Pub Date : 2021-11-19DOI: 10.1109/DISCOVER52564.2021.9663665
K. Neelima, Satyam
The computationally intensive designs such as Multiplier Accumulator Unit need to be revisited for ascertaining better performance. Design of MAC unit using Variable Precision multiplier is explored in this paper with adoption of this concept to multipliers like Array, Carry Save, Booth and Vedic Multipliers. The variable precision MAC unit saves the computation memory as the partial results are computed with less memory so that the final result has a size of 2n x m for multiplication of n x m bits. The Verilog HDL modeling is used for the designs and Xilinx ISE 14.5 with ISIM simulator are used to functionally verify for Zynq 7000 series FPGA (XC7Z020-1CLG484). Among these, Vedic VPMAC FIR Filter proved to be better for area and delay by atleast 23.05% and 17.16% respectively, with a trade-off of 2.04% in power dissipation when compared with the other three designs. Also when compared with existing designs, it uses less area, delay and power dissipation by at least 8.06%, 8.58% and 2% respectively.
为了获得更好的性能,需要重新考虑诸如乘法器累加器单元之类的计算密集型设计。本文探讨了可变精度乘法器的MAC单元设计,并将此概念应用于Array、Carry Save、Booth和Vedic乘法器等乘法器。可变精度MAC单元节省了计算内存,因为部分结果使用较少的内存进行计算,因此对于n x m位的乘法,最终结果的大小为2n x m。Verilog HDL建模用于设计,Xilinx ISE 14.5与ISIM模拟器用于Zynq 7000系列FPGA (XC7Z020-1CLG484)的功能验证。其中,Vedic VPMAC FIR滤波器与其他三种设计相比,在面积和延迟方面分别至少提高23.05%和17.16%,功耗降低2.04%。与现有设计相比,其面积、延迟和功耗分别降低至少8.06%、8.58%和2%。
{"title":"High Performance Variable Precision Multiplier and Accumulator Unit for Digital Filter Applications","authors":"K. Neelima, Satyam","doi":"10.1109/DISCOVER52564.2021.9663665","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663665","url":null,"abstract":"The computationally intensive designs such as Multiplier Accumulator Unit need to be revisited for ascertaining better performance. Design of MAC unit using Variable Precision multiplier is explored in this paper with adoption of this concept to multipliers like Array, Carry Save, Booth and Vedic Multipliers. The variable precision MAC unit saves the computation memory as the partial results are computed with less memory so that the final result has a size of 2n x m for multiplication of n x m bits. The Verilog HDL modeling is used for the designs and Xilinx ISE 14.5 with ISIM simulator are used to functionally verify for Zynq 7000 series FPGA (XC7Z020-1CLG484). Among these, Vedic VPMAC FIR Filter proved to be better for area and delay by atleast 23.05% and 17.16% respectively, with a trade-off of 2.04% in power dissipation when compared with the other three designs. Also when compared with existing designs, it uses less area, delay and power dissipation by at least 8.06%, 8.58% and 2% respectively.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114819345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/DISCOVER52564.2021.9663617
M. Gagandeep, R. Pushpalatha, B. Ramesh
The data centre is fundamental to cloud computing. Data centers are currently being strained by the rising demand for cloud computing services. Cloud computing practices are very important in terms of device performance and schedule that can make it easier for users to distribute the workload among network resources. Any data-center services can eventually become overloaded/ under loaded, resulting in increased energy usage, as well as decreased functionality and resource waste.As a result, this paper uses a contextual with multiple metrics to adopt optimization algorithms that are implemented by load balancing. Load balancing with system integration strengthens resource utilization but can increase Performance of System (Latency) metrics. This research aims to incorporate a new system for congestion control and server expansion including migration latency, device threshold, QoS, and energy consumption.
