Pervasive and ubiquitous computing has enabled people better integrate physical things into the digital world. The internet of things (IoT) has been considerably more widely used in business and everyday life in the last decade. Innovative healthcare information and communication technologies are a vast field of research and applications that need IoT benefits, including speed, security, and low cost. The proposed modified advanced encryption standard (AES)-cipher block chaining (CBC)-based blockchain technology offers a shared key to devices that need to communicate directly with or with entities outside the smart healthcare network to give users greater control over transactions. The experiments are carried out using a Raspberry Pi 3, whereas two different sensors are employed in this case. Blockchain technology encrypts data between doctor and patient with varied user numbers. The results from experiments revealed that the proposed modified AES-CBC based blockchain technology could provide the IoT application with security services (confidentiality, integrity, and access control) with efficient execution time.
A dynamic data encryption method based on addressing the data importance on ...IJECEIAES
The rapid growth of internet of things (IoT) in multiple areas brings research challenges closely linked to the nature of IoT technology. Therefore, there has been a need to secure the collected data from IoT sensors in an efficient and dynamic way taking into consideration the nature of collected data due to its importance. So, in this paper, a dynamic algorithm has been developed to distinguish the importance of data collected and apply the suitable security approach for each type of data collected. This was done by using hybrid system that combines block cipher and stream cipher systems. After data classification using machine learning classifiers the less important data are encrypted using stream cipher (SC) that use rivest cipher 4 algorithm, and more important data encrypted using block cipher (BC) that use advanced encryption standard algorithm. By applying a performance evaluation using simulation, the proposed method guarantees that it encrypts the data with less central processing unit (CPU) time with improvement in the security over the data by using the proposed hybrid system.
Blockchain based security framework for sharing digital images using reversib...Christo Ananth
Christo Ananth, Denslin Brabin, Sriramulu Bojjagani, “Blockchain based security framework for sharing digital images using reversible data hiding and encryption”, Multimedia Tools and Applications, Springer US, Volume 81,Issue 6, March 2022,pp. 1-18.
Description:
Christo Ananth et al. emphasized that Security is an important issue in current and next-generation networks. Blockchain will be an appropriate technology for securely sharing information in next-generation networks. Digital images are the prime medium attacked by cyber attackers. In this paper, a blockchain based security framework is proposed for sharing digital images in a multi user environment. The proposed framework uses reversible data hiding and encryption as component techniques. A novel high capacity reversible data hiding scheme is also proposed to protect digital images. Reversible data hiding in combination with encryption protects the confidentiality, integrity and authentication of digital images. In the proposed technique, the digital image is compressed first to create room for data hiding, then the user signature is embedded; afterwards the whole image is encrypted. For compression, JPEG lossy compression is used to create high capacity. For encryption, any symmetric block cipher or stream cipher can be used. Experimental results show that the proposed blockchain based framework provides high security and the proposed reversible data hiding scheme provides high capacity and image quality.
An efficient lightweight key exchange algorithm for internet of things appli...IJECEIAES
Internet of things (IoT) gained wide popularity in recent years, and this is proved by tremendous increase in use of IoT applications worldwide. Distributed IoT applications can be implemented securely with the support of blockchain. By default, blockchain will ensure authentication of involved entities as well as integrity of data. Due to storage restrictions, use of hybrid system is preferred, and this involves cloud server for storage and blockchain for other functionalities. Data kept in cloud has to be encrypted by a strong encryption algorithm. Even though core security objectives are achieved, it is necessary to provide a secure method to exchange the key. Since, the key is the backbone of a security algorithm, protection of the key has to be ensured. In this work, an algorithm is proposed to provide a no-share key exchange between two communicating parties in a resource constrained environment. The same was implemented and compared with conventional key sharing algorithms. Security analysis was formally conducted by using widely accepted automated validation of internet security protocols and applications (AVISPA) tool and the proposed method proved to be secure.
Design of programmable hardware security modules for enhancing blockchain bas...IJECEIAES
Globalization of the chip design and manufacturing industry has imposed significant threats to the hardware security of integrated circuits (ICs). It has made ICs more susceptible to various hardware attacks. Blockchain provides a trustworthy and distributed platform to store immutable records related to the evidence of intellectual property (IP) creation, authentication of provenance, and confidential data storage. However, blockchain encounters major security challenges due to its decentralized nature of ledgers that contain sensitive data. The research objective is to design a dedicated programmable hardware security modules scheme to safeguard and maintain sensitive information contained in the blockchain networks in the context of the IC supply chain. Thus, the blockchain framework could rely on the proposed hardware security modules and separate the entire cryptographic operations within the system as stand-alone hardware units. This work put forth a novel approach that could be considered and utilized to enhance blockchain security in real-time. The critical cryptographic components in blockchain secure hash algorithm-256 (SHA-256) and the elliptic curve digital signature algorithm are designed as separate entities to enhance the security of the blockchain framework. Physical unclonable functions are adopted to perform authentication of transactions in the blockchain. Relative comparison of designed modules with existing works clearly depicts the upper hand of the former in terms of performance parameters.
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESIJNSA Journal
The Internet of Things (IoT) is a growing trend in technology that interconnects millions of physical devices from any location anytime. Currently, IoT devices have become an integral part of human lives, as such organizations are deeply concerned with its security and technical issues. Blockchain system comprises a distributed digital ledger which is shared among community of users on the Internet; validated and recorded transactions in the ledger which cannot be altered or removed. We presented the challenges of IoT devices and how blockchain can be used to alleviate these problems. An outline of how to integrate blockchain with IoT was tackled, highlighting the challenges of IoT and how blockchain can remedy the issues. It was concluded that blockchain has the capability to curb the challenges posed by IoT devices.
A signature-based data security and authentication framework for internet of...IJECEIAES
Internet of things (IoT) is the next big revolution in modernized network technologies connecting a massive number of heterogeneous smart appliances and physical objects. Owing to these technologies' novelty, various issues are characterized by security concerns are the most prioritized issue. A review of existing security approaches highlights that they are very particular about the solution towards a specific attack and cannot resist any unknown attacker. Therefore, this manuscript presents a novel computational model that introduces a unique authentication process using a simplified encryption strategy. The simulated study outcome shows that the proposed system offers efficient security and efficient data transmission performance in the presence of an unknown adversary. Hence, the study outcome exhibits better effects than frequently used security solutions when implemented in a vulnerable IoT environment.
Efficient network management and security in 5G enabled internet of things us...IJECEIAES
The rise of fifth generation (5G) networks and the proliferation of internet- of-things (IoT) devices have created new opportunities for innovation and increased connectivity. However, this growth has also brought forth several challenges related to network management and security. Based on the review of literature it has been identified that majority of existing research work are limited to either addressing the network management issue or security concerns. In this paper, the proposed work has presented an integrated framework to address both network management and security concerns in 5G internet-of-things (IoT) network using a deep learning algorithm. Firstly, a joint approach of attention mechanism and long short-term memory (LSTM) model is proposed to forecast network traffic and optimization of network resources in a, service-based and user-oriented manner. The second contribution is development of reliable network attack detection system using autoencoder mechanism. Finally, a contextual model of 5G-IoT is discussed to demonstrate the scope of the proposed models quantifying the network behavior to drive predictive decision making in network resources and attack detection with performance guarantees. The experiments are conducted with respect to various statistical error analysis and other performance indicators to assess prediction capability of both traffic forecasting and attack detection model.
A dynamic data encryption method based on addressing the data importance on ...IJECEIAES
The rapid growth of internet of things (IoT) in multiple areas brings research challenges closely linked to the nature of IoT technology. Therefore, there has been a need to secure the collected data from IoT sensors in an efficient and dynamic way taking into consideration the nature of collected data due to its importance. So, in this paper, a dynamic algorithm has been developed to distinguish the importance of data collected and apply the suitable security approach for each type of data collected. This was done by using hybrid system that combines block cipher and stream cipher systems. After data classification using machine learning classifiers the less important data are encrypted using stream cipher (SC) that use rivest cipher 4 algorithm, and more important data encrypted using block cipher (BC) that use advanced encryption standard algorithm. By applying a performance evaluation using simulation, the proposed method guarantees that it encrypts the data with less central processing unit (CPU) time with improvement in the security over the data by using the proposed hybrid system.
Blockchain based security framework for sharing digital images using reversib...Christo Ananth
Christo Ananth, Denslin Brabin, Sriramulu Bojjagani, “Blockchain based security framework for sharing digital images using reversible data hiding and encryption”, Multimedia Tools and Applications, Springer US, Volume 81,Issue 6, March 2022,pp. 1-18.
Description:
Christo Ananth et al. emphasized that Security is an important issue in current and next-generation networks. Blockchain will be an appropriate technology for securely sharing information in next-generation networks. Digital images are the prime medium attacked by cyber attackers. In this paper, a blockchain based security framework is proposed for sharing digital images in a multi user environment. The proposed framework uses reversible data hiding and encryption as component techniques. A novel high capacity reversible data hiding scheme is also proposed to protect digital images. Reversible data hiding in combination with encryption protects the confidentiality, integrity and authentication of digital images. In the proposed technique, the digital image is compressed first to create room for data hiding, then the user signature is embedded; afterwards the whole image is encrypted. For compression, JPEG lossy compression is used to create high capacity. For encryption, any symmetric block cipher or stream cipher can be used. Experimental results show that the proposed blockchain based framework provides high security and the proposed reversible data hiding scheme provides high capacity and image quality.
