Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Tamilselvan, S.
- Security Architecture for the Cloud Integrated Internet of Things
Abstract Views :190 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics and Communication Engineering, Pondicherry Engineering College,Pillaichavadi, Puducherry – 605014, IN
1 Department of Electronics and Communication Engineering, Pondicherry Engineering College,Pillaichavadi, Puducherry – 605014, IN
Source
Indian Journal of Science and Technology, Vol 9, No 45 (2016), Pagination:Abstract
Objectives: To design efficient hybrid architecture for data security is applied for securing communication link between two user/senders by considering symmetric key algorithm and asymmetric key algorithm. Methods/ Analysis: A highly efficient architectures for data security is applied for securing communication link between two user/senders in cloud integrated Internet of Things (IoT). Data is encrypted with Advanced Encryption Standard (AES) algorithm and Elliptical Curve Cryptography (ECC) concept is used for securing the secret key between user/ sender and system/receiver. In this architecture authentication is provided by Elliptic Curve Diffie Hellman algorithm between user/sender and system/receiver. The efficient hybrid architecture is implemented on Field Programmable Gate Array (FPGA) and is scripted in verilog Hardware Description language (HDL).Findings: According to the IoT concept, Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSN) meet new challenges related to large volume of data. The physical things in an IoT are generally identified by WSN or RFID before connecting with each other. Once identified, they can interchange data between them. Cloud computing provides virtual infrastructure for storing, analyzing, and virtualization large data in client delivery. Data transferring like storing and retrieving from cloud by different user/senders should be secure from Men in the Middle (MIM) attack of information. The outcomes obtained shows that the efficient cryptosystem with encryption and decryption has a minimum period of 18.060ns with the maximum achievable frequency of 55.371MHz on Xilinx Virtex-5 (XC5VLX50T-1FF1136).Novelty/ Improvement: In this paper ECC algorithm is for providing security communication between user/senders and system/receiver. ECC encryption is used for encrypting the request of user/senders connected to the receiver. The file in the system/receiver is accessed by the user/sender and the file is encrypted by system/receiver using user/ sender’s public key. When uploading the files system/receiver encrypts the file using AES encryption algorithm or while downloading the file from data storage the system/receiver decrypts the data or file using AES algorithm.Keywords
Advanced Encryption Standard (AES), Cloud Computing, Elliptic Curve Cryptography (ECC), Elliptic Curve Diffie-Hellman-Merkle, Internet of Things (IoT), Key Exchange.- Design and Analysis of RTOs based Reconfigurable Cots Design on FPGA
Abstract Views :138 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical and Electronics Engineering, Vel Tech Multitech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai - 600062, Tamil Nadu, IN
1 Department of Electrical and Electronics Engineering, Vel Tech Multitech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai - 600062, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 1 (2016), Pagination:Abstract
Background: Due to greater potential to accelerate a wide variety of application, reconfigurable FPGA has become a subject to great deal of research. The FPGA has ability to perform computations in hardware to increase the system performance, while retaining much of the flexibility of software solutions. In recent development, the real-time embedded system are increasingly being built with COTS components namely mass-produced peripherals and by reducing cost through buses and performance improvement. But the available COTS systems do not guarantee any timeliness and do not implement any priority scheduling mechanism. Methods/Statistical Analysis: This article deals with a new approach to create an RTOS based reconfigurable COTS design for FPGA platform. Thereby RTOS kernel is designed for FPGA and COTS system designed on the FPGA. Application/Improvements: At runtime, the hardware tasks are scheduled and allocated system resources like I/O, memory, etc. to successfully export multiple virtual devices for a single physical device.Keywords
FPGA, RTOS based Reconfigurable Commercial-off-the-Shelf- A Review on 3GPP Femtocell Networks and its Technical Challenges
