The Internet of Things (IoT) is considered the base factor, that helps in developing many sectors. Additionally, IoT provides novel applications and services, i.e. smart homes, connected cars, and industrial automatio...
详细信息
The trend of conducting property safety inspections is increasingly being recognized and adopted by governments and the public. In this research, a comparison of various supervised learning models based on Convolution...
详细信息
Industrial internet of things (IIoT) is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing andcommunicating real-time events in the industrial system to reduce the unn...
详细信息
Industrial internet of things (IIoT) is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing andcommunicating real-time events in the industrial system to reduce the unnecessary operational cost and enhance manufacturing and other industrial-relatedprocesses to attain more profits. However, such IoT based smart industriesneed internet connectivity and interoperability which makes them susceptibleto numerous cyber-attacks due to the scarcity of computational resourcesof IoT devices and communication over insecure wireless channels. Therefore, this necessitates the design of an efficient security mechanism for IIoTenvironment. In this paper, we propose a hyperelliptic curve cryptography(HECC) based IIoT Certificateless Signcryption (IIoT-CS) scheme, with theaim of improving security while lowering computational and communicationoverhead in IIoT environment. HECC with 80-bit smaller key and parameterssizes offers similar security as elliptic curve cryptography (ECC) with 160-bitlong key and parameters sizes. We assessed the IIoT-CS scheme security byapplying formal and informal security evaluation techniques. We used Realor Random (RoR) model and the widely used automated validation of internet security protocols and applications (AVISPA) simulation tool for formalsecurity analysis and proved that the IIoT-CS scheme provides resistance tovarious attacks. Our proposed IIoT-CS scheme is relatively less expensivecompared to the current state-of-the-art in terms of computational cost andcommunication overhead. Furthermore, the IIoT-CS scheme is 31.25% and 51.31% more efficient in computational cost and communication overhead,respectively, compared to the most recent protocol.
Developing ultra-low-power devices requires low-power components, algorithms, and communication protocols. For environmental monitoring along the supply chain, products may travel a long way from the distributor to th...
Developing ultra-low-power devices requires low-power components, algorithms, and communication protocols. For environmental monitoring along the supply chain, products may travel a long way from the distributor to the customer. In addition, extreme climatic circumstances, such as temperatures below 0°C, affect battery capacity. In order to monitor package’s environment, it is crucial to ensure that all embedded system parts use as little energy as possible. This paper addresses how much power the SPI and I2C communication protocols use. These protocols are widely used in low-power embedded devices for sensor communication. Based on its results, this research article presented recommendations for developing ultra-low power embedded devices that use the SPI/I2C protocol.
In recent times, the number of spam reviews through various online platforms has emerged as a prime challenge, profoundly impacting businesses and consumers. These fake reviews not only distort clients' perception...
详细信息
Innovative rehabilitation treatments are needed since stroke is a major cause of long-term impairment globally. In this paper, it presents a smart robotics-assisted rehabilitation system for stroke patients that uses ...
详细信息
This comprehensive article explores the integration of reconfigurable intelligent surfaces (RIS) with massive multiple input and multiple output (mMIMO) systems for future wireless networks, focusing on millimeter-wav...
详细信息
The rapid expansion of video content across a variety of industries, including social media, education, entertainment, and surveillance, has made video summarization an essential field of study. The current work is a ...
详细信息
Population clustering methods, which consider the position and fitness of individuals to form sub-populations in multi-population algorithms, have shown high efficiency in tracking the moving global optimum in dynamic...
详细信息
Voice synthesizers still present several challenges in the speech of mathematical content, as spoken mathematics has quite peculiar rules. In the synthesized speech, pauses help blind and visually impaired students id...
详细信息
暂无评论