This document summarizes a research paper that applied application layer security protocols to a simulated smart home system using the Contiki-NG operating system. The researchers first designed a smart home network in Cooja simulator with various sensor nodes communicating with a border router and cloud. They then added the OSCORE and EDHOC security protocols to encrypt communication between the nodes. Finally, they evaluated the impact of applying these protocols on memory footprint and energy consumption compared to an unsecured implementation. The results showed that the current implementation introduced a small overhead compared to other security solutions.
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET Journal
This document discusses security aspects of internet of things (IoT) devices and proposes solutions. It summarizes 3 existing approaches:
1) An IoT reference model that includes authorization, encryption, and authentication mechanisms at each layer independently.
2) A protocol for IoT security using elliptic curve cryptography to allow encryption and decryption of messages between devices and gateways.
3) A mechanism using elliptic curve cryptography to provide security for communication between IPv4 and IPv6 networks, translating addresses and incorporating encryption.
The document also motivates the need for lightweight cryptographic algorithms for resource-constrained IoT devices and surveys existing schemes to provide confidentiality, integrity, and availability while addressing vulnerabilities.
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...IRJET Journal
This document proposes a multi-factor authentication security framework using blockchain for cloud computing. It discusses using one-time passwords and unique codes for login along with blockchain technology to securely store data in the cloud. The framework aims to improve security, securely share data online, and secure cloud data storage. It presents a system architecture with three modules - data owner, user, and authority - to allow data owners to securely upload files via blockchain that users can view and download with authentication.
This document summarizes a research paper that proposes implementing and analyzing cryptography techniques for 5G applications using Xilinx. It discusses how lightweight cryptography plays an important role in securing data for devices with limited resources in IoT and 5G networks. The research aims to develop an efficient VLSI architecture for a lightweight encryption algorithm and compare its performance to existing algorithms. It will simulate the design using Verilog code in Xilinx and evaluate performance metrics like latency, area, power consumption and throughput.
An energy efficiency analysis of lightweight security protocolsHamdamboy
This document analyzes the energy efficiency of lightweight security protocols for machine-to-machine (M2M) and internet of things (IoT) environments. It discusses resource-constrained IoT device protocols like CoAP, MQTT, and XMPP. It also examines security protocols like PANA, LDAP, HIP-DEX, CB-ABE, and XACML. Simulation results are presented comparing the energy efficiency and performance of these protocols. The conclusion discusses plans to simulate protocols over delay tolerant networks and develop underwater variants of CoAP and MQTT with security.
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their
implementation has posed several challenges insofar that they generate and process vast amounts of
security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and
constrained devices communicating with each other and being accessed ubiquitously through lossy
networks. In this scenario, the routing of data is a specific area of concern especially with the inherent
constraints and limiting properties of such devices like processing resources, memory capacity and battery
life. To suit these constraints and to provide the required connectivity, the IETF has developed several
standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be
compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing
Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management
mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In
addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared
with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be
better
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.pijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better.
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET Journal
This document provides an overview of the Internet of Things (IoT) including its definition, architecture, applications, and advantages/disadvantages. The key points are:
1. IoT allows both things and people to be connected anytime, anywhere through any network or service. It enables communication between machines (M2M).
2. The IoT architecture has two main components - the edge (sensors, devices, gateways) and cloud. Field protocols like Bluetooth, Zigbee, and WiFi enable communication at the edge, while cloud protocols like MQTT, CoAP, and HTTP connect to cloud services.
3. Important applications of IoT discussed are smart homes, farming, healthcare, cities
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET Journal
This document discusses security aspects of internet of things (IoT) devices and proposes solutions. It summarizes 3 existing approaches:
1) An IoT reference model that includes authorization, encryption, and authentication mechanisms at each layer independently.
2) A protocol for IoT security using elliptic curve cryptography to allow encryption and decryption of messages between devices and gateways.
3) A mechanism using elliptic curve cryptography to provide security for communication between IPv4 and IPv6 networks, translating addresses and incorporating encryption.
