SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 597
ENHANCED SIT ALGORITHM FOR EMBEDDED SYSTEMS
Hemala N1, Satheesh T2
1PG Scholar & Nandha Engineering College, Erode, Tamil Nadu, India
2Professor, Dept. of EEE, Nandha Engineering College, Erode, Tamil Nadu, India.
-----------------------------------------------------------------------***------------------------------------------------------------------------
Abstract - Encryption is the scrambling process of a
message so that it can only be read by the intended recipient.
Encryption can provide a way for information to be secured.
The need to ensure that this information is invulnerable to
snooping and/or tampering becomes more relevant as more
and more information is stored on computers or
communicated via computers. Information security is
becoming much more important in data storage and
transmission with the rapid progression of digital data
exchange in an electronic way. Information Confidentiality
has a prominent significance in the study of ethics, law, and
in information systems most recently.
The art of cryptography has become more complex with the
evolution of human intelligence to make information more
secure. Different organizations are deploying arrays of
encryption systems in the information systems world.
However, less complex algorithm may jeopardize the desired
integrity. I suggest a lightweight encryption algorithm, an
upgraded version of Secure IoT (SIT) called Enhanced SIT
algorithm in this paper. It is a cipher of 64-bit blocks and
requires a 128-bit key to encrypt the data. The algorithm's
architecture is a feistel mixture and a uniform replacement-
permutation network. The result of simulations shows that
in 10 encryption rounds the algorithm provides substantial
security. The algorithm's hardware is implemented on a low
cost microcontroller and the results of code size, memory
use gives a promising output.
Key Words – Cryptography, Decryption, Embedded,
Encryption, Key, Microcontrollers.
1. INTRODUCTION
Internet of Things is changing the world. Technology
together with innovation is changing every bit of day to day
life. From home to industries, Smartphones, smart gadgets
and sensors gather information to facilitate people.
Consequently, every information is made accessible to the
installed embedded frameworks around us. In the event that
any unapproved individual gains admittance to this
information, it would result in exceptional impacts.
Subsequently, it is very basic to keep our information
anchored from assailants. Cryptography is the field of study,
which involves different schemes utilized for anchoring
information.
An embedded framework is one sort of a PC framework for
the most part intended to play out a few errands like to
access, procedure, and store and furthermore control the
information in different hardware based frameworks.
Embedded frameworks are a blend of equipment and
programming where programming is typically known as
firmware that is embedded into the equipment. A standout
amongst its most critical attributes of these frameworks is, it
gives the o/p inside as far as possible. Embedded
frameworks backing to make the work increasingly
impeccable and advantageous. Along these lines, we as often
as possible utilize embedded frameworks in straightforward
and complex gadgets as well. The uses of embedded
frameworks for the most part include in our genuine for a
few gadgets like microwave, adding machines, TV remote
control, home security and neighborhood traffic control
frameworks, and so forth.
An IoT biological system comprises of web-empowered keen
gadgets that utilization embedded processors, sensors and
correspondence equipment to gather, send and follow up on
information they secure from their surroundings. IoT
gadgets share the sensor information they gather by
interfacing with an IoT door or other edge gadget where
information is either sent to the cloud to be broke down or
examined locally. Once in a while, these gadgets speak with
other related gadgets and follow up on the information they
get from each other. The gadgets do a large portion of the
work without human mediation, in spite of the fact that
individuals can collaborate with the gadgets - for example, to
set them up, give them directions or access the information.
The availability, systems administration and correspondence
conventions utilized with these web-empowered gadgets to
a great extent rely upon the particular IoT applications sent.
There are various true uses of the web of things, running
from purchaser IoT and endeavor IoT to assembling and
modern IoT. IoT applications range various verticals,
including car, telco, vitality and the sky is the limit from
there. In the customer portion, for instance, brilliant homes
that are furnished with shrewd indoor regulators, savvy
machines and associated warming, lighting and electronic
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 598
gadgets can be controlled remotely by means of PCs, cell
phones or other cell phones.
2. RELATED WORKS
The Internet of Things (IOT) being a promising innovation of
things to come is relied upon to associate billions of gadgets.
The expanded number of correspondence is required to
produce heaps of information and the security of
information can be a danger. The gadgets in the engineering
are basically littler in size and low fueled. Traditional
encryption calculations are commonly computationally
costly because of their intricacy and requires numerous
rounds to encode, basically squandering the compelled
