105 research outputs found

    Cryptographic key distribution in wireless sensor networks: a hardware perspective

    Get PDF
    In this work the suitability of different methods of symmetric key distribution for application in wireless sensor networks are discussed. Each method is considered in terms of its security implications for the network. It is concluded that an asymmetric scheme is the optimum choice for key distribution. In particular, Identity-Based Cryptography (IBC) is proposed as the most suitable of the various asymmetric approaches. A protocol for key distribution using identity based Non-Interactive Key Distribution Scheme (NIKDS) and Identity-Based Signature (IBS) scheme is presented. The protocol is analysed on the ARM920T processor and measurements were taken for the run time and energy of its components parts. It was found that the Tate pairing component of the NIKDS consumes significants amounts of energy, and so it should be ported to hardware. An accelerator was implemented in 65nm Complementary Metal Oxide Silicon (CMOS) technology and area, timing and energy figures have been obtained for the design. Initial results indicate that a hardware implementation of IBC would meet the strict energy constraint of a wireless sensor network node

    An automated toll collection system

    Get PDF
    Capstone Project submitted to the Department of Engineering, Ashesi University in partial fulfillment of the requirements for the award of Bachelor of Science degree in Electrical and Electronic Engineering, April 2019An Automated toll collection system is the system that helps in eliminating the heavy traffic caused in the Metropolitan countries. It is one of the flexible methods used to manage the flow of traffic in big cities of today. An Automated toll collection system is proposed, and the RFID technology is used. It is an innovative method that uses electromagnetic waves to easily identify and track the tags that are attached to the windshield of the vehicle. The main focus of this project is to design a system that automatically identifies the unique tag number on the windshield of the vehicle and be able to deduct the money on the tag. When the transaction is done, the system must be able to send the message to owner of the vehicle to notify how the transaction happened and also be able to automatically open the gate for the vehicle to pass.Ashesi Universit

    Book of short Abstracts of the 11th International Symposium on Digital Earth

    Get PDF
    The Booklet is a collection of accepted short abstracts of the ISDE11 Symposium

    Institute for the Protection and Security of the Citizen annual report 2009. EUR 24293

    Get PDF

    The University of Iowa General Catalog 2016-17

    Get PDF
    • …
    corecore