Computer
Haider M. Al-Mashhadi; Hussain Jassim Fahad
Abstract
Electrical energy is one of the most important components of life today where different fields depend on it. The field of electrical energy distribution (electricity network), which transmits electrical energy from sources to consumers, is one of the most important areas that need to be developed and ...
Read More ...
Electrical energy is one of the most important components of life today where different fields depend on it. The field of electrical energy distribution (electricity network), which transmits electrical energy from sources to consumers, is one of the most important areas that need to be developed and improved. In addition to analyzing electrical energy consumption, it needs to forecast consumption and determine consumer behavior in terms of consumption and how to balance supply and demand. The research aims to analyze weather data and find the relation between the weather factors and energy consumption in order to prepare data to use as a suitable data in machine learning model for future use. This model analyzes the building consumption rate for a particular area and takes into account the weather factors that affect electrical energy consumption, where (temperature, dew point, ultraviolet index) are selects based on the correlation confidence and then divided these factors into a set of categories using the K-Means algorithm to show the effect of each factors on the other.
Communication
Rawia Abdullah Muhammed; Maisa'a Abid Ali Al-Dabbas; Ashwak Mahmood Alabaichi
Abstract
The Internet of things (IoT) is one of those emerging technologies, which aregoing to rule the world in the next few decades. The IoT environment not only enablesHuman to Machine interaction but also fosters Machine to Machine connectivity.Numerous IoT devices have poor security and insufficient computing ...
Read More ...
The Internet of things (IoT) is one of those emerging technologies, which aregoing to rule the world in the next few decades. The IoT environment not only enablesHuman to Machine interaction but also fosters Machine to Machine connectivity.Numerous IoT devices have poor security and insufficient computing power, making themprime targets for hackers. The IoT environment uses lightweight cryptographic techniquesto address security requirements. Another security method for IoT devices issteganography. In the contemporary Internet era, the ability to secure private informationis crucial, and steganography offers this capability. Due to its great ability to concealsensitive data, video has drawn the attention of numerous academics among all forms ofdigital media. The main goal of this work is to examine several methods for fusing videosteganography and cryptography techniques. Additionally, a thorough investigation andevaluation of a variety of video steganography methods in both compressed and rawdomains are also emphasized. The comprehensive analysis of prior material makes iteasier to have in-depth knowledge while creating approaches that combine cryptographywith steganography.
Computer
Adil Yousef Hussein; Ahmed T. Sadiq
Abstract
Hackerscanconductmoredestructivecyber-attacksthankstotherapidspread of Internet of Things (IoT) devices, posing significant security risks for users. Through a malicious process, the attacker intended to exhaust the capital of the target IoT network. Researchers and company owners are concerned about ...
Read More ...
Hackerscanconductmoredestructivecyber-attacksthankstotherapidspread of Internet of Things (IoT) devices, posing significant security risks for users. Through a malicious process, the attacker intended to exhaust the capital of the target IoT network. Researchers and company owners are concerned about the reliability of IoT networks, which is taken into account because it has a significant impact on the delivery of facilities provided by IoT systems and the security of user groups. The intrusion prevention system ensures that the network is protected by detecting malicious activity. In this paper, the focus is on predicting attacks and distinguishing between normal network use and network exploitation for intrusion and network attack and we will use Swarm Intelligence (SI) which is one of the types of artificial intelligence (AI) that we harness to choose features to determine the task of them and specifically we will use an algorithm Meerkat Clan (MCA) for this purpose, as this research suggested a modified IDS in machine learning (ML) based IoT environments to identify features and these features will be input into Random Forest algorithm. The IoTID20 dataset is used where nominal traits are removed, so the final dataset contains 79 traits. The data set contains three categories: the label that identifies whether it is a natural use or exploitation, the category that characterizes the type of exploitation, and the subcategory that describes that exploitation more accurately. The number of trees in a random forest (RF) classifier for binary, class, and subclass will be determined by the experiment. The trained classifier is then tested and the approach achieves 100% accuracy for binary target prediction, 96.5% for category and accuracy ranges of 83.7% for sub-category target prediction. The proposed system is evaluated and compared with previous systems and its performance is shown through the use of confusion matrix and others.
Computer
Sameeh Abdulghafour Jassim; Alaa K. Farhan
Abstract
Recently, the Internet of Things (IoT) is begin used in many fields such as smart homes, healthcare systems, industrial applications, etc. Therefore, the use of the IoT led to a growth in the number of dangers especially in the areas of privacy and security for applications running on low- resource computers. ...
Read More ...
Recently, the Internet of Things (IoT) is begin used in many fields such as smart homes, healthcare systems, industrial applications, etc. Therefore, the use of the IoT led to a growth in the number of dangers especially in the areas of privacy and security for applications running on low- resource computers. Consequently, the demand for lightweight encryption methods is growing. To safeguard sensing data, this study introduces a Lightweight Advanced Encryption Standard (LAES) depending on dynamic ShiftRows, initial permutation instead of MixColumns, and a dynamic number of rounds. It was created with the goal of reducing encryption/decryption time. The proposed approach was assessed by using various measurements such as lengths of the key used was 2128 and it is quite enough for security, key sensitivity values were 100%, Also, this study compared the encryption/decryption time, NIST statistical test, and security strength of the proposed architecture to those of XTEA, SIMON, Skinny, SPECK, and PRESENT. The encryption/decryption time of the proposed approach was had the shortest period (0.0169 S) while the SPECK algorithm was had the longest period (4.1249 S) among the comparative algorithms. Whereas, NIST statistical test values of the proposed approach were passed successfully and had higher values than the comparative algorithms. Moreover, the proposed approach utilized 1280, 1024, and 768 GE with 6, 8, or 10 rounds respectively. The average number of GE was approximately 1000 GE. These numbers of GE are considered highly efficient with the IoT environment.
