1. INTRODUCTION. Keywords SMS, GSM network, electrical device, encryption, control.
|
|
|
- Angelica Cook
- 10 years ago
- Views:
Transcription
1 Secure Control of Remote Electrical Devices Using Mobile SMS Services Kishor T. Mane 1, G.A. Patil 2 1. Asst. Professor, 2. Head and Asst. Professor D. Y. Patil college of Engg. & Tech. Kolhapur, Maharashtra, India 1. [email protected], 2. [email protected] Abstract In this paper an attempt is made to extend the capability of mobile phones for secure control of remote electrical devices using SMS services. The transmission of SMS in GSM network is not secure. It only provides the encryption between Mobile Station to Base Station Controller. The message transmitted between GSM operator networks is not encrypted and hence is not safe. Mobile SMS service has been used for control purposes in various applications; but the control operations seem not to be secured. Therefore, it is desirable to secure SMS by adding suitable cryptographic algorithm so as to perform operations securely on certain crucial remote devices. In this system blowfish algorithm has been enhanced for its suitability to increase the security on the parameters like Avalanche effect, GA, key-size, and others. The results obtained are far better in above terms. Keywords SMS, GSM network, electrical device, encryption, control. 1. INTRODUCTION Today, mobile phones are integral part of our daily lives. Due to widespread growth of wireless network and drastic reduction in call rates and handset cost, the mobile usage has percolated to all sections of the society from business magnets to skilled laborers like carpenters, masons and even dabbawalas. Millions of people all over the world are familiar with the way of usage of mobile and their services provided like music tones, capture and send images, MMS, MP3 player, Internet browsing, downloading songs, etc. Many systems have been developed to control and operate home appliances using wireless technology. Also, systems to control remote devices exists in many specific areas like chemical industries, satellite communication systems, etc. However, this paper highlights on controlling electrical devices through the most common mechanism of SMS services provided by mobile technology, that too in a secured way. Sending SMS over the GSM network is not secure because GSM network does not provide end-to-end encryption. The encryption is provided only between the Mobile Station and Base Transceiver Station (BTS) using the A5 algorithm. The SMS message that traverses in between the operator networks is in plaintext format. If the attacker gets an access to the BTS or other parts of GSM network, then it is easy for tapping. Since the SMS messages stored on MSC (Mobile Switching Center) are in plaintext format, operator can always read all sent messages. The attacker can tap a message and also send fake SMS. Nowadays one can send SMS with arbitrary phone number of sender. It is possible to prepay this service on certain websites [8]. To avoid this, the additional facility of encrypting the message is desired to provide end-to-end security. The system developed to provide end-to-end message encryption can be used not only for controlling electrical devices but, can be applied to other common applications which are based on message transfers using mobile SMS services. It also provides authentication and secure message transfer between two wireless endpoints. 40
2 2. LITERATURE REVIEW In the past, different systems have been designed for controlling electrical devices. A system for controlling the devices especially for blind or handicapped people exists [1]. The algorithm is developed to generate text message from spoken commands of user by extracting features like cepstal coefficient, short-time energy and zero-crossing rates. A multi-layer feed-forward neural network is used for recognition of suitable words. The derived text message is then sent as SMS to the mobile connected to the control system through PC. On receiving SMS, the system responds by activating appropriate ports. But, the limitation of this system is that it cannot be controlled from remote places. An Internet application has been developed that allows local, remote monitoring and control of home appliances [2]. A fast and secure algorithm designed and proposed by Paul A. J. et. al. [6], use symmetric key algorithm which operates on block of size 128 bits and key size 