The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet of Things (IoT) conceptualizes the idea of remotely connecting and monitoring real world objects (things) through the Internet [1]. When it comes to our house, this concept can be aptly incorporated to make it smarter, safer and automated. This IoT project focuses on building a smart wireless home security system which sends alerts to the owner by using Internet in case of any trespass and...
Owing to the rapid developments in automation technology, embedded systems and connectivity, the emerging technology ‘Internet of Things’ (IOT) is sky-rocketing. Number of devices that can be inter connected through IOT is shooting up day-by-day. Life is made simpler and more productive through IOT. IOT can be considered as the network of multiple things including inanimate things as well as living...
India ranks sixth in the world in terms of production of coffee. As India being predominantly a tea consuming nation, about 80% of the country's coffee production is exported. The cultivation of coffee is primarily in the southern states of India and depends predominantly on the south west monsoon. Due to the current change in the climate patterns, artificial irrigation is essential to boost the productivity...
Various applications ranging from digital signal processing to cryptography require the usage of efficient multipliers. Many algorithms have been proposed in order to improve the speed while making use of lesser resources. There are 16 sutras or algorithms described in the Vedic literature for multiplication. This work makes use of Urdhva Tiryakbhyam Sutra, one among the 16 sutras and the same has...
Wireless Sensor Networks (WSNs) comprise of large number of sensor nodes, which sense and measure various physical phenomena related parameters and transmit the measured data towards the base station by making use of the neighbouring nodes acting as relay nodes. In order to extend the lifetime of a WSN application, it is necessary to distribute the energy dissipated among the nodes evenly in the network...
Various cryptographic techniques use finite field multiplication. An efficient implementation of finite field multiplication is essential. Especially, elliptic curve cryptography (ECC), which provides high security with shorter key lengths, requires many multiplications during encryption and decryption phases. It is imperative to choose a faster and less resource consuming multiplier. Many algorithms...
Wireless Sensor Networks (WSN) are spatially distributed nodes monitoring physical or environmental conditions such as temperature, pressure, sound, light etc using sensors. The sensed data is cooperatively passed through a series of nodes in a network to a main base-station (BS) where it is analysed by the user. The data is communicated over a wireless channel between the nodes and since wireless...
Most of the scientific operation involve floating point computations. It is necessary to implement faster multipliers occupying less area and consuming less power. Multipliers play a critical role in any digital design. Even though various multiplication algorithms have been in use, the performance of Vedic multipliers has not drawn a wider attention. Vedic mathematics involves application of 16 sutras...
Certain Wireless sensor network (WSN) applications such as military and e- health care require the inter-node communication to be secure. The tiny WSN nodes have limited computational power, memory and finite energy source. These constraints restrict the implementation of highly secure models on the devices as they demand more memory and involve compute intensive operations. Several protocols have...
Scalar Multiplication(SM) is the most frequently used operation in Elliptic Curve Cryptography(ECC). The efficiency of an ECC based system depends on the efficient implementation of SM. The type of basis used while designing a cryptosystem determines the space and time complexities. We implemented two multipliers based on Optimal Normal Basis of type II(ONB) and polynomial basis. This work uses Karatsuba...
Security is an important feature to be included in the field of wireless communications, where the transmission and reception need to be unassailable. Every wireless device needs to adopt a security model which may be complex or simple to make the com- munication impregnable. The algorithm to be chosen for the final implementation depends on the charac- teristics of the device. Applications requiring...
Sample rate conversion for a software radio receiver is one of the critical tasks. Due to the phenomenon of bandpass sampling, digitization of a very high intermediate frequency incorporating different wireless communication standards has to undergo sample rate conversion ranging from a factor of 4 to 400. In this paper, an architectural implementation of Digital Down Converter (DDC) for multi-standard...
Currently, various irrigation practices like localized irrigation, usage of sprinklers and sub-irrigation are being used while facilitating plant growth and conserve water. By making use of wireless sensor network (WSN) nodes in irrigation, a farmer can locate the specific areas, which need to be irrigated with limited amount of water and thereby avoid over irrigation and conserve water. This work...
Public key cryptography (PKC) is highly secure against threats compared to symmetric key cryptography (SKC). One of the PKC techniques, Elliptic curve cryptography has been gaining wider attention as compared to the popular RSA due to its lesser key size requirements in order to provide a similar security level. This paper details the hardware implementation modular multiplicative over binary field...
The rapid growth of technology influenced the need for the design of highly efficient digital systems. Multipliers have been playing a crucial role in every digital design. It is necessary to make use of an efficient multiplier. Many algorithms came into existence aiming at the reduction of execution time and area. Taking us back to the Vedic (ancient Indian) era, the sutras or algorithms described...
Secure Communication has become an important aspect in wireless sensor network applications such as military, medical and industrial fields. The nodes in WSN have limited computational ability and limited energy. These device constraints dictate the choice of various crypto primitives for the security model. This work considers a stream cipher algorithm, RC-4, which is easy to implement on the sensor...
The floating point arithmetic, specifically multiplication, is a widely used computational operation in many scientific and signal processing applications. In general, the IEEE-754 single-precision multiplier requires a 23 × 23 mantissa multiplication and the double-precision multiplier requires a large 52 × 52 mantissa multiplier to obtain the final result. This computation exists as a limit on both...
Elliptic Curve Cryptography (ECC) has been gaining popularity due to its shorter key size requirements. It uses arithmetic operations including addition, subtraction, multiplication and inversion in finite fields. For an efficient implementation of ECC, it is very important to carry out these operations faster using lesser resources. The in version operation consumes most of the time and more resources...
Software defined radio (SDR) seems to be a solution for communications for rapid changes in the communication standards. The two most computation and resource intensive tasks in the design of receiver for Software Defined Radio (SDR) are Sample Rate Conversion (SRC) and Channel-ization. Cascaded Integrator Comb (CIC) filters are suitable when Sample rate change by a large factor is desired. However,...
Mobile WiMAX is a broadband wireless access based on OFDM/OFDMA technology which employs Adaptive Modulation and Coding (AMC) scheme to attain higher data rates. In this paper, a selection strategy is incorporated with GNU Radio for the determination of Modulation and Coding Scheme (MCS) level dependent upon channel estimation parameter over AWGN and Rayleigh fading channels. MCS level choice has...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.