40 ◽  
Author(s):  
Parthasarathy Panchatcharam ◽  
Vivekanandan S.

Wellbeing is fundament requirement. What's more, it is human appropriate to get quality health care. These days, India is confronting numerous medical problems in light of fewer assets. This survey article displays the idea of solving health issues by utilizing a recent innovation, the Internet of Things (IOT). The Internet of Things with their developing interdisciplinary applications has changed our lives. Smart health care being one such IoT application interfaces brilliant gadgets, machines, patients, specialists, and sensors to the web. At long last, the difficulties and prospects of the improvement of IoT-based medicinal service frameworks are talked about in detail. This review additionally summarizes the security and protection worries of IoT, administrations and application of IoT and smart healthcare services that have changed the customary medicinal services framework by making healthcare administration more proficient through their applications.


2018 ◽  
Vol 7 (3) ◽  
pp. 1491
Author(s):  
Dr Chalasani Srinivas ◽  
Dr Srinivas Malladi

The Internet of Things (IoT) is growing in the web of an age-old IPv6 address for Internet connections and messages that arise between these and other devices and systems that work with the Internet. It is equipped with the unique ID and data transfer capability through the network. Among other things, tracking and tracking online travel is a major issue. Although there are many tracking techniques for moving objects, many are at risk. So there is a need for tracking the safety of an object Safety protocols should provide visibility and tracking of street objects in support of the Internet (IoT). This protocol is based on the RFID Identity System for IoT Objects. Existing ones do not provide authentication of sites that lead to fakes. Great use of energy. The proposed protocol improves road safety tracking using the base protocol light and SPDL. The requested protocol is intended to ensure accuracy, accuracy, confidentiality and encryption. To ensure safe monitoring of objects, the requested protocols use cryptic primitives that use HMAC concepts that are used to authenticate an object. This protocol introduction relies on code authentication code (CMC), which is used to reduce power consumption at low cost. The testing of a test network evaluates protocol implementation and is found to be safer and requires less calculation than existing protocols.  


Sensors ◽  
2019 ◽  
Vol 19 (21) ◽  
pp. 4724
Author(s):  
Enrico Buzzoni ◽  
Fabio Forlani ◽  
Carlo Giannelli ◽  
Matteo Mazzotti ◽  
Stefano Parisotto ◽  
...  

This paper discusses the design and prototype implementation of a software solution facilitating the interaction of third-party developers with a legacy monitoring and control system in the airfield environment. By following the Internet of Things (IoT) approach and adopting open standards and paradigms such as REpresentational State Transfer (REST) and Advanced Message Queuing Protocol (AMQP) for message dispatching, the work aims at paving the way towards a more open world in the airfield industrial sector. The paper also presents performance results achieved by extending legacy components to support IoT standards. Quantitative results not only demonstrate the feasibility of the proposed solution, but also its suitability in terms of prompt message dispatching and increased fault tolerance.


2013 ◽  
Vol 469 ◽  
pp. 322-325 ◽  
Author(s):  
Zhi Qiang Gao ◽  
Xiu Ping Zhao

The Internet of Things technology used in agricultural products, such as food safety traceability management is taking the technological advantages of the Internet of Things RFID (Radio Frequency IDentification) is non-contact automatic fast read and write data encryption, in order to achieve a unified management and efficient flow of work in coordination.This thesis reports a production method of conductive nanosilver jet ink. The ink can be used to directly print RFID antenna coil. In the method using silver nitrate as silver source, hydrazine hydrate as a reducing agent, polyvinyl pyrrolidone as a protective agent. Obtain the dispersion of silver nanoparticles through chemical reduction reaction. The dispersion was purified and used inkjet printer into a graphic on glossy photo paper, after 180 °C sintered for 15 minutes with good conductivity, RFID antennas to meet requirements.


Sensors ◽  
2021 ◽  
Vol 22 (1) ◽  
pp. 27
Author(s):  
Franco Cicirelli ◽  
Antonio Guerrieri ◽  
Andrea Vinci

The Internet of Things (IoT) and related technologies are promising in terms of realizing pervasive and smart applications, which, in turn, have the potential to improve the quality of life of people living in a connected world [...]


2020 ◽  
Vol 4 (2) ◽  
pp. 47-53
Author(s):  
Afdal Eka Kurniawan ◽  
Mayda Waruni Kasrani ◽  
A Asni B

Abstract— The LPG (Liquefied Petroleum Gas) gas leak detection and monitoring system is an anticipatory measure for safety from hazards such as gas cylinder explosions. This research aims to build a detection system by integrating MQ-6 sensor, Arduino microcontroller and ESP8266. Data can then be displayed on the Blynk application and notifications will be given via the application and email. The process of sending data using SIM800L module GSM/GPRS is a part that serves to communicate between the main monitors with mobile phone and the module ESP8266E ESP 12E WIFI IOT for data transfer in WIFI network . And this system has fulfilled the rules of the Internet of things, making it easier for the community in its application.


Sign in / Sign up

Export Citation Format

Share Document