128 bits. The limitations of existing systems used for control purposes are as under: a) Devices cannot be controlled from remote location. b) Insecure GSM network. c) Requirement of PC for sender to convert voice to text [1]. d) Systems are for specific purposes. e) Cost involved in such systems is high. Present work overcomes some of the above limitations. Blowfish algorithm has been used in many commercial applications for security purposes due to its more promising features like memory size, variable key-size and its robustness. However, Brute-force attack has been tried till 4-rounds of Blowfish algorithm. Therefore, there is a need to enhance the complexity where the present work emphasizes on. 3. SYSTEM ARCHITECTURE Fig.1 Architecture of proposed system 41
3 The layout of the system is as depicted in fig. 1 which conveys the mechanism of sending messages from a sender mobile handset for the purpose of performing control operation of the electrical device at a remote place. The operations are performed in a more secured way. The receiver is a GSM modem or GSM enabled mobile phone which is connected to the electrical device through a computer system and micro-controller based hardware. The security to the messages passing through the network operators between the sender and the receiver mobile devices is provided by developing enhanced version of Blowfish algorithm. Presently, emphasis is given on relay based control operations in a more secured way. The objectives behind this research work are 1. Provide end-to-end security over GSM network. 2. Utilize messaging service for important applications like control purposes etc. 3. Enhance the blowfish algorithm to provide better security and its use for many common purpose commercial applications. 4. Design microcontroller based hardware to apply all the above techniques and control the electrical devices connected there-on. 5. Analyze the performance of Blowfish and modified version of Blowfish algorithms on the parameters like block size, key size, memory size, Avalanche effect, GA and others. 4. MODIFIED BLOWFISH ALGORITHM Although the fast and secure encryption algorithm [6] and blowfish algorithm [7] are implemented for mobile device applications, they do have certain limitations and brute-force attack have been attempted. However, the combination of these two algorithms serves this purpose in better way. The techniques like substitution mapping, transposition, translation and Feistel networks make the cryptanalysis difficult by brute-force method. The modified blowfish algorithm has the block size of 128-bits and key size of 128-bits and it occupies 6.1 KB space which helps in embedding this mechanism in any handheld devices for secured message transfer. Fig. 2 depicts the mechanism of modified blowfish algorithm. 42
4 Fig. 2 Modified blowfish algorithm The terminologies used mean the following: L i Left 64-bits of i th round. R i Right 64-bits of i th round F Feistel function T Transposition K ts_i Key for translation of i th round. K tp_ij Key for transposition of i th round - XOR operation 4.1 Encryption steps i) Initialize matrix with given key and calculate various sub keys. ii) Perform forward mapping [6]. iii) For 1-16 stages of encryption: R i = L i-1 P i K ts_i L i = T(R i-1 ) F(R i ) 4.2 Decryption steps 43
5 i) Perform XOR using P i+1 and P i+2. ii) For 1-16 stages apply key in reverse order: L i-1 = R i P i K ts_i T(R i-1 ) = L i F(R i ) R i-1 = T -1 (L i F F(R i )) iii) Perform reverse mapping [6]. The J2ME wireless toolkit is used to provide GUI for user to choose the control operation of specific remote device, encrypt the user enforced information and send the message to the remote GSM modem enabled mobile device. At the receiver end, the Java packages like SMSLib, Comm are used and necessary initialization of communication with GSM device, decryption of message received, communicating with serial port of the computer system is done. 5. MICROCONTROLLER HARDWARE The interfacing hardware required to operate electrical devices connected to the computer system through serial ports has been designed using 89C51 microcontroller. Fig. 3 and fig. 4 show the required circuit diagrams. The functioning of the 89C51 micro-controller is to decode the bit stream coming from serial port of the computer system and send the signals to the relay circuit to control the appropriate devices connected to the relays. The code written in assembly language performs the operations of initializing communication port between the PC and microcontroller. The tools used for the purpose are Keil µvision4, universal programmer and XACCESS. 44
