Pub Date : 2017-03-23DOI: 10.1109/ICNETS2.2017.8067916
S. Elakshumi, A. Ponraj
The electricity demand is increasing with the growth of population and with the use of different appliances in the households. So, there is a need for consumers to track their daily usage and understand the consumption patterns to save and control these resources. Smart meter along with Advanced Metering Infrastructure(AMI) is a pragmatic and efficient solution for this. Earlier procedure which put to profitable use of one-way communications to gather meter data, were mentioned to as Automated Meter Reading (AMR)Systems. This paper aims at analysing the performance of the proposed smart meter systems, efficient transmission and how utilities explore new developments for the benefit of consumers as well as themselves by remotely monitoring energy consumption. The methodology followed to analyze the outcome is Power Line Communication(PLC), which is an arrangement to pass on data on an electrical conductor used for transmitting electric power from high voltage transmission lines to lower voltage lines used inside the buildings. This is achieved by using PLC modems for remote monitoring and control of energy meters. By this way we can bring down human efforts needed to outline meter readings which are till now recorded by visiting every home individually. As a result, the consumption patterns at the utilities are studies and load analysis is made so that this can help in maintaining other systems associated with energy management. To study and analyze the load consumption patterns, simulations were carried out in MATLAB. By this way an estimate on the energy consumption can be made and thus have a control on its usage.
{"title":"A server based load analysis of smart meter systems","authors":"S. Elakshumi, A. Ponraj","doi":"10.1109/ICNETS2.2017.8067916","DOIUrl":"https://doi.org/10.1109/ICNETS2.2017.8067916","url":null,"abstract":"The electricity demand is increasing with the growth of population and with the use of different appliances in the households. So, there is a need for consumers to track their daily usage and understand the consumption patterns to save and control these resources. Smart meter along with Advanced Metering Infrastructure(AMI) is a pragmatic and efficient solution for this. Earlier procedure which put to profitable use of one-way communications to gather meter data, were mentioned to as Automated Meter Reading (AMR)Systems. This paper aims at analysing the performance of the proposed smart meter systems, efficient transmission and how utilities explore new developments for the benefit of consumers as well as themselves by remotely monitoring energy consumption. The methodology followed to analyze the outcome is Power Line Communication(PLC), which is an arrangement to pass on data on an electrical conductor used for transmitting electric power from high voltage transmission lines to lower voltage lines used inside the buildings. This is achieved by using PLC modems for remote monitoring and control of energy meters. By this way we can bring down human efforts needed to outline meter readings which are till now recorded by visiting every home individually. As a result, the consumption patterns at the utilities are studies and load analysis is made so that this can help in maintaining other systems associated with energy management. To study and analyze the load consumption patterns, simulations were carried out in MATLAB. By this way an estimate on the energy consumption can be made and thus have a control on its usage.","PeriodicalId":413865,"journal":{"name":"2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131166988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-23DOI: 10.1109/ICNETS2.2017.8067895
A. Prakash, M. Jagannath, K. Adalarasu, G. M. Babu
This paper proposes the method of vehicle license plate recognition, which is essential in the field of intelligent transportation system. The purpose of the study is to present a simple and effective vehicle license plate detection and recognition using non-bling image de-blurring algorithm. The sharpness of the edges in an image is restored by the prior information on images. The blue kernel is free of noise while using the non-blind image de-blurring algorithm. This non-blind image de-blurring (NBID) algorithm is involved in the process of removing the optimization difficulties with respect to unknown image and unknown blur. Estimation is carried out for the length of the motion kernel with Radon transform in Fourier domain. The proposed algorithm was tested on different vehicle images and achieved satisfactory results in license plate detection. The experimental results deal with the efficiency and robustness of the proposed algorithm in both synthesized and real images.