vitality of the gadgets.[1] Less mind boggling calculation, in
any case, may bargain the ideal respectability.
In this paper we propose a lightweight encryption
calculation named as Secure IOT (SIT). It is a 64-bit square
figure and requires 64-bit key to scramble the information.
The design of the calculation is a blend of feistel and a
uniform substitution-stage organize. Recreations result
demonstrates the calculation gives generous security in only
five encryption rounds. The equipment usage of the
calculation is done on an ease 8-bit miniaturized scale
controller and the consequences of code estimate, memory
use and encryption/decoding execution cycles are
contrasted and benchmark encryption calculations.
[2] As increasingly more data is put away on PCs or imparted
by means of PCs, the need of great importance is to
guarantee that this data is secure and to keep from
snooping/altering turns out to be progressively applicable.
Regardless of whether information ends up getting stolen, it
will be disjointed and about futile if it's scrambled. With the
quick movement of computerized information trade in
electronic way, Encryption is fundamental for guaranteed
and believed conveyance of delicate data sent over the web.
Contemporary person knowledge, lead to cryptography has
turned out to be progressively mind boggling so as to make
data increasingly secure. In the interim numerous encryption
calculations are being created in the realm of Cyber security
society. In this paper, a study of different Encryption
Algorithms was introduced.
[3] Cryptography is the study of secure information
transmission through an unreliable channel. Propelled
Encryption Standard (AES) is the most broadly and secure
symmetric key cryptographic calculation today. The
multifaceted nature of AES is commanded by the substitution
box (S-box) change which is considered as a standout
amongst the most confused and exorbitant piece of the
framework since it is the main non-direct structure. In this
article, we present rapid proficient AES engineering. We
have utilized pipeline strategy to enable a parallel handling
so as to get high throughput. Furthermore, 5-organize
pipeline Sbox configuration utilizing combinational rationale
is acquainted with increment the speed and the most
extreme working recurrence. Besides, pipeline registers are
embedded in ideal situations to lessen the involved territory
and achieve a productive design. The proposed structure had
been effectively executed in virtex-6 FPGA gadget utilizing
Xilinx ISE 14.7. It had accomplished a throughput of 79Gbps
and involved 4830 cuts memory.
[4] Securing the clients' information can be accomplished by
the ordinary technique for Cryptography. Encryption is
finished by utilizing any of the mainstream symmetric or
deviated key calculations, for example, AES, DES, RSA,
Blowfish and Triple DES and so forth., RSA calculation which
is a hilter kilter key calculation utilizing two distinctive keys
for encryption and unscrambling forms. The Key size can be
differed to make the encryption procedure solid.
Subsequently it is troublesome for the aggressors to
interfere the information. Expanding key size
correspondingly builds the time taken for encryption and
decoding process. The proposed calculation diminishes the
season of encryption and unscrambling forms by separating
the record into squares and improves the quality of the
calculation by expanding the key size. This quality prepares
to store information in cloud by the clients with no bother.
Microcontroller is regularly actualized in world assembling
industry either part of an electronic item, for example, a
remote terminal unit. Remote terminal unit is an electronic
gadget that in charge of recovering information utilizing
sensors to a server, through link arrange or a remote system.
The sensor used to peruse the information of temperature,
height, etc as required. With respect to the system that
utilized as a mode for information conveyance, can be by
means of fiber-optic link, GPRS modem, VSAT satellite, RF
stations, etc. Issues can happen when the information is sent
as a plaintext (not verify). Such information can be perused
by unapproved people in different ways. So it needs to
convey an arrangement of data security that can be executed
into 8-bit microcontroller[5]. This examination was led on
the expansion of the capacity signature, with the motivation
behind information uprightness. Calculations MD5 actualize
on 8-bit microcontroller-board, in light of Arduino Uno unit.
At that point the following advancement phase of this
examination is, the information sent from a remote terminal
units can be scrambled by the microcontroller, utilizing
either the calculations AES, DES, 3DES or TwoFish
encryption calculation, among others. The aftereffect of this
underlying examination, MD5 hash calculation can be
executed in a 8-bit microcontroller with 100% precision. Be
that as it may, it has a few impediments on the issue among
them, the information can be handled to a limit of 15
(fifteen) characters, information input utilizing keypad
framework 4x3, MD5 hash yield is shown on the LCD
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 599
illustrations 128x64 and can just enter information input
capital letters as it were.
3. PROPOSED ALGORITHM
The engineering of the proposed calculation gives a
straightforward structure appropriate to actualizing in
embedded condition. SIT is a symmetric key square figure
that comprises of 128-piece key and plain-content. In