The document also motivates the need for lightweight cryptographic algorithms for resource-constrained IoT devices and surveys existing schemes to provide confidentiality, integrity, and availability while addressing vulnerabilities.
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...IRJET Journal
This document proposes a multi-factor authentication security framework using blockchain for cloud computing. It discusses using one-time passwords and unique codes for login along with blockchain technology to securely store data in the cloud. The framework aims to improve security, securely share data online, and secure cloud data storage. It presents a system architecture with three modules - data owner, user, and authority - to allow data owners to securely upload files via blockchain that users can view and download with authentication.
This document summarizes a research paper that proposes implementing and analyzing cryptography techniques for 5G applications using Xilinx. It discusses how lightweight cryptography plays an important role in securing data for devices with limited resources in IoT and 5G networks. The research aims to develop an efficient VLSI architecture for a lightweight encryption algorithm and compare its performance to existing algorithms. It will simulate the design using Verilog code in Xilinx and evaluate performance metrics like latency, area, power consumption and throughput.
An energy efficiency analysis of lightweight security protocolsHamdamboy
This document analyzes the energy efficiency of lightweight security protocols for machine-to-machine (M2M) and internet of things (IoT) environments. It discusses resource-constrained IoT device protocols like CoAP, MQTT, and XMPP. It also examines security protocols like PANA, LDAP, HIP-DEX, CB-ABE, and XACML. Simulation results are presented comparing the energy efficiency and performance of these protocols. The conclusion discusses plans to simulate protocols over delay tolerant networks and develop underwater variants of CoAP and MQTT with security.
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their
implementation has posed several challenges insofar that they generate and process vast amounts of
security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and
constrained devices communicating with each other and being accessed ubiquitously through lossy
networks. In this scenario, the routing of data is a specific area of concern especially with the inherent
constraints and limiting properties of such devices like processing resources, memory capacity and battery
life. To suit these constraints and to provide the required connectivity, the IETF has developed several
standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be
compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing
Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management
mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In
addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared
with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be
better
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.pijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better.
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET Journal
This document provides an overview of the Internet of Things (IoT) including its definition, architecture, applications, and advantages/disadvantages. The key points are:
1. IoT allows both things and people to be connected anytime, anywhere through any network or service. It enables communication between machines (M2M).
2. The IoT architecture has two main components - the edge (sensors, devices, gateways) and cloud. Field protocols like Bluetooth, Zigbee, and WiFi enable communication at the edge, while cloud protocols like MQTT, CoAP, and HTTP connect to cloud services.
3. Important applications of IoT discussed are smart homes, farming, healthcare, cities
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
The document discusses optimizing IP for use in Internet of Things networks. It covers several key topics:
- The advantages of using IP, including its open standards, versatility, ubiquity, scalability, manageability, and role in enabling innovation.
- The need to optimize IP for constrained IoT nodes with limited resources, as well as challenges around unreliable connectivity, power consumption, and bandwidth constraints.
- Classifying IoT nodes based on their constraints and whether they use a full IP stack, optimized IP stack, or non-IP stack with gateways for connectivity.
- Considerations for the IP adoption model of replacing non-IP layers versus the adaptation model of implementing application gateways between IP and
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET Journal
This document proposes a system for secure and efficient file sharing and shared ownership in cloud systems. It introduces the concept of shared ownership where multiple users can jointly own a file. For a file access request to be granted, approval is required from a predefined threshold of the file's owners. The system uses AES-128 encryption to encrypt files for security. It allows owners to share files and ownership with other authorized users, who can then read from and write to the shared file. This provides more flexibility than systems with only single user file ownership.