An efficient lightweight key exchange algorithm for internet of things appli...IJECEIAES
Internet of things (IoT) gained wide popularity in recent years, and this is proved by tremendous increase in use of IoT applications worldwide. Distributed IoT applications can be implemented securely with the support of blockchain. By default, blockchain will ensure authentication of involved entities as well as integrity of data. Due to storage restrictions, use of hybrid system is preferred, and this involves cloud server for storage and blockchain for other functionalities. Data kept in cloud has to be encrypted by a strong encryption algorithm. Even though core security objectives are achieved, it is necessary to provide a secure method to exchange the key. Since, the key is the backbone of a security algorithm, protection of the key has to be ensured. In this work, an algorithm is proposed to provide a no-share key exchange between two communicating parties in a resource constrained environment. The same was implemented and compared with conventional key sharing algorithms. Security analysis was formally conducted by using widely accepted automated validation of internet security protocols and applications (AVISPA) tool and the proposed method proved to be secure.
Design of programmable hardware security modules for enhancing blockchain bas...IJECEIAES
Globalization of the chip design and manufacturing industry has imposed significant threats to the hardware security of integrated circuits (ICs). It has made ICs more susceptible to various hardware attacks. Blockchain provides a trustworthy and distributed platform to store immutable records related to the evidence of intellectual property (IP) creation, authentication of provenance, and confidential data storage. However, blockchain encounters major security challenges due to its decentralized nature of ledgers that contain sensitive data. The research objective is to design a dedicated programmable hardware security modules scheme to safeguard and maintain sensitive information contained in the blockchain networks in the context of the IC supply chain. Thus, the blockchain framework could rely on the proposed hardware security modules and separate the entire cryptographic operations within the system as stand-alone hardware units. This work put forth a novel approach that could be considered and utilized to enhance blockchain security in real-time. The critical cryptographic components in blockchain secure hash algorithm-256 (SHA-256) and the elliptic curve digital signature algorithm are designed as separate entities to enhance the security of the blockchain framework. Physical unclonable functions are adopted to perform authentication of transactions in the blockchain. Relative comparison of designed modules with existing works clearly depicts the upper hand of the former in terms of performance parameters.
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESIJNSA Journal
The Internet of Things (IoT) is a growing trend in technology that interconnects millions of physical devices from any location anytime. Currently, IoT devices have become an integral part of human lives, as such organizations are deeply concerned with its security and technical issues. Blockchain system comprises a distributed digital ledger which is shared among community of users on the Internet; validated and recorded transactions in the ledger which cannot be altered or removed. We presented the challenges of IoT devices and how blockchain can be used to alleviate these problems. An outline of how to integrate blockchain with IoT was tackled, highlighting the challenges of IoT and how blockchain can remedy the issues. It was concluded that blockchain has the capability to curb the challenges posed by IoT devices.
A signature-based data security and authentication framework for internet of...IJECEIAES
Internet of things (IoT) is the next big revolution in modernized network technologies connecting a massive number of heterogeneous smart appliances and physical objects. Owing to these technologies' novelty, various issues are characterized by security concerns are the most prioritized issue. A review of existing security approaches highlights that they are very particular about the solution towards a specific attack and cannot resist any unknown attacker. Therefore, this manuscript presents a novel computational model that introduces a unique authentication process using a simplified encryption strategy. The simulated study outcome shows that the proposed system offers efficient security and efficient data transmission performance in the presence of an unknown adversary. Hence, the study outcome exhibits better effects than frequently used security solutions when implemented in a vulnerable IoT environment.
Efficient network management and security in 5G enabled internet of things us...IJECEIAES
The rise of fifth generation (5G) networks and the proliferation of internet- of-things (IoT) devices have created new opportunities for innovation and increased connectivity. However, this growth has also brought forth several challenges related to network management and security. Based on the review of literature it has been identified that majority of existing research work are limited to either addressing the network management issue or security concerns. In this paper, the proposed work has presented an integrated framework to address both network management and security concerns in 5G internet-of-things (IoT) network using a deep learning algorithm. Firstly, a joint approach of attention mechanism and long short-term memory (LSTM) model is proposed to forecast network traffic and optimization of network resources in a, service-based and user-oriented manner. The second contribution is development of reliable network attack detection system using autoencoder mechanism. Finally, a contextual model of 5G-IoT is discussed to demonstrate the scope of the proposed models quantifying the network behavior to drive predictive decision making in network resources and attack detection with performance guarantees. The experiments are conducted with respect to various statistical error analysis and other performance indicators to assess prediction capability of both traffic forecasting and attack detection model.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
One major problem is detecting the unsuitability of traffic caused by a distributed denial of services (DDoS) attack produced by third party nodes, such as smart phones and other handheld Wi-Fi devices. During the transmission between the devices, there are rising in the number of cyber attacks on systems by using negligible packets, which lead to suspension of the services between source and destination, and can find the vulnerabilities on the network. These vulnerable issues have led to a reduction in the reliability of networks and a reduction in consumer confidence. In this paper, we will introduce a new algorithm called rout attack with detection algorithm (RAWD) to reduce the affect of any attack by checking the packet injection, and to avoid number of cyber attacks being received by the destination and transferred through a determined path or alternative path based on the problem. The proposed algorithm will forward the real time traffic to the required destination from a new alternative backup path which is computed by it before the attacked occurred. The results have showed an improvement when the attack occurred and the alternative path has used to make sure the continuity of receiving the data to the main destination without any affection.
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
The rapid growth of cloud computing and Internet of Things (IoT) applications faces several threats, such as latency, security, network failure, and performance. These issues are solved with the development of fog computing, which brings storage and computation closer to IoT-devices. However, there are several challenges faced by security designers, engineers, and researchers to secure this environment. To ensure the confidentiality of data that passes between the connected devices, digital signature protocols have been applied to the authentication of identities and messages. However, in the traditional method, a user's private key is directly stored on IoTs, so the private key may be disclosed under various malicious attacks. Furthermore, these methods require a lot of energy, which drains the resources of IoT-devices. A signature scheme based on the elliptic curve digital signature algorithm (ECDSA) is proposed in this paper to improve the security of the private key and the time taken for key-pair generation. ECDSA security is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP), which allows one to use much smaller groups. Smaller group sizes directly translate into shorter signatures, which is a crucial feature in settings where communication bandwidth is limited, or data transfer consumes a large amount of energy. In this paper, we have chosen the safe curve types of elliptic-curve cryptography (ECC) such as M221, SECP256r1, curve 25519, Brainpool P256t1, and M-551. These types of curves are the most secure curves of other curves of ECC as their security is based on the complexity of the ECDLP of the curve. And these types of curves exceed the complexity of the ECDLP. A valid signature can be generated without reestablishing the whole private key. ECDSA ensures data security and successfully reduces intermediate attacks. The efficiency and effectiveness of ECDSA in the IoT environment are validated by experimental evaluation and comparison analysis. The results indicate that, in comparison to the two-party ECDSA and RSA, the proposed ECDSA decreases computation time by 65% and 87%, respectively. Additionally, as compared to two-party ECDSA and RSA, respectively, it reduces energy consumption by 77% and 82%.
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
The rapid growth of cloud computing and Internet of Things (IoT) applications faces several threats, such as latency, security, network failure, and performance. These issues are solved with the development of fog computing, which brings storage and computation closer to IoT-devices. However, there are several challenges faced by security designers, engineers, and researchers to secure this environment. To ensure the confidentiality of data that passes between the connected devices, digital signature protocols have been applied to the authentication of identities and messages. However, in the traditional method, a user's private key is directly stored on IoTs, so the private key may be disclosed under various malicious attacks. Furthermore, these methods require a lot of energy, which drains the resources of IoT-devices. A signature scheme based on the elliptic curve digital signature algorithm (ECDSA) is proposed in this paper to improve the security of the private key and the time taken for key-pair generation. ECDSA security is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP), which allows one to use much smaller groups. Smaller group sizes directly translate into shorter signatures, which is a crucial feature in settings where communication bandwidth is limited, or data transfer consumes a large amount of energy. In this paper, we have chosen the safe curve types of elliptic-curve cryptography (ECC) such as M221, SECP256r1, curve 25519, Brainpool P256t1, and M-551. These types of curves are the most secure curves of other curves of ECC as their security is based on the complexity of the ECDLP of the curve. And these types of curves exceed the complexity of the ECDLP. A valid signature can be generated without reestablishing the whole private key. ECDSA ensures data security and successfully reduces intermediate attacks. The efficiency and effectiveness of ECDSA in the IoT environment are validated by experimental evaluation and comparison analysis. The results indicate that, in comparison to the two-party ECDSA and RSA, the proposed ECDSA decreases computation time by 65% and 87%, respectively. Additionally, as compared to two-party ECDSA and RSA, respectively, it reduces energy consumption by 77% and 82%.
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...AlAtfat
— The internet of smart devices is a network of intelligent gadgets
with sensors, programs, Wi-Fi and communication network connections. These
devices store the data in cloud and process data outside the device using the
proposed Cloud-Internet communication framework. These devices can
communicate with other devices using the proposed framework. However, there
are many challenges for communication security among the internet of smart
devices. The Cloud can store the device data with security, reliability, privacy
and service availability. The communication Security has been raised as one of
the most critical issues of cloud computing where resolving such an issue would
result in a constant growth in the use and popularity of cloud computing. Our
purpose of this study is to create a framework for providing the communication
security among smart devices network for the internet of things using cloud
computing. Our main contribution links a new study for providing
communication security for the internet of smart devices using the cloud-Internet
framework. This study can be helpful for communication security problem in the
framework of the Internet of Things. The proposed study generates a new
framework for solving the issue of communication security among internet of
smart devices.
