Submit Search
Upload
IRJET- Enhanced SIT Algorithm for Embedded Systems
•
0 likes
•
16 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i4/IRJET-V6I4133.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET Journal
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET Journal
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
Symantec
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET Journal
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Dalton Valadares
IoT Security
IoT Security
Peter Waher
76 s201917
76 s201917
IJRAT
Recommended
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET Journal
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET Journal
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
Symantec
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET Journal
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Dalton Valadares
IoT Security
IoT Security
Peter Waher
76 s201917
76 s201917
IJRAT
Security in IoT
Security in IoT
gr9293
security and privacy-Internet of things
security and privacy-Internet of things
sreelekha appakondappagari
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
Ravindra Dastikop
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET Journal
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
Aki Koivu
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
Barcoding, Inc.
IoT Agent Design Principles
IoT Agent Design Principles
ardexateam
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
Ulf Mattsson
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
Ahmed Mohamed Mahmoud
Introduction to IoT Security
Introduction to IoT Security
CAS
Security in IoT
Security in IoT
SKS
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS )
GICTTraining
Introduction to IOT security
Introduction to IOT security
Priyab Satoshi
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
Somasundaram Jambunathan
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
Somasundaram Jambunathan
76 s201918
76 s201918
IJRAT
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
Koenig Solutions Ltd.
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
IRJET Journal
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
University of Ontario Institute of Technology (UOIT)
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET Journal
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
More Related Content
What's hot
Security in IoT
Security in IoT
gr9293
security and privacy-Internet of things
security and privacy-Internet of things
sreelekha appakondappagari
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
Ravindra Dastikop
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET Journal
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
Aki Koivu
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
Barcoding, Inc.
IoT Agent Design Principles
IoT Agent Design Principles
ardexateam
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
Ulf Mattsson
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
Ahmed Mohamed Mahmoud
Introduction to IoT Security
Introduction to IoT Security
CAS
Security in IoT
Security in IoT
SKS
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS )
GICTTraining
Introduction to IOT security
Introduction to IOT security
Priyab Satoshi
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
Somasundaram Jambunathan
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
Somasundaram Jambunathan
76 s201918
76 s201918
IJRAT
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
Koenig Solutions Ltd.
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
IRJET Journal
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
University of Ontario Institute of Technology (UOIT)
What's hot
(20)
Security in IoT
Security in IoT
security and privacy-Internet of things
security and privacy-Internet of things
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
IoT Agent Design Principles
IoT Agent Design Principles
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
Introduction to IoT Security
Introduction to IoT Security
Security in IoT
Security in IoT
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS )
Introduction to IOT security
Introduction to IOT security
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
76 s201918
76 s201918
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
Similar to IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET Journal
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
IRJET Journal
Secure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and Computers
IRJET Journal
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
IoT Design Principles
IoT Design Principles
ardexateam
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
IRJET Journal
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET Journal
eMsecure
eMsecure
Kalyana Sundaram
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
IRJET Journal
Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...
Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...
Enterprise Wired
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
IJCNCJournal
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
IJCNCJournal
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
IRJET Journal
Group 5 IoT Architecture Layer
Group 5 IoT Architecture Layer
Marcus Maneja
IRJET- Theft Control using IoT
IRJET- Theft Control using IoT
IRJET Journal
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET Journal
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
IRJET Journal
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
IJECEIAES
Similar to IRJET- Enhanced SIT Algorithm for Embedded Systems
(20)
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Secure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and Computers
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IoT Design Principles
IoT Design Principles
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
eMsecure
eMsecure
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...
Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
Group 5 IoT Architecture Layer
Group 5 IoT Architecture Layer
IRJET- Theft Control using IoT
IRJET- Theft Control using IoT
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
k795866
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
C Sai Kiran
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
LewisJB
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
roselinkalist12
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Recently uploaded
(20)
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
IRJET- Enhanced SIT Algorithm for Embedded Systems
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 597 ENHANCED SIT ALGORITHM FOR EMBEDDED SYSTEMS Hemala N1, Satheesh T2 1PG Scholar & Nandha Engineering College, Erode, Tamil Nadu, India 2Professor, Dept. of EEE, Nandha Engineering College, Erode, Tamil Nadu, India. -----------------------------------------------------------------------***------------------------------------------------------------------------ Abstract - Encryption is the scrambling process of a message so that it can only be read by the intended recipient. Encryption can provide a way for information to be secured. The need to ensure that this information is invulnerable to snooping and/or tampering becomes more relevant as more and more information is stored on computers or communicated via computers. Information security is becoming much more important in data storage and transmission with the rapid progression of digital data exchange in an electronic way. Information Confidentiality has a prominent significance in the study of ethics, law, and in information systems most recently. The art of cryptography has become more complex with the evolution of human intelligence to make information more secure. Different organizations are deploying arrays of encryption systems in the information systems world. However, less complex algorithm may jeopardize the desired integrity. I suggest a lightweight encryption algorithm, an upgraded version of Secure IoT (SIT) called Enhanced SIT algorithm in this paper. It is a cipher of 64-bit blocks and requires a 128-bit key to encrypt the data. The algorithm's architecture is a feistel mixture and a uniform replacement- permutation network. The result of simulations shows that in 10 encryption rounds the algorithm provides substantial security. The algorithm's hardware is implemented on a low cost microcontroller and the results of code size, memory use gives a promising output. Key Words – Cryptography, Decryption, Embedded, Encryption, Key, Microcontrollers. 1. INTRODUCTION Internet of Things is changing the world. Technology together with innovation is changing every bit of day to day life. From home to industries, Smartphones, smart gadgets and sensors gather information to facilitate people. Consequently, every information is made accessible to the installed embedded frameworks around us. In the event that any unapproved individual gains admittance to this information, it would result in exceptional impacts. Subsequently, it is very basic to keep our information anchored from assailants. Cryptography is the field of study, which involves different schemes utilized for anchoring information. An embedded framework is one sort of a PC framework for the most part intended to play out a few errands like to access, procedure, and store and furthermore control the information in different hardware based frameworks. Embedded frameworks are a blend of equipment and programming where programming is typically known as firmware that is embedded into the equipment. A standout amongst its most critical attributes of these frameworks is, it gives the o/p inside as far as possible. Embedded frameworks backing to make the work increasingly impeccable and advantageous. Along these lines, we as often as possible utilize embedded frameworks in straightforward and complex gadgets as well. The uses of embedded frameworks for the most part include in our genuine for a few gadgets like microwave, adding machines, TV remote control, home security and neighborhood traffic control frameworks, and so forth. An IoT biological system comprises of web-empowered keen gadgets that utilization embedded processors, sensors and correspondence equipment to gather, send and follow up on information they secure from their surroundings. IoT gadgets share the sensor information they gather by interfacing with an IoT door or other edge gadget where information is either sent to the cloud to be broke down or examined locally. Once in a while, these gadgets speak with other related gadgets and follow up on the information they get from each other. The gadgets do a large portion of the work without human mediation, in spite of the fact that individuals can collaborate with the gadgets - for example, to set them up, give them directions or access the information. The availability, systems administration and correspondence conventions utilized with these web-empowered gadgets to a great extent rely upon the particular IoT applications sent. There are various true uses of the web of things, running from purchaser IoT and endeavor IoT to assembling and modern IoT. IoT applications range various verticals, including car, telco, vitality and the sky is the limit from there. In the customer portion, for instance, brilliant homes that are furnished with shrewd indoor regulators, savvy machines and associated warming, lighting and electronic
