Pub Date : 2017-09-01DOI: 10.1109/ISPCC.2017.8269703
Geetanjali, Jyoti Gupta
Mobile ad-hoc network (MANET) contains various wireless movable nodes which can communicate with each other and they don't require any centralized administrator or network infrastructure and also can communicate with full capacity because it is composed of mobile nodes. They transmit data to each other with the help of intermediate nodes by establishing a path. But sometime malicious node can easily enter in network due to the mobility of nodes. That malicious node can harm the network by dropping the data packets. These type of attack is called gray hole attack. For detection and prevention from this type of attack a mechanism is proposed in this paper. By using network simulator, the simulation will be carried out for reporting the difficulties of prevention and detection of multiple gray hole attack in the Mobile ad-hoc network (MANET). Particle Swarm Optimization is used in this paper. Because of ad-hoc nature it observers the changing values of the node, if the value is infinite then node has been attacked and it prevents other nodes from sending data to that node. In this paper, we present possible solutions to prevent the network. Firstly, find more than one route to transmit packets to destination. Second, we provide minimum time delay to deliver the packet. The simulation shows the higher throughput, less time delay and less packet drop.
{"title":"Improved approach of co-operative gray hole attack prevention monitored by meta heuristic on MANET","authors":"Geetanjali, Jyoti Gupta","doi":"10.1109/ISPCC.2017.8269703","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269703","url":null,"abstract":"Mobile ad-hoc network (MANET) contains various wireless movable nodes which can communicate with each other and they don't require any centralized administrator or network infrastructure and also can communicate with full capacity because it is composed of mobile nodes. They transmit data to each other with the help of intermediate nodes by establishing a path. But sometime malicious node can easily enter in network due to the mobility of nodes. That malicious node can harm the network by dropping the data packets. These type of attack is called gray hole attack. For detection and prevention from this type of attack a mechanism is proposed in this paper. By using network simulator, the simulation will be carried out for reporting the difficulties of prevention and detection of multiple gray hole attack in the Mobile ad-hoc network (MANET). Particle Swarm Optimization is used in this paper. Because of ad-hoc nature it observers the changing values of the node, if the value is infinite then node has been attacked and it prevents other nodes from sending data to that node. In this paper, we present possible solutions to prevent the network. Firstly, find more than one route to transmit packets to destination. Second, we provide minimum time delay to deliver the packet. The simulation shows the higher throughput, less time delay and less packet drop.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123974958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ISPCC.2017.8269692
A. Deep, R. Jaswal
Cerebral palsy is defined as a neuromotor disorder which limits the motor activity and is attributed by non-progressive disturbance in the brain during pre or post natal time. The motor disabilities of CP are usually accompanied by cognitive impairment, abnormalities in behaviour, difficulty in communication, impaired sensory perception, and seizure disorders. Although CP is a non-progressive and non-curable disorder then also it must be managed so as it does not grt worsen with time. The key issue of cerebral palsy is its treatment and management. There are various aids available for the same. In the recent years, there is emergence in the new technologies for the treatment of the CP. One of the such recent technology is virtual reality rehabilitation therapy. Virtual reality is an enviroment simulated by computer with the help of specific hardware and software. VR is emerging as a promising technology for various field, specially for the field of education and medical. VR therapy has many advantages over the conventional therapies, and now a days this became a more appropriate option for the treatment. This article dispense a review of the nature, type, treatment and management of the cerebral palsy.
