ENT Result Output for 64-bit (Algorithm1 to Algorithm 3)

ENT Result Output for 64-bit (Algorithm1 to Algorithm 3)

Source publication
Article
Full-text available
The pervasiveness of IoT device requires each device to have a unique address number in order to communicate. Internet Standard specified in RFC4941-Privacy Extension for SLAAC had question raised on the randomness of the IPv6 address generated due to the shortcoming of device random generator algorithm. Improvements to the RFC’s have been proposed...

Context in source publication

Context 1
... nearer the test result to the comparative value of 127.5 is the more random the IPv6 address. Like the entropy result, Algorithm 1 score is further from the comparative value than algorithm 2 and algorithm 3. Table 2 shows the comparative value of the Arithmetic Mean Test. Monte Carlo value for Pi was calculated by plotting 6 successive sequence of byte into 24bits X and Y axis coordinates within a square. ...

Citations

... The DHT11 has an operating humidity rang of 20-90% RH and readings with ±5% accuracy. The DHT11 was consisted of 3 wires, the red wire connects to 3.3-5 V power, the white or the yellow wire (data pin) connects to GPIO, place a 10 K ohm resistor between VCC, the data pin, and the black wire connects to ground [33]. The last sensor is light sensor (LS) as LDR sensor. ...
Article
Full-text available
p>The internet of things (IoT) is a network of physical devices and is becoming a major area of innovation for computer-based systems. Agriculture is one of the areas which could be improved by utilizing this technology ranging from farming techniques to production efficiency. The objective of this research is to design an IoT to monitor local vegetable (Coriander; Coriandrum sativum L.) growth via sensors (light, humidity, temperature, water level) and combine with an automated watering system. This would provide planters with the ability to monitor field conditions from anywhere at any time. In this research, a group of local vegetables including coriander, cilantro, and dill weed were experimented. The prototype system consists of several smart sensors to accurately monitor the mentioned vegetable growth from seedling stage to a fully grown plant which will ensure the highest production levels from any field environment. Three different types coriander were measured under these parameters: height, trunk width, and leaf width. The result showed that IoT ecosystem for planting different types of coriander could produce effective and efficient plant growth and ready for harvest with a shorter time than conventional method.</p
... Implementing cryptosystem into data security to increase confidentiality is needed. All transmitted data will be in encrypted format during transmission where they are in cipher text mode [6][7]. ...
Article
Full-text available
IoT create an ecosystem that can be useful to the world with its various services. That make the security of IoT is more important. This paper presents a proposed technique to secure data transaction from IoT device to other node using cryptography technique. AES cryptography and IoT device model ESP8266 is used as a client to send data to a server via HTTP protocol. Security performance matrices used eavesdropping attack with Wireshark sniffing and brute-force attack. will be simulated to the proposed method in order to ensure if there is any possibility it can be cracked using those attacks and to evaluate the performance of ESP8266, several experiments were be conducted. Result gather from this experiment was evaluated based on processing time to see the effectiveness of the platform compare to different data size used while adapting this technique.
... However, the most espousing feature of NDP is the support for auto configuration. Selfconfiguration allows for reduction of operational and deployment cost of networks in addition to providing substantial self-management support for network nodes (Kasiran & Napi, 2018;Narten, Draves, & Krishnan, 2007). Additionally, productivity of inexperienced users to manage complex networks is increased. ...
... Privacy extensions have no authentication mechanism in place that facilitates the receiver to enable the validity of sender. The only viable solution to maintain privacy is to generate highly randomized IID which cannot be easily tracked (Kasiran & Napi, 2018.). The technique assumes that by creating arduous IIDs which are hard to approximate, the malicious node will fail to determine node's current location and hence will be ineffectual in deploying attacks on the node. ...
Article
Full-text available
Stateless Address Autoconfiguration (SLAAC) is one of the novel features introduced in IPv6 Neighbor Discovery Protocol (NDP) providing for self-configuration of nodes and supplementing the reduction of operational and deployment cost of networks. Although self-configuration elevates the idea of autonomy for network, it has also introduced vulnerabilities that require substantial solutions. The SLAAC is pivoted on the presumption that network consists of authentic and entrusted nodes, however with inception of public sector wireless networks; any node can affix to the link with trivial authentication and situation changes radically. Although some security extensions like IPsec or SeND have been proposed, but these security protocols have been reported to have serious limitations like complex cryptographic algorithms which negate their adoption. This paper revisits the stateless auto configuration process and discusses its inherent vulnerabilities. The paper surveys existing research and available defense mechanisms available to protect SLAAC. The paper also suggests some guidelines from existing literature which can further promote and supplement the research to secure the auto configuration process. Finally, a novel technique is proposed for securing IPv6 link layer communication against DoS and Man-in-the-Middle attack which can be used as an alternate approach for CGA and SeND protocol.