An overview of agriculture industry is involved with large area, farmers and agriculture products. A large scale of area requires time consuming for collecting data to make decision on agriculture (e.g. watering, pruning and harvesting.). From these requirements, wireless sensor network can be a supported technology because it can deploy distributed and construct network sharing among their group. In general, security solution needs an experienced and skilled specialist to set up, maintain and troubleshoot. This is a challenge for wireless sensor network to implement in agriculture industry. Our security approach is presented related factors and customized configuration for the process of deployment, maintenance, information feedback. This paper presents the security mechanism to support the needs of self-setup and minimum operation for wireless sensor network in agriculture industry. The security module has automated initiate key by HKD protocol and has Adaptive IDS to alert when threat is detected via speaker. This system is also simplified the configuration, deployment and maintenance by only powering on and system will then initiate the key among the agents. As a result, this security module is proposed to balance between the moderate security with the limited resource and technician.
Smart Grid Systems Based Survey on Cyber Security IssuesjournalBEEI
The future power system will be an innovative administration of existing power grids, which is called smart grid. Above all, the application of advanced communication and computing tools is going to significantly improve the productivity and consistency of smart grid systems with renewable energy resources. Together with the topographies of the smart grid, cyber security appears as a serious concern since a huge number of automatic devices are linked through communication networks. Cyber attacks on those devices had a direct influence on the reliability of extensive infrastructure of the power system. In this survey, several published works related to smart grid system vulnerabilities, potential intentional attacks, and suggested countermeasures for these threats have been investigated.
Smart grids is an added communication capabilities and intelligence to traditional grids,smart grids are enabled by Intelligent sensors and actuators, Extended data management system,Expanded two way communication between utility operation system facilities and customers,Network security ,National integration ,Self healing and adaptive –Improve distribution and transmission system operation,Allow customers freedom to purchase power based on dynamic pricing ,Improved quality of power-less wastage ,Integration of large variety of generation options.
We have seen the more complex and critical infrastructure the more vulnerable they are. From the Year of 1994 we have seen lots of incidents where SmartGrid were Hacked the latest and booming incident was Stuxnet Worm which targeted Nuclear Power System of Iran and Worldwide.There are different types of Attacks we will see. Security needed for Smart Grid.
Curtain Control Systems Development on Mesh Wireless Network of the Smart HomejournalBEEI
In this paper, a curtain controller for smart home is presented. The aim of this work is to develop an end device in smart home system that will support power conservation function indirectly, specifically a curtain open/close controller. To achieve this, the 28BYJ-48 stepper motor is used as actuator with the assistance of ULN2003A driver. The motor is controlled using STM32L100RCT6 microcontroller, which is chosen due to its low power consumption. The microcontroller controls the motor’s direction by using a pulse width modulation logic signals emitted from four GPIO pins, which works based on data transmitted from central host through ZigBee protocol on Mesh network. Meanwhile, from the user’s side, the control is done by using Android-based application, which is connected to central host through Bluetooth. Based on the testing conducted on a miniature curtain, the curtain can be controlled wirelessly through the Android application. Furthermore, the device consumes power 210.5 mW for idle condition and 1,586 mW for process condition. The amount of the consumed power makes it suitable for low-power operation and in alignment with the smart home system’s overall aim for power conservation in the wireless sensor network-based smart home system.
Smart security door system using SMS based energy harvestIJECEIAES
Over the last decade, different studies have been conducted to increase security to identify sensor technology and provide alternative energy with other energy harvest techniques such as vibration energy harvester and sun energy harvester. There is no combinational approach to utilize the door to create energy and use it for security measures in the literature, making our system different and unique. This proposed system comprises the security and the energy harvest; the security section utilizes a motion detector sensor to detect intruders. For instance, the magnetic door lock type firmly locks the door, which can only open with a generated password. On the other side, the energy harvest section utilizes the door motion to generate electricity for the system, which solves power shortage and limited battery life issues. Moreover, this study includes a GSM module that allows authorized owners to receive a generated password as a security enhancement. This design mainly focuses on improving or optimizing the conventional security doors' overall performance as sliding door, panel door, or revolving door. The experimental results show the system efficiency in terms of power generation and the time needed to authenticate the property owner. Notably, the power generator can generate electricity more rapidly, while the needed time to receive the mobile device's security code is around 3.6 seconds.
Smart Grid Systems Based Survey on Cyber Security IssuesjournalBEEI
The future power system will be an innovative administration of existing power grids, which is called smart grid. Above all, the application of advanced communication and computing tools is going to significantly improve the productivity and consistency of smart grid systems with renewable energy resources. Together with the topographies of the smart grid, cyber security appears as a serious concern since a huge number of automatic devices are linked through communication networks. Cyber attacks on those devices had a direct influence on the reliability of extensive infrastructure of the power system. In this survey, several published works related to smart grid system vulnerabilities, potential intentional attacks, and suggested countermeasures for these threats have been investigated.
Smart grids is an added communication capabilities and intelligence to traditional grids,smart grids are enabled by Intelligent sensors and actuators, Extended data management system,Expanded two way communication between utility operation system facilities and customers,Network security ,National integration ,Self healing and adaptive –Improve distribution and transmission system operation,Allow customers freedom to purchase power based on dynamic pricing ,Improved quality of power-less wastage ,Integration of large variety of generation options.
We have seen the more complex and critical infrastructure the more vulnerable they are. From the Year of 1994 we have seen lots of incidents where SmartGrid were Hacked the latest and booming incident was Stuxnet Worm which targeted Nuclear Power System of Iran and Worldwide.There are different types of Attacks we will see. Security needed for Smart Grid.
Curtain Control Systems Development on Mesh Wireless Network of the Smart HomejournalBEEI
In this paper, a curtain controller for smart home is presented. The aim of this work is to develop an end device in smart home system that will support power conservation function indirectly, specifically a curtain open/close controller. To achieve this, the 28BYJ-48 stepper motor is used as actuator with the assistance of ULN2003A driver. The motor is controlled using STM32L100RCT6 microcontroller, which is chosen due to its low power consumption. The microcontroller controls the motor’s direction by using a pulse width modulation logic signals emitted from four GPIO pins, which works based on data transmitted from central host through ZigBee protocol on Mesh network. Meanwhile, from the user’s side, the control is done by using Android-based application, which is connected to central host through Bluetooth. Based on the testing conducted on a miniature curtain, the curtain can be controlled wirelessly through the Android application. Furthermore, the device consumes power 210.5 mW for idle condition and 1,586 mW for process condition. The amount of the consumed power makes it suitable for low-power operation and in alignment with the smart home system’s overall aim for power conservation in the wireless sensor network-based smart home system.
Smart security door system using SMS based energy harvestIJECEIAES
Over the last decade, different studies have been conducted to increase security to identify sensor technology and provide alternative energy with other energy harvest techniques such as vibration energy harvester and sun energy harvester. There is no combinational approach to utilize the door to create energy and use it for security measures in the literature, making our system different and unique. This proposed system comprises the security and the energy harvest; the security section utilizes a motion detector sensor to detect intruders. For instance, the magnetic door lock type firmly locks the door, which can only open with a generated password. On the other side, the energy harvest section utilizes the door motion to generate electricity for the system, which solves power shortage and limited battery life issues. Moreover, this study includes a GSM module that allows authorized owners to receive a generated password as a security enhancement. This design mainly focuses on improving or optimizing the conventional security doors' overall performance as sliding door, panel door, or revolving door. The experimental results show the system efficiency in terms of power generation and the time needed to authenticate the property owner. Notably, the power generator can generate electricity more rapidly, while the needed time to receive the mobile device's security code is around 3.6 seconds.
The interconnecting mechanism for monitoring regular domestic conditioneSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES ijesajournal
A design of simple hardware circuit with different kind of fire sensors enables every user to use this wireless fire security system. The challenges in designing the nodes with various types of fire sensors are
discussed and the methods to overcome design problems are also analyzed. The circuit is interfaced with
the different types of sensor to sense different fire sources such as gas leakage, smoke, and heat. The cost,
circuit components, design requirements, power requirements of sensor node are minimized. The methods
to improve the quality of system to detect fire are analyzed. The system is fully controlled by the PIC
microcontroller. All the sensors and detectors are interconnected to PIC microcontroller by using various
types of interface circuits. The PIC microcontroller will continuously monitor all the sensors and if it senses
any security problem then the microcontroller will send the information to the PC central monitoring station wirelessly for a short distance of 300m indoor/1500m outdoor using zigbee technology. The gas
sensor, light sensor, smoke detector sensor, IR sensor, temperature & humidity sensor, fire sensor are interfaced with microcontroller to detect abnormal fire conditions in the environment in all possible ways.