{"title":"Role of management & virtual space for the rehabilitation of children affected with cerebral palsy: A review","authors":"A. Deep, R. Jaswal","doi":"10.1109/ISPCC.2017.8269692","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269692","url":null,"abstract":"Cerebral palsy is defined as a neuromotor disorder which limits the motor activity and is attributed by non-progressive disturbance in the brain during pre or post natal time. The motor disabilities of CP are usually accompanied by cognitive impairment, abnormalities in behaviour, difficulty in communication, impaired sensory perception, and seizure disorders. Although CP is a non-progressive and non-curable disorder then also it must be managed so as it does not grt worsen with time. The key issue of cerebral palsy is its treatment and management. There are various aids available for the same. In the recent years, there is emergence in the new technologies for the treatment of the CP. One of the such recent technology is virtual reality rehabilitation therapy. Virtual reality is an enviroment simulated by computer with the help of specific hardware and software. VR is emerging as a promising technology for various field, specially for the field of education and medical. VR therapy has many advantages over the conventional therapies, and now a days this became a more appropriate option for the treatment. This article dispense a review of the nature, type, treatment and management of the cerebral palsy.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128713119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ISPCC.2017.8269741
Sahil Saharan, J. Lather, R. Radhakrishnan
Travelling Salesman Problem(TSP) is an NP hard problem, which has been addressed via several heuristic algorithms like genetic algorithms (GA) etc. The paper presents TSP solution using Teaching Learning Based optimization(TLBO) which includes many similarities like the other nature-inspired algorithms. In addition, the strategy adds an auxiliary operator to regulate the sequence of array elements in mutation process with partial-mapped crossover used over the selected candidates of the population. Experimental study shows that introduced strategy can provide better convergence. The prominent feature of the strategy is in its stability and superior ways to handle computational complexity while dealing with TSP optimization as compared to GA.
{"title":"Combinatorial problem optimization using TLBO","authors":"Sahil Saharan, J. Lather, R. Radhakrishnan","doi":"10.1109/ISPCC.2017.8269741","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269741","url":null,"abstract":"Travelling Salesman Problem(TSP) is an NP hard problem, which has been addressed via several heuristic algorithms like genetic algorithms (GA) etc. The paper presents TSP solution using Teaching Learning Based optimization(TLBO) which includes many similarities like the other nature-inspired algorithms. In addition, the strategy adds an auxiliary operator to regulate the sequence of array elements in mutation process with partial-mapped crossover used over the selected candidates of the population. Experimental study shows that introduced strategy can provide better convergence. The prominent feature of the strategy is in its stability and superior ways to handle computational complexity while dealing with TSP optimization as compared to GA.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127474167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ISPCC.2017.8269717
Vatsala Anand, A. Kaur
Finite Impulse Response (FIR) is a type of digital filter that has no feedback and its impulse response is. In the following paper, power analysis has been done by applying energy efficient techniques to make FIR more energy and power efficient device. Input Output (IO) standard scaling technique has been used in which different 8 IO standards of High Speed Transceiver Logic (HSTL) and High Speed Transceiver Logic Digital Controlled Impedance (HSTL DCI) family has been analyzed. Static and dynamic power dissipation has been calculated using X Power Analyzer. It has been extruded from the analysis that it is always better to work on HSTL_I IO standard in case of HSTL logic family and HSTL_DCI IO standard of HSTL DCI family in comparison to the other IO standards of the family since these are the least power consuming IO standards. In this way by selecting the most energy and power efficient IO standards Green FIR Filter can be made, in order to meet ever increasing energy and power crises as faced by world around.
{"title":"Implementation of energy efficient FIR Gaussian filter on FPGA","authors":"Vatsala Anand, A. Kaur","doi":"10.1109/ISPCC.2017.8269717","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269717","url":null,"abstract":"Finite Impulse Response (FIR) is a type of digital filter that has no feedback and its impulse response is. In the following paper, power analysis has been done by applying energy efficient techniques to make FIR more energy and power efficient device. Input Output (IO) standard scaling technique has been used in which different 8 IO standards of High Speed Transceiver Logic (HSTL) and High Speed Transceiver Logic Digital Controlled Impedance (HSTL DCI) family has been analyzed. Static and dynamic power dissipation has been calculated using X Power Analyzer. It has been extruded from the analysis that it is always better to work on HSTL_I IO standard in case of HSTL logic family and HSTL_DCI IO standard of HSTL DCI family in comparison to the other IO standards of the family since these are the least power consuming IO standards. In this way by selecting the most energy and power efficient IO standards Green FIR Filter can be made, in order to meet ever increasing energy and power crises as faced by world around.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132024181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ISPCC.2017.8269680
Gurcharan Singh, V. Garg
The traditional inverters have the drawbacks of Harmonics as well as Total Harmonic Distortion (THD). The analysis of THD and harmonics are studied in this paper by using MATLAB simulation. The cascaded H-bridge multi-level inverter configuration is used. The used configurations contain less number of switches and produce lesser harmonics in the output voltage. The harmonics and THD at the output of cascaded H-bridge inverter of different levels i.e., three-level, five-level, seven-level, nine-level and eleven-level are studied and compared. The cascaded H-bridge multi-level inverter topology quashes the THD and harmonics.