symmetric key calculation the encryption procedure
comprises of encryption adjusts, each round depends on
some numerical capacities to make perplexity and
dispersion.
Fig -1: Encryption Process
The most crucial segment in the procedures of encryption
and unscrambling is the key. It is this key on which whole
security of the information is reliant, should this key be
known to aggressor, the mystery of the information is lost.
Consequently essential estimates must be considered to
make the disclosure of the key as troublesome as could be
allowed. The feistel based encryption calculations are made
out of a few adjusts, each round requiring a different key.
The encryption/decoding of the proposed calculation is
made out of ten rounds, consequently, we require ten one of
a kind keys for the said reason.
Increment in number of rounds guarantees better security
however in the end results in increment in the utilization of
obliged vitality. The cryptographic calculations proposed
here is intended for 10 rounds, to additionally improve the
vitality productivity, the key age process includes complex
numerical activities hence creating 10 special keys from 128
piece for each round of encryption. Every encryption round
incorporates scientific tasks that work on 4 bits of
information. To make adequate disarray and dissemination
of information so as to go up against the assaults, the
calculation uses the feistel system of substitution dispersion
capacities. Encryption can be portrayed as the accompanying
figure.
4. RESULTS
The recreation of the calculation is done to play out the
standard tests including Avalanche and picture entropy and
histogram on Intel Core i7-3770@3.40 GHz processor
utilizing MATLABR. To assess the execution in the genuine
IoT condition we actualized the calculation on ATmega 2560
based Ardinuo Mega board also. The memory usage what's
more, execution time of the proposed calculation is watched.
The execution time is observed to be 0.188 milliseconds and
0.187 milliseconds for encryption and unscrambling
separately, the proposed calculation uses the 18 bytes of
memory on ATmega 2560 stage and gives out the improved
security. We compare our algorithm with other algorithms
being implemented on hardware as shown here.
Table -1: Result
CIPHER DEVICE
Key
Size
Code
Size
RAM
AES AVR 128 1570 -
SIT Atmega 328 64 826 22
Enhanced SIT Atmega 2560 128 1268 18
5. CONCLUSION
Soon Internet of Things will be a basic component of our day
by day lives. Various vitality obliged gadgets and sensors will
persistently be speaking with one another the security of
which must not be undermined. For this reason a lightweight
security calculation is proposed in this paper named as
Enhanced SIT. The usage show promising outcomes making
the calculation an appropriate contender to be embraced in
Embedded applications. Soon we are keen on the detail
execution assessment and cryptanalysis of this calculation on
various equipment and programming stages for conceivable
assaults.
REFERENCES
[1] Muhammad Usman, Irfan Ahmedy, M. Imran Aslamy,
Shujaat Khan and Usman Ali Shah, “SIT: A
Lightweight Encryption Algorithm for Secure
Internet of Things”, (IJACSA) International Journal of
Advanced Computer Science and Applications, 2017.
[2] R. Sivakumar, B. Balakumar, V. Arivu Pandeeswaran,
“A Study of Encryption Algorithms (DES, 3DES and
AES) for Information Security”, International
Research Journal of Engineering and Technology
(IRJET) Volume: 05 Issue: 04, Apr-2018.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 600
[3] Dr. D.I. George Amalarethinam, H. M. Leena,
“Enhanced RSA Algorithm with varying Key Sizes for
Data Security in Cloud”, World Congress on
Computing and Communication Technologies
(WCCCT) 2017.
[4] G. Ho, D. Leung, P. Mishra, A. Hosseini, D. Song, and
D. Wagner, “Smart locks: Lessons for securing
commodity internet of things devices,” in
Proceedings of the 11th ACM on Asia Conference on
Computer and Communications Security. ACM,
2016, pp. 461–472.
[5] D. Airehrour, J. Gutierrez, and S. K. Ray, “Secure
routing for internet of things: A survey,” Journal of
Network and Computer Applications, vol. 66, pp.
198–213, 2016.
[6] J. Romero-Mariona, R. Hallman, M. Kline, J. San
Miguel, M. Major, and L. Kerr, “Security in the
industrial internet of things,” 2016.
[7] R. Want and S. Dustdar, “Activating the internet of
things [guest editors’ introduction],” Computer, vol.
48, no. 9, pp. 16–20, 2015.
[8] Bandung-Bali, Mochamad Vicky Ghani Aziz, Rifki
Wijaya, Ary Setijadi Prihatmanto, DIOTra Henriyan,
“HASH MD5 Function Implementation at 8-bit
Microcontroller” Joint International Conference on
Rural Information & Communication Technology
and Electric-Vehicle Technology (rICT & ICeV-T)
November 26-28, 2013, Indonesia.
[9] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami,
“Internet of things (IOT): A ision, architectural
elements, and future directions,” Future Generation
Computer Systems, vol. 29, no. 7, pp. 1645–1660,
2013.
[10] “Overview Of RSA And Its Enhancements”,
International Journal Of Innovative Research &
Development, November 2013, Volume 2 Issue 11.
[11] H. Suo, J. Wan, C. Zou, and J. Liu, “Security in the
internet of things: a review,” in Computer Science
and Electronics Engineering (ICCSEE), 2012
International Conference on, vol. 3. IEEE, 2012, pp.
648–651.
[12] D. Miorandi, S. Sicari, F. De Pellegrini, and I.
Chlamtac, “Internet of things: Vision, applications
and research challenges,” Ad Hoc Networks, vol. 10,
no. 7, pp. 1497–1516, 2