6 Fig. 3 Circuit diagram of CPU board in hardware 45
7 Fig. 4 Relay Driver Circuit 6. EXPERIMENTAL RESULTS The executable version of Modified Blowfish algorithm has been embedded on mobile phone. Varieties of messages were tested for encryption, decryption and control of appropriate relays to which electrical devices are connected. The implementation of Blowfish algorithm and Modified Blowfish algorithm has been tested on the following parameters: i) Time for encryption and decryption ii) Throughput iii) Guaranteed Avalanche effect iv) Memory size required to store the executable version of the algorithm. The throughput of encryption algorithm is calculated as the total plaintext in bytes divided by the time taken for encryption [4][5]. The Guaranteed avalanche effect is of order π. The comparison of both the algorithms is shown in table 1. Table 1 Parameters Modified Blowfish Algorithm Blowfish Algorithm Block size 128-bits 64-bits Key size 128-bits 128- bits 46
8 Techniques Feistel function, Substitution, Transposition, Translation Feistel function Total time ms ms Throughput bytes/sec bytes/sec Guaranteed Order=3 Order=1 Avalanche Memory size 6.5 KB 5.3 KB The table 1 shows that by having appropriate tradeoff amongst the parameters, the security is enhanced by looking at the guaranteed avalanche of the algorithms. The fig. 5 and fig. 6 show the avalanche effect of Blowfish algorithm and Modified Blowfish algorithm respectively plaintext Key plaintext Key Fig. 5 Avalanche effect of Blowfish algorithm Fig. 6 Avalanche effect of Modified Blowfish algorithm 7. CONCLUSION There has been tremendous rise in number of mobile users in the world as it provides lots of services. Hence the aim of developing new secured and authenticated system which can control the electrical devices from remote locations using mobile SMS services has been achieved. An 89C51 micro-controller was designed and programmed with the help of Universal programmer. The Modified Blowfish algorithm was found to be a suitable encryption 47
9 algorithm for the above purpose. Results of this algorithm clearly show that the system provides end-to-end security and the algorithm is difficult for cryptanalysis. The non-linear graph obtained using Modified Blowfish algorithm clearly shows that the algorithm provides greater security comparatively. The use of techniques like Substitution, Transposition, and Translation along with Feistel function increases the complexity of algorithm which makes it difficult for cryptanalysis. The further work includes use of digital signature for checking message integrity over GSM network. One can choose different control operations other than ON/OFF for remote electrical devices. REFERENCES [1] Jawarkar N.P.; Vasif Ahmed; Thakare R.D. Remote control using Mobile through Spoken commands Signal Processing, communications and Networking, ICSCN apos; 07 Vol. Issue, Feb.2007page(s): [2] Nunes, R.J.C.; Delgado, J.C.M. An Internet Application for Home automation Electrotechnical Conference, ME LECON th Mediterranean Vol 1, Issue, 2000 Page(s): [3] D.; Drahansky, M. SMS Encryption for Mobile Communication Security Technology,2008. SECTECH apos;08. Vol., Issue, Dec Page(s): [4] Diaa Salama, Abdul Elminaam, et.al. Performance Evaluation of Sym metric encryption Algorithms ICSNS International Journal of Computer Science and Network security, VOL.8 No.12, December [5] Aamer Nadeem, Dr.M. Younus Javed A Performance Comparison of Encryption algorithm. [6] Paul. A. J.,Varghese Paul, P. Mythili A fast and secure encryption algorithm for message communication Information and Communication Technology in Electrical Sciences (ICTES2007).ICTES.IET- UK. [7] Webpage: pocketbrief.net/related/blowfish Encryption.pdf [8] Website: [9] Website: Kishor T. Mane received the BE (CSE) from Dr. J. J. Magdum college of Engg., Jaysingpur and ME (CSE) from D. Y. Patil college of Engg. & Tech., Kolhapur. He is presently working as Assistant professor in D.Y. Patil college of Engg. & Tech., Kolhapur. G. A. Patil received BE (CSE) from PESCOE, Mandya and ME (CSE) from Walchand college of Engg., Sangli. He is working as Head and Assistant professor in D. Y. Patil college of Engg. & Tech., Kolhapur since 1992.