Secure cloud transmission protocol (SCTP) was proposed to achieve strong authentication and secure channel in cloud computing paradigm at preceding work. SCTP proposed with its own techniques to attain a cloud security. SCTP was proposed to design multilevel authentication technique with multidimensional
password generations System to achieve strong authentication. SCTP was projected to develop multilevel cryptography technique to attain secure channel. SCTP was proposed to blueprint usage profile based
intruder detection and prevention system to resist against intruder attacks. SCTP designed, developed and analyzed using protocol engineering phases. Proposed SCTP and its techniques complete design has presented using Petrinet production model. We present the designed SCTP petrinet models and its analysis. We discussed the SCTP design and its performance to achieve strong authentication, secure
channel and intruder prevention. SCTP designed to use in any cloud applications. It can authorize,
authenticates, secure channel and prevent intruder during the cloud transaction. SCTP designed to protect against different attack mentioned in literature. This paper depicts the SCTP performance analysis report
which compares with existing techniques that are proposed to achieve authentication, authorization, security and intruder prevention.
Secure cloud transmission protocol (SCTP) was proposed to achieve strong authentication and secure
channel in cloud computing paradigm at preceding work. SCTP proposed with its own techniques to attain
a cloud security. SCTP was proposed to design multilevel authentication technique with multidimensional
password generations System to achieve strong authentication. SCTP was projected to develop multilevel
cryptography technique to attain secure channel. SCTP was proposed to blueprint usage profile based
intruder detection and prevention system to resist against intruder attacks. SCTP designed, developed and
analyzed using protocol engineering phases. Proposed SCTP and its techniques complete design has
presented using Petrinet production model. We present the designed SCTP petrinet models and its
analysis. We discussed the SCTP design and its performance to achieve strong authentication, secure
channel and intruder prevention. SCTP designed to use in any cloud applications. It can authorize,
authenticates, secure channel and prevent intruder during the cloud transaction. SCTP designed to protect
against different attack mentioned in literature. This paper depicts the SCTP performance analysis report
which compares with existing techniques that are proposed to achieve authentication, authorization,
security and intruder prevention.
Secure cloud transmission protocol (SCTP) was proposed to achieve strong authentication and secure
channel in cloud computing paradigm at preceding work. SCTP proposed with its own techniques to attain
a cloud security. SCTP was proposed to design multilevel authentication technique with multidimensional
password generations System to achieve strong authentication. SCTP was projected to develop multilevel
cryptography technique to attain secure channel. SCTP was proposed to blueprint usage profile based
intruder detection and prevention system to resist against intruder attacks. SCTP designed, developed and
analyzed using protocol engineering phases. Proposed SCTP and its techniques complete design has
presented using Petrinet production model. We present the designed SCTP petrinet models and its
analysis. We discussed the SCTP design and its performance to achieve strong authentication, secure
channel and intruder prevention. SCTP designed to use in any cloud applications. It can authorize,
authenticates, secure channel and prevent intruder during the cloud transaction. SCTP designed to protect
against different attack mentioned in literature. This paper depicts the SCTP performance analysis report
which compares with existing techniques that are proposed to achieve authentication, authorization,
security and intruder prevention.
This document presents an improved secure cloud transmission protocol (SCTP) that was designed to achieve strong authentication, secure channels, and intruder detection in cloud computing. SCTP uses multi-level authentication with multidimensional password generation, multi-level cryptography, and usage profile-based intruder detection. SCTP was modeled using Petri net production models to analyze its design and performance. The analysis shows that SCTP outperforms existing techniques in authentication, authorization, security, and intruder prevention for cloud applications requiring high security. However, SCTP may introduce unnecessary complexity for simpler cloud applications.
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT.
