• Title/Summary/Keyword: Wireless Internet Device

Search Result 334, Processing Time 0.023 seconds

Low area field-programmable gate array implementation of PRESENT image encryption with key rotation and substitution

  • Parikibandla, Srikanth;Alluri, Sreenivas
    • ETRI Journal
    • /
    • v.43 no.6
    • /
    • pp.1113-1129
    • /
    • 2021
  • Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultralightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary-coded decimal-based key generation used in image encryption. The key rotation and substitution-based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field-programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture.

Design and Implementation of Customized Protocol and Smartphone App for the All-in-One Sensor Device

  • Bang, Jong-ho;Lee, Song-Yeon;Paik, Jong-Ho
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.19-26
    • /
    • 2018
  • Social issues for environmental pollution are continuously increasing globally. Especially, Users require services to measure environmental factors in indoor and outdoor and manage related data effectively and conveniently. According to this demand, sensors that can measure environmental factors in indoor and outdoor have been developed. However, since one sensor is composed of independent module, the interface of output data from each sensor is different. To solve the problem, we propose a customized protocol for low-power short-range wireless communication between smartphone using Bluetooth and All-in-One sensor device board and analyze the performance of the proposed customized protocol by developing program for performance verification of interface with user smartphone through Bluetooth. In addition, we implement a smartphone application using proposed protocol.

A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration (디바이스 센싱 단계의 IoT 네트워크 보안 기술 프레임워크 구성)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.35-41
    • /
    • 2015
  • Internet of Things has a wide range of vulnerabilities are exposed to information security threats. However, this does not deal with the basic solution, the vaccine does not secure encryption for the data transmission. The encryption and authentication message transmitted from one node to the construction of the secure wireless sensor networks is required. In order to satisfy the constraint, and security requirements of the sensor network, lightweight encryption and authentication technologies, the light key management technology for the sensor environment it is required. Mandatory sensor network security technology, privacy protection technology subchannel attack prevention, and technology. In order to establish a secure wireless sensor networks encrypt messages sent between the nodes and it is important to authenticate. Lightweight it shall apply the intrusion detection mechanism functions to securely detect the presence of the node on the network. From the sensor node is not involved will determine the authenticity of the terminal authentication technologies, there is a need for a system. Network security technology in an Internet environment objects is a technique for enhancing the security of communication channel between the devices and the sensor to be the center.

Design and Implementation of Resources Management System for Extension of outside Data Space in Mobile Device (모바일 디바이스에서 외부 데이터 영역의 확장을 위한 자원관리시스템의 설계 및 구현)

  • 나승원;오세만
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.2
    • /
    • pp.33-48
    • /
    • 2003
  • Wireless Internet, created through the merging of mobile communication with Internet technology, provides the advantage of mobility, but the restrictions of the mobile environment are deterring it from growing into a mass public service. Of the restricting factors of the wireless environment, narrow memory space creates the disadvantage of not being able to manage resources in mobile devices efficiently Because there is a limit to obtaining sufficient memory space from hardware made with consideration of portability, future devices will need to have a platform design with storage area extended from internal storage to external storage space. In this paper, we present a mobile agent that extends the memory space from only the inside of a mobile device to an external server making it possible to use data by on-line Run-time, and can also manage internal files efficiently. We have designed and implemented a RMS(Resources Management System) as a realization. Devices using the proposed RMS will be able to apply extended processes with the 'Mobile Space Extension' and will be benefited with optimal memory space through efficient internal file management.

  • PDF

The study of cash management system model using the RFID (RFID를 이용한 자산관리시스템 모델 연구)

  • Lee, Sun-Hyun;Kim, Min-Hong
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.8
    • /
    • pp.801-810
    • /
    • 2004
  • It is only 2 ~ 3 years in the interior to be introduced as a Ubiquitous era after going through mainframe, PC and internet era on account of the advent of computer. This thesis intends to present a model device of an epoch-making cash management system using the RFID(Radio Frequency Identification) Tag and EPC (Electronic Product Code) Platform which are core technologies of the Ubiquitous Computing on the assumption that cable and wireless internet is constructed in university. Also this sets up a purpose to minimize the administrative procedure as well as the waste of time, people and cost which are problems of the cash management system operating now. Therefore as a research project hereafter, it will be able to present an imporvement device about the problems which cannot solve these days through the model of the proposing cash management system when the standardization, normalization and commercialization of advanced IT department are accomplished.