A Study of New Trends in Blowfish Algorithm
A Study of New Trends in Blowfish Algorithm Gurjeevan Singh*, Ashwani Kumar**, K. S. Sandha*** *(Department of ECE, Shaheed Bhagat Singh College of Engg. & Tech. (Polywing), Ferozepur-152004) **(Department
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
Intelligent Home Automation and Security System
Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology
Design and Development of SMS Based Wireless Home Appliance Control and Security System
Design and Development of SMS Based Wireless Home Appliance Control and Security System Md. Abdullah Al Asad 1, Md. Al Muzahid 2 and Md. Saifuddin Faruk 3 The rapid change in the wireless communication
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
Gsm Based Controlled Switching Circuit Between Supply Mains and Captive Power Plant
International Journal of Computational Engineering Research Vol, 03 Issue, 4 Gsm Based Controlled Switching Circuit Between Supply Mains and Captive Power Plant 1, Mr.S.Vimalraj, 2, Gausalya.R.B, 3, Samyuktha.V,
Design of Wireless Home automation and security system using PIC Microcontroller
IJCAES ISSN: 2231-4946 Volume III, Special Issue, August 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on National Conference on Information and Communication
Smart Queue Management System Using GSM Technology
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 941-950 Research India Publications http://www.ripublication.com/aeee.htm Smart Queue Management System Using
A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.
A Comparative Study Of Two Symmetric Algorithms Across Different Platforms. Dr. S.A.M Rizvi 1,Dr. Syed Zeeshan Hussain 2 and Neeta Wadhwa 3 Deptt. of Computer Science, Jamia Millia Islamia, New Delhi,
Embedded Security System using RFID & GSM
Embedded Security System using RFID & GSM Kulkarni Amruta M., Taware Sachin S. Abstract The petroleum products are one of the valuable and rare creations of the nature. The proper use and distribution
Design and Development of SMS Based Wireless Home Appliance Control and Security System
Journal of Modern Science and Technology Vol. 3. No. 1. March 2015 Issue. Pp.80-87 Design and Development of SMS Based Wireless Home Appliance Control and Security System Md. Abdullah Al Asad *, Md. Al
AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Advanced Vehicle Tracking System on Google Earth Using GPS and GSM
IJECT Vo l. 5, Is s u e Sp l - 3, Ja n - Ma r c h 2014 ISSN : 2230-7109 (Online) ISSN : 2230-9543 (Print) Advanced Vehicle Tracking System on Google Earth Using GPS and GSM 1 Sowjanya Kotte, 2 Hima Bindhu
Development of a GSM based Control System for Electrical Appliances
International Journal of Engineering and Technology Volume 3 No. 4, April, 2013 Development of a GSM based Control System for Electrical Appliances Oke A. O., Emuoyibofarhe J. O., Adetunji A. B. Department
How To Design A Code Lock System With A Status Display On A Cell Phone And A Password Code On A Smart Phone
ISSN (e): 2250 3005 Vol, 04 Issue, 7 July 2014 International Journal of Computational Engineering Research (IJCER) Enhanced Wireless Security System With Digital code lock using RF &GSM Technology 1 E.Supraja,
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard
Wireless power meter monitoring with power theft detection and intimation system using GSM and Zigbee networks
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 6, Ver. I (Nov - Dec. 2014), PP 04-08 Wireless power meter monitoring with power
RFID, GPS & GSM Based Vehicle Tracing & Employee Security System
RFID, GPS & GSM Based Vehicle Tracing & Employee Security System Ms.S.S.Pethakar, Prof. N. Srivastava, Ms.S.D.Suryawanshi Abstract A RFID, GPS & GSM Based Vehicle Tracking and Employee Security System
Keywords Web Service, security, DES, cryptography.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Provide the
A New Digital Encryption Scheme: Binary Matrix Rotations Encryption Algorithm
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 2, February 2015, PP 18-27 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org A
Evaluating The Performance of Symmetric Encryption Algorithms
International Journal of Network Security, Vol.10, No.3, PP.213 219, May 2010 213 Evaluating The Performance of Symmetric Encryption Algorithms Diaa Salama Abd Elminaam 1, Hatem Mohamed Abdual Kader 2,
Raghavendra Reddy D 1, G Kumara Swamy 2
Car Accident Detection, Communication And Tracking Using ARM7 Controller Raghavendra Reddy D 1, G Kumara Swamy 2 1 PG Scholar, Dept of ECE, Malla Reddy Engineering College (Autonomous), Hyderabad, India.
Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
DEVELOPMENT OF HOME SECURITY SYSTEM USING GSM MODULE
DEVELOPMENT OF HOME SECURITY SYSTEM USING GSM MODULE Miss. M.Kiruthika 1, Mrs.M.kamarunisha 2, Miss P.Nithya 3 1,3 PG Scholar, 2 Associate Professor, Department of Computer Applications, Dhanalakshmi Srinivasan
Collided Vehicle Position Detection using GPS & Reporting System through GSM
Collided Vehicle Position Detection using GPS & Reporting System through GSM M.M.Raghaveendra 1, N.Sahitya 2, N.Nikhila 3, S.Sravani 4 1 Asst.Professor ECE Department, 2 Student, 3 Student, 4 Student,
Intelligent Fleet Management System Using Active RFID
Intelligent Fleet Management System Using Active RFID Ms. Rajeshri Prakash Mane 1 1 Student, Department of Electronics and Telecommunication Engineering, Rajarambapu Institute of Technology, Rajaramnagar,
Implementing Enhanced AES for Cloud based Biometric SaaS on Raspberry Pi as a Remote Authentication Node
Implementing Enhanced AES for Cloud based Biometric SaaS on Raspberry Pi as a Remote Authentication Node Dhvani. K. Shah Information Technology Thakur College of Engineering and Technology. Vinayak Bharadi,
Computer and Set of Robots
Lesson 11:DESIGN PROCESS EXAMPLES Mobile-Phone, Mobile- Computer and Set of Robots 1 Mobile Phone 2 Mobile phone SoC (System-on-Chip) Hardware units Microcontroller or ASIP (Application Specific Instruction
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
SMS based Remote Control System
International Journal of Computer Science and Management Studies, Vol. 11, Issue 02, Aug 2011 19 SMS based Remote Control System Amit Chauhan 1, Reecha Ranjan Singh 2, Sangeeta Agrawal 3, Saurabh Kapoor
EMBEDDED GSM MONITOR AND CONTROL USING ANDROID APPLICATION
http:// EMBEDDED GSM MONITOR AND CONTROL USING ANDROID APPLICATION J Ramya Ritika 1, K.V. Yateendranath 2 1 M.Tech Student [DSCE], Dept. of ECE, VITS, Kavali, Andhra Pradesh, (India) Associate Professor,
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
GSM Based Home Automation, Safety and Security System Using Android Mobile Phone
GSM Based Home Automation, Safety and Security System Using Android Mobile Phone Akanksha Singh (Student) Arijit Pal (Student) Bijay Rai (Assistant Professor) Department Of Electrical & Electronics Department
How To Track A Vehicle With A Smart Vehicle Tracking System
SMART VEHICLE TRACKING SYSTEM Mrs. K.P.Kamble 1 Lecturer 1 Department of Electronics and Telecommunication Engineering, YCCE, Nagpur [email protected] ABSTRACT It is amazing to know how simple
Secure File Multi Transfer Protocol Design
Journal of Software Engineering and Applications, 2011, 4, 311-315 doi:10.4236/jsea.2011.45034 Published Online May 2011 (http://www.scirp.org/journal/jsea) 311 Murali Krishna, Pradeep Jamwal, K. S. R.
A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique
A Survey on Performance Analysis of, AES and RSA Algorithm along with LSB Substitution Technique B. Padmavathi 1, S. Ranjitha Kumari 2 1 Research Scholar, R.V.S College of Arts & Science (Autonomous )Sulur,
(C) Global Journal of Engineering Science and Research Management
DEPENDABLE STORAGE FOR VEHICLE INSURANCE MANAGEMENT THROUGH SECURED ENCRYPTION IN CLOUD COMPUTING Prof.Abhijeet A.Chincholkar *1, Ms.Najuka Todekar 2 *1 M.E. Digital Electronics, JCOET Yavatmal, India.