This project aims at achieving automation using the widely used mobile operating system ANDROID i.e. android operating system. The electrical and office appliances can be controlled using the android mobile phones and Internet of things (IoT) even if you are out of your house and you forgot to switch off the appliances. Many electrical and office appliances like light, fan, air conditioner etc., can be controlled using the android operating system. This proposed system is implemented in order to overcome the drawbacks of the previous methodologies. This can also be implemented at homes also. Office automation is the residential extension of building automation. Office automation may include centralized control of lighting, HVAC (heating, ventilation and air conditioning), appliances, to provide improved convenience, comfort, energy efficiency and security. Office automation for the elderly and disabled can provide increased quality of life for persons who might otherwise require caregivers or institutional care.
23 9754 assessment paper id 0023 (ed l)2IAESIJEECS
This paper presents a risk assessment method for assessing the cyber security of power systems in view of the role of protection systems. This paper examines the collision of transmission and bus line protection systems positioned in substations on the cyber-physical performance of the power systems. The projected method simulates the physical feedback of power systems to hateful attacks on protection system settings and parameters. The relationship between protection device settings, protection logic, and circuit breaker logic is analyzed. The expected load reduction (ELC) indicator is used in this paper to determine potential losses in the system due to cyber attacks. The Monte Carlo simulation is used to calculate ELC’s account to assess the capabilities of the attackers and bus arrangements are changed. The influence of the projected risk assessment method is illustrated by the use of the 9-bus system and the IEEE-68 bus system.
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...CSCJournals
Due to extremely high demand of mobile phones among people, over the years there has been a great demand for the support of various applications and security services. 2G and 3G provide two levels of security through: encryption and authentication. This paper presents performance analysis and comparison between the algorithms in terms of time complexity. The parameters considered for comparison are processing power and input size. Security features may have adverse effect on quality of services offered to the end users and the system capacity. The computational cost overhead that the security protocols and algorithms impose on lightweight end users devices is analyzed. The results of analysis reveal the effect of authentication and encryption algorithms of 2G and 3G on system performance defined in terms of throughput which will further help in quantifying the overhead caused due to security.
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityLeonardo ENERGY
This Cybersecurity webinar, the second in a series, addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids worldwide. Technology and market challenges will be addressed, followed by cybersecurity approaches (including those used in Europe and US) and best practices. Three case studies, and legal and regulatory constraints, for architecting smart grids in a secure way also will be presented.
The multiple applications (Forest, Industrial, Home) sector being the backbone of the security system. Security systems which are being used now a day are not smart enough to provide real time notification after sensing the problem. This Project is very useful in industrial monitoring system, forest safety and controlling an application. The Processing Sensor analysis of PIR sensors, Fire, air, temp sensors based multiple sector Analysis industrial, human identification and Any Identification Indicate LCD Display and Web camera Based Any Problem Capture Stored Image Data base. In the present work a PIC Microcontroller based the remote irrigation system is developing for the multiple process. The microcontroller use to controlling and displaying the resultant sensor values LCD Display Identifying System.
DESIGNING THE IOT BASESTATION FOR GREENHOUSE MONITORINGIAEME Publication
This article put forward a technique to realize the communication between wireless sensor network and the Internet. The IOT (Internet of Things) gateway is used as part of the greenhouse checking system. The design well-matched multiple access method such as LAN, Wifi, GPRS, EDGE, 3G and so on, also the data can be deposited locally. The IOT gateway uses STM32 as the MCU, μC/OS-III as the embedded operating system. The application demonstrates the gateway is trustworthy, compatible, and extendible. Because of this gateway the greenhouse monitoring system realized the real-time detection and control of the greenhouse, and enhance the ability of the automation and the smartness of the greenhouse monitoring
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMIJNSA Journal
In this study security of internet access over the Third Generation (3G) telecommunication systems is considered and Universal Mobile Telecommunications System (UMTS) is selected as the most popular system among 3G systems. The study then focuses on network access security mechanism of UMTS, called Authentication and Key Agreement (AKA). In addition, twenty types of important attacks and threats in UMTS system are presented and classified based on three major security factors; authentication, confidentiality, and data integrity. The evaluations finally show that the authentication factor is more interesting than other factors for hackers. Then, we describe four attacks named; man-inthe-middle, denial of service, identity catching, and redirection as the most significant attacks against authentication mechanism. Furthermore, we provide some solutions and methods to improve AKA
mechanism and prevent these attacks in UMTS system.
Intelligent fire detection and alert system using labVIEWIJECEIAES
Fire detection systems are designed to discover fires and allow the safe evacuation of occupants as well as protecting the safety of emergency response personnel. This paper describes the design and development of a fire detection and alert system. Temperature and flame sensors are used to indicate the occurrence of fire. This work consists of two parts, which are transmitter and receiver, both using ZigBee wireless technology. Arduino Uno is used as the microcontroller at the transmitter part to control the sensor nodes and give alert when over temperature and flame are detected. At the transmitter, the collected data from the sensors are transmitted by an XBee module operated as router node. At the receiver side, an XBee coordinator module which is attached to a computer using USB to serial communication captured the data for further processing. In addition, an interactive and user-friendly Graphical User Interface (GUI) is developed. LabVIEW software is used to design the GUI which displays and analyze the possibility of fire happening. The system can display the fire location and provides early warning to allow occupants to escape the building safely.
MATLAB Implementation of 128-key length SAFER+ Cipher SystemIJERA Editor
Data security is a major challenge today. To protect data in the Internet or in private networks many measures exist. The most important security layer is the use of encryption standard to protect information from eavesdropper. Today many encryption standards exist failing in two categories: symmetric and asymmetric key algorithms. In this work Secure And Fast Encryption Routine (SAFER+) standard is implemented using MATLAB. The development in computer programming techniques and languages offers a good opportunity of the software implementation of encryption standards with moderate cost and good performance. MATLAB can be considered today as the first engineering programming language with powerful mathematical function and reliable programming procedures
Cyber-Defensive Architecture for Networked Industrial Control SystemsIJEACS
This paper deals with the inevitable consequence of the convenience and efficiency we benefit from the open, networked control system operation of safety-critical applications: vulnerability to such system from cyber-attacks. Even with numerous metrics and methods for intrusion detection and mitigation strategy, a complete detection and deterrence of internal code flaws and outside cyber-attacks has not been found and would not be found anytime soon. Considering the ever incompleteness of detection and prevention and the impact and consequence of mal-functions of the safety-critical operations caused by cyber incidents, this paper proposes a new computer control system architecture which assures resiliency even under compromised situations. The proposed architecture is centered on diversification of hardware systems and unidirectional communication from the proposed system in alerting suspicious activities to upper layers. This paper details the architectural structure of the proposed cyber defensive computer control system architecture for power substation applications and its validation in lab experimentation and on a cybersecurity testbed.
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...IJECEIAES
Smart Home concept is to connect several devices to perform control and the device to be controlled to help any human needs. So it should have one device being Host and several devices being Client. The environment in this case is a home that there is too much technology that planted technologies that has much influence at human activities is called pervasive computing. The device communication should be has a protocol, at the research used UDP protocol because it doesn't need to negotiate before performing communication like a TCP. With UDP behavior did not use to validate at every send or deliver data because at Smart Home environment doesn't need a large or big data being processed. LabView used at this research based on previous research, but MyRIO has used this research to perform Client and Host performed by PC. So it can measure how usable the design that created. This research proves that LabView and MyRIO successfully implemented with the design that created to perform Pervasive Computing for Smart Home environment. Functional testing scenario conducted by every condition that on system environment, based on design all testing scenario successfully and working as well as expected.
The interconnecting mechanism for monitoring regular domestic conditioneSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES ijesajournal
A design of simple hardware circuit with different kind of fire sensors enables every user to use this wireless fire security system. The challenges in designing the nodes with various types of fire sensors are
discussed and the methods to overcome design problems are also analyzed. The circuit is interfaced with
the different types of sensor to sense different fire sources such as gas leakage, smoke, and heat. The cost,
circuit components, design requirements, power requirements of sensor node are minimized. The methods
to improve the quality of system to detect fire are analyzed. The system is fully controlled by the PIC
microcontroller. All the sensors and detectors are interconnected to PIC microcontroller by using various
types of interface circuits. The PIC microcontroller will continuously monitor all the sensors and if it senses
any security problem then the microcontroller will send the information to the PC central monitoring station wirelessly for a short distance of 300m indoor/1500m outdoor using zigbee technology. The gas
sensor, light sensor, smoke detector sensor, IR sensor, temperature & humidity sensor, fire sensor are interfaced with microcontroller to detect abnormal fire conditions in the environment in all possible ways.