More Related Content

What's hot

Security in IoT
Security in IoTSecurity in IoT
Security in IoTgr9293
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET Journal
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-ReviewAki Koivu
 
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTSecurity Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTBarcoding, Inc.
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principlesardexateam
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Ulf Mattsson
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Ahmed Mohamed Mahmoud
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
 
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) GICTTraining
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT securityPriyab Satoshi
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 

What's hot (20)

Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTSecurity Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS )
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT security
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
76 s201918
76 s20191876 s201918
76 s201918
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 

Similar to IRJET- Enhanced SIT Algorithm for Embedded Systems

IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET Journal
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyLightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyIRJET Journal
 
Secure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and ComputersSecure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and ComputersIRJET Journal
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principlesardexateam
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmIRJET Journal
 
Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...
Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...
Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...Enterprise Wired
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET Journal
 
Group 5 IoT Architecture Layer
Group 5 IoT Architecture LayerGroup 5 IoT Architecture Layer
Group 5 IoT Architecture LayerMarcus Maneja
 
IRJET- Theft Control using IoT
IRJET-  	  Theft Control using IoTIRJET-  	  Theft Control using IoT
IRJET- Theft Control using IoTIRJET Journal
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET Journal
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...IRJET Journal
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingIJECEIAES
 

Similar to IRJET- Enhanced SIT Algorithm for Embedded Systems (20)

IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyLightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
 
Secure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and ComputersSecure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and Computers
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
eMsecure
eMsecureeMsecure
eMsecure
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
 
Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...
Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...
Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
 
Group 5 IoT Architecture Layer
Group 5 IoT Architecture LayerGroup 5 IoT Architecture Layer
Group 5 IoT Architecture Layer
 
IRJET- Theft Control using IoT
IRJET-  	  Theft Control using IoTIRJET-  	  Theft Control using IoT
IRJET- Theft Control using IoT
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