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
Internet of Things (IoT) offers reliable and seamless communication for the heterogeneous dynamic lowpower and lossy network (LLNs). To perform effective routing in IoT communication, LLN Routing Protocol (RPL) is developed for the tiny nodes to establish connection by using deflaut objective functions: OF0, MRHOF, for which resources are constraints like battery power, computation capacity, memory communication link impacts on varying traffic scenarios in terms of QoS metrics like packet delivery ratio, delay, secure communication channel. At present, conventional Internet of Things (IoT) are having secure communication channels issue for transmission of data between nodes. To withstand those issues, it is necessary to balance resource constraints of nodes in the network. In this paper, we developed a security algorithm for IoT networks with RPL routing. Initially, the constructed network in corporates optimizationbased deep learning (reinforcement learning) for route establishment in IoT. Upon the establishment of the route, the ClonQlearn based security algorithm is implemented for improving security which is based onaECC scheme for encryption and decryption of data. The proposed security technique incorporates reinforcement learning-based ClonQlearnintegrated with ECC (ClonQlearn+ECC) for random key generation. The proposed ClonQlearn+ECCexhibits secure data transmission with improved network performance when compared with the earlier works in simulation. The performance of network expressed that the proposed ClonQlearn+ECC increased the PDR of approximately 8% - 10%, throughput of 7% - 13%, end-to-end delay of 5% - 10% and power consumption variation of 3% - 7%.
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...IRJET Journal
This document discusses security issues with the Constrained Application Protocol (CoAP) which is commonly used for Internet of Things (IoT) communication. It first provides background on CoAP, including its architecture and use of Datagram Transport Layer Security (DTLS) for security. However, the document notes that while DTLS provides some security, it is not fully sufficient to protect data at large volumes. The document then reviews literature on security issues at different layers of IoT systems, such as perception, physical, and network layers. Specific attacks discussed include jamming, node tampering, man-in-the-middle, denial of service, and eavesdropping. The aim of the paper is to analyze CoAP security
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...IRJET Journal
This document summarizes a research paper that proposes a new technique for securing documents stored in the cloud using blockchain assisted public key encryption. The technique involves storing encrypted documents on a cloud server, while storing the encryption keys and keywords on separate secure key servers. Blockchain technology is used to distribute and track the keys. When a user wants to search for documents, the keywords are encrypted with Caesar cipher and stored on the separate key servers. This provides improved security over traditional methods that store all data and keys on the same cloud server. The researchers believe this distributed storage approach using blockchain for key management addresses security issues like document leakage that can occur when relying solely on a single cloud storage provider.
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...AM Publications
A network consisting of sensors such as temperature, pressure and sound are densely distributed to monitor physical or environmental conditions such a network is known as WIRELESS SENSOR NETWORK (WSN). The sensor data is transmitted to network coordinator which is the heart of the wireless personal area network. In the modern scenario wireless networks contains sensors as well as actuators. ZigBee is newly developed technology that works on IEEE standard 802.15.4. The low data rates, low power consumption and low cost are the main features of ZigBee. WSN is composed of ZigBee coordinator (network coordinator), ZigBee router and ZigBee end device. The sensor node’s information in the network is sent to the coordinator, the coordinator collects the sensor’s data, stores the data in memory, processes the data, and routes the data to the appropriate node.
This document describes a proposed LoRa-based data acquisition system for monitoring vehicles. Key points:
- The system would use LoRa technology and sensors to monitor various parameters in a vehicle and report the data to users via an IoT dashboard.
- LoRa allows long-range and low-power wireless connectivity for IoT applications. The system aims to leverage these capabilities of LoRa for vehicle monitoring.
- The goals of the data acquisition system are to monitor operations, provide effective communication to identify issues, collect and store diagnostic data, and analyze performance metrics in real-time to ensure reliable operation.