{"title":"Vehicle license plate detection and recognition using non-blind image de-blurring algorithm","authors":"A. Prakash, M. Jagannath, K. Adalarasu, G. M. Babu","doi":"10.1109/ICNETS2.2017.8067895","DOIUrl":"https://doi.org/10.1109/ICNETS2.2017.8067895","url":null,"abstract":"This paper proposes the method of vehicle license plate recognition, which is essential in the field of intelligent transportation system. The purpose of the study is to present a simple and effective vehicle license plate detection and recognition using non-bling image de-blurring algorithm. The sharpness of the edges in an image is restored by the prior information on images. The blue kernel is free of noise while using the non-blind image de-blurring algorithm. This non-blind image de-blurring (NBID) algorithm is involved in the process of removing the optimization difficulties with respect to unknown image and unknown blur. Estimation is carried out for the length of the motion kernel with Radon transform in Fourier domain. The proposed algorithm was tested on different vehicle images and achieved satisfactory results in license plate detection. The experimental results deal with the efficiency and robustness of the proposed algorithm in both synthesized and real images.","PeriodicalId":413865,"journal":{"name":"2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121994616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-23DOI: 10.1109/ICNETS2.2017.8067903
K. Kumaran, G. A. Bhanumithra, R. Rathi, M. M. Priya
The objective of this paper is to reduce the propagation time of carry skip adder(CSA) and also minimize the area by using MUX based full adder (MBFA-10T). The efficiency of the CSA has been improved by replacing the full adders with MUX based full adder circuit. Using this approach the delay, number of required transistors and the area has been diminished while comparing it to the existing one. The results are obtained after design, simulation and timing analysis was done using SPICE tool. From the results it shows that the transistors used in MBFA is only ten, which is less than that of the CMOS Full Adder (FA).
{"title":"Enhancing the efficiency of carry skip adder using MBFA-10T","authors":"K. Kumaran, G. A. Bhanumithra, R. Rathi, M. M. Priya","doi":"10.1109/ICNETS2.2017.8067903","DOIUrl":"https://doi.org/10.1109/ICNETS2.2017.8067903","url":null,"abstract":"The objective of this paper is to reduce the propagation time of carry skip adder(CSA) and also minimize the area by using MUX based full adder (MBFA-10T). The efficiency of the CSA has been improved by replacing the full adders with MUX based full adder circuit. Using this approach the delay, number of required transistors and the area has been diminished while comparing it to the existing one. The results are obtained after design, simulation and timing analysis was done using SPICE tool. From the results it shows that the transistors used in MBFA is only ten, which is less than that of the CMOS Full Adder (FA).","PeriodicalId":413865,"journal":{"name":"2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123222423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-23DOI: 10.1109/ICNETS2.2017.8067896
K. Induja, A. J. Deva Krupa
In this work, we concentrate on network which is not able communicate with the sensors due to fail in the sensing process due to the temporary links of clutter with the access point. The novelty of the work is mainly divided into two folds mainly i)to know the connectivity problems and its requirements in the relay networks, ii) to restore the connection problems on the sensor nodes and to recover the loss of information occurred in the connectivity obstructions. we propose the LAL protocol which automatically senses the failure location of the sensor nodes and backs up with the backup sensor node in a ad-hoc mobile environment. In this paper, mainly we concentrate on the existing protocol neighbor-assisted connectivity recovery protocol (NACRP), and the LAL protocol adding the backup sensors for both the protocols and comparing the different parameters for the better performance.
{"title":"A connectivity protocol for star topology using wireless sensor network","authors":"K. Induja, A. J. Deva Krupa","doi":"10.1109/ICNETS2.2017.8067896","DOIUrl":"https://doi.org/10.1109/ICNETS2.2017.8067896","url":null,"abstract":"In this work, we concentrate on network which is not able communicate with the sensors due to fail in the sensing process due to the temporary links of clutter with the access point. The novelty of the work is mainly divided into two folds mainly i)to know the connectivity problems and its requirements in the relay networks, ii) to restore the connection problems on the sensor nodes and to recover the loss of information occurred in the connectivity obstructions. we propose the LAL protocol which automatically senses the failure location of the sensor nodes and backs up with the backup sensor node in a ad-hoc mobile environment. In this paper, mainly we concentrate on the existing protocol neighbor-assisted connectivity recovery protocol (NACRP), and the LAL protocol adding the backup sensors for both the protocols and comparing the different parameters for the better performance.","PeriodicalId":413865,"journal":{"name":"2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122945680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-23DOI: 10.1109/ICNETS2.2017.8067892
S. Narendran, J. Selvakumar
This paper gives a newfangled dimension to superconducting logic which is the successor of CMOS logic and other superconducting quantum logic. Reciprocal Quantum logic (RQL) is proposed to achieve the less memory capability. RQL is a modified version of Rapid Single Flux Quantum (RSFQ). We designed and analyzed different RQL logic like half adder, full adder, counter, and Carry Save Adder (CSA) and we achieved an increase in clock speed compared to RSFQ logic by 20%. The designs are made of AndOr and AnotB gate operation and analyzed using WRSPICE software.
