105 research outputs found
Cryptographic key distribution in wireless sensor networks: a hardware perspective
In this work the suitability of different methods of symmetric key distribution for application in wireless sensor networks are discussed. Each method is considered in terms of its security implications for the network. It is concluded that an asymmetric scheme is the optimum choice for key distribution. In particular, Identity-Based Cryptography (IBC) is proposed as the most suitable of the various asymmetric approaches. A protocol for key distribution using identity based Non-Interactive Key Distribution Scheme (NIKDS) and Identity-Based Signature (IBS) scheme is presented. The protocol is analysed on the ARM920T processor and measurements were taken for the run time and energy of its components parts. It was found that the Tate pairing component of the NIKDS consumes significants amounts of energy, and so it should be ported to hardware. An accelerator was implemented in 65nm Complementary Metal Oxide Silicon (CMOS) technology and area, timing and energy figures have been obtained for the design. Initial results indicate that a hardware implementation of IBC would meet the strict energy constraint of a wireless sensor network node
An automated toll collection system
Capstone Project submitted to the Department of Engineering, Ashesi University in partial fulfillment of the requirements for the award of Bachelor of Science degree in Electrical and Electronic Engineering, April 2019An Automated toll collection system is the system that helps in eliminating the heavy traffic caused in the Metropolitan countries. It is one of the flexible methods used to manage the flow of traffic in big cities of today. An Automated toll collection system is proposed, and the RFID technology is used. It is an innovative method that uses electromagnetic waves to easily identify and track the tags that are attached to the windshield of the vehicle. The main focus of this project is to design a system that automatically identifies the unique tag number on the windshield of the vehicle and be able to deduct the money on the tag. When the transaction is done, the system must be able to send the message to owner of the vehicle to notify how the transaction happened and also be able to automatically open the gate for the vehicle to pass.Ashesi Universit
Book of short Abstracts of the 11th International Symposium on Digital Earth
The Booklet is a collection of accepted short abstracts of the ISDE11 Symposium
- …