{"title":"THD analysis of cascaded H-bridge multi-level inverter","authors":"Gurcharan Singh, V. Garg","doi":"10.1109/ISPCC.2017.8269680","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269680","url":null,"abstract":"The traditional inverters have the drawbacks of Harmonics as well as Total Harmonic Distortion (THD). The analysis of THD and harmonics are studied in this paper by using MATLAB simulation. The cascaded H-bridge multi-level inverter configuration is used. The used configurations contain less number of switches and produce lesser harmonics in the output voltage. The harmonics and THD at the output of cascaded H-bridge inverter of different levels i.e., three-level, five-level, seven-level, nine-level and eleven-level are studied and compared. The cascaded H-bridge multi-level inverter topology quashes the THD and harmonics.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123182147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Localization is an active area of research in the field of wireless sensor networks. The best solution is provided with the help of range based localization. However, the setup cost is very high for such a system. Range free localization provides an inbudget solution but at the same time, it compromises with the accuracy and increases the localization error. This paper intends to present a cost effective yet more accurate localization solution scheme. This scheme is a range free localization with a blend of APIT, RSSI and PSO algorithm. The algorithm selects and weights the RSSI measurements of the neighboring nodes from the beacon node during beacon exchange to measure the distance based upon the strength. Further, we use PSO along with a cost function to reduce the cost of the co-ordinates by continuous iterations using position and velocity vectors of the neighboring nodes by finding the co-ordinates with the global and local least cost. Finally, we use APIT to calculate the co-ordinates of the unknown or the desired node with the help of the beacon nodes and the neighboring nodes as calculated using PSO. Since the localization is range free, hardware setup cost is minimum and the simulation results shows that the location error is dropped sharply as compared to APIT and combination of APIT with RSSI. As a result, it leads to better accuracy with low cost.
{"title":"Improved APIT localization algorithm in wireless sensor networks","authors":"Shubhankar Jain, Akanksha Singh, Amanpreet Kaur, Shikha Jain","doi":"10.1109/ISPCC.2017.8269653","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269653","url":null,"abstract":"Localization is an active area of research in the field of wireless sensor networks. The best solution is provided with the help of range based localization. However, the setup cost is very high for such a system. Range free localization provides an inbudget solution but at the same time, it compromises with the accuracy and increases the localization error. This paper intends to present a cost effective yet more accurate localization solution scheme. This scheme is a range free localization with a blend of APIT, RSSI and PSO algorithm. The algorithm selects and weights the RSSI measurements of the neighboring nodes from the beacon node during beacon exchange to measure the distance based upon the strength. Further, we use PSO along with a cost function to reduce the cost of the co-ordinates by continuous iterations using position and velocity vectors of the neighboring nodes by finding the co-ordinates with the global and local least cost. Finally, we use APIT to calculate the co-ordinates of the unknown or the desired node with the help of the beacon nodes and the neighboring nodes as calculated using PSO. Since the localization is range free, hardware setup cost is minimum and the simulation results shows that the location error is dropped sharply as compared to APIT and combination of APIT with RSSI. As a result, it leads to better accuracy with low cost.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116246527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ISPCC.2017.8269713
Yadvir Kaur, N. Sohi
Biomolecular sequence alignment is an important research area in bioinformatics. Based on Flower Pollination Algorithm (FPA), we have proposed a new sequence alignment algorithm, named Pairwise Sequence Alignment with Flower Pollination Algorithm (PSAFPA). PSAFPA helps in finding the optimal or near-optimal solution to sequence alignment problem. PSAFPA first finds the current best solution with the help of FPA and then divides this solution into various segments of non-matching regions to find the better results. These segments are rearranged using FPA and finally the best identity value of each segment is added into the current best solution to get the final alignment identity value. Such segmentation helped to get better results. We have also done comparison of PSAFPA with the well-known methods using various DNA sequence pairs, which resulted in to better performance of PSAFPA for a majority of sequence pairs.