{"title":"Load Balancing and Predictive Analysis Model Implementation in Public Cloud","authors":"M. Gagandeep, R. Pushpalatha, B. Ramesh","doi":"10.1109/DISCOVER52564.2021.9663617","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663617","url":null,"abstract":"The data centre is fundamental to cloud computing. Data centers are currently being strained by the rising demand for cloud computing services. Cloud computing practices are very important in terms of device performance and schedule that can make it easier for users to distribute the workload among network resources. Any data-center services can eventually become overloaded/ under loaded, resulting in increased energy usage, as well as decreased functionality and resource waste.As a result, this paper uses a contextual with multiple metrics to adopt optimization algorithms that are implemented by load balancing. Load balancing with system integration strengthens resource utilization but can increase Performance of System (Latency) metrics. This research aims to incorporate a new system for congestion control and server expansion including migration latency, device threshold, QoS, and energy consumption.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132335987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/DISCOVER52564.2021.9663425
P. Abhishek, Y. Akash, D. Narayan
Cloud computing has become an important technology for the processing of large computationally expensive programs and data from real-world. IT organizations are en-trusting the cloud vendors for the security of their computational infrastructures including the data. Thus, there is a need for better provenance assurance for the data present in the cloud for better security and to establish trust between the cloud vendors and customers. Blockchain technology operates in a decentralized way for building trust between the entities in the system using immutable ledger. In this work, we propose the decentralized and trusted cloud data provenance mechanism using Ethereum blockchain platform, IPFS and scalable consensus mechanism. PoW is the consensus algorithm currently used in Ethereum Blockchain. PoW consensus mechanism needs lot of computational power for the processing of data in the Blockchain. Thus, we implement Proof of Stake (POS) consensus algorithm in Ethereum to improve the efficiency of the proposed data provenance mechanism. We demonstrate the performance of PoS-enabled provenance framework in a multi-node testbed. The results reveal that POS performs better than PoW for cloud data provenance.
{"title":"A Scalable Data Provenance Mechanism for Cloud Environment using Ethereum Blockchain","authors":"P. Abhishek, Y. Akash, D. Narayan","doi":"10.1109/DISCOVER52564.2021.9663425","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663425","url":null,"abstract":"Cloud computing has become an important technology for the processing of large computationally expensive programs and data from real-world. IT organizations are en-trusting the cloud vendors for the security of their computational infrastructures including the data. Thus, there is a need for better provenance assurance for the data present in the cloud for better security and to establish trust between the cloud vendors and customers. Blockchain technology operates in a decentralized way for building trust between the entities in the system using immutable ledger. In this work, we propose the decentralized and trusted cloud data provenance mechanism using Ethereum blockchain platform, IPFS and scalable consensus mechanism. PoW is the consensus algorithm currently used in Ethereum Blockchain. PoW consensus mechanism needs lot of computational power for the processing of data in the Blockchain. Thus, we implement Proof of Stake (POS) consensus algorithm in Ethereum to improve the efficiency of the proposed data provenance mechanism. We demonstrate the performance of PoS-enabled provenance framework in a multi-node testbed. The results reveal that POS performs better than PoW for cloud data provenance.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116401407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/DISCOVER52564.2021.9663647
H. Spoorti, R. Sneha, V. Soujanya, K. Heena, S. Pooja, D. Narayan
With the steady increase in complexity of cloud computing and other technologies, there has been a significant concern for providing privacy and data security. For secure access of cloud resources, protection of sensitive data is essential. The critical data that relates to resource provisioning in cloud environment includes key pairs and IP addresses. The user needs this critical data to access the resources which has been provisioned. In conventional systems, this data is directly provided to the user. This technique results in local storage and opens up a vulnerability of snooping by a malicious intruder. Furthermore, the user needs to repeatedly remember the key pairs and other information of all the created resources. Recently, Blockchain, with its decentralized and immutable features is being explored in the design access control mechanism. In this work, we design blockchain based access control mechanism to access cloud resources. We use OpenStack cloud to provision the resources, store the critical data of resources in Ethereum blockchain and use secure access control to cloud resources. We also carry out the scalability and performance analysis of the blockchain based system using Ethereum platform.