Protected Cash Withdrawal in Atm Using Mobile Phone
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar
Feasibility Study of Implementation of Cell Phone Controlled, Password Protected Door Locking System
Feasibility Study of Implementation of Cell Phone Controlled, Password Protected Door Locking System Ashish Jadhav 1, Mahesh Kumbhar 2, Mahesh Walunjkar 3 Lecturer, Dept. of Electronics and Telecommunication,
Design and Implementation of a Reliable Wireless Real-Time Home Automation System Based on Arduino Uno Single-Board Microcontroller
Design and Implementation of a Reliable Wireless Real-Time Home Automation System Based on Arduino Uno Single-Board Microcontroller Bader M. O. Al-thobaiti, Iman I. M. Abosolaiman, Mahdi H. M. Alzahrani,
Bus Data Acquisition and Remote Monitoring System Using Gsm & Can
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 8, Issue 3 (Nov. - Dec. 2013), PP 88-92 Bus Data Acquisition and Remote Monitoring System
Remote Patient Monitoring- An Implementation in ICU Ward
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore Remote Patient Monitoring- An Implementation in ICU Ward Arun E 1+, Marimuthu V 2,
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Display Message on Notice Board using GSM
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 7 (2013), pp. 827-832 Research India Publications http://www.ripublication.com/aeee.htm Display Message on Notice Board
Implementation of Full -Parallelism AES Encryption and Decryption
Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption
MICROCONTROLLER BASED SMART HOME WITH SECURITY USING GSM TECHNOLOGY
MICROCONTROLLER BASED SMART HOME WITH SECURITY USING GSM TECHNOLOGY F. Shawki 1,2, M. El-Shahat. Dessouki 1,3, A. I. Elbasiouny 4, A.N. Almazroui 5, F. M. R. Albeladi 5 1 Assistant Professor, Electrical
Accident Notification System by using Two Modems GSM and GPS
Accident Notification System by using Two Modems GSM and GPS Hajer Salim Humaid AL-Farsi Electronic Engineering Student Caledonian College of Engineering, Muscat Malathi B. N. Senior Lecturer, Department
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 5, Issue, Ver. III (Jan - Feb. 205), PP 0- e-issn: 239 4200, p-issn No. : 239 497 www.iosrjournals.org Design and Analysis of Parallel AES
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
Home Security System Using Gsm Modem
RESEARCH ARTICLE OPEN ACCESS Home Security System Using Gsm Modem Mehek Potnis 1, Ayesha Chimnani 1, Vishal Chawla 1 Mr. Amit Hatekar 2 1. Undergraduate Students, Department of EXTC, Thadomal Shahani Engineering
Nagpur, Maharashtra, India
Volume 6, Issue 2, February 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Automated Door
Encryption and Decryption for Secure Communication
Encryption and Decryption for Secure Communication Charu Rohilla Rahul Kumar Yadav Sugandha Singh Research Scholar, M.TECH CSE Dept. Asst. Prof. IT Dept. Asso. Prof. CSE Dept. PDMCE, B.Garh PDMCE, B.Garh
Design and Implementation of Asymmetric Cryptography Using AES Algorithm
Design and Implementation of Asymmetric Cryptography Using AES Algorithm Madhuri B. Shinde Student, Electronics & Telecommunication Department, Matoshri College of Engineering and Research Centre, Nashik,
Development of an Internet based Embedded System for Smart House Controlling and Monitoring
Development of an Internet based Embedded System for Smart House Controlling and Monitoring Ahmed Abd-Elkarim Abd- Ellatif Salih Maged Ali Mohammed Asa'ad Yousif Elhadi Elsideeg Ahmed Department of Computer
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION Prof. Dr. Alaa Hussain Al- Hamami, Amman Arab University for Graduate Studies [email protected] Dr. Mohammad Alaa Al-
How To Encrypt With A 64 Bit Block Cipher
The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric
Hardware and Logic Implementation of Multiple Alarm System for GSM BTS Rooms
Hardware and Logic Implementation of Multiple Alarm System for GSM BTS Rooms Arifa Ferdousi 1 and Sadeque Reza Khan 2 1 Dept. of Computer Science and Engineering, Varendra University, Rajshahi, Bangladesh