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
A pervasive network architecture that interconnect heterogeneous objects, devices, technologies and services called
Internet of Things has prompted a drastic change in demand of smart devices which in turn has increased the rate of
data exchange. These smart devices are built with numerous sensors which collect information from other interacting
devices, process it and send it to remote locations for storage or further processing. Although this mechanism of data
processing and sharing has contributed immensely to the information world, it has recently posed high security risk
on privacy and data confidentiality. This paper therefore analyses different security threats to data at different
architectural layers of Internet of Things, possible countermeasures and other in-depth security measures for Internet
of Things. The paper identifies device authentication on IoT network to be of paramount impo rtance in securing IoT
systems. This paper also suggests some essential technologies of security such as encryption for securing IoT
devices and the data shared over IoT network
Developed security and privacy algorithms for cyber physical system IJECEIAES
Cyber-physical system (CPS) is a modern technology in the cyber world, and it integrates with wireless sensor network (WSN). This system is widely used in many applications such as a smart city, greenhouse, healthcare, and power grid. Therefore, the data security and integrity are necessary to ensure the highest level of protection and performance for such systems. In this paper, two sides security system for cyber-physical level is proposed to obtain security, privacy, and integrity. The first side is applied the secure sockets layer (SSL)/transport layer security (TLS) encryption protocol with the internet of things (IoT) based message queuing telemetry transport (MQTT) protocol to secure the connection and encrypt the data exchange between the system's parties. The second side proposes an algorithm to detect and prevent a denial of service (DoS) attack (hypertext transfer protocol (HTTP) post request) on a Web server. The experiment results show the superior performance of the proposed method to secure the CPS by detecting and preventing the cyber-attacks, which infect the Web servers. They also prove the implementation of security, privacy and integrity aspects on the CPS.
Big data as a service (BDaaS) platform is widely used by various
organizations for handling and processing the high volume of data generated
from different internet of things (IoT) devices. Data generated from these IoT
devices are kept in the form of big data with the help of cloud computing
technology. Researchers are putting efforts into providing a more secure and
protected access environment for the data available on the cloud. In order to
create a safe, distributed, and decentralised environment in the cloud,
blockchain technology has emerged as a useful tool. In this research paper, we
have proposed a system that uses blockchain technology as a tool to regulate
data access that is provided by BDaaS platforms. We are securing the access
policy of data by using a modified form of ciphertext policy-attribute based
encryption (CP-ABE) technique with the help of blockchain technology. For
secure data access in BDaaS, algorithms have been created using a mix of CPABE with blockchain technology. Proposed smart contract algorithms are
implemented using Eclipse 7.0 IDE and the cloud environment has been
simulated on CloudSim tool. Results of key generation time, encryption time,
and decryption time has been calculated and compared with access control
mechanism without blockchain technology.
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
The introduction of Internet of Things (IoT) applications into daily life has raised serious privacy concerns
among consumers, network service providers, device manufacturers, and other parties involved. This paper
gives a high-level overview of the three phases of data collecting, transmission, and storage in IoT systems
as well as current privacy-preserving technologies. The following elements were investigated during these
three phases:(1) Physical and data connection layer security mechanisms(2) Network remedies(3)
Techniques for distributing and storing data. Real-world systems frequently have multiple phases and
incorporate a variety of methods to guarantee privacy. Therefore, for IoT research, design, development,
and operation, having a thorough understanding of all phases and their technologies can be beneficial. In
this Study introduced two independent methodologies namely generic differential privacy (GenDP) and
Cluster-Based Differential privacy ( Cluster-based DP) algorithms for handling metadata as intents and
intent scope to maintain privacy and security of IoT data in cloud environments. With its help, we can
virtual and connect enormous numbers of devices, get a clearer understanding of the IoT architecture, and
store data eternally. However, due of the dynamic nature of the environment, the diversity of devices, the
ad hoc requirements of multiple stakeholders, and hardware or network failures, it is a very challenging
task to create security-, privacy-, safety-, and quality-aware Internet of Things apps. It is becoming more
and more important to improve data privacy and security through appropriate data acquisition. The
proposed approach resulted in reduced loss performance as compared to Support Vector Machine (SVM) ,
Random Forest (RF) .
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...AlAtfat
Introducing IBchain, a new blockchain architecture with the Internet of Things (IoT), could be an
attractive framework regarding improvements in connectivity implementation through the smart cities.
Instead of meriting innovation and security, the IoT links people, sites, and products and provides
opportunities. Everything that transfers information to the IoT system is integrated by advanced
microchips, sensors, and actuators in actual things. The analytical ability of the IoT converts observations
into actions, impacting business advancements and significant ways of activity. IoT enables connected
objects to transmit information to personal blockchain systems to create tamper-resistant transaction
records. The information from sensors and microchips is progressing rapidly with blockchain ledgers,
making them more portable and relevant for immediate conversations. In IBchain methodology, the smart
objects are permissible to connect securely with other smart objects in diverse situations. IBchain creates
an innovative blockchain-based processing configuration through the IoT. The IBchain could analyze
blockchain to the main expertise or supports the IoT validation and trustworthiness. It reinforces
blockchain and cloud to build an empowering IoT ubiquitous situation for secure communication among
the smart devices.
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...IJCNCJournal
Internet of things (IoT), is the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data. The communication is through the internet hence susceptible to security and privacy attacks. Consequently, authenticated key agreement (AKA) of communicating entities in IoT is of paramount importance as a security and privacy credential. However, IoT devices have resource-constrained feature, hence implementation of heavy security and privacy features becomes a challenge. Research on AKA in IoT has been done since year 2006. Current research trends on AKA are together with forward secrecy (FS) feasibility, which ensures that future SKs remain safe even if the long-term master keys get compromised. However, most of researches use public key cryptosystems to achieve FS, which requires heavy computations that is not good for the resource-constrained IoT environment. The main purpose of this Thesis is to devise a new machine AKA with FS for IoT, denoted as M2MAKA-FS. To design M2MAKA-FS, we devise a new lightweight FS framework first, which does not rely on the public key cryptosystem but based on a hash chain. The security and privacy building blocks of M2MAKA-FS and the FS framework are symmetric key cryptosystem, one-way hash function, fuzzy commitment and challenge-response mechanism. Results of formal security and privacy analysis show that M2MAKA-FS provides mutual authentication, SK agreement with FS, anonymity and unlinkability and is resilient against various active attacks. Performance analysis shows that M2MAKA-FS achieves the lightweight requirements for IoT environments compared to the related protocols.
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...IJCNCJournal
Internet of things (IoT), is the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data. The communication is through the internet hence susceptible to security and privacy attacks. Consequently, authenticated key agreement (AKA) of communicating entities in IoT is of paramount importance as a security and privacy credential. However, IoT devices have resource-constrained feature, hence implementation of heavy security and privacy features becomes a challenge. Research on AKA in IoT has been done since year 2006. Current research trends on AKA are together with forward secrecy (FS) feasibility, which ensures that future SKs remain safe even if the long-term master keys get compromised. However, most of researches use public key cryptosystems to achieve FS, which requires heavy computations that is not good for the resource-constrained IoT environment. The main purpose of this Thesis is to devise a new machine AKA with FS for IoT, denoted as M2MAKA-FS. To design M2MAKA-FS, we devise a new lightweight FS framework first, which does not rely on the public key cryptosystem but based on a hash chain. The security and privacy building blocks of M2MAKA-FS and the FS framework are symmetric key cryptosystem, one-way hash function, fuzzy commitment and challenge-response mechanism. Results of formal security and privacy analysis show that M2MAKA-FS provides mutual authentication, SK agreement with FS, anonymity and unlinkability and is resilient against various active attacks. Performance analysis shows that M2MAKA-FS achieves the lightweight requirements for IoT environments compared to the related protocols.
Authentication Devices in Fog-mobile Edge Computing Environments through a Wi...ijujournal
The rapid growth of the Internet of Things (IoT), cloud computing, Fog computing, mobile edge computing and wireless grids has resulted in the
wide spread deployment of relatively immature technology. These technologies, which will primarily use 5G wireless communication networks, are becoming popular because they can be deployed quickly with little infrastructure and lends themselves to environments
utilizing numerous internet connected devices (ICD). There are, however, many significant challenges faced by security designers, engineers and implementers of these networks in ensuring that the level of
security afforded is appropriate. Because of the threat of exploitation, these networks have to be protected by a robust security architecture due to these technologies being plagued with security problems. The authentication of smart ICDs to IoT networks is a critical mechanism for achieving security on these new information system platforms. This article identifies an authentication process required for these ICDs, which will need to prove their identity to authenticate to an IoT fog-mobile edge computing (FMEC) cloud
network through a wireless grid authentication process. The purpose of this article is to hypothesize a generic authentication methodology for these FMEC clouds uses in an IoT architecture. The proposed
methodology, called wg-IoT, must include the integration of Fog computing, wireless grids and mobile edge computing clouds to create this new IoT architecture. An authentication process developed from the resource sharing protocol (RSP) from a wireless grid is first developed and proposed for the authentication of ICDs. The wireless grid core components must be embedded in IoT devices or sensors
depending on their capability to handle five primary functions: management of identification [ID] andpresence, permissions
management, data transferability, application-programming interface [API] and security.
AUTHENTICATING DEVICES IN FOG-MOBILE EDGE COMPUTING ENVIRONMENTS THROUGH A WI...ijujournal
The rapid growth of the Internet of Things (IoT), cloud computing, Fog computing, mobile edge computing
and wireless grids has resulted in the widespread deployment of relatively immature technology. These
technologies, which will primarily use 5G wireless communication networks, are becoming popular
because they can be deployed quickly with little infrastructure and lends themselves to environments
utilizing numerous internet connected devices (ICD). There are, however, many significant challenges
faced by security designers, engineers and implementers of these networks in ensuring that the level of
security afforded is appropriate. Because of the threat of exploitation, these networks have to be protected
by a robust security architecture due to these technologies being plagued with security problems. The
authentication of smart ICDs to IoT networks is a critical mechanism for achieving security on these new
information system platforms. This article identifies an authentication process required for these ICDs,
which will need to prove their identity to authenticate to an IoT fog-mobile edge computing (FMEC) cloud
network through a wireless grid authentication process. The purpose of this article is to begin to
hypothesize a generic authentication methodology for these FMEC clouds uses in an IoT architecture. The
proposed methodology, called wg-IoT, must include the integration of Fog computing, wireless grids and
mobile edge computing clouds to create this new IoT architecture. An authentication process developed
from the resource sharing protocol (RSP) from a wireless grid is first developed and proposed for the
authentication of ICDs. The wireless grid core components must be embedded in IoT devices or sensors
depending on their capability to handle five primary functions: management of identification [ID] and
presence, permissions management, data transferability, application-programming interface [API] and
security.