This project aims at achieving automation using the widely used mobile operating system ANDROID i.e. android operating system. The electrical and office appliances can be controlled using the android mobile phones and Internet of things (IoT) even if you are out of your house and you forgot to switch off the appliances. Many electrical and office appliances like light, fan, air conditioner etc., can be controlled using the android operating system. This proposed system is implemented in order to overcome the drawbacks of the previous methodologies. This can also be implemented at homes also. Office automation is the residential extension of building automation. Office automation may include centralized control of lighting, HVAC (heating, ventilation and air conditioning), appliances, to provide improved convenience, comfort, energy efficiency and security. Office automation for the elderly and disabled can provide increased quality of life for persons who might otherwise require caregivers or institutional care.
23 9754 assessment paper id 0023 (ed l)2IAESIJEECS
This paper presents a risk assessment method for assessing the cyber security of power systems in view of the role of protection systems. This paper examines the collision of transmission and bus line protection systems positioned in substations on the cyber-physical performance of the power systems. The projected method simulates the physical feedback of power systems to hateful attacks on protection system settings and parameters. The relationship between protection device settings, protection logic, and circuit breaker logic is analyzed. The expected load reduction (ELC) indicator is used in this paper to determine potential losses in the system due to cyber attacks. The Monte Carlo simulation is used to calculate ELC’s account to assess the capabilities of the attackers and bus arrangements are changed. The influence of the projected risk assessment method is illustrated by the use of the 9-bus system and the IEEE-68 bus system.
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...CSCJournals
Due to extremely high demand of mobile phones among people, over the years there has been a great demand for the support of various applications and security services. 2G and 3G provide two levels of security through: encryption and authentication. This paper presents performance analysis and comparison between the algorithms in terms of time complexity. The parameters considered for comparison are processing power and input size. Security features may have adverse effect on quality of services offered to the end users and the system capacity. The computational cost overhead that the security protocols and algorithms impose on lightweight end users devices is analyzed. The results of analysis reveal the effect of authentication and encryption algorithms of 2G and 3G on system performance defined in terms of throughput which will further help in quantifying the overhead caused due to security.
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityLeonardo ENERGY
This Cybersecurity webinar, the second in a series, addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids worldwide. Technology and market challenges will be addressed, followed by cybersecurity approaches (including those used in Europe and US) and best practices. Three case studies, and legal and regulatory constraints, for architecting smart grids in a secure way also will be presented.
The multiple applications (Forest, Industrial, Home) sector being the backbone of the security system. Security systems which are being used now a day are not smart enough to provide real time notification after sensing the problem. This Project is very useful in industrial monitoring system, forest safety and controlling an application. The Processing Sensor analysis of PIR sensors, Fire, air, temp sensors based multiple sector Analysis industrial, human identification and Any Identification Indicate LCD Display and Web camera Based Any Problem Capture Stored Image Data base. In the present work a PIC Microcontroller based the remote irrigation system is developing for the multiple process. The microcontroller use to controlling and displaying the resultant sensor values LCD Display Identifying System.
DESIGNING THE IOT BASESTATION FOR GREENHOUSE MONITORINGIAEME Publication
This article put forward a technique to realize the communication between wireless sensor network and the Internet. The IOT (Internet of Things) gateway is used as part of the greenhouse checking system. The design well-matched multiple access method such as LAN, Wifi, GPRS, EDGE, 3G and so on, also the data can be deposited locally. The IOT gateway uses STM32 as the MCU, μC/OS-III as the embedded operating system. The application demonstrates the gateway is trustworthy, compatible, and extendible. Because of this gateway the greenhouse monitoring system realized the real-time detection and control of the greenhouse, and enhance the ability of the automation and the smartness of the greenhouse monitoring
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMIJNSA Journal
In this study security of internet access over the Third Generation (3G) telecommunication systems is considered and Universal Mobile Telecommunications System (UMTS) is selected as the most popular system among 3G systems. The study then focuses on network access security mechanism of UMTS, called Authentication and Key Agreement (AKA). In addition, twenty types of important attacks and threats in UMTS system are presented and classified based on three major security factors; authentication, confidentiality, and data integrity. The evaluations finally show that the authentication factor is more interesting than other factors for hackers. Then, we describe four attacks named; man-inthe-middle, denial of service, identity catching, and redirection as the most significant attacks against authentication mechanism. Furthermore, we provide some solutions and methods to improve AKA
mechanism and prevent these attacks in UMTS system.
Intelligent fire detection and alert system using labVIEWIJECEIAES
Fire detection systems are designed to discover fires and allow the safe evacuation of occupants as well as protecting the safety of emergency response personnel. This paper describes the design and development of a fire detection and alert system. Temperature and flame sensors are used to indicate the occurrence of fire. This work consists of two parts, which are transmitter and receiver, both using ZigBee wireless technology. Arduino Uno is used as the microcontroller at the transmitter part to control the sensor nodes and give alert when over temperature and flame are detected. At the transmitter, the collected data from the sensors are transmitted by an XBee module operated as router node. At the receiver side, an XBee coordinator module which is attached to a computer using USB to serial communication captured the data for further processing. In addition, an interactive and user-friendly Graphical User Interface (GUI) is developed. LabVIEW software is used to design the GUI which displays and analyze the possibility of fire happening. The system can display the fire location and provides early warning to allow occupants to escape the building safely.
MATLAB Implementation of 128-key length SAFER+ Cipher SystemIJERA Editor
Data security is a major challenge today. To protect data in the Internet or in private networks many measures exist. The most important security layer is the use of encryption standard to protect information from eavesdropper. Today many encryption standards exist failing in two categories: symmetric and asymmetric key algorithms. In this work Secure And Fast Encryption Routine (SAFER+) standard is implemented using MATLAB. The development in computer programming techniques and languages offers a good opportunity of the software implementation of encryption standards with moderate cost and good performance. MATLAB can be considered today as the first engineering programming language with powerful mathematical function and reliable programming procedures
Cyber-Defensive Architecture for Networked Industrial Control SystemsIJEACS
This paper deals with the inevitable consequence of the convenience and efficiency we benefit from the open, networked control system operation of safety-critical applications: vulnerability to such system from cyber-attacks. Even with numerous metrics and methods for intrusion detection and mitigation strategy, a complete detection and deterrence of internal code flaws and outside cyber-attacks has not been found and would not be found anytime soon. Considering the ever incompleteness of detection and prevention and the impact and consequence of mal-functions of the safety-critical operations caused by cyber incidents, this paper proposes a new computer control system architecture which assures resiliency even under compromised situations. The proposed architecture is centered on diversification of hardware systems and unidirectional communication from the proposed system in alerting suspicious activities to upper layers. This paper details the architectural structure of the proposed cyber defensive computer control system architecture for power substation applications and its validation in lab experimentation and on a cybersecurity testbed.
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...IJECEIAES
Smart Home concept is to connect several devices to perform control and the device to be controlled to help any human needs. So it should have one device being Host and several devices being Client. The environment in this case is a home that there is too much technology that planted technologies that has much influence at human activities is called pervasive computing. The device communication should be has a protocol, at the research used UDP protocol because it doesn't need to negotiate before performing communication like a TCP. With UDP behavior did not use to validate at every send or deliver data because at Smart Home environment doesn't need a large or big data being processed. LabView used at this research based on previous research, but MyRIO has used this research to perform Client and Host performed by PC. So it can measure how usable the design that created. This research proves that LabView and MyRIO successfully implemented with the design that created to perform Pervasive Computing for Smart Home environment. Functional testing scenario conducted by every condition that on system environment, based on design all testing scenario successfully and working as well as expected.
Plant growth regulators (also called plant hormones) are numerous chemical substances that profoundly influence the growth and differentiation of plant cells, tissues and organs.
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
This paper provides a review of orchestration distributed systems for IoT smart services in fog computing. The cloud infrastructure alone cannot handle the flow of information with the abundance of data, devices and interactions. Thus, fog computing becomes a new paradigm to overcome the problem. One of the first challenges was to build the orchestration systems to activate the clouds and to execute tasks throughout the whole system that has to be considered to the situation in the large scale of geographical distance, heterogeneity and low latency to support the limitation of cloud computing. Some problems exist for orchestration distributed in fog computing are to fulfil with high reliability and low-delay requirements in the IoT applications system and to form a larger computer network like a fog network, at different geographic sites. This paper reviewed approximately 68 articles on orchestration distributed system for fog computing. The result shows the orchestration distribute system and some of the evaluation criteria for fog computing that have been compared in terms of Borg, Kubernetes, Swarm, Mesos, Aurora, heterogeneity, QoS management, scalability, mobility, federation, and interoperability. The significance of this study is to support the researcher in developing orchestration distributed systems for IoT smart services in fog computing focus on IR4.0 national agenda.