Sabreen J. Siwan; Waleed Fawwaz Shareef; Ahmed Nasser
Abstract
Petroleum is the economic infrastructure in Iraq because it generates a significant portion of the country's revenue and can be considered as the primary source of financial costs each year. As a consequence, it is critical to protect the sector and continue to develop it. Therefore, it is important ...
Read More ...
Petroleum is the economic infrastructure in Iraq because it generates a significant portion of the country's revenue and can be considered as the primary source of financial costs each year. As a consequence, it is critical to protect the sector and continue to develop it. Therefore, it is important to track and maintain pipelines regularly to detect defects on time. In pipeline monitor and control, the advent of the Internet of Things (IoT) technology and the deployment of embedded sensing systems enable successful pipeline maintenance with the simple requirement for real-time precise measurements. In this paper, a wireless network based on an IoT system and integrated with cloud service is proposed for structure monitoring of oil pipelines, to detect the risks on the structure such as tampering and/or wear and tear effects. The method is based on collecting data from a sensor node equipped with an RF module attached to the pipeline structure. These nodes collectively form a network of IoT devices connected to the cloud server. The raw data is collected, stored, and statistically analyzed to be accessible by the user anytime and anywhere through the Internet. The performance of the system is evaluated in different cases, including the distance about the node to detect events on the pipe and to discriminate the distance of event to determine the location the event it was tested by using four different states of the transmitted data.
Iman Mohammed Hasan; Rana Fareed Ghani
Abstract
Today's insurance industry plays a significant role in a variety of fields, particularly in health insurance. As IoT technology advances, health insurers in IoT networks can obtain real-time medical data for individuals and issue individual insurance policies based on a person's lifestyle. However, sharing ...
Read More ...
Today's insurance industry plays a significant role in a variety of fields, particularly in health insurance. As IoT technology advances, health insurers in IoT networks can obtain real-time medical data for individuals and issue individual insurance policies based on a person's lifestyle. However, sharing personal data requires a guarantee of privacy and security. This paper suggests a Blockchain technology to solve this problem. The work presents a novel framework that integrates health insurers, IoT-based networks, and Blockchain technology to implement access control protocol using a smart contract for sharing the financial premium of insureds with the stakeholders as non-participants/authorized parties. The evaluation of the proposal results in authorized access within less time compared to traditional data-sharing systems, and the security analysis shows that proposal can protect data from potential threats.
Hawraa R. Abdul Ameer; Hamid M. Hasan
Volume 20, Issue 1 , January 2020, , Page 53-67
Abstract
The MQTT protocol is one of the Internet of Things (loT) application protocols. It is based on publishing/subscribing messaging patterns. This protocol uses a broker to manage the communication between the subscribers and the publishers over the internet. There were two problems associated with the implementation ...
Read More ...
The MQTT protocol is one of the Internet of Things (loT) application protocols. It is based on publishing/subscribing messaging patterns. This protocol uses a broker to manage the communication between the subscribers and the publishers over the internet. There were two problems associated with the implementation of this protocol. The first one, there are many sensors generating huge data using the very simple IoT architecture. These big data may lead to congestion on the internet and thus will cause several disadvantages such as decreasing throughput, packet loss, and delay, which in turn may affect the performance of the MQTT broker, thus affecting the mechanism of the performance of the IoT application. The second problem, the MQTT protocol does not contain a priority management algorithm which is considered a very important and special issue in health applications. In this paper, a smart gateway is designed to enhance the MQTT networks. This work introduced the smart e-health gateway used in MQTT based remote Electrocardiogram (ECG) monitoring system. A new architecture has been implemented that contains two new components, the local broker and the publisher /subscriber (pub/sub) models. The local broker works in the local network and the publisher /subscriber (pub/sub) model is responsible for the process of smart in the gateway. One of the smart applications was used is a filter application. We’ve taken the data filtering side and give it a priority, as an example in order to know the possibility of achieving the architecture of the gateway that was created in our work. And is this architecture valid to work or invalid. Therefore, we conducted a test using the application of ECG signal filtration and give priority to patients according to the case of an urgent for each patient. The R-peaks were calculated from the ECG signals-peaks for the identification of heart rate. The urgent level will be classified depending on the beats rate feature. The proposed smart gateway function is to manage the data rate that will pass through to the internet. In the case of high urgent level, all the packets will be passed, while in case of a low level, the least possible data will be passed. The proposed system scenarios are designed and evaluated by using the OMNET simulation environment and Inet4 framework. The simulation results are shown by the evaluation methods used (delay, throughput, packets sent, and packets received). These results proved the success of the architectural work that was implemented in the system.