The Internet of Things IoT infuses our everyday life, e.g., in the area of health monitoring, wearables, industry, and home automation. It comprises devices that provide only limited resources, operate in stimulating network conditions, and are often battery powered. To embed these devices into the Internet, they are intended to operate standard events. Yet, these procedures occupy the majority of limited program memory resources. Thus, devices can neither add application logic nor apply safety updates or adopt optimizations for efficiency. This problem will further exacerbate in the future as the further ongoing infusion of smart devices in our environment demands for more and more functionality. To overcome limited functionality due to resource limitations, we show that not all functionality is required in parallel, and thus can be SPLIT in a feasible manner. This enables on demand loading of functionality outsourced as multiple modules to the significantly lesser controlled flash storage of devices. J. Gokul | S. Venkateshkumar "Smart Protocol Loading for the IoT" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29354.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/29354/smart-protocol-loading-for-the-iot/j-gokul
35 9142 it s-execution evaluation of end-to-end edit septianIAESIJEECS
Remote Sensor Networks are bound to assume a crucial part in the cutting edge Internet, which will be described by the Machine-to-Machine worldview, as indicated by which; installed gadgets will effectively trade data, therefore empowering the improvement of creative applications. It will add to declare the idea of Internet of Things, where end to-end security speaks to a key issue. In such setting, it is essential to comprehend which conventions can give the correct level of security without loading the restricted assets of compelled systems. This paper displays an execution examination between two of the most broadly utilized security conventions: IPSec and DTLS. We give the investigation of their effect on the assets of gadgets.
A novel architecture for lightweight block cipher, piccoloeSAT Journals
This document summarizes a novel architecture for the Piccolo lightweight block cipher that is optimized for constrained devices like RFID tags and wireless sensors. Piccolo has a 64-bit block size and supports 80-bit or 128-bit keys. The proposed architecture shares the key scheduling block for two plaintext blocks concurrently to improve throughput and speed compared to the conventional Piccolo architecture. The new architecture is implemented using Matlab simulation software.
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Dalton Valadares
This document proposes and evaluates a solution to securely disseminate sensitive IoT data using FIWARE and Intel SGX. The solution uses FIWARE components for authentication and authorization, and introduces a new Key Vault component that uses Intel SGX to securely store and manage encryption keys. Sensitive IoT data from smart meters is encrypted before being sent to the FIWARE Orion Context Broker for processing. Consumers that are SGX applications can decrypt and process the data securely within the SGX enclave. The evaluation shows the solution provides privacy and security guarantees without harming scalability or availability.
DEVELOPMENT AND IMPLEMENTATION OF LOW COST IIOT GATEWAY WITH EDGE COMPUTING F...IRJET Journal
The document describes the development and implementation of a low-cost Industrial Internet of Things (IIoT) gateway with edge computing capabilities. The system was created to help small and medium-sized industries implement IIoT solutions in an affordable way. It uses a Raspberry Pi single-board computer to collect data from devices using different communication protocols like OPC-UA, MQTT, Modbus RTU, and Modbus TCP. The data is processed using Node-RED software and can be viewed on dashboards. The goal is to help more industries benefit from IIoT technologies like predictive maintenance, inventory management and production monitoring with a low-cost solution.
Smart offload chain: a proposed architecture for blockchain assisted fog off...IJECEIAES
Blockchain enables smart contract for secure data transfer by which fog offloading servers can have trustworthy access control to work with data execution. When cloud is used for handling requests from mobile users, the attacker may perform denial of service attack and the same is possible at fog nodes and the same can be handled with the help of blockchain technology. In this paper, smart city application is discussed a use case study for blockchain based fog computing architecture. We propose a novel offload chain architecture for blockchain-based offloading in internet of things (IoT) networks where mobile devices can offload their data to fog servers for computation by an access control mechanism. The offload chain model using deep reinforcement learning (DRL) is proposed to improve the efficiency of blockchain based fog offloading amongst existing models.
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
More Related Content
Similar to Application Layer Security for IoT: The Case Study of a Smart Home
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
The document discusses optimizing IP for use in Internet of Things networks. It covers several key topics:
- The advantages of using IP, including its open standards, versatility, ubiquity, scalability, manageability, and role in enabling innovation.
- The need to optimize IP for constrained IoT nodes with limited resources, as well as challenges around unreliable connectivity, power consumption, and bandwidth constraints.
- Classifying IoT nodes based on their constraints and whether they use a full IP stack, optimized IP stack, or non-IP stack with gateways for connectivity.