{"title":"Pairwise sequence alignment method using flower pollination algorithm","authors":"Yadvir Kaur, N. Sohi","doi":"10.1109/ISPCC.2017.8269713","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269713","url":null,"abstract":"Biomolecular sequence alignment is an important research area in bioinformatics. Based on Flower Pollination Algorithm (FPA), we have proposed a new sequence alignment algorithm, named Pairwise Sequence Alignment with Flower Pollination Algorithm (PSAFPA). PSAFPA helps in finding the optimal or near-optimal solution to sequence alignment problem. PSAFPA first finds the current best solution with the help of FPA and then divides this solution into various segments of non-matching regions to find the better results. These segments are rearranged using FPA and finally the best identity value of each segment is added into the current best solution to get the final alignment identity value. Such segmentation helped to get better results. We have also done comparison of PSAFPA with the well-known methods using various DNA sequence pairs, which resulted in to better performance of PSAFPA for a majority of sequence pairs.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125258974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ISPCC.2017.8269715
Bhawna Tandon, Sukhdeep Kaur, Ashima Kalra
This study proposes the stability analysis of Magnetic Levitation System having a nonlinear controller, designed with feedback linearization based on the back-stepping method, using Sum of Squares (SOS) technique. The selection of Lyapunov function for nonlinear polynomial systems can be formulated as a convex optimization problem with the advancement of sum of squares method in the past few years. For this, the nonlinear systems with non-polynomial form are required to be recast into polynomial form first. This recasting results in increasing the order of the system.
{"title":"Stability analysis of feedback linearized magnetic levitation system using sum-of-squares method","authors":"Bhawna Tandon, Sukhdeep Kaur, Ashima Kalra","doi":"10.1109/ISPCC.2017.8269715","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269715","url":null,"abstract":"This study proposes the stability analysis of Magnetic Levitation System having a nonlinear controller, designed with feedback linearization based on the back-stepping method, using Sum of Squares (SOS) technique. The selection of Lyapunov function for nonlinear polynomial systems can be formulated as a convex optimization problem with the advancement of sum of squares method in the past few years. For this, the nonlinear systems with non-polynomial form are required to be recast into polynomial form first. This recasting results in increasing the order of the system.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122832167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ISPCC.2017.8269654
Rashmi Sharma, R. Agarwal, Ashwani Kumar Dubey, A. Arora
A 3D model of Capacitive Micromachined Ultrasonic Transducer (CMUT) have been created in COMSOL with two membranes one overlaid on the other. The impact of multiple membranes have been shown on the various parameters like resonant frequency, deflection with applied DC voltage, deflection with applied AC voltage and deflection along frequency. The performance of the device, its sensitivity and the capacity to generate the ultrasonic waves all are associated with the amount of deflection of the membrane. This has been found that the resonant frequency increases with the multiple membranes and the deflection with applied DC and AC voltage decreases as compared to the single membrane. The results provide the researcher the complete impact of the transducer with the multiple membranes in comparison with the single membrane prior to fabrication.