DNA computing based stream cipher for internet of things using MQTT protocol IJECEIAES
Internet of Things (IoT) is a rapidly developing technology that enables “devices” to communicate and share information amongst them without human control. The devices have the features of internet connectivity and networking. Due to the increasing demands of a secure environment in IoT application, security has become a crucial aspect on which researchers have been increasingly focused. Connecting devices to the internet can facilitate intruders to attack devices as they can access the data from anywhere in the globe. In this work, an encryption–decryption process-based stream cipher has been used. The messages between IoT nodes were encrypted using One Time Pad (OTP) and DNA computing. Furthermore, the required key sequence was generated using a linear feedback shift register (LFSR) as a pseudo number key generator. This key sequence was combined to generate a unique key for each message. The algorithm was implemented using source python and tested on a Raspberry pi under Linux open operation system.
Implementation of IoT in Agriculture: A Scientific Approach for Smart Irriga...Springer
Digital technologies empower the
transformation into data-driven, intelligent, agile, and
autonomous farm operations and are typically considered a
key to addressing the grand challenges in agriculture. To avoid
unscientific water supply for plantation as well as to save the
water and also yield the better crop, therefore, to increase
production efficiency out of smart irrigation and to send the
status of irrigation at standard environmental conditions, The
Internet of Things (IoT) based prototype is designed and
implemented. The prototype automatically turns ON /OFF the
motor pump based on the moisture level of the soil by taking
the temperature and humidity of the environment near the
plantation into consideration (In India, the standard
parameters for watering the vegetable plantation are
Humidity>60%, Temperature < 25°C and Humidity<40% ).
The prototype is designed with an ESP32S microcontroller
with DHT 11 and a moisture sensor. Arduino IDE development
tool is used for programming ESP32S using embedded C
programming language. The prototype is configured,
programmed, and connected to the Arduino IoT cloud. The
data of temperature, humidity, and moisture are received via
message queuing telemetry transport (MQTT) protocol on IoT
cloud through public IP therefore the data can be accessed
worldwide. The authorized person can access the data and
control the motor pump from anywhere across the world. The
test data obtained out of the prototype over the cloud and at
the system are presented in the result section.
This paper clarifies the standards defined around LTE network security by standard development organizations including 3GPP, ITU, ETSI, and industry group NGMN. It also examines the different security borders of the mobile network, and delves deeper into the requirements of the Mobile Access Border - the border between the RAN and the core (S1).
Design and implementation of microcontroller in fpga for io tIJARIIT
One of the buzz words in the Information Technology is the Internet of Things (IoT). In coming years, IoT will
transform the objects which are present in the real world into virtual objects. IoT keep us informed about the status of objects
and controls of things in a sensor network. Sensor node comprises of the sensor, microcontroller and RF transceiver. A
microcontroller is an integrated circuit which basically performs one task and executes a particular application. It contains
programmable in/out peripherals, memory, and processor. Microcontrollers are mostly designed in view of embedded and are
used to automatically controllable systems. In digital system design microcontrollers and field programmable gate arrays
(FPGAs), both are widely used. Microcontroller based devices are becoming increasingly widespread. On one hand, high speed,
power, and falling prices make them an obvious choice whereas fast growing popularity of FPGAs, the availability of powerful
development tools and the increase in speed and high density have made FPGA based systems an alternative choice. Sensor node
controller is going to develop using VHDL with behavioral modeling which is an abstract model of the controller and breaks
down of the system into subcomponents and functional blocks.
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
The rapid growth of cloud computing and Internet of Things (IoT) applications faces several threats, such as latency, security, network failure, and performance. These issues are solved with the development of fog computing, which brings storage and computation closer to IoT-devices. However, there are several challenges faced by security designers, engineers, and researchers to secure this environment. To ensure the confidentiality of data that passes between the connected devices, digital signature protocols have been applied to the authentication of identities and messages. However, in the traditional method, a user's private key is directly stored on IoTs, so the private key may be disclosed under various malicious attacks. Furthermore, these methods require a lot of energy, which drains the resources of IoT-devices. A signature scheme based on the elliptic curve digital signature algorithm (ECDSA) is proposed in this paper to improve the security of the private key and the time taken for key-pair generation. ECDSA security is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP), which allows one to use much smaller groups. Smaller group sizes directly translate into shorter signatures, which is a crucial feature in settings where communication bandwidth is limited, or data transfer consumes a large amount of energy. In this paper, we have chosen the safe curve types of elliptic-curve cryptography (ECC) such as M221, SECP256r1, curve 25519, Brainpool P256t1, and M-551. These types of curves are the most secure curves of other curves of ECC as their security is based on the complexity of the ECDLP of the curve. And these types of curves exceed the complexity of the ECDLP. A valid signature can be generated without reestablishing the whole private key. ECDSA ensures data security and successfully reduces intermediate attacks. The efficiency and effectiveness of ECDSA in the IoT environment are validated by experimental evaluation and comparison analysis. The results indicate that, in comparison to the two-party ECDSA and RSA, the proposed ECDSA decreases computation time by 65% and 87%, respectively. Additionally, as compared to two-party ECDSA and RSA, respectively, it reduces energy consumption by 77% and 82%.
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
The rapid growth of cloud computing and Internet of Things (IoT) applications faces several threats, such as latency, security, network failure, and performance. These issues are solved with the development of fog computing, which brings storage and computation closer to IoT-devices. However, there are several challenges faced by security designers, engineers, and researchers to secure this environment. To ensure the confidentiality of data that passes between the connected devices, digital signature protocols have been applied to the authentication of identities and messages. However, in the traditional method, a user's private key is directly stored on IoTs, so the private key may be disclosed under various malicious attacks. Furthermore, these methods require a lot of energy, which drains the resources of IoT-devices. A signature scheme based on the elliptic curve digital signature algorithm (ECDSA) is proposed in this paper to improve the security of the private key and the time taken for key-pair generation. ECDSA security is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP), which allows one to use much smaller groups. Smaller group sizes directly translate into shorter signatures, which is a crucial feature in settings where communication bandwidth is limited, or data transfer consumes a large amount of energy. In this paper, we have chosen the safe curve types of elliptic-curve cryptography (ECC) such as M221, SECP256r1, curve 25519, Brainpool P256t1, and M-551. These types of curves are the most secure curves of other curves of ECC as their security is based on the complexity of the ECDLP of the curve. And these types of curves exceed the complexity of the ECDLP. A valid signature can be generated without reestablishing the whole private key. ECDSA ensures data security and successfully reduces intermediate attacks. The efficiency and effectiveness of ECDSA in the IoT environment are validated by experimental evaluation and comparison analysis. The results indicate that, in comparison to the two-party ECDSA and RSA, the proposed ECDSA decreases computation time by 65% and 87%, respectively. Additionally, as compared to two-party ECDSA and RSA, respectively, it reduces energy consumption by 77% and 82%.
Similar to A Security Approach for Wireless Sensor Network in Agriculture Industry (20)
11(4) 2020 ITJEMAST Multidisciplinary Research Articlesdrboon
Research papers 2020 Behavioral finance; Personality traits; Behavioral factors; Overconfidence bias; Locus of control; Decision-making; Biased behavior Carbon (CO2) emissions; Economic Growth; Energy consumption; Trade; ARDL Approach; Granger Causality; Energy use Pedestrian start-up time; Street crosswalk, Pedestrian traffic signals; Pedestrians traffic lights; zebra crossings; Intersection crossings Service Attributes; Relationship quality; Relationship outcomes; Banking services; Electronic Customer Relationship Management; Virtual relationships; eBanking; eCRM College town landscape; College town character; Campus community; Urban identity; College town space; Sense of a place; Public Space; University gardens; Cultural identity; Campus identity; Businesses in college towns Emotional quotient; Self-emotional appraisal; Workplace Advice Network (WAN) Centrality; Service Sector Organizations; Sociometric matrix; Interconnectivity of nodes
11(3) 2020 ITJEMAST Multidisciplinary Research Articles drboon
Non-destructive testing method Heat loss Thermal conductivity Specific heat Know-how Psychological contract breach Employees' Workplace behaviour Workplace spirituality Human resource management (HRM) Power sector Positive classroom Male teachers Classroom management system Public primary schools Private primary school Positive motivation students Quality primary education Grout rheology Construction workings High-precision lining Tunneling complex Cement slurry Reinforcement solutions Smart building systems Green architecture Green roof Green design Sustainable environmental architecture Smart energy management Architecture technology Neo-Functionalism Trade integration CPEC agreement Economic integration Regional cooperation Pak-China relations Pak-Iran relations Central Asia Republics Sino-Pakistan Agreement
11(2)2020 International Transaction Journal of Engineering, Management, & Ap...drboon
Multidisciplinary Management, Journalism and Mass Communication Science (Information and Media Sciences), Political Sciences (International Affairs), Global Studies), Animal Sciences, Feeding Technology, Healthcare Management.
