Measurement of Component Performance (Sensor) on Internet of Thing (IoT)

Published on Oct 1, 2018 in ICEE (International Conference on Electrical Engineering)
· DOI :10.1109/ICECOS.2018.8605265
Estimated H-index: 3
Estimated H-index: 3
+ 6 AuthorsRahmat Budiarto13
Estimated H-index: 13
(Al Baha University)
This study presents the testing of several devices (sensors) in obtaining sensor performance, there are several experiments and evaluations of the results obtained in the topology. Each sensor must be able to provide some results in the form of accuracy, reliability, range, and resolution. The accuracy and reliability have very important role in producing accurate data. With several explanations and analysis, it is expected to produce a reference for advanced development and policies making in the deployment of IoT system, especially in multi-sensing IoT systems. This work obtain the dataset through several stages, namely building topology (system design), data capture, and feature extraction. Wi-Fi and XBee communication protocols are used. In Wi-Fi protocol, the TCP traffic gives the greatest value compared to other traffic on normal data as well as attack data. In XBee protocol, the Low Rate Wireless PAN IEEE 802.15.4 protocol has an average of 83.96 percent for normal data and 98.73 percent for attack data, respectively. The results of attribute reading experiments, the XBee protocol achieves eighteen attributes whereas the Wi-Fi protocol only seventeen attributes.
📖 Papers frequently viewed together
23 Citations
20193.75IEEE Access
4 Authors (Yuichi Inagaki, ..., Eiji Oki)
10 Citations
4 Citations
#1Jesus Pacheco (UA: University of Arizona)H-Index: 9
#2Salim Hariri (UA: University of Arizona)H-Index: 30
The Internet of Things (IoT) will not only connect computers and mobile devices but also interconnect smart buildings, homes, and cities, as well as electrical grids, gas, and water networks, automobiles, airplanes, etc. IoT will lead to the development of a wide range of advanced information services that need to be processed in real time and require large storage and computational power. The integration of IoT with fog and cloud computing not only brings the computational requirements but also...
39 CitationsSource
#1Ala Al-Fuqaha (WMU: Western Michigan University)H-Index: 25
#2Mohsen Guizani (Qatar University)H-Index: 82
Last. Moussa Ayyash (CSU: Chicago State University)H-Index: 12
view all 5 authors...
This paper provides an overview of the Internet of Things (IoT) with emphasis on enabling technologies, protocols, and application issues. The IoT is enabled by the latest developments in RFID, smart sensors, communication technologies, and Internet protocols. The basic premise is to have smart sensors collaborate directly without human involvement to deliver a new class of applications. The current revolution in Internet, mobile, and machine-to-machine (M2M) technologies can be seen as the firs...
3,886 CitationsSource
Mar 9, 2015 in DATE (Design, Automation, and Test in Europe)
#1Santos Merino Del Pozo (UCL: Université catholique de Louvain)H-Index: 4
#2François-Xavier Standaert (UCL: Université catholique de Louvain)H-Index: 70
Last. Amir Moradi (RUB: Ruhr University Bochum)H-Index: 29
view all 4 authors...
Static power consumption is an increasingly important concern when designing circuits in deep submicron technologies. Besides its impact for low-power implementations, recent research has investigated whether it could lead to exploitable side-channel leakages. Both simulated analyses and measurements from FPGA devices have confirmed that such a static signal can indeed lead to successful key recoveries. In this respect, the main remaining question is whether it can become the target of choice fo...
34 CitationsSource
Jun 9, 2013 in ICC (International Conference on Communications)
#1Venkatachalam Subramanian (Georgia Institute of Technology)H-Index: 4
#2Selcuk Uluagac (Georgia Institute of Technology)H-Index: 7
Last. Raheem Beyah (Georgia Institute of Technology)H-Index: 31
view all 4 authors...
The nodes in wireless sensor networks (WSNs) utilize the radio frequency (RF) channel to communicate. Given that the RF channel is the primary communication channel, many researchers have developed techniques for securing that channel. However, the RF channel is not the only interface into a sensor. The sensing components, which are primarily designed to sense characteristics about the outside world, can also be used (or misused) as a communication (side) channel. In this paper, we characterize ...
22 CitationsSource
Jul 11, 2012 in SOUPS (Symposium On Usable Privacy and Security)
#1Adrienne Porter Felt (University of California, Berkeley)H-Index: 24
#2Elizabeth Ha (University of California, Berkeley)H-Index: 1
Last. David Wagner (University of California, Berkeley)H-Index: 94
view all 6 authors...
Android's permission system is intended to inform users about the risks of installing applications. When a user installs an application, he or she has the opportunity to review the application's permission requests and cancel the installation if the permissions are excessive or objectionable. We examine whether the Android permission system is effective at warning users. In particular, we evaluate whether Android users pay attention to, understand, and act on permission information during instal...
794 CitationsSource
#1Luigi Atzori (University of Cagliari)H-Index: 30
#2Antonio IeraH-Index: 37
Last. Giacomo Morabito (University of Catania)H-Index: 30
view all 3 authors...
This paper addresses the Internet of Things. Main enabling factor of this promising paradigm is the integration of several technologies and communications solutions. Identification and tracking technologies, wired and wireless sensor and actuator networks, enhanced communication protocols (shared with the Next Generation Internet), and distributed intelligence for smart objects are just the most relevant. As one can easily imagine, any serious contribution to the advance of the Internet of Thing...
10.4k CitationsSource
Jul 28, 2008 in SAINT (Symposium on Applications and the Internet)
#1Jungsuk Song (Kyoto University)H-Index: 9
#2Hiroki Takakura (Kyoto University)H-Index: 13
Last. Yongjin Kwon (Korea Aerospace University)H-Index: 6
view all 3 authors...
Intrusion detection system (IDS) has played an important role as a device to defend our networks from cyber attacks. However, since it still suffers from detecting an unknown attack, i.e., 0-day attack, the ultimate challenge in intrusion detection field is how we can exactly identify such an attack. Unlike the existing approaches that investigate raw traffic data, we introduced a feature extraction method in order to detect such an attack from IDS alerts [J. Song et al., 2007]. However, there i...
29 CitationsSource
Cited By1
#1Sharipuddin (Sriwijaya University)H-Index: 3
#2Benni Purnama (Sriwijaya University)H-Index: 3
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 8 authors...
Feature extraction solves the problem of finding the most efficient and comprehensive set of features. A Principle Component Analysis (PCA) feature extraction algorithm is applied to optimize the effectiveness of feature extraction to build an effective intrusion detection method. This paper uses the Principal Components Analysis (PCA) for features extraction on intrusion detection system with the aim to improve the accuracy and precision of the detection. The impact of features extraction to at...
1 CitationsSource