{"title":"Effect of multiple membranes on capacitive micromachined ultrasonic transducers","authors":"Rashmi Sharma, R. Agarwal, Ashwani Kumar Dubey, A. Arora","doi":"10.1109/ISPCC.2017.8269654","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269654","url":null,"abstract":"A 3D model of Capacitive Micromachined Ultrasonic Transducer (CMUT) have been created in COMSOL with two membranes one overlaid on the other. The impact of multiple membranes have been shown on the various parameters like resonant frequency, deflection with applied DC voltage, deflection with applied AC voltage and deflection along frequency. The performance of the device, its sensitivity and the capacity to generate the ultrasonic waves all are associated with the amount of deflection of the membrane. This has been found that the resonant frequency increases with the multiple membranes and the deflection with applied DC and AC voltage decreases as compared to the single membrane. The results provide the researcher the complete impact of the transducer with the multiple membranes in comparison with the single membrane prior to fabrication.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131241177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ISPCC.2017.8269752
Effy Raja Naru, H. Saini, Geetanjali Rathee
Internet of Things (IoT) is the future of next era of the Internet which connects various physical objects by communicating with each other without the aid of human interactions. Applications of IoT become important in day to day lifestyle such as healthcare, smart grid, smart home, smart parking. Various IoT sensors such as temperature sensors, fault sensors track monitoring sensors are used to make an intelligent railway system which monitoring the railway stations. IoT application is useful to human yet if the IoT system shield the client data from a hacker, attacks, and vulnerabilities. Security plays an important role in network to prevent the unauthorized access, misuses of data, monitoring and data, modification etc. In conventional network security, intruder may destroy modification, monitor the information and allow the unauthorized person to access the system. Similarly, IoT is endured from various security attacks. Although we have numerous cryptographic algorithms, however these are not suitable for constrained devices because of their large key size like RSA. Our proposed security IoT architecture generates a secret key and its administration by the notarization mechanism for securing the data.
物联网(Internet of Things, IoT)是下一个互联网时代的未来,它可以在没有人类互动的情况下,通过相互通信将各种物理对象连接起来。物联网的应用在医疗保健、智能电网、智能家居、智能停车等日常生活方式中变得越来越重要。各种物联网传感器,如温度传感器,故障传感器,轨道监控传感器,用于制造智能铁路系统,监控火车站。物联网应用对人类是有用的,但如果物联网系统保护客户端数据免受黑客,攻击和漏洞。网络安全在防止未经授权的访问、数据的滥用、监控和修改等方面起着重要的作用。在传统的网络安全中,入侵者可以破坏修改、监视信息和允许未经授权的人访问系统。同样,物联网也承受着各种安全攻击。虽然我们有许多加密算法,但是这些算法都不适合像RSA这样的受约束的设备,因为它们的密钥大小很大。我们提出的安全物联网架构通过公证机制生成密钥并对其进行管理,以保护数据。
{"title":"Proposed IoT framework using third party with enhanced security","authors":"Effy Raja Naru, H. Saini, Geetanjali Rathee","doi":"10.1109/ISPCC.2017.8269752","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269752","url":null,"abstract":"Internet of Things (IoT) is the future of next era of the Internet which connects various physical objects by communicating with each other without the aid of human interactions. Applications of IoT become important in day to day lifestyle such as healthcare, smart grid, smart home, smart parking. Various IoT sensors such as temperature sensors, fault sensors track monitoring sensors are used to make an intelligent railway system which monitoring the railway stations. IoT application is useful to human yet if the IoT system shield the client data from a hacker, attacks, and vulnerabilities. Security plays an important role in network to prevent the unauthorized access, misuses of data, monitoring and data, modification etc. In conventional network security, intruder may destroy modification, monitor the information and allow the unauthorized person to access the system. Similarly, IoT is endured from various security attacks. Although we have numerous cryptographic algorithms, however these are not suitable for constrained devices because of their large key size like RSA. Our proposed security IoT architecture generates a secret key and its administration by the notarization mechanism for securing the data.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132814558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}