V8(3) 2017:: International Transaction Journal of Engineering, Management, & ...drboon
Research articles published in V8(3) 2017:: International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies ==>
Awareness of Passive Design on Apartment Façade Designs in Putrajaya, Malaysia
127
Comparative Analysis of Low-Cost Housing Policies in Malaysia and Nigeria
139
A Study on Kevin Lynch’s Urban Design Elements: Precinct 9 East Putrajaya
153
Investigating Urban Design Elements of Bandar Baru Sentul, Kuala Lumpur
169
A Study on Sharing Home Ownership Schemes in Malaysia
183
The Impact of Window to Wall Ratio (WWR) and Glazing Type on Energy Consumption in Air-Conditioned Office Buildings
197
Competitiveness Factors of Thai Construction Industry within the AEC Context: A Qualitative Approach
209
Application of Confirmatory Factor Analysis in Government Construction Procurement Problems in Thailand
221
In a world of rapidly increasing urbanization, striving to develop more livable cities, the city’s streets designing and planning should be high on the agenda for policymakers, city planners and other practitioners, as well as researchers. Designing streets is not as easy as it might originally seem, however, done correctly it means that one third of the city was designed successfully with an immense impact on the rest of the city. The key challenge in developing sustainable and fulfilling streets is to develop an integrated approach in planning them, where it is necessary to consider all aspects involved. Meanwhile, efforts devoted to this topic vary considerably from place to place. Thus, this paper aims at discussing the main elements involved in designing streets for a livable city, in a comprehensive approach including pedestrians, vehicles, and parking areas.
Impact of Building Envelope Modification on Energy Performance of High-Rise A...drboon
In residential buildings, providing comfortable living environment for building occupants is a major challenge for architects, engineers and those who involved in the building industry. It is reported that considerable energy is consumed to provide and maintain acceptable indoor conditions for thermal comfort in residential buildings in hot-humid climate. The observable increase in energy consumption is chiefly resulting from the growing use of air conditioning system. There are various energy conservation measures which can be applied to reduce energy consumption and among these measures are passive envelope design measures. This paper addresses the energy performance of selected high-rise apartments in Kuala Lumpur. Energy Plus software is utilized in measuring the performance because of its availability, validity and accuracy. Possible energy savings due to passive envelope design measures integration are investigated. This includes investigating the effect of thermal insulation and glazing type on potential energy savings.
Enhancement of Space Environment Via Healing Gardendrboon
Green nature, sunlight and fresh air have been known as important component of healing in healthcare facilities. This paper presents the finding of an exploratory study on healing garden elements in healthcare facilities. The purpose of the paper is to find the elements of healing gardens and its healing factors in the existing garden design. In conducting this research study, site observation and informal interview at selected healthcare facilities have been performed. The study reveals the elements of existing garden design, the interactivity and the end users expectation on a garden. The finding shows that lacking some of the elements of garden design lead to less user friendliness and interactivity in the garden. It also shows that the visibility, accessibility, quietness and comfortable condition in the garden give impact to the utilization of the garden.
Design of Quadruped Walking Robot with Spherical Shelldrboon
We propose a new quadruped walking robot with a spherical shell, called "QRoSS." QRoSS is a transformable robot that can store its legs in the spherical shell. The shell not only absorbs external forces from all directions, but also improves mobile performance because of its round shape. In rescue operations at a disaster site, carrying robots into a site is dangerous for operators because doing so may result in a second accident. If QRoSS is used, instead of carrying robots in, they are thrown in, making the operation safe and easy. This paper reports details of the design concept and development of the prototype model. Basic experiments were conducted to verify performance, which includes landing, rising and walking through a series of movements.
Motion Analysis of Pitch Rotation Mechanism for Posture Control of Butterfly-...drboon
We developed a small flapping robot on the basis of movements made by a butterfly with a low flapping frequency of approximately 10 Hz, a few degrees of freedom of the wings, and a large flapping angle. In this study, we clarify the pitch rotation mechanism that is used to control its posture during takeoff for different initial pitch and flapping angles by the experiments of both manufactured robots and simulation models. The results indicate that the pitch angle can be controlled by altering the initial pitch angle at takeoff and the flapping angles. Furthermore, it is suggested that the initial pitch angle generates a proportional increase in the pitch angle during takeoff, and that certain flapping angles are conducive to increasing the tendency for pitch angle transition. Thus, it is shown that the direction of the flight led by periodic changing in the pitch angle can be controlled by optimizing control parameters such as initial pitch and flapping angles.
Analysis of Roll Rotation Mechanism of a Butterfly for Development of a Small...drboon
In this paper, we investigated the aerodynamic characteristics during roll rotation of a butterfly based on computational fluid dynamics using a three-dimensional high-speed camera information. This method allows to create a numerical model of a butterfly from the camera images and to analyze the flow field corresponding to the captured behavior. We photographed two behaviors different in rotational axis and analyzed the roll rotational mechanism. In a typical pitch rotational flight, the differential pressure was concentrated on the tip of fore wings. The magnitudes of reaction forces on left and right wings were roughly matched each other. On the other hands, the differential pressure of the roll rotational flight was distributed in the whole of wings. The magnitude of the right reaction force was twice greater than that of left at the first down stroke. The roll angle changed largely at the same time. These results show that a butterfly rotates about roll by changing the reaction forces on each side.
Effect of Oryzalin on Growth of Anthurium andraeanum In Vitrodrboon
Apical shoots and lateral buds of Anthurium andraeanum about 0.5 cm grew very well when cultured on MS medium supplemented with NAA, kinetin, sucrose and gelrite. When brought young plantlets (the same sized) of A. andraeanum soaked in various concentrations of oryzalin with different duration times. The A. andraeanum plantlets were subcultured into the same medium every 4 weeks for 3 times. It was found that 5.0 mg/l oryzalin with 24 and 72 hours gave the best average number of leaves per bunch, plant height and diameter of bunch. These parameters were reverse proportion, when increased concentration of oryzalin, the growth rate in each parameter was decreased with thick and pale green leaves.
Role of 2,4-D on Callus Induction and Shoot Formation to Increase Number of S...drboon
Stem node of Miniature Rose with axillary bud were used as explants. These explants cultured on MS medium supplemented with different concentrations of 2,4-D. It was found that MS medium supplemented with 0.5 mg/l 2,4-D gave the highest number of green callus. The callus cultured on MS medium supplemented with different combinations of NAA and BA to form new shoot and root. From the result, we are able to find the highest number of young shoots that were induced from callus when cultured callus on MS medium supplemented with NAA and BA. When subcultured all new shoots with the same size to MS medium supplemented with different concentrations of NAA and BA, and 2,4- D for six weeks. The result was significant difference (P≤0.5) when compared the average height of plant and percentage of root formation, but their duration time for flowering were not significant different.
Seismic Capacity Comparisons of Reinforced Concrete Buildings Between Standar...drboon
Earthquakes are cause of serious damage through the building. Therefore, moment resistant frame buildings are widely used as lateral resisting system. Generally three types of moment resisting frames are designed namely Special ductile frames (SDF), Intermediate ductile frames (IDF) and Gravity load designed (GLD) frames, each of which has a certain level of ductility. Comparative studies on the seismic performance of three different ductility of building are performed in this study. The analytical models are considered about failure mode of column (i.e. shear failure, flexural to shear failure and flexural failure); beam-column joint connection, infill wall and flexural foundation. Concepts of incremental dynamic analysis are practiced to assess the required data for performance based evaluations. This study found that the lateral load capacity of GLD, IDF, and SDF building was 19.25, 27.87, and 25.92 %W respectively. The average response spectrum at the collapse state for GLD, IDF, and SDF are 0.75 g, 1.19 g, and 1.33 g, respectively. The results show that SDF is more ductile than IDF and the initial strength of SDF is close to IDF. The results indicate that all of frames are able to resistant a design earthquake.