{"title":"Secure Access Control to Cloud Resources using Blockchain","authors":"H. Spoorti, R. Sneha, V. Soujanya, K. Heena, S. Pooja, D. Narayan","doi":"10.1109/DISCOVER52564.2021.9663647","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663647","url":null,"abstract":"With the steady increase in complexity of cloud computing and other technologies, there has been a significant concern for providing privacy and data security. For secure access of cloud resources, protection of sensitive data is essential. The critical data that relates to resource provisioning in cloud environment includes key pairs and IP addresses. The user needs this critical data to access the resources which has been provisioned. In conventional systems, this data is directly provided to the user. This technique results in local storage and opens up a vulnerability of snooping by a malicious intruder. Furthermore, the user needs to repeatedly remember the key pairs and other information of all the created resources. Recently, Blockchain, with its decentralized and immutable features is being explored in the design access control mechanism. In this work, we design blockchain based access control mechanism to access cloud resources. We use OpenStack cloud to provision the resources, store the critical data of resources in Ethereum blockchain and use secure access control to cloud resources. We also carry out the scalability and performance analysis of the blockchain based system using Ethereum platform.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116453686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/DISCOVER52564.2021.9663714
S. Ragani, T. Vijaya Murari, K. Ravishankar
Nowadays Internet is used for faster transmission of valuable information. This information may be text, image, and video anything. With the advancement of computer and biomedical innovations, medical JPEG images contain the patient’s individual data and the security of the private data pulls in incredible consideration. The progression of program and correspondence advancements has made images act significant parts in the domain of telediagnosis, tele-surgery, and so forth. Simultaneously, such signs of progress provide new intends to process clinical pictures; it additionally expands security concern as far as confidentiality, integrity and availability. This paper provides an overview of the various approaches currently in use and then goes on to develop a new mechanism for the same using various Chaos maps techniques in order to provide more integrityand security to the image by making the keyspace large enough towithstand brute force attacks.
{"title":"Security of the Medical Images using Different Chaos map Techniques","authors":"S. Ragani, T. Vijaya Murari, K. Ravishankar","doi":"10.1109/DISCOVER52564.2021.9663714","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663714","url":null,"abstract":"Nowadays Internet is used for faster transmission of valuable information. This information may be text, image, and video anything. With the advancement of computer and biomedical innovations, medical JPEG images contain the patient’s individual data and the security of the private data pulls in incredible consideration. The progression of program and correspondence advancements has made images act significant parts in the domain of telediagnosis, tele-surgery, and so forth. Simultaneously, such signs of progress provide new intends to process clinical pictures; it additionally expands security concern as far as confidentiality, integrity and availability. This paper provides an overview of the various approaches currently in use and then goes on to develop a new mechanism for the same using various Chaos maps techniques in order to provide more integrityand security to the image by making the keyspace large enough towithstand brute force attacks.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116608133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/DISCOVER52564.2021.9663616
Mohammad Asif Raibag, J. V. Franklin
In India we have shortage of skilled Neuro-Physicians who can correctly and timely analyze the complicated features of electroencephalogram (EEG) signal which is critical in epilepsy diagnosis, and hence developing a reliable seizure classification model remains a challenging task. A Support Vector Machine (SVM)-based mechanism is proposed in this paper for classification of epileptic seizures from EEG recordings of brain activity. Certain relevant features are selected from time-frequency domain EEG recordings (TFD). Principal Component Analysis (PCA) technique is applied to improve the performance of the model and for classification SVM classifier with different kernels is applied. According to the results, the proposed PCA-SVM radial basis kernel approach is capable of improving epilepsy classification, as made evident by the results, which show an accuracy of 96.6% for normal subject data versus epileptic data. The performance with other parameters too show promising results hence the proposed SVM-RBF model achieves robust classification for epilepsy.