- Considerations for the IP adoption model of replacing non-IP layers versus the adaptation model of implementing application gateways between IP and
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET Journal
This document proposes a system for secure and efficient file sharing and shared ownership in cloud systems. It introduces the concept of shared ownership where multiple users can jointly own a file. For a file access request to be granted, approval is required from a predefined threshold of the file's owners. The system uses AES-128 encryption to encrypt files for security. It allows owners to share files and ownership with other authorized users, who can then read from and write to the shared file. This provides more flexibility than systems with only single user file ownership.
Secure cloud transmission protocol (SCTP) was proposed to achieve strong authentication and secure channel in cloud computing paradigm at preceding work. SCTP proposed with its own techniques to attain a cloud security. SCTP was proposed to design multilevel authentication technique with multidimensional
password generations System to achieve strong authentication. SCTP was projected to develop multilevel cryptography technique to attain secure channel. SCTP was proposed to blueprint usage profile based
intruder detection and prevention system to resist against intruder attacks. SCTP designed, developed and analyzed using protocol engineering phases. Proposed SCTP and its techniques complete design has presented using Petrinet production model. We present the designed SCTP petrinet models and its analysis. We discussed the SCTP design and its performance to achieve strong authentication, secure
channel and intruder prevention. SCTP designed to use in any cloud applications. It can authorize,
authenticates, secure channel and prevent intruder during the cloud transaction. SCTP designed to protect against different attack mentioned in literature. This paper depicts the SCTP performance analysis report
which compares with existing techniques that are proposed to achieve authentication, authorization, security and intruder prevention.
Secure cloud transmission protocol (SCTP) was proposed to achieve strong authentication and secure
channel in cloud computing paradigm at preceding work. SCTP proposed with its own techniques to attain
a cloud security. SCTP was proposed to design multilevel authentication technique with multidimensional
password generations System to achieve strong authentication. SCTP was projected to develop multilevel
cryptography technique to attain secure channel. SCTP was proposed to blueprint usage profile based
intruder detection and prevention system to resist against intruder attacks. SCTP designed, developed and
analyzed using protocol engineering phases. Proposed SCTP and its techniques complete design has
presented using Petrinet production model. We present the designed SCTP petrinet models and its
analysis. We discussed the SCTP design and its performance to achieve strong authentication, secure
channel and intruder prevention. SCTP designed to use in any cloud applications. It can authorize,
authenticates, secure channel and prevent intruder during the cloud transaction. SCTP designed to protect
against different attack mentioned in literature. This paper depicts the SCTP performance analysis report
which compares with existing techniques that are proposed to achieve authentication, authorization,
security and intruder prevention.
Secure cloud transmission protocol (SCTP) was proposed to achieve strong authentication and secure
channel in cloud computing paradigm at preceding work. SCTP proposed with its own techniques to attain
a cloud security. SCTP was proposed to design multilevel authentication technique with multidimensional
password generations System to achieve strong authentication. SCTP was projected to develop multilevel
cryptography technique to attain secure channel. SCTP was proposed to blueprint usage profile based
intruder detection and prevention system to resist against intruder attacks. SCTP designed, developed and
analyzed using protocol engineering phases. Proposed SCTP and its techniques complete design has
presented using Petrinet production model. We present the designed SCTP petrinet models and its
analysis. We discussed the SCTP design and its performance to achieve strong authentication, secure
channel and intruder prevention. SCTP designed to use in any cloud applications. It can authorize,
authenticates, secure channel and prevent intruder during the cloud transaction. SCTP designed to protect
against different attack mentioned in literature. This paper depicts the SCTP performance analysis report
which compares with existing techniques that are proposed to achieve authentication, authorization,
security and intruder prevention.
This document presents an improved secure cloud transmission protocol (SCTP) that was designed to achieve strong authentication, secure channels, and intruder detection in cloud computing. SCTP uses multi-level authentication with multidimensional password generation, multi-level cryptography, and usage profile-based intruder detection. SCTP was modeled using Petri net production models to analyze its design and performance. The analysis shows that SCTP outperforms existing techniques in authentication, authorization, security, and intruder prevention for cloud applications requiring high security. However, SCTP may introduce unnecessary complexity for simpler cloud applications.