{"title":"Quantum computation based on Reciprocal Quantum logic","authors":"S. Narendran, J. Selvakumar","doi":"10.1109/ICNETS2.2017.8067892","DOIUrl":"https://doi.org/10.1109/ICNETS2.2017.8067892","url":null,"abstract":"This paper gives a newfangled dimension to superconducting logic which is the successor of CMOS logic and other superconducting quantum logic. Reciprocal Quantum logic (RQL) is proposed to achieve the less memory capability. RQL is a modified version of Rapid Single Flux Quantum (RSFQ). We designed and analyzed different RQL logic like half adder, full adder, counter, and Carry Save Adder (CSA) and we achieved an increase in clock speed compared to RSFQ logic by 20%. The designs are made of AndOr and AnotB gate operation and analyzed using WRSPICE software.","PeriodicalId":413865,"journal":{"name":"2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132368742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-23DOI: 10.1109/ICNETS2.2017.8067943
Chanda Rajurkar, S. Prabaharan, S. Muthulakshmi
Objectives: This project focuses on monitoring of use of water, consider, by one block of house in a flat system, where at the partition of pipeline from where the water gets diverted to various part of a block. Methods/Statistical analysis: Water places a vital role for living beings in their day to day lives. The earth's 71% is covered by water is a ubiquitous fact. Among which Oceans has approximately 96.50% and 3% is considered to be freshwater, again out of which only 0.08% is accessible direct to human use and rest is preserved in tundra regions and in different form on and in the earth surface which is very difficult to abstract for the human purposes. From this it states that only 0.08% is available as fresh water for human being to make use for drinking, domestic purposes, sanitation, manufacturing, leisure, agriculture etc which gets recharged by rain and snowfall 1. Findings: According to scientists and organizations as IPCC (Intergovernmental Panel on Climate Change), state has come, since a long time, where water management as such implies to maximizing use of water and minimizing the wastage of water and thus preventing the domino effect cycle arises as wastage of water. The sensors will sense the flow of water to each pipe which ultimately tells the usage of water at one block ideally. This water usage data would be sent to cloud using the IOT (Internet of things) space. This cloud data would be sent to the concern resident's person's mobile app (application) reporting the water used and alerting the user to limit the water use if it gets extended to the limit usage set by municipal government or corporation. If the limit gets extended the user have to pay accordingly. This will be real time operation. The objective of doing so is for limiting and minimizing the usage of water for an average of per person. And secondly, the cloud data will be used as statistic data for use of water at every seasons that is winter, summer and monsoon so that measuring steps for water management can be taken with the appropriate statistics, yielding an avenue for predictive measure. Improvements/Applications: To appraise the IOT based water management, it can be ramified as diligent, frugal for water management in a symbiotic parity way, which will constrict the water resource evenly according to the in situ factors.
{"title":"IoT based water management","authors":"Chanda Rajurkar, S. Prabaharan, S. Muthulakshmi","doi":"10.1109/ICNETS2.2017.8067943","DOIUrl":"https://doi.org/10.1109/ICNETS2.2017.8067943","url":null,"abstract":"Objectives: This project focuses on monitoring of use of water, consider, by one block of house in a flat system, where at the partition of pipeline from where the water gets diverted to various part of a block. Methods/Statistical analysis: Water places a vital role for living beings in their day to day lives. The earth's 71% is covered by water is a ubiquitous fact. Among which Oceans has approximately 96.50% and 3% is considered to be freshwater, again out of which only 0.08% is accessible direct to human use and rest is preserved in tundra regions and in different form on and in the earth surface which is very difficult to abstract for the human purposes. From this it states that only 0.08% is available as fresh water for human being to make use for drinking, domestic purposes, sanitation, manufacturing, leisure, agriculture etc which gets recharged by rain and snowfall 1. Findings: According to scientists and organizations as IPCC (Intergovernmental Panel on Climate Change), state has come, since a long time, where water management as such implies to maximizing use of water and minimizing the wastage of water and thus preventing the domino effect cycle arises as wastage of water. The sensors will sense the flow of water to each pipe which ultimately tells the usage of water at one block ideally. This water usage data would be sent to cloud using the IOT (Internet of things) space. This cloud data would be sent to the concern resident's person's mobile app (application) reporting the water used and alerting the user to limit the water use if it gets extended to the limit usage set by municipal government or corporation. If the limit gets extended the user have to pay accordingly. This will be real time operation. The objective of doing so is for limiting and minimizing the usage of water for an average of per person. And secondly, the cloud data will be used as statistic data for use of water at every seasons that is winter, summer and monsoon so that measuring steps for water management can be taken with the appropriate statistics, yielding an avenue for predictive measure. Improvements/Applications: To appraise the IOT based water management, it can be ramified as diligent, frugal for water management in a symbiotic parity way, which will constrict the water resource evenly according to the in situ factors.","PeriodicalId":413865,"journal":{"name":"2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132862693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-23DOI: 10.1109/ICNETS2.2017.8067899
Shubhrasmita Mandal, Sabitha Gauni
Multi input multi output (MIMO) has become a promising technique for 5th generation cellular network. By significantly increasing the number of antennas at the Base Station (BS) Massive MIMO can support very high spectral efficiency with linear transceivers. Energy efficiency is one of the critical design goal for 5G network. The aim of this paper is to analyze the energy efficiency of single cell and multi cell Massive MIMO, where transmit and circuit power consumption, training overhead, channel estimation, pilot contamination and decontamination is taken into account. Maximal energy efficiency for the system is obtained by using Maximum Ratio Transmission (MRT) for given number of antennas and users by optimizing the transmit power. A multi cell Massive MIMO suffers from pilot contamination due to unavoidable reuse of pilots in adjacent cells. Pilot contamination causes inter cell interferences, which grows as the number of Base Station (BS) antennas increases and damages the system performance.
