17 research outputs found

    A robust authentication scheme for observing resources in the internet of things environment

    Full text link
    © 2014 IEEE. The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify themselves to the participating entities. This innovative concept enables a physical device to represent itself in the digital world. There are a lot of speculations and future forecasts about the Internet of Things devices. However, most of them are vendor specific and lack a unified standard, which renders their seamless integration and interoperable operations. Another major concern is the lack of security features in these devices and their corresponding products. Most of them are resource-starved and unable to support computationally complex and resource consuming secure algorithms. In this paper, we have proposed a lightweight mutual authentication scheme which validates the identities of the participating devices before engaging them in communication for the resource observation. Our scheme incurs less connection overhead and provides a robust defence solution to combat various types of attacks

    A Comparison between RISC and CISC Microprocessor Architectures

    Get PDF
    - In this paper, we have made a comparison between RISC (Reduced Instruction Set Computer) and CISC (Complex Instruction Set Computer.) RISC and CISC are two different types of microprocessor architectures. RISC is a computer microprocessor that uses simple instructions which can be divided into multiple instructions that performs low level operations within a single clock cycle while CISC is a PC processor which utilizes single direction to execute a few low level operations, for example, stacking from memory, a number juggling operation, and a memory store or are fit for multi-step operations or tending to modes inside single guideline. The principle distinction amongst RISC and CISC is in the quantity of figuring cycles each of their directions take. The distinction in the quantity of cycles depends on the intricacy and the objective of their directions

    Mobile Ad hoc Networks Challenges

    Get PDF
    Now adays Mobile Ad Hoc Networks are becoming a major immerging technology in mobile computing. In this paper we focus on the evolution of the MANET, the challenges in it and a wide area of its applications. In the first section we provide a brief information about the history and evolution of MANET , next to it we discuss the major challenges in Mobile Ad Hoc Networks and towards the end we mentioned some of the application of MANET

    An analyzing process on wireless protection criteria focusing on (WPA) within computer network security

    Get PDF
    Network security from a long ago approaches to cryptography and hash functions which are tremendous and due to the weakness of different vulnerabilities in the networks and obviously there is a significant need for analyzes. In this manuscript, the state-of-the-art wireless environment is focused solely on the sensor technology, in which security needs to be integrated with the Wireless Protected Access (WPA) standards. Wireless networking includes numerous points of view from wireless sensor systems, ad hoc mobile devices, Wi-Max and many more. The authentication and dynamic encryption is modified by system managers so that general communication can be anchored without any sniper effort in order to perform higher degrees of security and overall execution. The key exchange mechanism in wireless systems such as forward cases is accompanied by the sophisticated cryptography so as to anchor the whole computer state. The manuscript carries out a significant audit of test points of view using the methodologies used for the cryptography angle for protection and honesty in the wireless case, stressing Wi-Fi Secure Protected (WPA) needs

    An Overview of 4G LTE Technologies – A Top down Approach

    Get PDF
    4G LTE design began in 2000 and was first implemented in 2010.commercially in DLTE technology introduced December 2009 by teliasonerain Norway and Sweden came to the U.S. in 2010.Data rates and supportable bandwidths much higher in Forth generation and This has a significant in fact on voice. In cellular telecommunications, the term handover or handoff refers to the process of transferring an ongoing call or data session from one channel connected to the core network to another channel.In This paper we provide a comprehensive overview of Long Term Evolution network evolution.4G technologies are designed to provide IP-based voice, data and multimedia streaming at speeds of at least 100 Mbit per second and up to as fast as 1 Gbitper second

    An Overview of 5G Wireless Networks- Past, Present and Future

    Get PDF
    5G stands for fifth generation mobiles. Fromgeneration 1G to 2.5G and from 3G to 5G this world of telecommunication got improvement along with improve performance with every passing day. Due to this rapid improvement the world become like a little village where we can interact, work, learn and spread our knowledge etc. over the world. This improvement makes our daily life so much easy.By 2020 all networks will support voice, videoand a complex range of communication services for more 9 billion users and billions of connected Around the same time the next generation 5G of telecom technology, equipment and devices will become commercially available.It is the next generation of telecom networks designed to meet a more advanced and complex set of performance requirement. It represents new way of thinking. The main purpose of 5G networks is that, user can simultaneously connect to multiple wireless technologies and can switch between them.5G will offer the service like Documentations, Supporting electronic transmissions such as e-payment-transaction

    The Evolution of Microprocessor Chip: A historic overview of development

    Get PDF
    In this paper we aredescribing the more interesting segments like, external structure of microprocessor chip(the birth of microprocessor) from silicon element becausemost of IT student does not have knowledge about the external structure. Also this paper presentsthe conventional silicon based computing technology for manufacturing of microprocessors but as we know that siliconreached to its upper limit of physical design therefore we also discussed the alternative of silicon in the future to makeprocessor more efficient with changing technology

    Internet of Things (IoTs): Applications in Home Automation

    Get PDF
    Over the last decade in the field of science & technology, the internet has made significant impact in our economies & societies by bringing in remarkable communication & networking infrastructure. In continuation with this pattern, it is ready to develop as a "Web of Things (IoTs)" where the web will give a medium to physical world articles to take an interest in cooperation. Along these lines the computerized data innovation can incorporate the physical world to the online world, to give a typical cooperation stage. The Internet of Things (IoTs) portrays an overall system of intercommunicating gadgets.   It coordinates the worldwide correspondences, general figuring, and likewise the surrounding knowledge. Now, (IoTs) must be viewed as a dream where "things", particularly regular items, for example, almost all home machines additionally furniture, garments, vehicles, streets and shrewd materials, and more, are intelligible, conspicuous, locatable, addressable or controllable through the Internet. This will provide the basis for many new applications, such as energy monitoring, transport safety systems or building security. This vision will surely change with the passage of time, especially as collaborations between Identification Technologies, Wireless Sensor Networks, Intelligent Devices & Nano-technology will enable a number of advanced applications.   The innovative use of technologies is contributing to create a value proposition for Internet of Things stakeholders.We have successfully developed an IoTs system section of home automation applications for automating the AC appliances to be used at domestic level. This type of automation uses wireless communication between user & as well as devices to be used. The main back-end principle behind the communication established between all the devices is of serial type. Here we have also adjusted the developed system in such a way to operate manually the similar appliances, connected with it. It is advantageous in system’s faulty situations & also for new users/guests
    corecore