IRJET- Enhanced SIT Algorithm for Embedded Systems

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 597 ENHANCED SIT ALGORITHM FOR EMBEDDED SYSTEMS Hemala N1, Satheesh T2 1PG Scholar & Nandha Engineering College, Erode, Tamil Nadu, India 2Professor, Dept. of EEE, Nandha Engineering College, Erode, Tamil Nadu, India. -----------------------------------------------------------------------***------------------------------------------------------------------------ Abstract - Encryption is the scrambling process of a message so that it can only be read by the intended recipient. Encryption can provide a way for information to be secured. The need to ensure that this information is invulnerable to snooping and/or tampering becomes more relevant as more and more information is stored on computers or communicated via computers. Information security is becoming much more important in data storage and transmission with the rapid progression of digital data exchange in an electronic way. Information Confidentiality has a prominent significance in the study of ethics, law, and in information systems most recently. The art of cryptography has become more complex with the evolution of human intelligence to make information more secure. Different organizations are deploying arrays of encryption systems in the information systems world. However, less complex algorithm may jeopardize the desired integrity. I suggest a lightweight encryption algorithm, an upgraded version of Secure IoT (SIT) called Enhanced SIT algorithm in this paper. It is a cipher of 64-bit blocks and requires a 128-bit key to encrypt the data. The algorithm's architecture is a feistel mixture and a uniform replacement- permutation network. The result of simulations shows that in 10 encryption rounds the algorithm provides substantial security. The algorithm's hardware is implemented on a low cost microcontroller and the results of code size, memory use gives a promising output. Key Words – Cryptography, Decryption, Embedded, Encryption, Key, Microcontrollers. 1. INTRODUCTION Internet of Things is changing the world. Technology together with innovation is changing every bit of day to day life. From home to industries, Smartphones, smart gadgets and sensors gather information to facilitate people. Consequently, every information is made accessible to the installed embedded frameworks around us. In the event that any unapproved individual gains admittance to this information, it would result in exceptional impacts. Subsequently, it is very basic to keep our information anchored from assailants. Cryptography is the field of study, which involves different schemes utilized for anchoring information. An embedded framework is one sort of a PC framework for the most part intended to play out a few errands like to access, procedure, and store and furthermore control the information in different hardware based frameworks. Embedded frameworks are a blend of equipment and programming where programming is typically known as firmware that is embedded into the equipment. A standout amongst its most critical attributes of these frameworks is, it gives the o/p inside as far as possible. Embedded frameworks backing to make the work increasingly impeccable and advantageous. Along these lines, we as often as possible utilize embedded frameworks in straightforward and complex gadgets as well. The uses of embedded frameworks for the most part include in our genuine for a few gadgets like microwave, adding machines, TV remote control, home security and neighborhood traffic control frameworks, and so forth. An IoT biological system comprises of web-empowered keen gadgets that utilization embedded processors, sensors and correspondence equipment to gather, send and follow up on information they secure from their surroundings. IoT gadgets share the sensor information they gather by interfacing with an IoT door or other edge gadget where information is either sent to the cloud to be broke down or examined locally. Once in a while, these gadgets speak with other related gadgets and follow up on the information they get from each other. The gadgets do a large portion of the work without human mediation, in spite of the fact that individuals can collaborate with the gadgets - for example, to set them up, give them directions or access the information. The availability, systems administration and correspondence conventions utilized with these web-empowered gadgets to a great extent rely upon the particular IoT applications sent. There are various true uses of the web of things, running from purchaser IoT and endeavor IoT to assembling and modern IoT. IoT applications range various verticals, including car, telco, vitality and the sky is the limit from there. In the customer portion, for instance, brilliant homes that are furnished with shrewd indoor regulators, savvy machines and associated warming, lighting and electronic