{"title":"Energy efficiency of single cell and multi cell Massive MIMO system MMSE estimation","authors":"Shubhrasmita Mandal, Sabitha Gauni","doi":"10.1109/ICNETS2.2017.8067899","DOIUrl":"https://doi.org/10.1109/ICNETS2.2017.8067899","url":null,"abstract":"Multi input multi output (MIMO) has become a promising technique for 5th generation cellular network. By significantly increasing the number of antennas at the Base Station (BS) Massive MIMO can support very high spectral efficiency with linear transceivers. Energy efficiency is one of the critical design goal for 5G network. The aim of this paper is to analyze the energy efficiency of single cell and multi cell Massive MIMO, where transmit and circuit power consumption, training overhead, channel estimation, pilot contamination and decontamination is taken into account. Maximal energy efficiency for the system is obtained by using Maximum Ratio Transmission (MRT) for given number of antennas and users by optimizing the transmit power. A multi cell Massive MIMO suffers from pilot contamination due to unavoidable reuse of pilots in adjacent cells. Pilot contamination causes inter cell interferences, which grows as the number of Base Station (BS) antennas increases and damages the system performance.","PeriodicalId":413865,"journal":{"name":"2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123424390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-23DOI: 10.1109/ICNETS2.2017.8067894
M. Suguna, R. Anusia, S. Shalinie, S. Deepti
Mobile cloud computing (MCC) is a platform that allows mobile users to offload the computationally rigorous and storage demanding tasks on available cloud resources using wireless access. The major concern with MCC is the privacy of data. Mobile users give confidential information through the network, that if not safeguarded may lead to security issues. Identity Management (IDM) is the management of user identities, their authentication, and authorization in the cloud environment. The existing Consolidated Identity Management (CIDM) overcomes the network traffic interception in the traditional IDM but is prone to Identity theft in case of Identity Management Server (IDMS) compromise. This work is focused on the development of a Secure Identity Management (SIDM) that alleviates the attacks in the CIDM by using techniques that strengthens the authentication process and identity privacy. A secure IDM is developed using two-step authentication process which involves Zero Knowledge Proof (ZKP) and token verification. The proposed SIDM model reduces the consequences of Identity server compromise attack. There is a marginal increase in the communication overhead of SIDM compared to that of CIDM but it can be compromised to realize the benefits of identity privacy. The analysis of the experimental results shows that there is an overall increase of thirty percent in communication overhead when compared to CIDM.
