Présentation PowerPoint

Published on Slideshow
Static slideshow
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 1 (0s)

International Conference on Pattern Analysis and Intelligent Systems.

Scene 2 (11s)

1. Introduction. Problematic. 2. Internet of Things(IoT).

Scene 3 (32s)

Introduction. The internet of things(IoT) plays an increasingly crucial role in the contemporary world..

Scene 4 (47s)

Problematic. The exchange of data is essential among IoT devices. However, data can be vulnerable to various attacks. The authentication phase is one of the most important phases in security..

Scene 5 (1m 1s)

[image] J0078625. What is the Internet of Things?.

Scene 6 (1m 16s)

Security and Blockchain. 7.

Scene 7 (1m 25s)

Security mechanism:. Elliptic Curve Cryptography(ECC).

Scene 8 (1m 40s)

Blockchain. Security and Blockchain. A decentralized ledger..

Scene 9 (1m 56s)

Proposed approach. Our proposed approach comprises 4 phases.

Scene 10 (2m 8s)

01. The key generation phase. Proposed Approach. 11.

Scene 11 (2m 15s)

Generation of random numbers. Generation of the ECC private key.

Scene 12 (2m 25s)

02. The registration phase. Proposed Approach. 13.

Scene 13 (2m 33s)

Users. Proposed Approach. PuB EncryptedID. قفل PNG الصور | ناقل و PSD الملفات | تحميل مجاني على Pngtree.

Scene 14 (2m 59s)

03. The authentication phase. Proposed Approach. 17.

Scene 15 (3m 7s)

User. Generate N. Proposed Approach. Calculate HASH(ID).

Scene 16 (3m 56s)

04. The session key phase. s. Proposed Approach. 19.

Scene 17 (4m 3s)

SK = N Xor ID. SK = N’ Xor ID. Approche Proposé. Don’t share.

Scene 18 (4m 13s)

Simulation et Résultat. [image]. 21.

Scene 19 (4m 20s)

[image] J0078625. s. Why NS3?. NS3. 22. Open source.

Scene 20 (4m 31s)

Protocol excution time. The first graph highlights the following key elements:.

Scene 21 (4m 49s)

The third graph highlights the following key elements:.

Scene 22 (5m 7s)

The average block creation time. The first chart highlights the following key elements:.

Scene 23 (5m 30s)

Throughput. The following graph highlights the following points:.

Scene 24 (5m 46s)

Comparison graph. 27.

Scene 25 (5m 53s)

Computational cost. The following graph shows the comparison between our scheme and other schemes in terms of computation cost..

Scene 26 (6m 10s)

Communication cost. The following graph shows the comparison between our scheme and other schemes in terms of communication cost..

Scene 27 (6m 28s)

Conclusion. Security in the Internet of Things (IoT) is one of the hottest topics of our time. In this thesis, we have proposed a secure scheme that ensures a secure authentication and data exchange process by using blockchain..

Scene 28 (6m 42s)

THANK YOU FOR YOUR ATTENTION.. [image] 52rose ouvre.