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 598 gadgets can be controlled remotely by means of PCs, cell phones or other cell phones. 2. RELATED WORKS The Internet of Things (IOT) being a promising innovation of things to come is relied upon to associate billions of gadgets. The expanded number of correspondence is required to produce heaps of information and the security of information can be a danger. The gadgets in the engineering are basically littler in size and low fueled. Traditional encryption calculations are commonly computationally costly because of their intricacy and requires numerous rounds to encode, basically squandering the compelled vitality of the gadgets.[1] Less mind boggling calculation, in any case, may bargain the ideal respectability. In this paper we propose a lightweight encryption calculation named as Secure IOT (SIT). It is a 64-bit square figure and requires 64-bit key to scramble the information. The design of the calculation is a blend of feistel and a uniform substitution-stage organize. Recreations result demonstrates the calculation gives generous security in only five encryption rounds. The equipment usage of the calculation is done on an ease 8-bit miniaturized scale controller and the consequences of code estimate, memory use and encryption/decoding execution cycles are contrasted and benchmark encryption calculations. [2] As increasingly more data is put away on PCs or imparted by means of PCs, the need of great importance is to guarantee that this data is secure and to keep from snooping/altering turns out to be progressively applicable. Regardless of whether information ends up getting stolen, it will be disjointed and about futile if it's scrambled. With the quick movement of computerized information trade in electronic way, Encryption is fundamental for guaranteed and believed conveyance of delicate data sent over the web. Contemporary person knowledge, lead to cryptography has turned out to be progressively mind boggling so as to make data increasingly secure. In the interim numerous encryption calculations are being created in the realm of Cyber security society. In this paper, a study of different Encryption Algorithms was introduced. [3] Cryptography is the study of secure information transmission through an unreliable channel. Propelled Encryption Standard (AES) is the most broadly and secure symmetric key cryptographic calculation today. The multifaceted nature of AES is commanded by the substitution box (S-box) change which is considered as a standout amongst the most confused and exorbitant piece of the framework since it is the main non-direct structure. In this article, we present rapid proficient AES engineering. We have utilized pipeline strategy to enable a parallel handling so as to get high throughput. Furthermore, 5-organize pipeline Sbox configuration utilizing combinational rationale is acquainted with increment the speed and the most extreme working recurrence. Besides, pipeline registers are embedded in ideal situations to lessen the involved territory and achieve a productive design. The proposed structure had been effectively executed in virtex-6 FPGA gadget utilizing Xilinx ISE 14.7. It had accomplished a throughput of 79Gbps and involved 4830 cuts memory. [4] Securing the clients' information can be accomplished by the ordinary technique for Cryptography. Encryption is finished by utilizing any of the mainstream symmetric or deviated key calculations, for example, AES, DES, RSA, Blowfish and Triple DES and so forth., RSA calculation which is a hilter kilter key calculation utilizing two distinctive keys for encryption and unscrambling forms. The Key size can be differed to make the encryption procedure solid. Subsequently it is troublesome for the aggressors to interfere the information. Expanding key size correspondingly builds the time taken for encryption and decoding process. The proposed calculation diminishes the season of encryption and unscrambling forms by separating the record into squares and improves the quality of the calculation by expanding the key size. This quality prepares to store information in cloud by the clients with no bother. Microcontroller is regularly actualized in world assembling industry either part of an electronic item, for example, a remote terminal unit. Remote terminal unit is an electronic gadget that in charge of recovering information utilizing sensors to a server, through link arrange or a remote system. The sensor used to peruse the information of temperature, height, etc as required. With respect to the system that utilized as a mode for information conveyance, can be by means of fiber-optic link, GPRS modem, VSAT satellite, RF stations, etc. Issues can happen when the information is sent as a plaintext (not verify). Such information can be perused by unapproved people in different ways. So it needs to convey an arrangement of data security that can be executed into 8-bit microcontroller[5]. This examination was led on the expansion of the capacity signature, with the motivation behind information uprightness. Calculations MD5 actualize on 8-bit microcontroller-board, in light of Arduino Uno unit. At that point the following advancement phase of this examination is, the information sent from a remote terminal units can be scrambled by the microcontroller, utilizing either the calculations AES, DES, 3DES or TwoFish encryption calculation, among others. The aftereffect of this underlying examination, MD5 hash calculation can be executed in a 8-bit microcontroller with 100% precision. Be that as it may, it has a few impediments on the issue among them, the information can be handled to a limit of 15 (fifteen) characters, information input utilizing keypad framework 4x3, MD5 hash yield is shown on the LCD