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
One major problem is detecting the unsuitability of traffic caused by a distributed denial of services (DDoS) attack produced by third party nodes, such as smart phones and other handheld Wi-Fi devices. During the transmission between the devices, there are rising in the number of cyber attacks on systems by using negligible packets, which lead to suspension of the services between source and destination, and can find the vulnerabilities on the network. These vulnerable issues have led to a reduction in the reliability of networks and a reduction in consumer confidence. In this paper, we will introduce a new algorithm called rout attack with detection algorithm (RAWD) to reduce the affect of any attack by checking the packet injection, and to avoid number of cyber attacks being received by the destination and transferred through a determined path or alternative path based on the problem. The proposed algorithm will forward the real time traffic to the required destination from a new alternative backup path which is computed by it before the attacked occurred. The results have showed an improvement when the attack occurred and the alternative path has used to make sure the continuity of receiving the data to the main destination without any affection.
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
The rapid growth of cloud computing and Internet of Things (IoT) applications faces several threats, such as latency, security, network failure, and performance. These issues are solved with the development of fog computing, which brings storage and computation closer to IoT-devices. However, there are several challenges faced by security designers, engineers, and researchers to secure this environment. To ensure the confidentiality of data that passes between the connected devices, digital signature protocols have been applied to the authentication of identities and messages. However, in the traditional method, a user's private key is directly stored on IoTs, so the private key may be disclosed under various malicious attacks. Furthermore, these methods require a lot of energy, which drains the resources of IoT-devices. A signature scheme based on the elliptic curve digital signature algorithm (ECDSA) is proposed in this paper to improve the security of the private key and the time taken for key-pair generation. ECDSA security is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP), which allows one to use much smaller groups. Smaller group sizes directly translate into shorter signatures, which is a crucial feature in settings where communication bandwidth is limited, or data transfer consumes a large amount of energy. In this paper, we have chosen the safe curve types of elliptic-curve cryptography (ECC) such as M221, SECP256r1, curve 25519, Brainpool P256t1, and M-551. These types of curves are the most secure curves of other curves of ECC as their security is based on the complexity of the ECDLP of the curve. And these types of curves exceed the complexity of the ECDLP. A valid signature can be generated without reestablishing the whole private key. ECDSA ensures data security and successfully reduces intermediate attacks. The efficiency and effectiveness of ECDSA in the IoT environment are validated by experimental evaluation and comparison analysis. The results indicate that, in comparison to the two-party ECDSA and RSA, the proposed ECDSA decreases computation time by 65% and 87%, respectively. Additionally, as compared to two-party ECDSA and RSA, respectively, it reduces energy consumption by 77% and 82%.
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
The rapid growth of cloud computing and Internet of Things (IoT) applications faces several threats, such as latency, security, network failure, and performance. These issues are solved with the development of fog computing, which brings storage and computation closer to IoT-devices. However, there are several challenges faced by security designers, engineers, and researchers to secure this environment. To ensure the confidentiality of data that passes between the connected devices, digital signature protocols have been applied to the authentication of identities and messages. However, in the traditional method, a user's private key is directly stored on IoTs, so the private key may be disclosed under various malicious attacks. Furthermore, these methods require a lot of energy, which drains the resources of IoT-devices. A signature scheme based on the elliptic curve digital signature algorithm (ECDSA) is proposed in this paper to improve the security of the private key and the time taken for key-pair generation. ECDSA security is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP), which allows one to use much smaller groups. Smaller group sizes directly translate into shorter signatures, which is a crucial feature in settings where communication bandwidth is limited, or data transfer consumes a large amount of energy. In this paper, we have chosen the safe curve types of elliptic-curve cryptography (ECC) such as M221, SECP256r1, curve 25519, Brainpool P256t1, and M-551. These types of curves are the most secure curves of other curves of ECC as their security is based on the complexity of the ECDLP of the curve. And these types of curves exceed the complexity of the ECDLP. A valid signature can be generated without reestablishing the whole private key. ECDSA ensures data security and successfully reduces intermediate attacks. The efficiency and effectiveness of ECDSA in the IoT environment are validated by experimental evaluation and comparison analysis. The results indicate that, in comparison to the two-party ECDSA and RSA, the proposed ECDSA decreases computation time by 65% and 87%, respectively. Additionally, as compared to two-party ECDSA and RSA, respectively, it reduces energy consumption by 77% and 82%.
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...AlAtfat
— The internet of smart devices is a network of intelligent gadgets
with sensors, programs, Wi-Fi and communication network connections. These
devices store the data in cloud and process data outside the device using the
proposed Cloud-Internet communication framework. These devices can
communicate with other devices using the proposed framework. However, there
are many challenges for communication security among the internet of smart
devices. The Cloud can store the device data with security, reliability, privacy
and service availability. The communication Security has been raised as one of
the most critical issues of cloud computing where resolving such an issue would
result in a constant growth in the use and popularity of cloud computing. Our
purpose of this study is to create a framework for providing the communication
security among smart devices network for the internet of things using cloud
computing. Our main contribution links a new study for providing
communication security for the internet of smart devices using the cloud-Internet
framework. This study can be helpful for communication security problem in the
framework of the Internet of Things. The proposed study generates a new
framework for solving the issue of communication security among internet of
smart devices.
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
A pervasive network architecture that interconnect heterogeneous objects, devices, technologies and services called
Internet of Things has prompted a drastic change in demand of smart devices which in turn has increased the rate of
data exchange. These smart devices are built with numerous sensors which collect information from other interacting
devices, process it and send it to remote locations for storage or further processing. Although this mechanism of data
processing and sharing has contributed immensely to the information world, it has recently posed high security risk
on privacy and data confidentiality. This paper therefore analyses different security threats to data at different
architectural layers of Internet of Things, possible countermeasures and other in-depth security measures for Internet
of Things. The paper identifies device authentication on IoT network to be of paramount impo rtance in securing IoT
systems. This paper also suggests some essential technologies of security such as encryption for securing IoT
devices and the data shared over IoT network
Developed security and privacy algorithms for cyber physical system IJECEIAES
Cyber-physical system (CPS) is a modern technology in the cyber world, and it integrates with wireless sensor network (WSN). This system is widely used in many applications such as a smart city, greenhouse, healthcare, and power grid. Therefore, the data security and integrity are necessary to ensure the highest level of protection and performance for such systems. In this paper, two sides security system for cyber-physical level is proposed to obtain security, privacy, and integrity. The first side is applied the secure sockets layer (SSL)/transport layer security (TLS) encryption protocol with the internet of things (IoT) based message queuing telemetry transport (MQTT) protocol to secure the connection and encrypt the data exchange between the system's parties. The second side proposes an algorithm to detect and prevent a denial of service (DoS) attack (hypertext transfer protocol (HTTP) post request) on a Web server. The experiment results show the superior performance of the proposed method to secure the CPS by detecting and preventing the cyber-attacks, which infect the Web servers. They also prove the implementation of security, privacy and integrity aspects on the CPS.
Big data as a service (BDaaS) platform is widely used by various
organizations for handling and processing the high volume of data generated
from different internet of things (IoT) devices. Data generated from these IoT
devices are kept in the form of big data with the help of cloud computing
technology. Researchers are putting efforts into providing a more secure and
protected access environment for the data available on the cloud. In order to
create a safe, distributed, and decentralised environment in the cloud,
blockchain technology has emerged as a useful tool. In this research paper, we
have proposed a system that uses blockchain technology as a tool to regulate
data access that is provided by BDaaS platforms. We are securing the access
policy of data by using a modified form of ciphertext policy-attribute based
encryption (CP-ABE) technique with the help of blockchain technology. For
secure data access in BDaaS, algorithms have been created using a mix of CPABE with blockchain technology. Proposed smart contract algorithms are
implemented using Eclipse 7.0 IDE and the cloud environment has been
simulated on CloudSim tool. Results of key generation time, encryption time,
and decryption time has been calculated and compared with access control
mechanism without blockchain technology.
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
The introduction of Internet of Things (IoT) applications into daily life has raised serious privacy concerns
among consumers, network service providers, device manufacturers, and other parties involved. This paper
gives a high-level overview of the three phases of data collecting, transmission, and storage in IoT systems
as well as current privacy-preserving technologies. The following elements were investigated during these
three phases:(1) Physical and data connection layer security mechanisms(2) Network remedies(3)
Techniques for distributing and storing data. Real-world systems frequently have multiple phases and
incorporate a variety of methods to guarantee privacy. Therefore, for IoT research, design, development,
and operation, having a thorough understanding of all phases and their technologies can be beneficial. In
this Study introduced two independent methodologies namely generic differential privacy (GenDP) and
Cluster-Based Differential privacy ( Cluster-based DP) algorithms for handling metadata as intents and
intent scope to maintain privacy and security of IoT data in cloud environments. With its help, we can
virtual and connect enormous numbers of devices, get a clearer understanding of the IoT architecture, and
store data eternally. However, due of the dynamic nature of the environment, the diversity of devices, the
ad hoc requirements of multiple stakeholders, and hardware or network failures, it is a very challenging
task to create security-, privacy-, safety-, and quality-aware Internet of Things apps. It is becoming more
and more important to improve data privacy and security through appropriate data acquisition. The
proposed approach resulted in reduced loss performance as compared to Support Vector Machine (SVM) ,
Random Forest (RF) .
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...AlAtfat
Introducing IBchain, a new blockchain architecture with the Internet of Things (IoT), could be an
attractive framework regarding improvements in connectivity implementation through the smart cities.