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT.
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
Internet of Things (IoT) offers reliable and seamless communication for the heterogeneous dynamic lowpower and lossy network (LLNs). To perform effective routing in IoT communication, LLN Routing Protocol (RPL) is developed for the tiny nodes to establish connection by using deflaut objective functions: OF0, MRHOF, for which resources are constraints like battery power, computation capacity, memory communication link impacts on varying traffic scenarios in terms of QoS metrics like packet delivery ratio, delay, secure communication channel. At present, conventional Internet of Things (IoT) are having secure communication channels issue for transmission of data between nodes. To withstand those issues, it is necessary to balance resource constraints of nodes in the network. In this paper, we developed a security algorithm for IoT networks with RPL routing. Initially, the constructed network in corporates optimizationbased deep learning (reinforcement learning) for route establishment in IoT. Upon the establishment of the route, the ClonQlearn based security algorithm is implemented for improving security which is based onaECC scheme for encryption and decryption of data. The proposed security technique incorporates reinforcement learning-based ClonQlearnintegrated with ECC (ClonQlearn+ECC) for random key generation. The proposed ClonQlearn+ECCexhibits secure data transmission with improved network performance when compared with the earlier works in simulation. The performance of network expressed that the proposed ClonQlearn+ECC increased the PDR of approximately 8% - 10%, throughput of 7% - 13%, end-to-end delay of 5% - 10% and power consumption variation of 3% - 7%.
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...IRJET Journal
This document discusses security issues with the Constrained Application Protocol (CoAP) which is commonly used for Internet of Things (IoT) communication. It first provides background on CoAP, including its architecture and use of Datagram Transport Layer Security (DTLS) for security. However, the document notes that while DTLS provides some security, it is not fully sufficient to protect data at large volumes. The document then reviews literature on security issues at different layers of IoT systems, such as perception, physical, and network layers. Specific attacks discussed include jamming, node tampering, man-in-the-middle, denial of service, and eavesdropping. The aim of the paper is to analyze CoAP security
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...IRJET Journal
This document summarizes a research paper that proposes a new technique for securing documents stored in the cloud using blockchain assisted public key encryption. The technique involves storing encrypted documents on a cloud server, while storing the encryption keys and keywords on separate secure key servers. Blockchain technology is used to distribute and track the keys. When a user wants to search for documents, the keywords are encrypted with Caesar cipher and stored on the separate key servers. This provides improved security over traditional methods that store all data and keys on the same cloud server. The researchers believe this distributed storage approach using blockchain for key management addresses security issues like document leakage that can occur when relying solely on a single cloud storage provider.
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...AM Publications
A network consisting of sensors such as temperature, pressure and sound are densely distributed to monitor physical or environmental conditions such a network is known as WIRELESS SENSOR NETWORK (WSN). The sensor data is transmitted to network coordinator which is the heart of the wireless personal area network. In the modern scenario wireless networks contains sensors as well as actuators. ZigBee is newly developed technology that works on IEEE standard 802.15.4. The low data rates, low power consumption and low cost are the main features of ZigBee. WSN is composed of ZigBee coordinator (network coordinator), ZigBee router and ZigBee end device. The sensor node’s information in the network is sent to the coordinator, the coordinator collects the sensor’s data, stores the data in memory, processes the data, and routes the data to the appropriate node.
This document describes a proposed LoRa-based data acquisition system for monitoring vehicles. Key points:
- The system would use LoRa technology and sensors to monitor various parameters in a vehicle and report the data to users via an IoT dashboard.
- LoRa allows long-range and low-power wireless connectivity for IoT applications. The system aims to leverage these capabilities of LoRa for vehicle monitoring.
- The goals of the data acquisition system are to monitor operations, provide effective communication to identify issues, collect and store diagnostic data, and analyze performance metrics in real-time to ensure reliable operation.