ITJEMAST5(2): Latest Research from International Transaction Journal of Engin...drboon
An After-Stay Satisfaction Survey of Residents Living in Prefabricated Concrete Structures in Thailand
Hydrothermal Assisted Microwave Pyrolysis of Water Hyacinth for Electrochemical Capacitors Electrodes
Group Technology Paves the Road for Automation
Effect of Laser Priming on accumulation of Free Proline in Spring Durum Wheat (Triticum turgidum L.) under Salinity Stress
Livable Public Open Space for Citizen’s Quality of Life in Medan, Indonesia
ITJEMAST5(1): Latest Research from International Transaction Journal of Engin...drboon
Latest Research from International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies ITJEMAST5(1):
Effects of Calcination Treatment of Diatomite on Dimethyl Ether Synthesis from Methanol
Effect of Blend Ratio on Cure Characteristics, Mechanical Properties, and Aging Resistance of Silica-filled ENR/SBR Blends
An Efficient Formulation of Off-line Model Predictive Control for Nonlinear Systems Using Polyhedral Invariant Sets
Effect of Modeling Parameters on System Hydrodynamics of Air Reactor in Chemical Looping Combustion Using CFD Simulation
Flow Behavior of Geldart A and Geldart C Particles in a Co-current Downflow Circulating Fluidized Bed Reactor
Optimization of Enzymatic Clarification from Corncob
Synthesis of Alkali Metal/CaO Sorbent for CO2 Capture at Low Temperature
Effect of Exchangeable Cations on Bentonite Swelling Characteristics of Geosy...drboon
Geosynthetic clay liners (GCLs) are thin hydraulic barriers which contain the bentonite sandwiched between geotextiles or geomembrane. Bentonite swelling is a very common phenomenon observed in GCLs. It is one of the major causes for permeability reduction in hydraulic barriers. The aim of this study is to characterize the swelling behavior of bentonite in GCLs by exchangeable cations. X-ray diffraction test and scanning electron microscopy were used to quantify the swelling characteristics of this bentonite under contact with salt solutions, as in the hydraulic barriers. The results from X-ray diffraction test showed that the presence of clay minerals was swelling montmorillonite. The swell volume of bentonite decreases with increasing valence of cations. In the case of the same valence the free swell volume of bentonite increased with decreasing concentration of permeant liquids. From another test, the scanning electron microscopy, it can be seen that the bentonite appears as corn flake like crystals for air-dried bentonite. However, specimen permeated with salt solutions, the clay has become more porous and fluffy and porous size seemed to be diminished.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
A Security Approach for Wireless Sensor Network in Agriculture Industry
1. 2013 International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies.
International Transaction Journal of Engineering,
Management, & Applied Sciences & Technologies
http://TuEngr.com
A Security Approach for Wireless Sensor Network in
Agriculture Industry
Piya Techateerawat
a*
a
Department of Electrical and Computer Engineering, Faculty of Engineering, Thammasat University
Khlong-Luang, Pathumthani, THAILAND
ARTICLEINFO
ABSTRACT
Article history:
Received 24 April 2013
Received in revised form
20 August 2013
Accepted 26 August 2013
Available online
26 August 2013
An overview of agriculture industry is involved with large area,
farmers and agriculture products. A large scale of area requires time
consuming for collecting data to make decision on agriculture (e.g.
watering, pruning and harvesting.). From these requirements,
wireless sensor network can be a supported technology because it can
deploy distributed and construct network sharing among their group.
In general, security solution needs an experienced and skilled
specialist to set up, maintain and troubleshoot. This is a challenge for
wireless sensor network to implement in agriculture industry.
Keywords:
Security Framework;
Key Distribution;
Intrusion Detection
System
Our security approach is presented related factors and
customized configuration for the process of deployment,
maintenance, information feedback. This paper presents the security
mechanism to support the needs of self-setup and minimum
operation for wireless sensor network in agriculture industry. The
security module has automated initiate key by HKD protocol and has
Adaptive IDS to alert when threat is detected via speaker. This
system is also simplified the configuration, deployment and
maintenance by only powering on and system will then initiate the
key among the agents. As a result, this security module is proposed
to balance between the moderate security with the limited resource
and technician.
2013 INT TRANS J ENG MANAG SCI TECH.
*Corresponding author (P.Techateerawat). Tel/Fax: +66-2-5643001 Ext.3249. E-mail address:
tpiya@engr.tu.ac.th.
2013 International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 4 No.4
ISSN 2228-9860
eISSN 1906-9642.
Online Available at http://TuEngr.com/V04/269-282.pdf
269
2. Nomenclature and Symbols
We use the following notation to describe a protocol and operation in this paper:
M1 | M2
the concatenation of message M1 and M2
H[D]
the hash function which digests data D
F1[D]
the first one-way function which covert data D
F2[D]
the second one-way function which covert data D
KC
the common key to use when secret key is not set up
KM
the master key to generate keys for the 1 time.
K0
the storing key to save previous key session
K[M]
encryption of message M with key K
S1
the signature of key from F1
S2
the signature of key from F2
L, N
the random numbers in the key generating
st
1. Introduction
A wireless sensor network is developed for self-established network infrastructure with
data sensor technology. In addition, it can reduce the complexity of device deployment on
small and large area. The sensor data can monitor different types of data e.g. monitoring
water, humidity, temperature and etc. These could be the keys to support various industries
including the agriculture industry [1-3].
A security approach for wireless sensor network is required to consider three main
factors: area, farmers and agriculture products. A large area of agriculture field requires a
technology that has a low cost of technology devices to cover large area of farm. A farmer is
skilled person for specific agriculture but requires the simplified technology for less time
learning as well as less human-error for the user. For the last factor, agriculture product is the
main objective for agriculture industry, therefore selected technology needs to support the
growing process and improve the agriculture product in the final result.
As SensorScope [4] presents the benefit of wireless sensor network could be operated as
a simple management system. The end-user can minimize the learning curve by let the
self-operated algorithm to manage the technical task such as power management, sensor data,
270
Piya Techateerawat
3. network infrastructure and ad-hoc management. In addition, it is expected that the network is
flexible and adaptable to the additional of new nodes. It also manages routing changes in the
event of node failure. These features also need to consider the energy efficiency which is the
most critical aspect of sensor network application [5-8].
However, security in sensor network needs to consider variety of factors for a completed
approach. This paper shows the suggested factors and customization solution for agriculture
industry by demonstration in ordered as 1) A security approach for wireless sensor network,
and 2) A mechanism for security in wireless sensor network.
2. A Security Approach for Wireless Sensor Network
A security approach for wireless sensor network is covered: agriculture industry
challenge, user approach and technology implementation. These approaches are the support
factors for successive in security implementation. Although difference agriculture needs a
difference solution, a main structure and framework can be prepared for agriculture field [9].
The agriculture industry challenge is taking part on the location, device handling,
activities and personas. The location of agriculture can be differentiated for each place. In the
case of rural area, the infrastructure and technology platform cannot be expected to be
installed. The set up configuration of wireless sensor network relies on data transfer as well as
security establishing. For device handling scheme, a farmer and equipment can be changed
and cannot rely on the exact procedure or timeline. The activities are also difference from
types of agriculture and time but the main time during seeding and harvesting need to be rush.
Therefore, only a compulsory activity for security in wireless sensor network is needed to
involve with agriculture user. In the last, special needs or personas needs special equipment
and simplified interaction [10].
The user approach is the second challenge for security implementation. As part of
operation people is in rural area, communication can be more effective by customized
interaction as a local culture. Also, survey and training should have communicate in person
can gain more attraction and cooperative with the system. The final solution also should fill
the gap between core technology and user familiarity [11].
*Corresponding author (P.Techateerawat). Tel/Fax: +66-2-5643001 Ext.3249. E-mail address:
tpiya@engr.tu.ac.th.
2013 International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 4 No.4
ISSN 2228-9860
eISSN 1906-9642.
Online Available at http://TuEngr.com/V04/269-282.pdf
271
4. 3. Security Out-of-the-Box
The following part presents the core technology that can be used as security mechanism
in wireless sensor network. The main benefit is self-constructed, use limited energy and
maintain the sufficient security for agriculture application. The system is based on the
SensorScope [4] but adds the solution module on top of the system. The security module is
consisted with two main functions: HKD and Adaptive IDS.
3.1 Hint Key Distribution (HKD)
HKD [12] is inspired by using of hint messages in ELK [13].
It uses symmetric
encryption to secure transmissions. The confidentiality and simplicity are provided from
encryption and decryption. When every sensor node has the secret key, it can establish
secured communication without altering the routing (or tree hierarchy).
To construct a key, we describe two sides of operations.
Sender and receiver have
common key KC which is used as a secret key when the key is not distributed. Master key, KM
is also installed asa part of key computation.
Two one-way functions F1 and F2 could minimize the computation while maintain a large
key domain. There are more key possibilities to protect from intruders in guessing the secret
key. In the long term, despite both sender and receiver remain computing in the same range
(L, N).
select random number L
load key K = KM
for j = Ldownto 0 do
compute key K= F1[K]
end for
store key KM = K
compute hashed value S1 = H[K]
select random number N
for j = N downto 0 do
compute key K = F2[K]
end for
compute hashed value S2 = H[K]
encrypt message (S1|S2) with key KC
broadcast message KC(S1|S2)
Figure 1: Generating hint procedure in HKD.