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 599 illustrations 128x64 and can just enter information input capital letters as it were. 3. PROPOSED ALGORITHM The engineering of the proposed calculation gives a straightforward structure appropriate to actualizing in embedded condition. SIT is a symmetric key square figure that comprises of 128-piece key and plain-content. In symmetric key calculation the encryption procedure comprises of encryption adjusts, each round depends on some numerical capacities to make perplexity and dispersion. Fig -1: Encryption Process The most crucial segment in the procedures of encryption and unscrambling is the key. It is this key on which whole security of the information is reliant, should this key be known to aggressor, the mystery of the information is lost. Consequently essential estimates must be considered to make the disclosure of the key as troublesome as could be allowed. The feistel based encryption calculations are made out of a few adjusts, each round requiring a different key. The encryption/decoding of the proposed calculation is made out of ten rounds, consequently, we require ten one of a kind keys for the said reason. Increment in number of rounds guarantees better security however in the end results in increment in the utilization of obliged vitality. The cryptographic calculations proposed here is intended for 10 rounds, to additionally improve the vitality productivity, the key age process includes complex numerical activities hence creating 10 special keys from 128 piece for each round of encryption. Every encryption round incorporates scientific tasks that work on 4 bits of information. To make adequate disarray and dissemination of information so as to go up against the assaults, the calculation uses the feistel system of substitution dispersion capacities. Encryption can be portrayed as the accompanying figure. 4. RESULTS The recreation of the calculation is done to play out the standard tests including Avalanche and picture entropy and histogram on Intel Core i7-3770@3.40 GHz processor utilizing MATLABR. To assess the execution in the genuine IoT condition we actualized the calculation on ATmega 2560 based Ardinuo Mega board also. The memory usage what's more, execution time of the proposed calculation is watched. The execution time is observed to be 0.188 milliseconds and 0.187 milliseconds for encryption and unscrambling separately, the proposed calculation uses the 18 bytes of memory on ATmega 2560 stage and gives out the improved security. We compare our algorithm with other algorithms being implemented on hardware as shown here. Table -1: Result CIPHER DEVICE Key Size Code Size RAM AES AVR 128 1570 - SIT Atmega 328 64 826 22 Enhanced SIT Atmega 2560 128 1268 18 5. CONCLUSION Soon Internet of Things will be a basic component of our day by day lives. Various vitality obliged gadgets and sensors will persistently be speaking with one another the security of which must not be undermined. For this reason a lightweight security calculation is proposed in this paper named as Enhanced SIT. The usage show promising outcomes making the calculation an appropriate contender to be embraced in Embedded applications. Soon we are keen on the detail execution assessment and cryptanalysis of this calculation on various equipment and programming stages for conceivable assaults. REFERENCES [1] Muhammad Usman, Irfan Ahmedy, M. Imran Aslamy, Shujaat Khan and Usman Ali Shah, “SIT: A Lightweight Encryption Algorithm for Secure Internet of Things”, (IJACSA) International Journal of Advanced Computer Science and Applications, 2017. [2] R. Sivakumar, B. Balakumar, V. Arivu Pandeeswaran, “A Study of Encryption Algorithms (DES, 3DES and AES) for Information Security”, International Research Journal of Engineering and Technology (IRJET) Volume: 05 Issue: 04, Apr-2018.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 600 [3] Dr. D.I. George Amalarethinam, H. M. Leena, “Enhanced RSA Algorithm with varying Key Sizes for Data Security in Cloud”, World Congress on Computing and Communication Technologies (WCCCT) 2017. [4] G. Ho, D. Leung, P. Mishra, A. Hosseini, D. Song, and D. Wagner, “Smart locks: Lessons for securing commodity internet of things devices,” in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, 2016, pp. 461–472. [5] D. Airehrour, J. Gutierrez, and S. K. Ray, “Secure routing for internet of things: A survey,” Journal of Network and Computer Applications, vol. 66, pp. 198–213, 2016. [6] J. Romero-Mariona, R. Hallman, M. Kline, J. San Miguel, M. Major, and L. Kerr, “Security in the industrial internet of things,” 2016. [7] R. Want and S. Dustdar, “Activating the internet of things [guest editors’ introduction],” Computer, vol. 48, no. 9, pp. 16–20, 2015. [8] Bandung-Bali, Mochamad Vicky Ghani Aziz, Rifki Wijaya, Ary Setijadi Prihatmanto, DIOTra Henriyan, “HASH MD5 Function Implementation at 8-bit Microcontroller” Joint International Conference on Rural Information & Communication Technology and Electric-Vehicle Technology (rICT & ICeV-T) November 26-28, 2013, Indonesia. [9] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of things (IOT): A ision, architectural elements, and future directions,” Future Generation Computer Systems, vol. 29, no. 7, pp. 1645–1660, 2013. [10] “Overview Of RSA And Its Enhancements”, International Journal Of Innovative Research & Development, November 2013, Volume 2 Issue 11. [11] H. Suo, J. Wan, C. Zou, and J. Liu, “Security in the internet of things: a review,” in Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, vol. 3. IEEE, 2012, pp. 648–651. [12] D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of things: Vision, applications and research challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497–1516, 2