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 598 gadgets can be controlled remotely by means of PCs, cell phones or other cell phones. 2. RELATED WORKS The Internet of Things (IOT) being a promising innovation of things to come is relied upon to associate billions of gadgets. The expanded number of correspondence is required to produce heaps of information and the security of information can be a danger. The gadgets in the engineering are basically littler in size and low fueled. Traditional encryption calculations are commonly computationally costly because of their intricacy and requires numerous rounds to encode, basically squandering the compelled vitality of the gadgets.[1] Less mind boggling calculation, in any case, may bargain the ideal respectability. In this paper we propose a lightweight encryption calculation named as Secure IOT (SIT). It is a 64-bit square figure and requires 64-bit key to scramble the information. The design of the calculation is a blend of feistel and a uniform substitution-stage organize. Recreations result demonstrates the calculation gives generous security in only five encryption rounds. The equipment usage of the calculation is done on an ease 8-bit miniaturized scale controller and the consequences of code estimate, memory use and encryption/decoding execution cycles are contrasted and benchmark encryption calculations. [2] As increasingly more data is put away on PCs or imparted by means of PCs, the need of great importance is to guarantee that this data is secure and to keep from snooping/altering turns out to be progressively applicable. Regardless of whether information ends up getting stolen, it will be disjointed and about futile if it's scrambled. With the quick movement of computerized information trade in electronic way, Encryption is fundamental for guaranteed and believed conveyance of delicate data sent over the web. Contemporary person knowledge, lead to cryptography has turned out to be progressively mind boggling so as to make data increasingly secure. In the interim numerous encryption calculations are being created in the realm of Cyber security society. In this paper, a study of different Encryption Algorithms was introduced. [3] Cryptography is the study of secure information transmission through an unreliable channel. Propelled Encryption Standard (AES) is the most broadly and secure symmetric key cryptographic calculation today. The multifaceted nature of AES is commanded by the substitution box (S-box) change which is considered as a standout amongst the most confused and exorbitant piece of the framework since it is the main non-direct structure. In this article, we present rapid proficient AES engineering. We have utilized pipeline strategy to enable a parallel handling so as to get high throughput. Furthermore, 5-organize pipeline Sbox configuration utilizing combinational rationale is acquainted with increment the speed and the most extreme working recurrence. Besides, pipeline registers are embedded in ideal situations to lessen the involved territory and achieve a productive design. The proposed structure had been effectively executed in virtex-6 FPGA gadget utilizing Xilinx ISE 14.7. It had accomplished a throughput of 79Gbps and involved 4830 cuts memory. [4] Securing the clients' information can be accomplished by the ordinary technique for Cryptography. Encryption is finished by utilizing any of the mainstream symmetric or deviated key calculations, for example, AES, DES, RSA, Blowfish and Triple DES and so forth., RSA calculation which is a hilter kilter key calculation utilizing two distinctive keys for encryption and unscrambling forms. The Key size can be differed to make the encryption procedure solid. Subsequently it is troublesome for the aggressors to interfere the information. Expanding key size correspondingly builds the time taken for encryption and decoding process. The proposed calculation diminishes the season of encryption and unscrambling forms by separating the record into squares and improves the quality of the calculation by expanding the key size. This quality prepares to store information in cloud by the clients with no bother. Microcontroller is regularly actualized in world assembling industry either part of an electronic item, for example, a remote terminal unit. Remote terminal unit is an electronic gadget that in charge of recovering information utilizing sensors to a server, through link arrange or a remote system. The sensor used to peruse the information of temperature, height, etc as required. With respect to the system that utilized as a mode for information conveyance, can be by means of fiber-optic link, GPRS modem, VSAT satellite, RF stations, etc. Issues can happen when the information is sent as a plaintext (not verify). Such information can be perused by unapproved people in different ways. So it needs to convey an arrangement of data security that can be executed into 8-bit microcontroller[5]. This examination was led on the expansion of the capacity signature, with the motivation behind information uprightness. Calculations MD5 actualize on 8-bit microcontroller-board, in light of Arduino Uno unit. At that point the following advancement phase of this examination is, the information sent from a remote terminal units can be scrambled by the microcontroller, utilizing either the calculations AES, DES, 3DES or TwoFish encryption calculation, among others. The aftereffect of this underlying examination, MD5 hash calculation can be executed in a 8-bit microcontroller with 100% precision. Be that as it may, it has a few impediments on the issue among them, the information can be handled to a limit of 15 (fifteen) characters, information input utilizing keypad framework 4x3, MD5 hash yield is shown on the LCD