Instead of meriting innovation and security, the IoT links people, sites, and products and provides
opportunities. Everything that transfers information to the IoT system is integrated by advanced
microchips, sensors, and actuators in actual things. The analytical ability of the IoT converts observations
into actions, impacting business advancements and significant ways of activity. IoT enables connected
objects to transmit information to personal blockchain systems to create tamper-resistant transaction
records. The information from sensors and microchips is progressing rapidly with blockchain ledgers,
making them more portable and relevant for immediate conversations. In IBchain methodology, the smart
objects are permissible to connect securely with other smart objects in diverse situations. IBchain creates
an innovative blockchain-based processing configuration through the IoT. The IBchain could analyze
blockchain to the main expertise or supports the IoT validation and trustworthiness. It reinforces
blockchain and cloud to build an empowering IoT ubiquitous situation for secure communication among
the smart devices.
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...IJCNCJournal
Internet of things (IoT), is the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data. The communication is through the internet hence susceptible to security and privacy attacks. Consequently, authenticated key agreement (AKA) of communicating entities in IoT is of paramount importance as a security and privacy credential. However, IoT devices have resource-constrained feature, hence implementation of heavy security and privacy features becomes a challenge. Research on AKA in IoT has been done since year 2006. Current research trends on AKA are together with forward secrecy (FS) feasibility, which ensures that future SKs remain safe even if the long-term master keys get compromised. However, most of researches use public key cryptosystems to achieve FS, which requires heavy computations that is not good for the resource-constrained IoT environment. The main purpose of this Thesis is to devise a new machine AKA with FS for IoT, denoted as M2MAKA-FS. To design M2MAKA-FS, we devise a new lightweight FS framework first, which does not rely on the public key cryptosystem but based on a hash chain. The security and privacy building blocks of M2MAKA-FS and the FS framework are symmetric key cryptosystem, one-way hash function, fuzzy commitment and challenge-response mechanism. Results of formal security and privacy analysis show that M2MAKA-FS provides mutual authentication, SK agreement with FS, anonymity and unlinkability and is resilient against various active attacks. Performance analysis shows that M2MAKA-FS achieves the lightweight requirements for IoT environments compared to the related protocols.
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...IJCNCJournal
Internet of things (IoT), is the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data. The communication is through the internet hence susceptible to security and privacy attacks. Consequently, authenticated key agreement (AKA) of communicating entities in IoT is of paramount importance as a security and privacy credential. However, IoT devices have resource-constrained feature, hence implementation of heavy security and privacy features becomes a challenge. Research on AKA in IoT has been done since year 2006. Current research trends on AKA are together with forward secrecy (FS) feasibility, which ensures that future SKs remain safe even if the long-term master keys get compromised. However, most of researches use public key cryptosystems to achieve FS, which requires heavy computations that is not good for the resource-constrained IoT environment. The main purpose of this Thesis is to devise a new machine AKA with FS for IoT, denoted as M2MAKA-FS. To design M2MAKA-FS, we devise a new lightweight FS framework first, which does not rely on the public key cryptosystem but based on a hash chain. The security and privacy building blocks of M2MAKA-FS and the FS framework are symmetric key cryptosystem, one-way hash function, fuzzy commitment and challenge-response mechanism. Results of formal security and privacy analysis show that M2MAKA-FS provides mutual authentication, SK agreement with FS, anonymity and unlinkability and is resilient against various active attacks. Performance analysis shows that M2MAKA-FS achieves the lightweight requirements for IoT environments compared to the related protocols.
Authentication Devices in Fog-mobile Edge Computing Environments through a Wi...ijujournal
The rapid growth of the Internet of Things (IoT), cloud computing, Fog computing, mobile edge computing and wireless grids has resulted in the
wide spread deployment of relatively immature technology. These technologies, which will primarily use 5G wireless communication networks, are becoming popular because they can be deployed quickly with little infrastructure and lends themselves to environments
utilizing numerous internet connected devices (ICD). There are, however, many significant challenges faced by security designers, engineers and implementers of these networks in ensuring that the level of
security afforded is appropriate. Because of the threat of exploitation, these networks have to be protected by a robust security architecture due to these technologies being plagued with security problems. The authentication of smart ICDs to IoT networks is a critical mechanism for achieving security on these new information system platforms. This article identifies an authentication process required for these ICDs, which will need to prove their identity to authenticate to an IoT fog-mobile edge computing (FMEC) cloud
network through a wireless grid authentication process. The purpose of this article is to hypothesize a generic authentication methodology for these FMEC clouds uses in an IoT architecture. The proposed
methodology, called wg-IoT, must include the integration of Fog computing, wireless grids and mobile edge computing clouds to create this new IoT architecture. An authentication process developed from the resource sharing protocol (RSP) from a wireless grid is first developed and proposed for the authentication of ICDs. The wireless grid core components must be embedded in IoT devices or sensors
depending on their capability to handle five primary functions: management of identification [ID] andpresence, permissions
management, data transferability, application-programming interface [API] and security.
AUTHENTICATING DEVICES IN FOG-MOBILE EDGE COMPUTING ENVIRONMENTS THROUGH A WI...ijujournal
The rapid growth of the Internet of Things (IoT), cloud computing, Fog computing, mobile edge computing
and wireless grids has resulted in the widespread deployment of relatively immature technology. These
technologies, which will primarily use 5G wireless communication networks, are becoming popular
because they can be deployed quickly with little infrastructure and lends themselves to environments
utilizing numerous internet connected devices (ICD). There are, however, many significant challenges
faced by security designers, engineers and implementers of these networks in ensuring that the level of
security afforded is appropriate. Because of the threat of exploitation, these networks have to be protected
by a robust security architecture due to these technologies being plagued with security problems. The
authentication of smart ICDs to IoT networks is a critical mechanism for achieving security on these new
information system platforms. This article identifies an authentication process required for these ICDs,
which will need to prove their identity to authenticate to an IoT fog-mobile edge computing (FMEC) cloud
network through a wireless grid authentication process. The purpose of this article is to begin to
hypothesize a generic authentication methodology for these FMEC clouds uses in an IoT architecture. The
proposed methodology, called wg-IoT, must include the integration of Fog computing, wireless grids and
mobile edge computing clouds to create this new IoT architecture. An authentication process developed
from the resource sharing protocol (RSP) from a wireless grid is first developed and proposed for the
authentication of ICDs. The wireless grid core components must be embedded in IoT devices or sensors
depending on their capability to handle five primary functions: management of identification [ID] and
presence, permissions management, data transferability, application-programming interface [API] and
security.
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
In this paper, snake optimization algorithm (SOA) is used to find the optimal gains of an enhanced controller for controlling congestion problem in computer networks. M-file and Simulink platform is adopted to evaluate the response of the active queue management (AQM) system, a comparison with two classical controllers is done, all tuned gains of controllers are obtained using SOA method and the fitness function chose to monitor the system performance is the integral time absolute error (ITAE). Transient analysis and robust analysis is used to show the proposed controller performance, two robustness tests are applied to the AQM system, one is done by varying the size of queue value in different period and the other test is done by changing the number of transmission control protocol (TCP) sessions with a value of ± 20% from its original value. The simulation results reflect a stable and robust behavior and best performance is appeared clearly to achieve the desired queue size without any noise or any transmission problems.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
1. TELKOMNIKA Telecommunication Computing Electronics and Control
Vol. 20, No. 4, August 2022, pp. 772~779
ISSN: 1693-6930, DOI: 10.12928/TELKOMNIKA.v20i4.23765 772
Journal homepage: http://telkomnika.uad.ac.id
A security services for internet of thing smart health care
solutions based blockchain technology
Ahmed Hashim Mohammed1
, Rawaa Mohammed Abdul Hussein2
1
Department of Computer Science, College of Education, Mustansiriyah University, Baghdad, Iraq
2
Computer Engineering Department, Faculty of Engineering, Mustansiriyah University, Baghdad, Iraq
Article Info ABSTRACT
Article history:
Received Jul 13, 2021
Revised Apr 11, 2022
Accepted Apr 24, 2022
Pervasive and ubiquitous computing has enabled people better integrate
physical things into the digital world. The internet of things (IoT) has been
considerably more widely used in business and everyday life in the last
decade. Innovative healthcare information and communication technologies
are a vast field of research and applications that need IoT benefits, including
speed, security, and low cost. The proposed modified advanced encryption
standard (AES)-cipher block chaining (CBC)-based blockchain technology
offers a shared key to devices that need to communicate directly with or with
entities outside the smart healthcare network to give users greater control
over transactions. The experiments are carried out using a Raspberry Pi 3,
whereas two different sensors are employed in this case. Blockchain
technology encrypts data between doctor and patient with varied user
numbers. The results from experiments revealed that the proposed modified
AES-CBC based blockchain technology could provide the IoT application
with security services (confidentiality, integrity, and access control) with
efficient execution time.
Keywords:
AES-CBC
Electronic health
Internet of thing blockchain
Security services
This is an open access article under the CC BY-SA license.
Corresponding Author:
Ahmed Hashim Mohammed
Department of Computer Science, College of Education, Mustansiriyah University
9C83+WC8, Baghdad, Iraq
Email: dr.ahmedh@uomustansiriyah.edu.iq
1. INTRODUCTION
The internet of things (IoT) is a new term that refers to how things, such as sensors, devices,
radio-frequency identification (RFID) tags, and physical objects, are networked with the internet in real-time.
The IoT can be used for many things, like healthcare, home automation, smart cities, agriculture, industry,
and more [1]. According to current estimates, 50 billion such devices will be in use by 2025 [2]. The objects
connected to the internet make it possible for the user to monitor and act quickly in the environment, no
matter where they are in the world. Things could send information about a person or a place when they talk
to each other from anywhere at any time. The development of new IoT technologies without considering
security would put a lot of security threats in the IoT environment and the privacy of data at risk [3], [4].