{"title":"PCA and SVM Technique for Epileptic Seizure Classification","authors":"Mohammad Asif Raibag, J. V. Franklin","doi":"10.1109/DISCOVER52564.2021.9663616","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663616","url":null,"abstract":"In India we have shortage of skilled Neuro-Physicians who can correctly and timely analyze the complicated features of electroencephalogram (EEG) signal which is critical in epilepsy diagnosis, and hence developing a reliable seizure classification model remains a challenging task. A Support Vector Machine (SVM)-based mechanism is proposed in this paper for classification of epileptic seizures from EEG recordings of brain activity. Certain relevant features are selected from time-frequency domain EEG recordings (TFD). Principal Component Analysis (PCA) technique is applied to improve the performance of the model and for classification SVM classifier with different kernels is applied. According to the results, the proposed PCA-SVM radial basis kernel approach is capable of improving epilepsy classification, as made evident by the results, which show an accuracy of 96.6% for normal subject data versus epileptic data. The performance with other parameters too show promising results hence the proposed SVM-RBF model achieves robust classification for epilepsy.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114942963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/DISCOVER52564.2021.9663590
P. Kopperundevi, M. S. Prakash
The newly introduced in-loop filtering tool in the High Efficiency Video Coding (HEVC) standard is the Sample Adaptive Offset (SAO) filter. It mainly helps to reduce the ringing artifacts, that occurs due to distortion or loss of high frequency information. While SAO contributes to a significant increase in coding efficiency, the complexity of in-loop filtering in HEVC encoding is dominated by the estimation of SAO parameters. The SAO estimation primarily includes two phases: the statistics collection phase and the parameter determination phase. The statistics collection phase involves calculating sum and count for band and edge offset. The parameter determination phase involves distortion and offset generation, cost generation and decision, SAO type decision and finally, merge mode decision. In this paper, we designed the SAO encoder’s hardware architecture using a separate clock for each phase. The evaluation of proposed architecture results in decrease in the area of 4%-73% when compared with existing architectures while achieving a similar throughput rate. The design occupies a 70K gate count with a minimum operating frequency of 375MHz.
{"title":"A Hardware Architecture for Sample Adaptive Offset Filter in HEVC","authors":"P. Kopperundevi, M. S. Prakash","doi":"10.1109/DISCOVER52564.2021.9663590","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663590","url":null,"abstract":"The newly introduced in-loop filtering tool in the High Efficiency Video Coding (HEVC) standard is the Sample Adaptive Offset (SAO) filter. It mainly helps to reduce the ringing artifacts, that occurs due to distortion or loss of high frequency information. While SAO contributes to a significant increase in coding efficiency, the complexity of in-loop filtering in HEVC encoding is dominated by the estimation of SAO parameters. The SAO estimation primarily includes two phases: the statistics collection phase and the parameter determination phase. The statistics collection phase involves calculating sum and count for band and edge offset. The parameter determination phase involves distortion and offset generation, cost generation and decision, SAO type decision and finally, merge mode decision. In this paper, we designed the SAO encoder’s hardware architecture using a separate clock for each phase. The evaluation of proposed architecture results in decrease in the area of 4%-73% when compared with existing architectures while achieving a similar throughput rate. The design occupies a 70K gate count with a minimum operating frequency of 375MHz.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122983051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
One of the major concern in the agricultural sector is the control of weeds. Weeds are capable of reducing the crop yield significantly and thus in curhuge loss. There are many ways of controlling weeds like using chemical herbicides, manual weeding, and using mechanical weeder. Overuse of chemical herbicides for weeds harms environment. Shortage of labors is a main problem with manual weeding. Mechanical weeding is not effective and is not suitable for some of the crops like direct-seeded rice fields. In recenty ears, technology is being explored in agriculture for the automatic detection and identification weeds from the digital images. This is useful in recommending specific herbicides and thus reducing overuse of herbicides and herbicide-resistant weeds. Thus contributing to site-specific weed management. This paper reviews some of the important research works carried out for the classification of crop and weeds from the digital images. In addition, some of the important future research scopes are discussed in this paper.