The Internet of Things IoT infuses our everyday life, e.g., in the area of health monitoring, wearables, industry, and home automation. It comprises devices that provide only limited resources, operate in stimulating network conditions, and are often battery powered. To embed these devices into the Internet, they are intended to operate standard events. Yet, these procedures occupy the majority of limited program memory resources. Thus, devices can neither add application logic nor apply safety updates or adopt optimizations for efficiency. This problem will further exacerbate in the future as the further ongoing infusion of smart devices in our environment demands for more and more functionality. To overcome limited functionality due to resource limitations, we show that not all functionality is required in parallel, and thus can be SPLIT in a feasible manner. This enables on demand loading of functionality outsourced as multiple modules to the significantly lesser controlled flash storage of devices. J. Gokul | S. Venkateshkumar "Smart Protocol Loading for the IoT" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29354.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/29354/smart-protocol-loading-for-the-iot/j-gokul
35 9142 it s-execution evaluation of end-to-end edit septianIAESIJEECS
Remote Sensor Networks are bound to assume a crucial part in the cutting edge Internet, which will be described by the Machine-to-Machine worldview, as indicated by which; installed gadgets will effectively trade data, therefore empowering the improvement of creative applications. It will add to declare the idea of Internet of Things, where end to-end security speaks to a key issue. In such setting, it is essential to comprehend which conventions can give the correct level of security without loading the restricted assets of compelled systems. This paper displays an execution examination between two of the most broadly utilized security conventions: IPSec and DTLS. We give the investigation of their effect on the assets of gadgets.
A novel architecture for lightweight block cipher, piccoloeSAT Journals
This document summarizes a novel architecture for the Piccolo lightweight block cipher that is optimized for constrained devices like RFID tags and wireless sensors. Piccolo has a 64-bit block size and supports 80-bit or 128-bit keys. The proposed architecture shares the key scheduling block for two plaintext blocks concurrently to improve throughput and speed compared to the conventional Piccolo architecture. The new architecture is implemented using Matlab simulation software.
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Dalton Valadares
This document proposes and evaluates a solution to securely disseminate sensitive IoT data using FIWARE and Intel SGX. The solution uses FIWARE components for authentication and authorization, and introduces a new Key Vault component that uses Intel SGX to securely store and manage encryption keys. Sensitive IoT data from smart meters is encrypted before being sent to the FIWARE Orion Context Broker for processing. Consumers that are SGX applications can decrypt and process the data securely within the SGX enclave. The evaluation shows the solution provides privacy and security guarantees without harming scalability or availability.
DEVELOPMENT AND IMPLEMENTATION OF LOW COST IIOT GATEWAY WITH EDGE COMPUTING F...IRJET Journal
The document describes the development and implementation of a low-cost Industrial Internet of Things (IIoT) gateway with edge computing capabilities. The system was created to help small and medium-sized industries implement IIoT solutions in an affordable way. It uses a Raspberry Pi single-board computer to collect data from devices using different communication protocols like OPC-UA, MQTT, Modbus RTU, and Modbus TCP. The data is processed using Node-RED software and can be viewed on dashboards. The goal is to help more industries benefit from IIoT technologies like predictive maintenance, inventory management and production monitoring with a low-cost solution.
Smart offload chain: a proposed architecture for blockchain assisted fog off...IJECEIAES
Blockchain enables smart contract for secure data transfer by which fog offloading servers can have trustworthy access control to work with data execution. When cloud is used for handling requests from mobile users, the attacker may perform denial of service attack and the same is possible at fog nodes and the same can be handled with the help of blockchain technology. In this paper, smart city application is discussed a use case study for blockchain based fog computing architecture. We propose a novel offload chain architecture for blockchain-based offloading in internet of things (IoT) networks where mobile devices can offload their data to fog servers for computation by an access control mechanism. The offload chain model using deep reinforcement learning (DRL) is proposed to improve the efficiency of blockchain based fog offloading amongst existing models.
Similar to Application Layer Security for IoT: The Case Study of a Smart Home (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.