Sensors and devices in the IoT communicate data like mobile phones and wireless networks. They are
thus vulnerable to the same security dangers and assaults that need the three things confidentiality, integrity, and
availability (CIA) [5]. Data security is regarded as one of the most significant challenges; it is necessary,
particularly for activities and transactions reliant on data collection and manipulation. In reality, data
encryption is essential before any data can be transmitted across a network connection [6].
Cryptographic systems are well-known for their effectiveness in ensuring the confidentiality,
secrecy, and validity of data. The communications between IoT devices should be encrypted in order to protect
their security, but unfortunately, developing solutions based on traditional encryption methods is a difficult task
2. TELKOMNIKA Telecommun Comput El Control
A security services for internet of thing smart health care solutions based … (Ahmed Hashim Mohammed)
773
because of the restricted resources available to the IoT devices component including, battery-powered, limited
processing and storage capacity. on the other hand, conventional cryptographic methods are sophisticated and
need a lot of processing power, making them unsuitable for IoT devices [7]. As a result, they need a security
solution that costs a lot less than other devices for IoT environments with limited resources. The current
research demonstrated that the IoT has resulted in the emergence of new security threats and that sensors and
devices utilized in the IoT network may be targeted by malware and subjected to various attacks [8].
The necessity for the right cryptographic solution is growing in an IoT world. However, the usage of
cryptography on edge devices is constrained by their short battery lives, low power computing, little memory,
insufficient power supply, and small size [9]. These low-powered edge devices may not handle standard
cryptographic primitives. An RFID tag, for example, cannot use a 1204-bit Rivest, Shamir, and Adleman
(RSA) method since it does not have the resources. Today smart industries now require cryptographic
solutions for ubiquitous computing and only the most resource-constrained edge devices [10].
Alshammari et al. [11] have suggested a method that relied heavily on the advanced encryption standard
(AES) and a novel chaotic substitution box (S-box) because AES has been widely employed in embedded
systems since the IEEE 802.15.4 standard adopted it. Sruthi and Rajasekaran [12] proposed performing both
signature and encryption in the same round. They encrypted the data using AES-cipher block chaining
(CBC), a lightweight block cipher, and the session key with the elliptic curve cryptography (ECC) method.
Xie and Chen [13] has developed a better way to do IoT decentralized data aggregation (DDA) by using
secret sharing to make smart contracts more efficient and run the computers. Full-fledged systems also allow
data sharing, such as allowing a leader to look at other people’s devices’ data. This is done using local
differential privacy and cryptographic primitives like token-based encryption. Ayachi et al. [14] have
proposed a method to encrypt data on a network-on-chip (NoC) based on the light encryption device (LED)
algorithm to cut down on the amount of space it takes up and achieve high speed and low power consumption
at the same time. Ali et al. [15] have suggested a light privacy-conscious IoT-based metering that delivers
message integrity and confidentiality to an industrial environment that ensures the privacy of smart gadgets
and customers. The original power usage data is encrypted and disseminated safely, so only the smart meter
can reconstruct the original value. The suggested approach does not need extra demanding encryption and
decryption operations.
Lee and Sim [16] have changed the secret key and initialization vector (IV) of the AES-CBC
algorithm every few times that, makes it more secure. Also, they simplified directed acyclic graph (DAG) by
sending overlap packets to three blocks at a time. Guan et al. [17] have come up with a new ciphertext policy
attribute-based encryption (CP-ABE) scheme that keeps the length of the ciphertext the same and does not
have much extra work in the encryption and decryption stages. It has also been proven that their scheme is
adaptable to be safe under the standard model.
Karbasi and Shahpasand [18] suggested a lightweight security mechanism based on cryptographic
ratchets to safeguard IoT items and sensors. Khan et al. [19] suggested a novel blockchain model with
resource-constrained IoT sensor nodes. A lightweight authenticated encryption (AE) technique is AES-CBC
ed for proof-of-authentication. Sensor nodes produce tags based on sensor data and broadcast them to the
network. After the cluster head node, the block is hashed and uploaded to the blockchain. Sun et al. [20]
suggested employing neural cryptosystems and latent binary space for IoT device authentication, encryption,
and key distribution. The neural cryptosystems used symmetric, public-key, and no-key encryption
techniques.
Sowjanya et al. [21] used ECC to make a simple key management system for the CP-ABE scheme.
The unique thing about this scheme is that even though the semi-trusted authority (an honest person who
wants to know the secret information) makes a secret key, it cannot decrypt a message with these keys unless
it also has the private key of the receiver. Dwivedi [22] proposed encrypting data that uses dynamism and
two separate cipher parts. The number of rounds that can be played in a session may also change from
session to session. Only one type of encryption is used at a time, and the attacker does not know which type
of encryption is being used in this case.
Shi et al. [23] suggests that access control authorization of data from devices is redefined and that
the data be stored on the blockchain. They develop procedures for authorization, permission revocation,
access control, and auditing the authorization and access control. They use a lightweight symmetric encryption
technique (SEA) to ensure that the privacy of the IoT system is not compromised. Sleem and Couturier [24]
have suggested Speck-R, ultra-lightweight Speck-based encryption. It is a hybrid cipher that combines
addition/rotation/XOR (ARX) with a layer of dynamic substitution. They proposed the addition of a
key-dynamic replacement layer that changes in response to the presence of a dynamic key.
Ragab et al. [25] increased the security of the original corrected block tiny encryption algorithm
(CBTEA) block cipher by using an upgraded S-box. The modified TEA (M-TEA) also has a chaotic key
generating technology, giving the one-time pad concept extra security. When encrypting plaintext, the cipher
keys change for each block. It is, therefore, more secure than the TEA and AES algorithm. The M-TEA can
3. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022: 772-779
774
boost data security with various text blocks and key sizes. Li et al. [26] used homomorphic encryption to
keep people’s data safe. They looked at how the data owners, untrustworthy third-party cloud servers, and the
people who use the data all had to work together to keep their privacy safe. Meanwhile, efficient
homomorphic algorithms are proposed to protect the privacy of the people who use the data.
2. INTERNET OF THING AND BLOCKCHAIN
The internet of objects is a network of things in the physical world that has arisen as a collection of
technologies ranging from wireless sensor networks (WSN) to radio frequency identification [27].
Furthermore, to enable a wide variety of new services, the growth in IoT technology also poses issues in
protecting the enormous amounts of data collected and preserving individual privacy. Access control may be
used to guarantee that data is only accessible by those who have the appropriate permissions [28], [29].
The IoT has generated a tremendous quantity of data, including sensitive personal information about
individuals. The IoT security must ensure that all portions of the system are secure, which is a difficult task
for developers to overcome. It is necessary to determine how and where the IoTs interaction will be the key
to IoT data safety; researchers are combining blockchain with access control, which they believe can remove
the need for a central middleman while still allowing real-time, trustful data flow [30]. Participants may
uniquely identify each device by making digital replicas of real things on a blockchain-based network. At the
same time, the data they supply is permanently saved and cannot be changed.
In 2008, an unknown individual or group by the name of for the first time, Satoshi Nakamoto,
introduced blockchain technology, which serves as the foundation of the cryptocurrency Bitcoin, to the rest
of the world [31]. Combining blockchain technology with IoTs platforms would result in a dependable
solution. In the decentralized and trustless blockchain environment, distributed ledger technology is used to
aid decentralized and distributed computing. Blockchain is a shared public database of all conducted digital
activities that stores time-stamped transactions in the form of blocks. Each block header retains the previous
block’s hash. Because of this block structure, the records of blockchain are immutable. Even a minor
alteration in a single transaction would result in a new hash, resulting in a mismatch between the hash of that
transaction and the hash of the nearby block. Blockchain technology allows businesses that do not trust one
another to exchange transactions and information without the involvement of a third party [32]. Blockchain
technology is distinguished by characteristics such as decentralization, security, transparency, redundancy,
and reputation, as well as traceability, all of which provide value to any industry that adopts blockchain
technology [33].
There are three sorts of blockchains: public, private, and hybrid. Public blockchain means that
anybody can join ad participate. Private blockchains are the most appropriate form of connecting with IoT
and adding value since they are not available to the general public. Hybrid blockchains combine the best
features of both private and public blockchains in one system [34]. The IoT would benefit significantly from
blockchain technology, mainly when implemented smart contracts. It removes the need for central servers
and enhances fault tolerance and scalability, and makes peer-to-peer messaging far quicker than it would be
with the current centralized architecture. Smart contracts may be used to automatically update devices’
firmware to cope with vulnerabilities and improve the overall security of the underlying IoT system, which is
beneficial to both parties [35], [36]. When individuals trade money, property, shares, or anything else of
value without the need for a third party to intervene, they are referred to as smart contracts. In the blockchain
network, smart contracts are computer programs or written scripts that have unique addresses integrated into
the network. The blockchain consensus mechanism, which enables the system to enforce the conditions of a
contract, is responsible for ensuring that the contract is carried out as agreed [37].
3. PROPOSED ENCRYPTION ALGORITHM
The IoT is a potential future technology that will link billions of things. It is projected that
increasing communication would result in data posing a security risk. Depending on how many critical
factors must be considered to achieve full performance. These challenges, scalability and resource efficiency,
impact other issues like security and energy efficiency. Healthcare systems based on IoT may regulate
hospital equipment such as patient temperature, pulse rate, and pressure via a web interface or smartphone
application. Numerous technologies, such as standalone lightweight IoT security and protocols for data
transmission, are being developed to support this approach. A flowchart of the safe healthcare system can be
shown in Figure 1 to provide the security services for IoT-based applications in healthcare devices.
