Preferred Language
Articles
/
ijs-3180
A lightweight AES Algorithm Implementation for Secure IoT Environment
...Show More Authors

In recent years, the rapid development in the field of wireless technologies led to the appearance of a new topic, known as the Internet of things (IoT). The IoT applications can be found in various fields of our life, such as smart home, health care, smart building, and etc. In all these applications, the data collected from the real world are transmitted through the Internet; therefore, these data have become a target of many attacks and hackers. Hence, a secure communication must be provided to protect the transmitted data from unauthorized access. This paper focuses on designing a secure IoT system to protect the sensing data. In this system, the security is provided by the use of Lightweight AES encryption algorithm to encrypt the data received from physical environment. The hardware used in this proposal is the Raspberry Pi 3 model B and two types of sensors. The LAES algorithm was embedded inside the Raspberry in order to protect the sensing data, that come from sensors connected to the Raspberry Pi, before sending them through the network. The analysis results show that the proposed IoT security system consumes less time in encryption/decryption and has high throughput when compared with others from related work. Its throughput is higher in about 19.24% than the value reported for one system in the related studies.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2024
Journal Name
Results In Engineering
Implementation of a control and monitoring system for a cathodic protection cell to mitigate localized corrosion in fixed and mobile steel structures
...Show More Authors

The current study introduces a novel technique to handle electrochemical localized corrosion in certain limited regions rather than applying comprehensive cathodic protection (CP) treatment. An impressed current cathodic protection cell (ICCPC) was fabricated and firmly installed on the middle of a steel structure surface to deter localized corrosion in fixed or mobile steel structures. The designed ICCPC comprises three essential parts: an anode, a cathode, and an artificial electrolyte. The latter was developed to mimic the function of the natural electrolyte in CP. A proportional-integrated-derivative (PID) controller was designed to stabilize this potential below the ICCPC at a cathodic potential of −850 mV, which is crucial for prote

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Design and Implementation of a Multiplier free FPGA based OFDM Transmitter
...Show More Authors

Orthogonal Frequency Division Multiplexing (OFDM) is an efficient multi-carrier technique.The core operation in the OFDM systems is the FFT/IFFT unit that requires a large amount of hardware resources and processing delay. The developments in implementation techniques likes Field Programmable Gate Array (FPGA) technologies have made OFDM a feasible option. The goal of this paper is to design and implement an OFDM transmitter based on Altera FPGA using Quartus software. The proposed transmitter is carried out to simplify the Fourier transform calculation by using decoder instead of multipliers. After programming ALTERA DE2 FPGA kit with implemented project, several practical tests have been done starting from monitoring all the results of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Bulletin Of Electrical Engineering And Informatics
Lightweight hamming product code based multiple bit error correction coding scheme using shared resources for on chip interconnects
...Show More Authors

In this paper, we present multiple bit error correction coding scheme based on extended Hamming product code combined with type II HARQ using shared resources for on chip interconnect. The shared resources reduce the hardware complexity of the encoder and decoder compared to the existing three stages iterative decoding method for on chip interconnects. The proposed method of decoding achieves 20% and 28% reduction in area and power consumption respectively, with only small increase in decoder delay compared to the existing three stage iterative decoding scheme for multiple bit error correction. The proposed code also achieves excellent improvement in residual flit error rate and up to 58% of total power consumption compared to the other err

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Radioelectronics And Communications Systems
BER performance enhancement for secure wireless communication systems based on DCSK-MIMO techniques under Rayleigh fading channel
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Oct 18 2023
Journal Name
Ieee Access
A New Imputation Technique Based a Multi-Spike Neural Network to Handle Missing Data in the Internet of Things Network (IoT)
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Wed Nov 02 2011
Journal Name
Journal Of Engineering
Implementation of Gypseous Soil-asphalt Stabilization Technique for Base Course Construction
...Show More Authors

The aim of this research work is to study the effect of stabilizing gypseous soil, which covers vast areas in the middle, west and south parts of Iraq, using liquid asphalt on its strength properties to be used as a base course layer replacing the traditional materials of coarse aggregate and broken stones which are scarce at economical prices and hauling distances. Gypseous soil brought from Al-Ramadi City, west of Iraq, with gypsum content of 66.65%, medium curing cutback asphalt (MC-30), and hydrated lime are used in this study. The conducted tests on untreated and treated gypseous soil with different percentages of medium curing cutback asphalt (MC-30), water, and lime were: unconfined compression strength, and one dimensional confine

... Show More
Publication Date
Tue Jun 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Implementation of hierarchically porous zeolite-polymer membrane for Chromium ions removal
...Show More Authors
Abstract<p>This work deals with the preparation of a zeolite/polymer flat sheet membrane with hierarchical porosity and ion-exchange properties. The performance of the prepared membrane was examined by the removal of chromium ions from simulated wastewater. A NaY zeolite (crystal size of 745.8 nm) was prepared by conventional hydrothermal treatment and fabricated with polyethersulfone (15% PES) in dimethylformamide (DMF) to obtain an ion-exchange ultrafiltration membrane. The permeate flux was enhanced by increasing the zeolite content within the membrane texture indicating increasing the hydrophilicity of the prepared membranes and constructing a hierarchically porous system. A membrane contain</p> ... Show More
View Publication
Scopus (17)
Crossref (11)
Scopus Crossref
Publication Date
Sat Dec 17 2022
Journal Name
Journal Of Al-ma'moon College
Simulation and Implementation of SNR Measurement processor for Adaptive Communication Systems
...Show More Authors

Preview PDF
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
IMPLEMENTATION OF GYPSEOUS SOIL-ASPHALT STABILIZATION TECHNIQUE FOR BASE COURSE CONSTRUCTION
...Show More Authors

The aim of this research work is to study the effect of stabilizing gypseous soil, which covers
vast areas in the middle, west and south parts of Iraq, using liquid asphalt on its strength properties
to be used as a base course layer replacing the traditional materials of coarse aggregate and broken
stones which are scarce at economical prices and hauling distances.
Gypseous soil brought from Al-Ramadi City, west of Iraq, with gypsum content of 66.65%,
medium curing cutback asphalt (MC-30), and hydrated lime are used in this study.
The conducted tests on untreated and treated gypseous soil with different percentages of medium
curing cutback asphalt (MC-30), water, and lime were: unconfined compression strength, and o

... Show More
View Publication Preview PDF
Crossref (2)
Crossref