The recent trend of integrating distributed generation (DG) units with distribution network has necessitated reformulation of conventional distribution load flow problem to incorporate the DG models. 3-phase distribut...
详细信息
In this paper, we present an application of a pole placement technique related to the stability analysis for a linear constrained system. In this regard some of the main approaches that have been used in the last deca...
详细信息
Interconnection networks have been extensively studied in the field of parallel computer systems. In the interconnection network, completely independent spanning tree (CIsts) plays an important role in the reliable tr...
详细信息
Internet-of-Things (IoT) began to be widely used in smart city, smart agriculture, and smart factories. However, security issues have always threatened the development of the IoT. Blockchain is the current promising t...
详细信息
ISBN:
(纸本)9789811527777;9789811527760
Internet-of-Things (IoT) began to be widely used in smart city, smart agriculture, and smart factories. However, security issues have always threatened the development of the IoT. Blockchain is the current promising technologies, which uses several security mechanisms to protect system. In this paper, we propose a security architecture for IoT based on blockchain. sensor data in IoT are collected by border-router, and is sent to blockchain network. The communication of IoT system is encrypted by AES algorithm. Smart contracts are used to build the access control mechanisms. Finally, theoretical analysis shows that the proposed architecture can secure against different attacks, as well as low latency.
When implemented in a complex environment, wireless network security is the main factor, and it is the sensor networks’ primary concern. Cryptology is a vital component in wireless sensor networks to accomplish this....
详细信息
ISBN:
(纸本)9781665429528
When implemented in a complex environment, wireless network security is the main factor, and it is the sensor networks’ primary concern. Cryptology is a vital component in wireless sensor networks to accomplish this. Many existing cryptographic techniques had not shown good and better results till now. An efficient, strong, triple phased, double secured, and integrated cryptographic approach has been introduced in this study that utilizes both secret-key and public-key methods. Rijndael Encryption Approach (REA), Horst Feistel’s Encryption Approach (HFEA), and enhanced Rivest-Shamir-Adleman (e- RSA) are employed in the propounded technique in various stages of the algorithm since secret-key based system offers a significant level of protection and enable key management through publickey based techniques. REA was used in stage 1 of the algorithm; REA+HFEA was used in stage 2, and REA+HFEA+e-RSA was used in the laststage, and all three stages were performed in parallel. Parameters like execution time and decryption time were taken into account for measuring the performance levels of the propounded approach. The propounded algorithm is differentiated from existing techniques using a single evaluation parameter i.e computation time. It is found that propounded approach gave a good performance in terms of computation time with an Average Encryption Time (AET) and Average Decryption Time (ADT) of 1.12 and 1.26 on text sizes of 6, 25, 35, 61, and 184MegaBytes (MB) respectively. The proposed hybrid model is 1.36 times faster than ECC+RSA+MD-5,3.25 times faster than AES+ECC, 2.7 times faster than AES+RSA, and 3.24 times faster than AES+ECC+RSA+MD5.
The development of a microcontroller-based data acquisition for the processing of the real-time data of a QCM sensor array-based E-Nose system and its output on a graphical user interface (GUI) has been discussed. The...
详细信息
Aiming at the need of online intelligent perception in substations, this paper designs and researches wireless sensor networks in substations. Apply the magnetic resonance wireless energy transmission technology, sele...
详细信息
Due to the wide application of signals with OFDM - modulation, security is becoming more and more important. In this paper, we propose a security method of masking digital messages in signals with OFDM-modulation by c...
详细信息
ISBN:
(纸本)9781665406833
Due to the wide application of signals with OFDM - modulation, security is becoming more and more important. In this paper, we propose a security method of masking digital messages in signals with OFDM-modulation by chaotic sequences formed with Chebyshev's polynomials of the 1-st kind of different orders. The evaluation of Independent and Identically distributed (IID) security (level of masking the signal to noise) of signals formed with the proposed method is passing over. Simulation results have shown that in comparison with systems that use harmonical signals with OFDM-modulation, chaotic signals with OFDM-modulation with signal constellation can ensure a higher level of IID-security. This has been confirmed by the computed values of Brock Dechert Scheinkman (BDS) statistics, the type of time realization, energy spectrum, and “shape” in the pseudo-phase space. The obtained results give grounds to claim that the application of the proposed method will allow providing the required level of IID-secrecy in systems with OFDM-modulation. Consequently, it can provide reliable data protection from unauthorized access, which is especially relevant for information telecommunication systems for special purposes.
暂无评论