272
Piya Techateerawat
5. decrypt message with key KC
extractS1 and S2 from broadcasted message
load key K = KM
whileH[K] not equal to S1
compute key K = F1[K]
end while
store key KM = K
while H[K] not equal to S2
compute key K = F2[K]
end while
until store K as secret key
Figure 2: Receiver procedure in HKD
Intruders require a large set of key to attack. Since secret key is generated from previous
key, this adds up the number of possible keys to Ltx N to attack (where t is number of key
distribution).
Sender Process
Secret key is generated from repeatedly computing one-way function F1 and F2. Then,
sender broadcasts encrypted message which contains signature key from both F1 and F2 as in
figure 1.
Receiver Process
When broadcasted message is received, receiver decrypts message and extracts
signature S1 and S2. Then it repeatedly computes KM until its hash value matches with S1 and then
repeats for S2 as in figure 2.
Key Renewing Process
Sender and receiver start computing the secret key from previous key, K0 instead of KM.
So there is no key duplication and ithelps minimizing the computation.
3.2 Adaptive Intrusion Detection System (Adaptive IDS)
Adaptive Intrusion Detection System (Adaptive IDS) [14] uses either anomaly
detection or misuse detection. This paper uses a decision mechanism derived from Siraj and et
*Corresponding author (P.Techateerawat). Tel/Fax: +66-2-5643001 Ext.3249. E-mail address:
tpiya@engr.tu.ac.th.
2013 International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 4 No.4
ISSN 2228-9860
eISSN 1906-9642.
Online Available at http://TuEngr.com/V04/269-282.pdf
273
6. al. [15]. Within IDS, tasks are combined to minimize energy consumption. So, anomaly
detection is proceeding while event data is pre-checked for misuse detection. The signature
records are combined to a single database to reduce memory use. In normal situation, both
systems operate with the same record.
Event Data is the network activities (for example numbers of success and failure of
authentication). This set of data is prepared for further analysis.
Misuse Detection analyses event data from signature record. In case of event data is
matched with any rules, alert signal will be raised. Otherwise, event data is forwarded to
anomaly detection for further analysis.
Anomaly Detection compares event data with signature record to find harmful attacks
from intruder. If probability reaches the risk threshold, alert signal will be raised.
Signature Record is a database which contains signature of unauthorized and high
risk activities. In addition, each record contains level of harm for misuse detection and
probability chance for anomaly detection.
Voting algorithm for the selection of nodes in distributed defense consists of four
steps: vote preparation, voting, vote counting, and IDS activating. There are two parameters in
this algorithm. First, number of hop count determines the threshold of selection for the number
of hops between a candidate node and itself. A larger hop count means less activated nodes and
each IDS node has to take responsibility for more nodes. Second, the voting threshold is the
minimum number of votes before activating IDS. The procedure allows each node to elect its
gateway. The stages are:
1. Vote Preparation: Each node decides their gateway or nearest node. A hop count
parameter determines distance between agent node and neighboring nodes.
2. Voting: Each node transmits their vote message to their gateway.
3. Vote Counting: To count a received vote.
274
Piya Techateerawat
7. Figure 3: Procedure to find current key Kcby using one-way function F1 and F2
where L and N are random numbersfrom master key KM.
4. IDS Activating: If the number of votes exceeds the threshold, and IDS is then
activated. The node will remain active until timeout; at this point the process 1-4 will
be commenced again.
To address some of the limitations, we have further investigated the use of adaptive
thresholds. The approach is outlined in the protocol flow chart of figure 4. We assume that
each node has been synchronized to be accurate within a 5 second window. Initial threshold
number is 0 which increases and reduces based on pre-set number. A suggestion is reducing
number should be less than increasing number so activated node can be distributed wider. For
example, in 80 nodes cluster we use increasing increment number as 5 and reducing
increment number as 1.Note that a tree structure is not employed for the adaptive distributed
defense. Instead we rely on the adaptive threshold to guide selection.
The approach shows both a positive reinforcement for the threshold, and an active
reduction of threshold to promote candidate nodes for intrusion detection. The protocol also
avoids the difficulty of maintenance a tree hierarchy. Instead we use the dynamics of the
threshold to control which nodes are activated. This is potentially more robust.
3.3
User Interaction
The objective is to develop security solution which involves less interaction with user or
farmer and simple for non-technical skilled peopleto understand and implement the system.
We divide into four scenarios that system may interact with the user.
1.) Deployment: user requires not involving with complex tasksbut only turn on the
devices. At the same time, devices initiate themselves and set up key by HKD protocols.
*Corresponding author (P.Techateerawat). Tel/Fax: +66-2-5643001 Ext.3249. E-mail address:
tpiya@engr.tu.ac.th.
2013 International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 4 No.4
ISSN 2228-9860
eISSN 1906-9642.
Online Available at http://TuEngr.com/V04/269-282.pdf
275
8. Figure 4: User Interaction for Security Module.
2.) Troubleshooting: in the case that security protocol is corrupted or mal-function user can
simply re-start all the devices so HKD will start the initiate the key as well as Adaptive IDS
will be restarted itself.
3.) Alert: In case that security system raises the warning to user, the system communicates
to user in three levels:3.1) Minor Level Alert: warning will be logged on the central database.
3.2) Medium Level Alert: warning will be shown on the monitor which user can
observe and monitor the system.
3.3) High Level Alert: warning will be connected high power speaker so user can
immediately notice.
Optional, in the complex system may connect via telephone or SMS
system.
4.) Configuration: this scenario is designed for skilled people or administrator to
configure the system, read the log file, upgrade the software or configure the integration
system via telephone or SMS system.
276
Piya Techateerawat
9. 4. Evaluation
4.1 Security
Brute Force Attach (BFA) is used to evaluate the resistance of SPINS and HKD. The
evaluation is based on a pair of communications which follow the theory and algorithm.
However, in practice, adversaries may reduce their computation time when they collect
information from a group of nodes.
Among these protocols: SPINS and HKD, they protect master key with hash or one-way
function. To obtain current secret key, adversary can directly perform BFA, but it is infeasible
to generate next key or master key.
However, breaking current secret key requires 2key length - 1 x Computation Time. In 40 bits
key length, there are 240 possible keys which average half (239) must be attempted to find the
correct key while 128 bits key needs 2127 attempts. Since UltraSparc II computes each key in
2 μs [16], in 40 bits key. It requires 1.10x106 s (12.7 days). To compare with 128 bits key, it
requires 3.4x1032 s (1.08x1025 years). So 128 bits key can enhance security protection as
shown in figure 5. However, breaking master key requires more computation than current
key. Since, it needs to compute for the entire key chain from master key to current key. To
compute key chain, MD5 and SHA-1 use the same 128bits hash.
Let maximum key chain
length is N and assuming that adversary knows this information. To break master key, it
needs to try every key chain. In each key chain, it needs to compute hash function N0 times.
Since number of computing function N0 depends on key chain length N (for key chain length
N, it requires to compute function N! times). So it must run 2key length - 1 x N! x Computation
Time. Then, let the key chain length is 10 for the worst case which actual protocols use
larger number.
In UltraSparc II, its execution times for MD5 and SHA-1 are 39 μs and 56 μs
[15]. In MD5, BFA will find the master key for 40 bits keychain in 7.78x1013 s (2.47x106
years) and 128 bits key chain in 2.41x1040 s (7.64x1032 years).
In SHA-1, it will find the
master key for 40 bits key chain in 1.12x1014s (3.54x106years) and 128 bits key chain in
3.46x1040s (1.10x1033years) as in Figure 6.
*Corresponding author (P.Techateerawat). Tel/Fax: +66-2-5643001 Ext.3249. E-mail address:
tpiya@engr.tu.ac.th.
2013 International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 4 No.4
ISSN 2228-9860
eISSN 1906-9642.
Online Available at http://TuEngr.com/V04/269-282.pdf
277
10. Figure 5: Logarithm of computation times for current key in brute force attack.
Figure 6: Logarithm of computation times for the key chain in brute force attack.
In short key length (40 bits key), it can secure data in a short period of time (less than 12
days) before renewing key. However, for sensitive information, a longer key (128 bits key) is
required. To protect the system with master key, both short and long key show a secure
protection from BFA. However, SPINS can renew their master key in a period of time while
HKD can still uses its master key for longer. This can improve the security in the long term.