Vehicle Scrutinizing using GPS & GSM Technologies Implemented with Ardunio controller
Vehicle Scrutinizing using GPS & GSM Technologies Implemented with Ardunio controller A.Kalaiarasi 1, Raviram.P 2, Prabakaran. P M 3, ShanthoshKumar.K 4, Dheeraj B P 5 Assistant Professor, Dept. of EEE,
SMS Based Wireless Home Appliance Control System (HACS) for Automating Appliances and Security. Abstract
Issue s in Informing Science and Information Technology Volume 6, 2009 SMS Based Wireless Home Appliance Control System (HACS) for Automating Appliances and Security Malik Sikandar Hayat Khiyal, Aihab
Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach
Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach Gamil R. S. Qaid 1, Sanjay N. Talbar 2 1 Research Student, Electronics & Telecommunications Dept.,S.G.G.S. institute
SIM300 GSM Module Controller For Smart Home
www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 4 Issue 9 Sep 2015, Page No. 14126-14138 SIM300 GSM Module Controller For Smart Home Nnakwuzie, Doris Nkechi,
Intelligent Database Monitoring System using ARM9 with QR Code
Intelligent Database Monitoring System using ARM9 with QR Code Jyoshi Niklesh 1, Dhruva R. Rinku 2 Department of Electronics and Communication CVR College of Engineering, JNTU Hyderabad Hyderabad, India
Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin
Cryptography and Network Security Chapter 3
Cryptography and Network Security Chapter 3 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 3 Block Ciphers and the Data Encryption Standard All the afternoon
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0020 ISSN (Online): 2279-0039 International
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES
REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES 1 Abinath.T.R, 2 Sudhakar.V, 3 Sasikala.S 1,2 UG Scholar, Department of Electrical and Electronics Engineering, Info Institute of Engineering,
Remote PLC system using GSM network with application to home security system
PLC using GS with application to home security A. Alheraish, W. Alomar, and. Abu-Al-Ela Department of Electrical Engineering, King Saud University, Riyadh, Saudi Arabia PLC using GS Keywords Programmable
Computer System Management: Hosting Servers, Miscellaneous
Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation
High Performance VPN Solutions Over Satellite Networks
High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have
An Example of Mobile Forensics
An Example of Mobile Forensics Kelvin Hilton K319 kchilton@staffsacuk [email protected] www.soc.staffs.ac.uk/kch1 Objectives The sources of evidence The subscriber The mobile station The network
COMPUTER BASED REMOTE CONTROL FOR LAYOUT OF SCALED MODEL TRAINS
COMPUTER BASED REMOTE CONTROL FOR LAYOUT OF SCALED MODEL TRAINS Ivan Ivanov Monov, Ivan Petrov Gorchev Technical University - Sofia, 8 Kliment Ohridski Blvd., Sofia 1000, Bulgaria, phone: +359 887 204488,
TCP/IP Network Communication in Physical Access Control
TCP/IP Network Communication in Physical Access Control The way it's done: The security industry has adopted many standards over time which have gone on to prove as solid foundations for product development
ADVANCED VEHICLE TRACKING SYSTEM USING ARM7
ADVANCED VEHICLE TRACKING SYSTEM USING ARM7 L. Kishore 1, Arun Raja 2 1 M.E. Embedded Systems Technologies, Sri Ramakrishna Engineering College 2 Assistant Professor, Department of ECE, Sri Ramakrishna
Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm
Global Journal of Computer Science and Technology Software & Data Engineering Volume 13 Issue 5 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,
Split Based Encryption in Secure File Transfer
Split Based Encryption in Secure File Transfer Parul Rathor, Rohit Sehgal Assistant Professor, Dept. of CSE, IET, Nagpur University, India Assistant Professor, Dept. of CSE, IET, Alwar, Rajasthan Technical
Keywords: GPS, GSM, AVR Microcontroller, SMS.