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 599 illustrations 128x64 and can just enter information input capital letters as it were. 3. PROPOSED ALGORITHM The engineering of the proposed calculation gives a straightforward structure appropriate to actualizing in embedded condition. SIT is a symmetric key square figure that comprises of 128-piece key and plain-content. In symmetric key calculation the encryption procedure comprises of encryption adjusts, each round depends on some numerical capacities to make perplexity and dispersion. Fig -1: Encryption Process The most crucial segment in the procedures of encryption and unscrambling is the key. It is this key on which whole security of the information is reliant, should this key be known to aggressor, the mystery of the information is lost. Consequently essential estimates must be considered to make the disclosure of the key as troublesome as could be allowed. The feistel based encryption calculations are made out of a few adjusts, each round requiring a different key. The encryption/decoding of the proposed calculation is made out of ten rounds, consequently, we require ten one of a kind keys for the said reason. Increment in number of rounds guarantees better security however in the end results in increment in the utilization of obliged vitality. The cryptographic calculations proposed here is intended for 10 rounds, to additionally improve the vitality productivity, the key age process includes complex numerical activities hence creating 10 special keys from 128 piece for each round of encryption. Every encryption round incorporates scientific tasks that work on 4 bits of information. To make adequate disarray and dissemination of information so as to go up against the assaults, the calculation uses the feistel system of substitution dispersion capacities. Encryption can be portrayed as the accompanying figure. 4. RESULTS The recreation of the calculation is done to play out the standard tests including Avalanche and picture entropy and histogram on Intel Core i7-3770@3.40 GHz processor utilizing MATLABR. To assess the execution in the genuine IoT condition we actualized the calculation on ATmega 2560 based Ardinuo Mega board also. The memory usage what's more, execution time of the proposed calculation is watched. The execution time is observed to be 0.188 milliseconds and 0.187 milliseconds for encryption and unscrambling separately, the proposed calculation uses the 18 bytes of memory on ATmega 2560 stage and gives out the improved security. We compare our algorithm with other algorithms being implemented on hardware as shown here. Table -1: Result CIPHER DEVICE Key Size Code Size RAM AES AVR 128 1570 - SIT Atmega 328 64 826 22 Enhanced SIT Atmega 2560 128 1268 18 5. CONCLUSION Soon Internet of Things will be a basic component of our day by day lives. Various vitality obliged gadgets and sensors will persistently be speaking with one another the security of which must not be undermined. For this reason a lightweight security calculation is proposed in this paper named as Enhanced SIT. The usage show promising outcomes making the calculation an appropriate contender to be embraced in Embedded applications. Soon we are keen on the detail execution assessment and cryptanalysis of this calculation on various equipment and programming stages for conceivable assaults. REFERENCES [1] Muhammad Usman, Irfan Ahmedy, M. Imran Aslamy, Shujaat Khan and Usman Ali Shah, “SIT: A Lightweight Encryption Algorithm for Secure Internet of Things”, (IJACSA) International Journal of Advanced Computer Science and Applications, 2017. [2] R. Sivakumar, B. Balakumar, V. Arivu Pandeeswaran, “A Study of Encryption Algorithms (DES, 3DES and AES) for Information Security”, International Research Journal of Engineering and Technology (IRJET) Volume: 05 Issue: 04, Apr-2018.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 600 [3] Dr. D.I. George Amalarethinam, H. M. Leena, “Enhanced RSA Algorithm with varying Key Sizes for Data Security in Cloud”, World Congress on Computing and Communication Technologies (WCCCT) 2017. [4] G. Ho, D. Leung, P. Mishra, A. Hosseini, D. Song, and D. Wagner, “Smart locks: Lessons for securing commodity internet of things devices,” in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, 2016, pp. 461–472. [5] D. Airehrour, J. Gutierrez, and S. K. Ray, “Secure routing for internet of things: A survey,” Journal of Network and Computer Applications, vol. 66, pp. 198–213, 2016. [6] J. Romero-Mariona, R. Hallman, M. Kline, J. San Miguel, M. Major, and L. Kerr, “Security in the industrial internet of things,” 2016. [7] R. Want and S. Dustdar, “Activating the internet of things [guest editors’ introduction],” Computer, vol. 48, no. 9, pp. 16–20, 2015. [8] Bandung-Bali, Mochamad Vicky Ghani Aziz, Rifki Wijaya, Ary Setijadi Prihatmanto, DIOTra Henriyan, “HASH MD5 Function Implementation at 8-bit Microcontroller” Joint International Conference on Rural Information & Communication Technology and Electric-Vehicle Technology (rICT & ICeV-T) November 26-28, 2013, Indonesia. [9] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of things (IOT): A ision, architectural elements, and future directions,” Future Generation Computer Systems, vol. 29, no. 7, pp. 1645–1660, 2013. [10] “Overview Of RSA And Its Enhancements”, International Journal Of Innovative Research & Development, November 2013, Volume 2 Issue 11. [11] H. Suo, J. Wan, C. Zou, and J. Liu, “Security in the internet of things: a review,” in Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, vol. 3. IEEE, 2012, pp. 648–651. [12] D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of things: Vision, applications and research challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497–1516, 2
Download now