Présentation PowerPoint

1 of
Published on Video
Go to video
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Page 1 (0s)

International Conference on Pattern Analysis and Intelligent Systems.

Page 2 (11s)

1. Introduction. Problematic. 2. Internet of Things(IoT).

Page 3 (32s)

Introduction. The internet of things(IoT) plays an increasingly crucial role in the contemporary world..

Page 4 (47s)

Problematic. The exchange of data is essential among IoT devices. However, data can be vulnerable to various attacks. The authentication phase is one of the most important phases in security..

Page 5 (1m 1s)

[image] J0078625. What is the Internet of Things?.

Page 6 (1m 16s)

Security and Blockchain. 7.

Page 7 (1m 25s)

Security mechanism:. Elliptic Curve Cryptography(ECC).

Page 8 (1m 40s)

Blockchain. Security and Blockchain. A decentralized ledger..

Page 9 (1m 56s)

Proposed approach. Our proposed approach comprises 4 phases.

Page 10 (2m 8s)

01. The key generation phase. Proposed Approach. 11.

Page 11 (2m 15s)

Generation of random numbers. Generation of the ECC private key.

Page 12 (2m 25s)

02. The registration phase. Proposed Approach. 13.

Page 13 (2m 33s)

Users. Proposed Approach. PuB EncryptedID. قفل PNG الصور | ناقل و PSD الملفات | تحميل مجاني على Pngtree.

Page 14 (2m 59s)

03. The authentication phase. Proposed Approach. 17.

Page 15 (3m 7s)

User. Generate N. Proposed Approach. Calculate HASH(ID).

Page 16 (3m 56s)

04. The session key phase. s. Proposed Approach. 19.

Page 17 (4m 3s)

SK = N Xor ID. SK = N’ Xor ID. Approche Proposé. Don’t share.

Page 18 (4m 13s)

Simulation et Résultat. [image]. 21.

Page 19 (4m 20s)

[image] J0078625. s. Why NS3?. NS3. 22. Open source.

Page 20 (4m 31s)

Protocol excution time. The first graph highlights the following key elements:.

Page 21 (4m 49s)

The third graph highlights the following key elements:.

Page 22 (5m 7s)

The average block creation time. The first chart highlights the following key elements:.

Page 23 (5m 30s)

Throughput. The following graph highlights the following points:.

Page 24 (5m 46s)

Comparison graph. 27.

Page 25 (5m 53s)

Computational cost. The following graph shows the comparison between our scheme and other schemes in terms of computation cost..

Page 26 (6m 10s)

Communication cost. The following graph shows the comparison between our scheme and other schemes in terms of communication cost..

Page 27 (6m 28s)

Conclusion. Security in the Internet of Things (IoT) is one of the hottest topics of our time. In this thesis, we have proposed a secure scheme that ensures a secure authentication and data exchange process by using blockchain..

Page 28 (6m 42s)

THANK YOU FOR YOUR ATTENTION.. [image] 52rose ouvre.