Abstract Views :128 |
PDF Views:0
Authors
Affiliations
1 Department of ECE, Pondicherry Engineering College, ECR Road and VSR Street, Pillaichavadi, Puducherry - 605014, IN
1 Department of ECE, Pondicherry Engineering College, ECR Road and VSR Street, Pillaichavadi, Puducherry - 605014, IN
Source
Indian Journal of Science and Technology, Vol 9, No 16 (2016), Pagination:Abstract
Background/Objective: The demand for the data traffic is exponentially increasing day to day because of the proliferation of smart phones, tablets and internet-connected devices. To meet this requirements network operators has to dramatically increase their network capacities. Methods: One of the possible ways to increase the system capacity is bringing the transmitter and receiver nearer to each other. It gives dual benefits higher quality and spectrum efficiency. Findings: The cost effective solution is installing the low power nodes instead of traditional high power macro base stations. Examples of these low power nodes are microcells, picocells, femtocells and distributed antenna systems. The network, which consists of different power nodes, architectures, and protocols is called Heterogeneous network. To overcome the indoor coverage and increased system capacity femtocells also called low power base stations are selected by the researchers as the suitable solution. In this paper we overview the femtocell deployment scenarios, access modes, and technical challenges briefly. Improvements: This paper gives the details about solutions available in the literature and gives future research directions to solve the technical challenges faced by femtocells.Keywords
Femtocell, Heterogeneous Network, 3GPP, Interference Management, Smallcell- Design of Secured and Intelligent Architecture for Security in Perceptual Layer of the Internet of Things
Abstract Views :228 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics and Communication Engineering, Pondicherry Engineering College, Pillaichavady – 605014, Puducherry,, IN
2 Department of Electronics and Communication Engineering, Pondicherry Engineering College, Pillaichavady – 605014, Puducherry, IN
1 Department of Electronics and Communication Engineering, Pondicherry Engineering College, Pillaichavady – 605014, Puducherry,, IN
2 Department of Electronics and Communication Engineering, Pondicherry Engineering College, Pillaichavady – 605014, Puducherry, IN
Source
Indian Journal of Science and Technology, Vol 10, No 1 (2017), Pagination:Abstract
Background: Today’s developing era data and information security plays an important role in unsecured communication between Internet of Things (IoT) elements. As the technologies are developing huge amount of information are exchanged with each other which increases the demand of a secure encryption standards. Objectives: To protect the information transmission between nodes in the perceptual layer of IoT, security is to be enhanced such that the Men in Middle (MIM) attack of information by intruders in the communication link is not possible. Methods/Statistical analysis: The security method is implemented using the concept of symmetric, asymmetric and hash algorithms between the sender and receiver. Elliptic Curve Cryptography (ECC) is performed for encrypting and sharing the Advanced Encryption Standard (AES) secret key between the sender and receiver. Elliptic Curve digital signature are added with the encrypted data for validation in transmission. Secured Hash Algorithm (SHA) is considered for generating Elliptical Curve Digital Signature Algorithm (ECDSA). All the algorithms are combined to enhance the security. Findings: Elliptic Curve Cryptography is generally applied for encrypting and sharing the secret key between the sender and receiver when Advanced Encryption Standard is used for encryption/decryption of data. A highly efficient architectures for asymmetric key encryption is applied with symmetric key encryption for encrypting the data transmitted between the devices present in the perceptual layers in the IoT. Due to security issues NIST selected SHA-3 Keccak-f[1600] algorithm. An authentication process based on ECC is applied to perceptual layer involving initialization and authentication phase apart from encryption and signature generation. Sender combines the encrypted data and key with signature together before transmitting to the receiver. The receiver verifies the signature and decrypts the key and obtains original information. Hence it is very difficult for the man in middle to access the information exchanged between the Perceptual Layer devices. Application/Improvements: This generally doesn’t require an innovative technique but an approach to develop the method implemented successfully in the perceptual layer of Internet of Things. The key is encrypted and decrypted using a novel ECC algorithm with improved ECDSA.Keywords
