2017 IEEE International Instrumentation and Measurement Technology Conference (I2MTC) 2017
DOI: 10.1109/i2mtc.2017.7969754
|View full text |Cite
|
Sign up to set email alerts
|

First step towards an IoT implementation of a wireless sensors network for environmental radiation monitoring

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 23 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…In order to evaluate the performance of our proposed authentication protocol based on EPNR Decrypt encrypted Hash(Nonce||Ts) with (E, N) (9) Generate Hash(Nonce||T s ) from the result of (9) (10) Hash(Nonce||T s ) comparison/confirmation (11) Generate Hash(ID R ) (12) Double encryption to Hash(ID R ) (13) Encrypt e and n with (E, N) ( 14) Disguise result of ( 13) and ( 14) with K 3 ,K 4 , and K 5 (15) Generate Nonce and Timestamp (T R ) (16) Generate Hash (Nonce||T R ) and encrypt with (e, n) (17) Conversion result of ( 15) and ( 17) to ASCII code (18) Concatenate the result of ( 18) with Nonce||T R ( 19)…”
Section: Proposed Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to evaluate the performance of our proposed authentication protocol based on EPNR Decrypt encrypted Hash(Nonce||Ts) with (E, N) (9) Generate Hash(Nonce||T s ) from the result of (9) (10) Hash(Nonce||T s ) comparison/confirmation (11) Generate Hash(ID R ) (12) Double encryption to Hash(ID R ) (13) Encrypt e and n with (E, N) ( 14) Disguise result of ( 13) and ( 14) with K 3 ,K 4 , and K 5 (15) Generate Nonce and Timestamp (T R ) (16) Generate Hash (Nonce||T R ) and encrypt with (e, n) (17) Conversion result of ( 15) and ( 17) to ASCII code (18) Concatenate the result of ( 18) with Nonce||T R ( 19)…”
Section: Proposed Methodsmentioning
confidence: 99%
“…Some related researches to radiation monitoring have been conducted [13][14][15][16]. However, they were purely focused on local communication without considering outside communication and required security aspects, especially in mechanism of device authentication.…”
Section: Related Workmentioning
confidence: 99%
“…For water monitoring, sensors that detect water levels could provide early warnings of water disasters, such as floods, allowing people the time to evacuate or plan in advance of the event [80]. Similarly, radiological risk monitoring helps reduce or eliminate the consequences of the release of radiation elements by providing early detection [81]. Sensors that could predict air temperature and relative air humidity could also help detect and manage the spread of fungal diseases in crop fields, which are important for providing food to the population [82].…”
Section: Internet Of Things In Environment and Healthmentioning
confidence: 99%
“…The Lopy is a multi-bearer microcontroller that is able to communicate via LoRa, Wi-Fi, and Bluetooth protocols. These features make it particularly suitable for the development of devices to be integrated into IoT platforms [28].…”
Section: Data Transmissionmentioning
confidence: 99%