4.2 Energy Consumption
Energy consumption is the significant issue in sensor networks. MD5 consumes 0.59
μJ/Byte when comparing to 3DES computation, 6.04 μJ/Byte. So it can be assured that system
has capability to operate encryption, also able to perform HKD [17-19].
278
Piya Techateerawat
11. Table 1 illustrates the simulation result that shows the energy consumption in HKD,
SPINS and ELK. This simulation focuses on message size and energy consumption. This
result presents that HKD has almost three times expected lifetime than SPINS. However,
ELK in the best case scenarios reveals the best performance in the simulation.
Table 1: Energy consumption in communication.
Protocol
Estimated operation
(bytes)
time (days)
ELK (best case)
23-38
967
ELK (average)
23-38
108
ELK (worst case)
23-38
53
SPINS
598
277
HKD
4.3
Message size
64
715
User Interaction
User requires the least operation with security module. User needs only turning on to
activate HKD and Adaptive IDS to operate. In the case that system is corrupted, user needs to
re-start the system. For the output from system, user does not require to monitor regularly. In
case that critical threat, system raises the alert via speaker (or telephone/SMS if integrated
with this system). As a result, user requires zero-configuration and zero-maintenance for
day-to-day operation.
4.4
Cost
Cost of configuration and maintenance has a benefit from zero-configuration and
zero-maintenance so user does not require paying extra for security module as well as
implementing and maintenance cost. This is a significant factor for agriculture in developing
countries with limited budget and skilled technicians.
5. Conclusion and Future Works
According to the nature of agriculture industry, wireless sensor network can support the
large area, simple setup and operation. However, the security technology is complicated and
can be the challenge to implement security in wireless sensor network.
*Corresponding author (P.Techateerawat). Tel/Fax: +66-2-5643001 Ext.3249. E-mail address:
tpiya@engr.tu.ac.th.
2013 International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 4 No.4
ISSN 2228-9860
eISSN 1906-9642.
Online Available at http://TuEngr.com/V04/269-282.pdf
279
12. This paper suggests the challenge main factors: location, device handling, activities and
personas. Since the agriculture can be difference in locations, equipments, activities and
personas, the customized security solution is required for specific type of agriculture.
However, the framework and approach can be set as a guideline. Location can affect by rural
area have less or none of technology infrastructure. The equipments are varied from type of
agriculture similar as the activities. Therefore, security approach needs to be simple and keep
the simple interaction with user. In addition, user approach requires having a customization to
match with local culture and balance with user interaction can be more effective for overall
system.
This paper also presents the security mechanism to support the needs of self-setup and
minimum operation for wireless sensor network in agriculture industry. The security module
has automated initiate key by HKD protocol and has Adaptive IDS to alert when threat is
detected via speaker. This system is also simplified the configuration, deployment and
maintenance by only powering on and system will then initiate the key among the agents.
Since HKD uses key chain, the key is updated regularly to increase the security of system.
The benefit from HKD is used less energy from communication with hint message as well as
error handling when message is lost during key change.
In addition, HKD also reduces the
energy consumption by small size of message and increases the operation time. As a result,
this security module is proposed to balance between the moderate security with the limited
budget and knowledge of user where focusing on agriculture in developing country.
For the future, research should focus on error-handling of security system. Since the
current model needs to restart system to initiate the key, the future model should provide
flexible solution for non-technician user to manage the security issues.
6. Acknowledgements
We would like to thank Faculty of Engineering, Thammasat University, Optical and
Quantum Communication Research Lab, National Research Council of Thailand and the
Thailand Research Fund (TRF) for the support and cooperation.
7. References
[1]
A. Dunkels, T. Voigt, N. Bergman and M. Jonsson. “The Design and Implementation
280
Piya Techateerawat
13. of an IP-based Sensor Network for Intrusion Monitoring”, Swedish National
Computer Networking Workshop, Nov 2004
[2]
C. Murthy and B. Manoj. Ad Hoc Wireless Networks, Ed 1st, Prentice Hall PTR,
United States of America, 2004, pp. 204-219
[3]
A. Hac. Wireless Sensor Network Designs, Ed 1st, Wiley, Great Britain, 2003, pp.
213-234
[4]
G. Barrenetxea, F. Ingelrest, G. Schaefer, M. Vetterli, O. Couach and M.
Parlange,“SensorScope: Out-of-the-Box Enbironmental Monitoring“, Information
Processing in Sensor Networks, 2008.
[5]
A. Perrig, J. Stankovic and D. Wagner. “Security in Wireless Sensor Networks”,
Communications of the ACM, vol. 47, pp 53-57, Jun 2004
[6]
E. Shi and A. Perrig. “Designing Secure Sensor Networks”, IEEE Wireless
Communications, pp. 38-43, Dec 2004
[7]
J. Newcome, E. Shi, D. Song and A. Perrig. “ The Sybil Attack in Sensor Networks:
Analysis & Defenses”, Information Processing in Sensor Networks 2004, pp. 259-268,
Apr 2004
[8]
J. Deng, R. Han and S. Mishra. “Security Support for In- Network Processing in
Wireless Sensor Networks”, Proceedings of the 1st ACM workshop on Security of ad
hoc and sensor networks, pp. 83-93, 2003
[9]
J. Burrell, T. Brooke and R. Beckwith. “Vineyard Computing: Sensor Networks in
Agricultural Production”, IEEE Pervasive Computing, pp. 38-45, Jan 2004
[10]
M. de Sá and L. Carriço. “Lessons from early stages design of mobile applications”,
Proceedings of the 10th international conference on Human computer interaction with
mobile devices and services (MobileHCI '08). ACM, New York, NY, USA, 127-136,
2008.
[11]
A. Sukumaran, S. Ramlal and et. el. “Intermediated technology interaction in rural
contexts”. Proceedings of the 27th international conference extended abstracts on
Human factors in computing systems (CHI EA '09). ACM, New York, NY, USA,
3817-3822, 2009.
[12]
P. Techateerawat and A. Jennings. “Hint Key Distribution for Sensor Networks”, in
International Joint Conferences on Computer, Information, and Systems Sciences, and
Engineering (CISSE 2006), 2006.
[13]
Penrig, D. Song, and D. Tygar, "ELK, a new protocol for efficient large-group key
distribution," presented at Security and Privacy, 2001. S&P 2001. Proceedings. 2001
IEEE Symposium on, 2001.
[14]
P. Techateerawat and A. Jennings. “Adaptive Intrusion Detection in Wireless Sensor
*Corresponding author (P.Techateerawat). Tel/Fax: +66-2-5643001 Ext.3249. E-mail address:
tpiya@engr.tu.ac.th.
2013 International Transaction Journal of Engineering, Management,
& Applied Sciences & Technologies. Volume 4 No.4
ISSN 2228-9860
eISSN 1906-9642.
Online Available at http://TuEngr.com/V04/269-282.pdf
281
14. Networks”, in The 2007 International Conference on Intelligent Pervasive Computing
(IPC-07), 2007.
[15]
A. Siraj, S. Bridges and R. Vaughn. “Fuzzy Cognitive Maps for Decision Support in
an Intelligent Intrusion Detection System”, IFSA World Congress and 20th NAFIPS
International Conference 2001, vol. 4, pp. 2165-2170, Jul 2001
[16]
P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F.Mueller, and M. Sichitiu,
"Analyzing and modeling encryption overhead for sensor network nodes " in
Proceedings of the 2nd ACM international conference on Wireless sensor networks
and applications San Diego, CA, USA ACM Press, 2003 pp. 151-159
[17]
P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M.
Sichitiu, "Analyzing and modeling encryption overhead for sensor network nodes," in
Proceedings of the 2nd ACM international conference on Wireless sensor networks
and applications. San Diego, CA, USA: ACM Press, 2003, pp. 151-159.
[18]
N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, "Analyzing the energy
consumption of security protocols," in Proceedings of the 2003 international
symposium on Low power electronics and design. Seoul, Korea: ACM Press, 2003,
pp. 30-35.
[19]
J. D. Touch, "Performance analysis of MD5," in Proceedings of the conference on
Applications, technologies, architectures, and protocols for computer communication.
Cambridge, Massachusetts, United States: ACM Press, 1995, pp. 77-86.
Dr. P. Techateerawat is Assistant Professor of Computer Engineering Department, Faculty of Engineering,
Thammasat University. He received his B.Eng. from University of New South Wales, Australia with
Honors in 2004. He continued his PhD study at Royal Melbourne Institute of Technology University,
Australia, where he obtained his PhD in Wireless Sensor Network Security. Dr. PiyaTechateerawat current
interests involve applications of Sensor Network, Security and Quantum Cryptography.
Peer Review: This article has been internationally peer-reviewed and accepted for publication
according to the guidelines given at the journal’s website.
282
Piya Techateerawat