The classical encryption techniques are computationally costly owing to their complexity and
necessity for several encryption rounds. The encryption algorithm based blockchain is proposed to identify
any changes in the content of transactions while they are being sent. Transactions are linked together as an
immutable ledger in the local private blockchain, which is not accessible to the public. A miner is a device
4. TELKOMNIKA Telecommun Comput El Control
A security services for internet of thing smart health care solutions based … (Ahmed Hashim Mohammed)
775
that manages the processing of incoming and outgoing transactions to and from a smart healthcare system.
The miner might be integrated with the hospital internet gateway in some instances.
In contrast, it could be an independent device in others, such as a computer. Each device inside the
hospital may request data from another device to provide certain services. In order to provide users with more
control over transactions, the miners should create a shared key for devices that communicate with each other
directly or with entities outside of smart healthcare. The miner receives the data and the request from the
device to save data on the cloud storage service. After verifying that the device has been approved, the miner
takes the most recent block number and hash from the local blockchain and transfers it to a storage device,
together with the data, as shown in Figure 2.
Because data security is vital in IoT applications, it is important to consider which paradigm to use to
exchange keys. In this research, the data is encrypted using a modified AES-CBC asymmetric encryption-based
blockchain approach, as seen in Figure 3. The input plaintext (P1, P2, and Pn) has been encrypted using three
blocks in this chain, namely BC0, BC1, and BC2, in the order of appearance with intial value. The result of
the encryption method is a series of blocks of ciphertext (C1, C2, and Cn).
Figure 1. Flowchart of the proposed algorithm
Figure 2. Blockchain structure
5. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022: 772-779
776
Figure 3. Modified AES-CBC algorithm based blockchain
This kind of encryption has the benefit of having a minimal execution time, which makes it suitable
for use in high-speed related to smart tasks that need limited processing resources. Both the sender and the
receiver know a standard secret key. The proposed encryption algorithm process can be summarized in the
following steps.
Algorithm 1. Encryption algorithm
Input: Plaintext
Output: Ciphertext
Steps:
Step 1: Read data from the sensor
Step 2: Generate the first blockchain for sensor data
Step 3: Encrypt the sensor data using the first blockchain key
Step 4: XOR (state, IV)
Step 5: Add round key (state, BC0)
Step 6: XOR (state, IV)
Step 7: Send the encrypted sensor data to the client
Step 8: End
Decryption is the process of reversing the encryption process. It refers to the process of converting encrypted
text into the plain text as shown below.
Algorithm 2. Decryption algorithm
Input: Ciphertext
Output: Plaintext
Steps:
Step 1: User received the encrypted sensor data
Step 2: If first blockchain = second blockchain then decrypt the sensor data using the first blockchain else
sensor data has tampered
Step 3: Generate the new blockchain for control data
Step 4: Encrypt the control data using new blockchain
Step 5: XOR (state, IV)
Step 6: Add round key (state, Ki)
Step 7: XOR (state, IV)
Step 8: Send the encrypted control data to the server
Step 9: End
4. RESULTS AND DISCUSSIONS
The experiments are carried out using a Raspberry Pi 3, whereas two different sensors are employed
in this case. The first is a temperature sensor, while the second is a pulse sensor. The infrared sensor
thermometer may be used for non-contact temperature detection. After installing the library, identify the
general-purpose input/output (GPIO) data pins for taking a patient’s temperature every few seconds using
node js and express environment. The second pulse amped is a heart-rate sensor compatible with Arduino
and the Raspberry Pi. Its primary optical heart rate sensor, amplification, and noise reduction technology
provides rapid and straightforward pulse readings.
6. TELKOMNIKA Telecommun Comput El Control
A security services for internet of thing smart health care solutions based … (Ahmed Hashim Mohammed)
777
Moreover, it uses less power, using just 4 mA at 5 V, making it particularly well suited for IoT
applications. It is possible to use sensors to detect when a patient’s finger is placed into a linked line
connected to the Raspberry Pi 3. Confidentiality, integrity, and availability are the three essential security
criteria that any IoT application security must handle. Confidentiality ensures that only the intended receiver
of the communication has access to it. Integrity no tampering with the message should be allowed;
availability ensures the service or data must be accessible to the user at all times.
Security services’ confidentiality integrity and availability have been accomplished via modified
AES-CBC symmetric encryption and blockchain technology. A shared key is created between the devices.
The execution time of an algorithm in an IoT environment was an important metric to consider while
assessing the method. This method must be fast and efficient while also delivering a high degree of security.
An evaluation of the suggested encryption method (modified AES-CBC algorithm) in comparison to the
AES-CBC algorithm is performed in this system. We compute the time it takes to encrypt and decode
particular data received from the sensors. Table 1 illustrates the system execution time in milliseconds for
both the AES-CBC without blockchain and modified AES-CBC with blockchain algorithms using 100 bytes
file stored on the Raspberry Pi. The modified AES-CBC algorithm using blockchain was executed faster than
the original AES-CBC method. Consequently, the suggested method is well-suited for the system under
consideration.
The execution time of any algorithm used in the IoT environment was very important for the
evaluation of that algorithm; therefore, another evaluation of the average encryption time of using the
modified AES-CBC encryption algorithm based on blockchain technology is listed in Table 2 among
different numbers of users (1−100). The modified AES-CBC algorithm based blockchain is implemented
with key lengths of 128 bits and two separate data sensors, which are both used in the implementation.
A calculation has been made to determine the amount of time required for the encryption and decryption of
data received from sensors, as well as for each control instruction to modify the state of a device. Increasing
the number of users connecting to the IoT healthcare solution has a direct impact on the length of time it
takes the server to decode a set message size.
The randomness features of cryptographic algorithms may be evaluated using various statistical
techniques. After running two algorithms for a certain amount of time on a text file, this article gathered
100 bits. National Institute of Standards and Technology (NIST) statistical testing indicated that the
suggested method worked tremendously and passed all the statistical randomness tests, as shown in Table 3.
Table 1. Execution time
Algorithm Average encryption time
AES-CBC 0.1841
Modified AES-CBC 0.0741
Table 2. The average execution times
No of users AES-CBC Modified AES-CBC
1 0.4934 0.3729
10 2.1922 1.9221
20 2.5941 2.1551
30 3.2131 2.5691
40 4.1931 3.4690
50 6.5540 4.3240
100 7.9021 5.8951
Table 3. NIST test
NIST tests Modified AES-CBC
Frequency test Pass
Frequency test within a block Pass
Longest-run-of-ones in a block Pass
Binary matrix rank test Pass
Discrete fourier transform (spectral) test Pass
Non-overlapping template matching test Pass
Overlapping template matching test Pass
Maurer’s “Universal Statistical” test Pass
Linear complexity test Pass
Serial test Pass
Approximate entropy test Pass
Cumulative sums test Pass
Random excursions test Pass
Random excursions variant test Pass
7. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022: 772-779
778
5. CONCLUSION
People have better integrated physical objects into the digital realm due to pervasive and ubiquitous
computing. IoT has been extensively utilized in business and daily life in the previous decade. This trend is
expected to continue. Using information and communication technologies in e-health is a massive field of
study and applications that require the IoT to provide security and cost-effectiveness. This article described
the development of an IoT system for remote patient monitoring at a hospital (using any computer or mobile
device to control and switch on/off the devices). In order to give users greater control over transactions, the
proposed modified AES-CBC based blockchain technology provides a shared key to devices that need to
communicate directly with one another or with entities outside of the smart healthcare network. The test of
the proposed system was carried out using a Raspberry Pi 3 computer, with two distinct types of sensors
being used in this instance. Blockchain technology is being used to encrypt data between a doctor and a patient,
with various users participating. The results demonstrated that the suggested modified AES-CBC-based
blockchain technology might be used to deliver security services (confidentiality, integrity, and access control)
to IoT applications while ensuring that the execution time is as short as possible.
REFERENCES
[1] F. G. Abdulkadhim, Z. Yi, C. Tang, M. Khalid, and S. A. Waheeb, “A Survey on the applications of IoT: an investigation into
existing environments, present challenges and future opportunities,” TELKOMNIKA (Telecommunication Computing Electronics
and Control), vol. 18, no. 3, pp. 1447–1458, Jun. 2020, doi: 10.12928/telkomnika.v18i3.15604.
[2] T. Song, R. Li, B. Mei, J. Yu, X. Xing, and X. Cheng, “A privacy preserving communication protocol for IoT applications in
smart homes,” IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1844–1852, Dec. 2017, doi: 10.1109/JIOT.2017.2707489.
[3] F. Siddiqui, J. Beley, S. Zeadally, and G. Braught, “Secure and lightweight communication in heterogeneous IoT environments,”
Internet of Things, vol. 14, p. 100093, Jun. 2021, doi: 10.1016/j.iot.2019.100093.
[4] A. H. Mohammed and A. M. Mahdi, “A security services of proposed social web of things,” UPB Scientific Bulletin, Series C:
Electrical Engineering and Computer Science, vol. 83, no. 4, pp. 283–292, 2021. [Online]. Available:
https://www.scientificbulletin.upb.ro/rev_docs_arhiva/rez64d_526806.pdf
[5] D. A. N. Gookyi, G. Kanda, and K. Ryoo, “NIST lightweight cryptography standardization process: classification of second round
candidates, open challenges, and recommendations,” Journal of Information Processing Systems, vol. 17, no. 2, pp. 253–270,
2021, doi: 10.3745/JIPS.03.0156.
[6] V. A. Thakor, M. A. Razzaque, and M. R. A. Khandaker, “Lightweight cryptography algorithms for resource-constrained IoT
devices: A review, comparison and research opportunities,” IEEE Access, vol. 9, pp. 28177–28193, 2021,
doi: 10.1109/ACCESS.2021.3052867.
[7] P. Asghari, A. M. Rahmani, and H. H. S. Javadi, “Internet of things applications: A systematic review,” Computer Networks,
vol. 148, pp. 241–261, Jan. 2019, doi: 10.1016/j.comnet.2018.12.008.