  • PDF

Belongings Position Tracking System using RFID (RFID를 이용한 소지품 위치추적 시스템)

  • Kwun, Jungho;Kim, Jinsu;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.5
    • /
    • pp.75-81
    • /
    • 2012
  • RFID is new recognition technology which can trace IC chip(built in information) with wireless frequency. The present RFID is used in parcel service, missing child potection system, bus card, and extensive areas. This paper proposes and designs a belongings position tracking system using RFID with GPS. The main features of the proposed system are as follows. First, the system can in real time track the lost belongings. Second, the system can provide lost belonging location information to the users. The performance evaluation of the proposed system is performed by using AVD(Android Virture Device).

Coalition Formation Game Based Relay Selection and Frequency Sharing for Cooperative Relay Assisted Wireless D2D Networks with QoS Constraints

  • Niu, Jinxin;Tang, Wei;Guo, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5253-5270
    • /
    • 2016
  • With device-to-device (D2D) communications, an inactive user terminal can be utilized as a relay node to support multi-hop communication so that connective experience of the cell-edge user as well as the capacity of the whole system can be significantly improved. In this paper, we investigate the spectrum sharing for a cooperative relay assisted D2D communication underlying a cellular network. We formulate a joint relay selection and channel assignment problem to maximize the throughput of the system while guaranteeing the quality of service (QoS) requirements of cellular users (CUs) and D2D users (DUs). By exploiting coalition formation game theory, we propose two algorithms to solve the problem. The first algorithm is designed based on merge and split rules while the second one is developed based on single user's movement. Both of them are proved to be stable and convergent. Simulation results are presented to show the effectiveness of the proposed algorithms.

DLNA Protocol Inspection Tool for Compatibility Analysis

  • Park, Se-Ho;Park, Yong-Suk;Seo, Jeong-Wook;Choi, Jun-Rim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.2104-2117
    • /
    • 2014
  • The propagation of smart devices and the rapid expansion of wireless mobile networks have increased the need for ubiquitous device connectivity and contents access. DLNA is currently being used as the de facto standard for connectivity of consumer devices in the digital home. The guidelines provided by DLNA are intended to facilitate device and contents discovery, management, sharing and distribution. However, consumer experience with DLNA has been rather poor and usability not up to speed. Different problems and issues in limited compatibility have been reported due to manufacturer customizations. Such compatibility issues are often difficult to identify by average consumers who are not savvy in information communications and multimedia technology. In this paper, the design and implementation of a DLNA protocol inspection tool is presented for compatibility analysis among DLNA certified devices. The tool monitors the home network and performs analysis of the underlying protocols used by DLNA. The tool can be used for diagnostics and troubleshooting, enabling the user to identify compatibility issues between devices or problems in the network.

Method to specify Subsidiary Device Positioning for Sidelobe Distortion Suppression of Parabolic Antenna (파라볼라 안테나 부엽 왜곡 억제를 위한 부속 장치 위치 지정 방법)

  • Kim, Seungho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.49-53
    • /
    • 2018
  • Parabolic offset antenna is widely used for wireless communication system. The general structure of parabolic offset antenna system is composed of supporting stand and RF devices under parabolic reflector. However sidelobe distortion in gain pattern is occurred by supporting stand and RF devices. Depending on position of subsidiary devices, angle of sidelobe distortion can be changed. In this paper we describe method for sidelobe distortion suppression using raytracing. We calculate 3D vector for sidelobe distortion suppression zone by raytracing method and compare when subsidiary device is in sidelobe distortion suppression zone or not. By comparison, we show method for parabolic antenna sidelobe distortion suppression.

A Study of Selective Encryption for Images using Tree Structures (트리구조를 이용한 이미지의 선택적 암호화에 관한 연구)

  • Han, Myung-Mook;Kim, Geum-Sil
    • Journal of Internet Computing and Services
    • /
    • v.10 no.6
    • /
    • pp.219-228
    • /
    • 2009
  • The increased popularity of multimedia applications places a great demand on efficient data storage and transmission techniques. Some methods have been proposed to combine compression and encryption together to reduce the overall processing time, but they are either insecure or intensive computationally. specially, they are unsuitable to wireless communication of mobile device. We propose a novel solution called partial encryption, We introduce quadtree and zerotree wavelet image compression in this paper, it reduces computation for date transmission in mobile device, and does not reduce the compression rate. In conclusion, the proposed partial encryption schemes are fast, secure, and do not reduce the compression performance of underlying compression algorithm.

  • PDF