Edge Computing Security with an IoT device
Journal Title: Journal of Emerging Computer Technologies - Year 2021, Vol 1, Issue 1
Abstract
Information technologies are changing every aspect of human life day by day. In this context, Edge Computing, Internet of Things, Machine Learning and Big Data Analytics technologies are thought to be a part of this change. Edge computing aims to bring the computing power from the remote cloud environments to the endpoints/edges of networks. Thus, smart applications do not have to send all their data to the cloud and wait for the answers to come back over the same long route. Despite this advantage, there are security risks in the edge computing process. Encryption of information is of great importance especially for IoT devices to perform transactions safely. With a system established in this study, encrypted communication has been tried to be provided on IoT devices performing edge computing. In this way, it is aimed to make the communication secure. Arduino is used as an IoT device. In the encryption process, AES encryption is used with 128-bit and 256-bit key length.
Authors and Affiliations
Beyda Nur Kars
Vehicle Detection with HOG and Linear SVM
In this paper, we present a vehicle detection system by employing Histogram of Oriented Gradients (HOG) for feature extraction and linear SVM for classification. We study the influence of the colour space on the performa...
Edge Computing Security with an IoT device
Information technologies are changing every aspect of human life day by day. In this context, Edge Computing, Internet of Things, Machine Learning and Big Data Analytics technologies are thought to be a part of this chan...
GoHammer Blockchain Performance Test Tool
Decentralized services are increasingly being developed and their Decentralized applications are increasingly developed but their performance metrics are not tested enough. The total number of transactions that can be su...
A Dynamic Method and Program for Multiple Password Generation and Management
Authentication is a process that users must do first to gain access to the websites/services they receive service from. Today, the most common method used for authentication is still text-based passwords. But, some diffi...
Semantic Web and Hospital Appointment Ontology
Ontologies are a very important element for applications. They are used in many areas such as management information systems, e-commerce applications. Ontologies also play a major role in the new technology called Web 3....