Volume 5, Issue 4, 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A System for Car Accident
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software
Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software Ya Ling Huang, Chung Huang Yang Graduate Institute of Information & Computer Education, National Kaohsiung Normal University
FaultAnalysisandElectricalProtectionofDistributionTransformers
Global Journal of Researches in Engineering: F Electrical and Electronics Engineering Volume 14 Issue 3 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Keywords : complexity, dictionary, compression, frequency, retrieval, occurrence, coded file. GJCST-C Classification : E.3
Global Journal of Computer Science and Technology Software & Data Engineering Volume 13 Issue 4 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
DESIGN OF SMART HOME SECURITY SURVEILLANCE SYSTEM USING GSM
DESIGN OF SMART HOME SECURITY SURVEILLANCE SYSTEM USING GSM Shweta 1, Nayana P Shetty 2 M.Tech student, Department of Electrical and Electronics Engineering, NMAMIT, Nitte, India 1 Associate Professor,
Implementation of Embedded Web server using TEA algorithm
Implementation of Embedded Web server using TEA algorithm Arunkumar G 1, Dr. T.C. Manjunath 2, Harish H.M 3, Jayaprakasha.H 4 1 Department of E&C, S.T.J.I.T, Ranebennur 2 Principal, HKBKCE, Bangalore 3,4
4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19
4. H.323 Components VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4.1 H.323 Terminals (1/2)...3 4.1 H.323 Terminals (2/2)...4 4.1.1 The software IP phone (1/2)...5 4.1.1 The software
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
Achieving Low-Latency Security
Achieving Low-Latency Security In Today's Competitive, Regulatory and High-Speed Transaction Environment Darren Turnbull, VP Strategic Solutions - Fortinet Agenda 1 2 3 Firewall Architecture Typical Requirements
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Secret Key Cryptography (I) 1 Introductory Remarks Roadmap Feistel Cipher DES AES Introduction
Secure Data Transmission using Blowfish Algorithm
Secure Data Transmission using Blowfish lgorithm Panem.Charan rur 1, M. Sai Chandrasekhar 2, S.Sai Sreeram 3, K.RamKishore 4, S.Venu gopal 5, 1 ssistant professor, 2 UG Students[ B.Tech] Dept. of ECE,
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Embedded Intensive Patient Care Unit
Embedded Intensive Patient Care Unit #V.Ramya, *Anuradha Kumari # Asst. professor, Department of CSE, Annamalai University, Chidambaram Email: [email protected] *BE [IT], Department of CSE, Annamalai
SMART DRUNKEN DRIVER DETECTION AND SPEED MONITORING SYSTEM FOR VEHICLES
SMART DRUNKEN DRIVER DETECTION AND SPEED MONITORING SYSTEM FOR VEHICLES Bandi Sree Geeta 1, Diwakar R. Marur 2 1,2 Department of Electronics and Communication Engineering, SRM University, (India) ABSTRACT
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010
Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010 Dennis Wehrle, Konrad Meier, Dirk von Suchodoletz, Klaus Rechert, Gerhard Schneider Overview 1. GSM Infrastructure
Mobile SMS and Data Roaming Explained
Mobile SMS and Data Roaming Explained Mobile SMS and data roaming explained Roaming is the ability of customers to use their mobile phones or other mobile devices outside the geographical coverage area
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra
FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS
FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS K.Jaikumar 1, M.Santhosh Kumar 2, S.Rajkumar 3, A.Sakthivel 4 1 Asst. Professor-ECE, P. A. College of Engineering and Technology 2