{"title":"Classification of Crop and Weed from Digital Images: A Review","authors":"Radhika Kamath, Mamatha Balachandra, Srikanth Prabhu","doi":"10.1109/DISCOVER52564.2021.9663729","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663729","url":null,"abstract":"One of the major concern in the agricultural sector is the control of weeds. Weeds are capable of reducing the crop yield significantly and thus in curhuge loss. There are many ways of controlling weeds like using chemical herbicides, manual weeding, and using mechanical weeder. Overuse of chemical herbicides for weeds harms environment. Shortage of labors is a main problem with manual weeding. Mechanical weeding is not effective and is not suitable for some of the crops like direct-seeded rice fields. In recenty ears, technology is being explored in agriculture for the automatic detection and identification weeds from the digital images. This is useful in recommending specific herbicides and thus reducing overuse of herbicides and herbicide-resistant weeds. Thus contributing to site-specific weed management. This paper reviews some of the important research works carried out for the classification of crop and weeds from the digital images. In addition, some of the important future research scopes are discussed in this paper.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122846010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/discover52564.2021.9663626
{"title":"[DISCOVER 2021 Front cover]","authors":"","doi":"10.1109/discover52564.2021.9663626","DOIUrl":"https://doi.org/10.1109/discover52564.2021.9663626","url":null,"abstract":"","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117245785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/DISCOVER52564.2021.9663674
K. Vivek, M. R. Kale, Venkata Sai Krishna Thotakura, K. Sushma
When implemented in a complex environment, wireless network security is the main factor, and it is the sensor networks’ primary concern. Cryptology is a vital component in wireless sensor networks to accomplish this. Many existing cryptographic techniques had not shown good and better results till now. An efficient, strong, triple phased, double secured, and integrated cryptographic approach has been introduced in this study that utilizes both secret-key and public-key methods. Rijndael Encryption Approach (REA), Horst Feistel’s Encryption Approach (HFEA), and enhanced Rivest-Shamir-Adleman (e- RSA) are employed in the propounded technique in various stages of the algorithm since secret-key based system offers a significant level of protection and enable key management through publickey based techniques. REA was used in stage 1 of the algorithm; REA+HFEA was used in stage 2, and REA+HFEA+e-RSA was used in the last stage, and all three stages were performed in parallel. Parameters like execution time and decryption time were taken into account for measuring the performance levels of the propounded approach. The propounded algorithm is differentiated from existing techniques using a single evaluation parameter i.e computation time. It is found that propounded approach gave a good performance in terms of computation time with an Average Encryption Time (AET) and Average Decryption Time (ADT) of 1.12 and 1.26 on text sizes of 6, 25, 35, 61, and 184MegaBytes (MB) respectively. The proposed hybrid model is 1.36 times faster than ECC+RSA+MD-5,3.25 times faster than AES+ECC, 2.7 times faster than AES+RSA, and 3.24 times faster than AES+ECC+RSA+MD5.
{"title":"An Efficient Triple-Layered and Double Secured Cryptography Technique in Wireless Sensor Networks","authors":"K. Vivek, M. R. Kale, Venkata Sai Krishna Thotakura, K. Sushma","doi":"10.1109/DISCOVER52564.2021.9663674","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663674","url":null,"abstract":"When implemented in a complex environment, wireless network security is the main factor, and it is the sensor networks’ primary concern. Cryptology is a vital component in wireless sensor networks to accomplish this. Many existing cryptographic techniques had not shown good and better results till now. An efficient, strong, triple phased, double secured, and integrated cryptographic approach has been introduced in this study that utilizes both secret-key and public-key methods. Rijndael Encryption Approach (REA), Horst Feistel’s Encryption Approach (HFEA), and enhanced Rivest-Shamir-Adleman (e- RSA) are employed in the propounded technique in various stages of the algorithm since secret-key based system offers a significant level of protection and enable key management through publickey based techniques. REA was used in stage 1 of the algorithm; REA+HFEA was used in stage 2, and REA+HFEA+e-RSA was used in the last stage, and all three stages were performed in parallel. Parameters like execution time and decryption time were taken into account for measuring the performance levels of the propounded approach. The propounded algorithm is differentiated from existing techniques using a single evaluation parameter i.e computation time. It is found that propounded approach gave a good performance in terms of computation time with an Average Encryption Time (AET) and Average Decryption Time (ADT) of 1.12 and 1.26 on text sizes of 6, 25, 35, 61, and 184MegaBytes (MB) respectively. The proposed hybrid model is 1.36 times faster than ECC+RSA+MD-5,3.25 times faster than AES+ECC, 2.7 times faster than AES+RSA, and 3.24 times faster than AES+ECC+RSA+MD5.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132950680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}