[8] R. M. Abdul-Hussein, R. S. Mohammed, and A. H. Mohammed, “Review: Security challenges and cyber-attacks for internet of
things,” in 2021 1st Babylon International Conference on Information Technology and Science (BICITS), Apr. 2021, pp. 81–85,
doi: 10.1109/BICITS51482.2021.9509899.
[9] X. Luo et al., “A lightweight privacy-preserving communication protocol for heterogeneous IoT environment,” IEEE Access,
vol. 8, pp. 67192–67204, 2020, doi: 10.1109/ACCESS.2020.2978525.
[10] I. R. Chiadighikaobi and N. Katuk, “A scoping study on lightweight cryptography reviews in IoT,” Baghdad Science Journal,
vol. 18, no. 2, pp. 989–1000, Jun. 2021, doi: 10.21123/bsj.2021.18.2(Suppl.).0989.
[11] B. M. Alshammari, R. Guesmi, T. Guesmi, H. Alsaif, and A. Alzamil, “Implementing a symmetric lightweight cryptosystem in
highly constrained iot devices by using a chaotic s-box,” Symmetry, vol. 13, no. 1, pp. 1–20, Jan. 2021,
doi: 10.3390/sym13010129.
[12] M. Sruthi and R. Rajasekaran, “Hybrid lightweight signcryption scheme for IoT,” Open Computer Science, vol. 11, no. 1,
pp. 391–398, 2021, doi: 10.1515/comp-2020-0105.
[13] X. Xie and Y. -C. Chen, “Decentralized data aggregation: a new secure framework based on lightweight cryptographic
algorithms,” Wireless Communications and Mobile Computing, vol. 2021, no. 3, pp. 1–12, Apr. 2021,
doi: 10.1155/2021/5565663.
[14] R. Ayachi, A. Mhaouch, and A. Ben Abdelali, “Lightweight cryptography for network-on-chip data encryption,” Security and
Communication Networks, vol. 2021, pp. 1–10, May 2021, doi: 10.1155/2021/9943713.
[15] W. Ali, I. U. Din, A. Almogren, M. Guizani, and M. Zuair, “A lightweight privacy-aware IoT-based metering scheme for smart
industrial ecosystems,” IEEE Transactions on Industrial Informatics, vol. 17, no. 9, pp. 6134–6143, Sep. 2021,
doi: 10.1109/TII.2020.2984366.
[16] S. -W. Lee and K. -B. Sim, “Design and hardware implementation of a simplified dag-based blockchain and new aes-cbc
algorithm for iot security,” Electronics, vol. 10, no. 9, p. 1127, May 2021, doi: 10.3390/electronics10091127.
[17] Z. Guan, W. Yang, L. Zhu, L. Wu, and R. Wang, “Achieving adaptively secure data access control with privacy protection for
lightweight IoT devices,” Science China Information Sciences, vol. 64, no. 6, pp. 1–14, Jun. 2021, doi: 10.1007/s11432-020-
2957-5.
[18] A. H. Karbasi and S. Shahpasand, “SINGLETON: A lightweight and secure end-to-end encryption protocol for the sensor
networks in the Internet of Things based on cryptographic ratchets,” The Journal of Supercomputing, vol. 77, pp. 3516–3554,
2021, doi: 10.1007/s11227-020-03411-x.
[19] S. Khan, W. -K. Lee, and S. O. Hwang, “AEchain: A lightweight blockchain for IoT applications,” IEEE Consumer Electronics
Magazine, vol. 11, no. 2, pp. 64–76, Mar. 2022, doi: 10.1109/MCE.2021.3060373.
[20] Y. Sun, F. P.-W. Lo, and B. Lo, “Light-weight internet-of-things device authentication, encryption and key distribution using end-
to-end neural cryptosystems,” IEEE Internet of Things Journal, vol. 14, no. 8, pp. 1–10, 2021, doi: 10.1109/JIOT.2021.3067036.
[21] K. Sowjanya, M. Dasgupta, and S. Ray, “A lightweight key management scheme for key-escrow-free ECC-based CP-ABE for
IoT healthcare systems,” Journal of Systems Architecture, vol. 117, p. 102108, Aug. 2021, doi: 10.1016/j.sysarc.2021.102108.
[22] A. D. Dwivedi, “Brisk: Dynamic encryption-based cipher for long term security,” Sensors, vol. 21, no. 17, p. 5744, Aug. 2021,
8. TELKOMNIKA Telecommun Comput El Control
A security services for internet of thing smart health care solutions based … (Ahmed Hashim Mohammed)
779
doi: 10.3390/s21175744.
[23] N. Shi et al., “BacS: A blockchain-based access control scheme in distributed internet of things,” Peer-to-Peer Networking and
Applications, vol. 14, no. 5, pp. 2585–2599, Sep. 2021, doi: 10.1007/s12083-020-00930-5.
[24] L. Sleem and R. Couturier, “Speck-R: An ultra light-weight cryptographic scheme for internet of things,” Multimedia Tools and
Applications, vol. 80, pp. 17067–17102, May 2021, doi: 10.1007/s11042-020-09625-8.
[25] A. A. M. Ragab, A. Madani, A. M. Wahdan, and G. M. I. Selim, “Design, analysis, and implementation of a new lightweight
block cipher for protecting IoT smart devices,” Journal of Ambient Intelligence and Humanized Computing,
pp. 1–18, Jan. 2021, doi: 10.1007/s12652-020-02782-6.
[26] S. Li, S. Zhao, G. Min, L. Qi, and G. Liu, “Lightweight privacy-preserving scheme using homomorphic encryption in industrial
internet of things,” IEEE Internet of Things Journal, 2021, doi: 10.1109/JIOT.2021.3066427.
[27] A. Aborujilah, M. N. M. Yatim, and A. Al-Othmani, “Blockchain-based adoption framework for authentic land registry system in
Malaysia,” TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 19, no. 6, pp. 2038–2049, Dec. 2021,
doi: 10.12928/telkomnika.v19i6.19276.
[28] W. Xiang and Z. Yuanyuan, “Scalable access control scheme of internet of things based on blockchain based on blockchain,”
Procedia Computer Science, vol. 198, pp. 448–453, 2022, doi: 10.1016/j.procs.2021.12.268.
[29] J. Gong and N. J. Navimipour, “An in-depth and systematic literature review on the blockchain-based approaches for cloud
computing,” Cluster Computing, vol. 25, pp. 383–400, 2022, doi: 10.1007/s10586-021-03412-2.
[30] S. Villamil, C. Hernández, and G. Tarazona, “An overview of internet of things,” TELKOMNIKA (Telecommunication Computing
Electronics and Control), vol. 18, no. 5, pp. 2320–2327, Oct. 2020, doi: 10.12928/telkomnika.v18i5.15911.
[31] M. M. Khubrani and S. Alam, “A detailed review of blockchain-based applications for protection against pandemic like COVID-19,”
TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 19, no. 4, pp. 1185–1196, Aug. 2021,
doi: 10.12928/telkomnika.v19i4.18465.
[32] K. M. Khan, J. Arshad, W. Iqbal, S. Abdullah, and H. Zaib, “Blockchain-enabled real-time SLA monitoring for cloud-hosted
services,” Cluster Computing, vol. 25, no. 1, pp. 537–559, 2022, doi: 10.1007/s10586-021-03416-y.
[33] A. Reyna, C. Martín, J. Chen, E. Soler, and M. Díaz, “On blockchain and its integration with IoT. Challenges and opportunities,”
Future Generation Computer Systems, vol. 88, pp. 173–190, Nov. 2018, doi: 10.1016/j.future.2018.05.046.
[34] S. Auer, S. Nagler, S. Mazumdar, and R. R. Mukkamala, “Towards blockchain-IoT based shared mobility: Car-sharing and
leasing as a case study,” Journal of Network and Computer Applications, vol. 200, p. 103316, Apr. 2022,
doi: 10.1016/j.jnca.2021.103316.
[35] A. A. Sadawi, M. S. Hassan, and M. Ndiaye, “A survey on the integration of blockchain with IoT to enhance performance and
eliminate challenges,” IEEE Access, vol. 9, pp. 54478–54497, 2021, doi: 10.1109/ACCESS.2021.3070555.
[36] J. J. Hunhevicz, M. Motie, and D. M. Hall, “Digital building twins and blockchain for performance-based (smart) contracts,”
Automation in Construction, vol. 133, p. 103981, Jan. 2022, doi: 10.1016/j.autcon.2021.103981.
[37] B. Assiri and W. Z. Khan, “Fair and trustworthy: Lock-free enhanced tendermint blockchain algorithm,” TELKOMNIKA
(Telecommunication Computing Electronics and Control), vol. 18, no. 4, pp. 2224–2234, Aug. 2020,
doi: 10.12928/telkomnika.v18i4.15701.
BIOGRAPHIES OF AUTHORS
Ahmed Hashim Mohammed received a Computer Science degree from Al-
Rafidain University, Baghdad, Iraq, in 2003, and M.Sc. degree in computer science from
Informatics Institute for Postgraduate Studies, Baghdad, Iraq, in 2006, and a PhD degree in
computer science from the University of Technology, Baghdad, Iraq in 2015. He is Currently
Assist Prof. lecturer at Al- Mustansiriyah University. His research interests include internet of
things, cloud computing, cyber security, network security and cryptanalysis. He can be
contacted at email: dr.ahmedh@uomustansiriyah.edu.iq.
Rawaa Mohammed Abdul Hussein works as a Lecturer in the computer
engineering department -faculty of engineering / University of Mustansiriyah. From 2001-to
2005, she got a Bachelor’s degree in “computer and software engineering” from the university
of Mustansiriyah. From 2006-to 2008, she received a Master’s degree in “information
technology” from the University of Technology. Her research interests are cloud computing,
software engineering, intelligent algorithm, logic design, and web application security. She can
be contacted at email: mscrawaahm@uomustansiriyah.edu.iq.