{"title":"Secure identity management in mobile cloud computing","authors":"M. Suguna, R. Anusia, S. Shalinie, S. Deepti","doi":"10.1109/ICNETS2.2017.8067894","DOIUrl":"https://doi.org/10.1109/ICNETS2.2017.8067894","url":null,"abstract":"Mobile cloud computing (MCC) is a platform that allows mobile users to offload the computationally rigorous and storage demanding tasks on available cloud resources using wireless access. The major concern with MCC is the privacy of data. Mobile users give confidential information through the network, that if not safeguarded may lead to security issues. Identity Management (IDM) is the management of user identities, their authentication, and authorization in the cloud environment. The existing Consolidated Identity Management (CIDM) overcomes the network traffic interception in the traditional IDM but is prone to Identity theft in case of Identity Management Server (IDMS) compromise. This work is focused on the development of a Secure Identity Management (SIDM) that alleviates the attacks in the CIDM by using techniques that strengthens the authentication process and identity privacy. A secure IDM is developed using two-step authentication process which involves Zero Knowledge Proof (ZKP) and token verification. The proposed SIDM model reduces the consequences of Identity server compromise attack. There is a marginal increase in the communication overhead of SIDM compared to that of CIDM but it can be compromised to realize the benefits of identity privacy. The analysis of the experimental results shows that there is an overall increase of thirty percent in communication overhead when compared to CIDM.","PeriodicalId":413865,"journal":{"name":"2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117154278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-23DOI: 10.1109/ICNETS2.2017.8067900
Snehal Deshmukh, S. Sonavane
Internet of Things (IoT) is made up of various technologies, which supports advanced services in various application domains. Security and privacy are a very important aspect for IoT application domains. These applications require data confidentiality, authenticity, integrity and access control within the IoT network. For users and things, security is achieved by enforcing the security and privacy policies. Due to the different standards and communication stacks involved in traditional security solutions, it cannot be directly applied to IoT technologies. In IoT number of interconnected devices is expected to increase tremendously hence scalability is the biggest challenge for IoT development. This survey paper presents the available security protocols at respective IoT layers. A comparison of this information is done with respective to various security aspects and research gaps are identified.
物联网(Internet of Things, IoT)由多种技术组成,支持各种应用领域的高级服务。安全和隐私是物联网应用领域非常重要的方面。这些应用需要物联网网络中的数据保密性、真实性、完整性和访问控制。对于用户和事物,安全性是通过执行安全和隐私策略来实现的。由于传统安全解决方案涉及的标准和通信栈不同,无法直接应用于物联网技术。在物联网中,互联设备的数量预计将大幅增加,因此可扩展性是物联网发展的最大挑战。本调查报告介绍了各物联网层可用的安全协议。将这些信息与各个安全方面进行比较,并确定研究差距。
{"title":"Security protocols for Internet of Things: A survey","authors":"Snehal Deshmukh, S. Sonavane","doi":"10.1109/ICNETS2.2017.8067900","DOIUrl":"https://doi.org/10.1109/ICNETS2.2017.8067900","url":null,"abstract":"Internet of Things (IoT) is made up of various technologies, which supports advanced services in various application domains. Security and privacy are a very important aspect for IoT application domains. These applications require data confidentiality, authenticity, integrity and access control within the IoT network. For users and things, security is achieved by enforcing the security and privacy policies. Due to the different standards and communication stacks involved in traditional security solutions, it cannot be directly applied to IoT technologies. In IoT number of interconnected devices is expected to increase tremendously hence scalability is the biggest challenge for IoT development. This survey paper presents the available security protocols at respective IoT layers. A comparison of this information is done with respective to various security aspects and research gaps are identified.","PeriodicalId":413865,"journal":{"name":"2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114309381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-23DOI: 10.1109/ICNETS2.2017.8067893
S. Sabu, S. Renimol, D. Abhiram, B. Premlet
As the world is getting more connected through cell phones, Cellular Signal Strength metrics demand more attention as parameters linked to everyday life. This paper focuses on the effects of temperature on cellular signal strength quality. In telecommunications, Received Signal Strength Indicator (RSSI) is a measure of the power present in a received radio signal. This work looks into the variation of RSSI values over temperature and its effects on cellular communication networks. The study on the effect of temperature on RSSI is performed by measuring the temperature and signal strength over a region simultaneously. Signal strength values is collected using Android Packaging Index (API) of Android smartphones and temperature using a custom made weather station.
{"title":"A study on the effect of temperature on cellular signal strength quality","authors":"S. Sabu, S. Renimol, D. Abhiram, B. Premlet","doi":"10.1109/ICNETS2.2017.8067893","DOIUrl":"https://doi.org/10.1109/ICNETS2.2017.8067893","url":null,"abstract":"As the world is getting more connected through cell phones, Cellular Signal Strength metrics demand more attention as parameters linked to everyday life. This paper focuses on the effects of temperature on cellular signal strength quality. In telecommunications, Received Signal Strength Indicator (RSSI) is a measure of the power present in a received radio signal. This work looks into the variation of RSSI values over temperature and its effects on cellular communication networks. The study on the effect of temperature on RSSI is performed by measuring the temperature and signal strength over a region simultaneously. Signal strength values is collected using Android Packaging Index (API) of Android smartphones and temperature using a custom made weather station.","PeriodicalId":413865,"journal":{"name":"2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127775479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}