Elliptical Curve Cryptography (ECC), Elliptic Curve Digital Signature Algorithm (EDSA), Internet of Things (IoT), Keccak, Perception Layer, Secured Hash Algorithm (SHA).- Performance Comparison of Paraunitary Analysis Filter Bank Based Spectrum Sensing Technique over Multipath Channels
Abstract Views :215 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics and Communication Engineering, Pondicherry Engineering College,Puducherry – 605014, IN
1 Department of Electronics and Communication Engineering, Pondicherry Engineering College,Puducherry – 605014, IN
Source
Indian Journal of Science and Technology, Vol 10, No 1 (2017), Pagination:Abstract
Background/Objectives: In earlier days of wireless communications, the demand for the spectrum is limited, because the wireless services may not require higher bandwidths. But as time passes radio spectrum has become one of the important and regulated resources for all the wireless services. From the past 10 to 15 years the spectrum needs were increased and it becomes a scarce resource. Methods/Statistical analysis: The information and communication technology industry in today’s scenario faces several global challenges like: Higher data services with improved Quality Of Service (QOS), scarcity of spectrum, and increased expenses of the services. Thus both the energy domains as well as spectral domain efficiencies were degraded, which made the researches to think in different ways, The other ways to improve spectrum utilization is the use of unlicensed spectrum or secondary access. In order to solve this spectrum utilization efficiency problem, Cognitive Radio (CR) concept was introduced. CR technology is an secondary access method in which an unlicensed Secondary Users (SUs) senses the whole radio spectrum and uses the licensed spectrum holes such that it does not cause any interference to the Primary Users (PUs). This way of spectrum access improves the efficiency of spectrum utilization. Findings: For sensing the spectrum of the primary user, several methods are proposed in literature. A method called Paraunitary Analysis Filter Bank based sensing method is analysed in this paper and its performance was compared with Filter bank based spectrum sensing and Energy Detection (ED) based spectrum sensing techniques. Application/Improvements: It can be used to reduce the interference in Femtocell networks by considering the macro user as a primary user and femto user as a secondary user to use the spectrum effectively and to increase the capacity of the cellular networks.Keywords
Cognitive Radio, Energy Detection, Filter Bank, Paraunitary Filter Bank, Spectrum Sensing.- Efficient Modified Booth Multiplier for Signal Processing Applications
Abstract Views :164 |
PDF Views:0
Authors
S. Tamilselvan
1,
P. Nithya
1
Affiliations
1 Department of Electronics and Communication Engineering, M. Kumarasamy College of Engineering (Autonomous), Thalavapalayam - 639113, IN
1 Department of Electronics and Communication Engineering, M. Kumarasamy College of Engineering (Autonomous), Thalavapalayam - 639113, IN
Source
Indian Journal of Science and Technology, Vol 10, No 14 (2017), Pagination:Abstract
The two’s complement approach plays a vital role in reducing Partial product Rows count in signed bit multiplier. In this paper proposed a multiplier which reduces the partial product rows by Modified Booth techniques with less delay. This high performance 2’s complement multiplier is used in embedded cores. This work was implemented in the Xilinx software and simulation results were obtained for the different applications. Applications such as FIR filter and Image processing requires high accuracy and smaller size multipliers. The image and filter interfacing is done with the help of MATLAB software.Keywords
Image Processing, MATLAB, Modified Booth Technique, Partial Product, Xilinx- An Efficient MAC Design for Image Processing Application
Abstract Views :178 |
PDF Views:0
Authors
S. Tamilselvan
1,
A. Arun
1
Affiliations
1 Department of Electronics and Communication Engineering, M. Kumarasamy College of Engineering, Karur - 639113, Tamil Nadu, IN
1 Department of Electronics and Communication Engineering, M. Kumarasamy College of Engineering, Karur - 639113, Tamil Nadu, IN