Optimized and secured data collection and recovery for IoT applications

  • Authors

    • M. Tanooj Kumar
    • T. Praveena
    • T. Lakshman
    • M. Sai Krishna
    2018-03-18
    https://doi.org/10.14419/ijet.v7i2.7.10857
  • Basis Pursuit, Compressive sensing, Internet of Things (IoT), Measurement matrix.
  • This paper proposes a new compressive sensing based method for data collection and recovery related to IoT based systems. It performs data capturing, its compression and encryption at the same time, transmission, storage and its recovery. The measurement matrix, used in compressive sensing, is generated based on the user private key and is utilized for encrypting the captured data. Basis Pursuit is used for reconstruction of the data. The results shows that it is very suitable for the IoT based applications by considering data security, transmission cost and storage cost.

     

     

  • References

    1. [1] ENCRYPTION OF MESSAGES AND IMAGES USING COMPRESSED SENSING by Marie Dankova.

      [2] Compressed Sensing for IOT Application by Mayur Mhaske, Sayali Shelke,Bhakti Kulkarni, Ravindra Salunke, Dept. of Information Technology, Sinhgad Institute of Technology & Science.

      [3] Structured Compressed Sensing From Theory to Applications By Marco F. Duarte, Member, IEEE, and Yonina C. Eldar, Senior Member, IEEE.

      [4] D. L. Donoho, “Compressed sensing,†IEEE Trans. Inf. Theory, vol.52, no. 4, pp. 1289–1306, Sep. 2006.

      [5] R. G. Baraniuk, “Compressive sensing,†IEEE Signal Process. Mag.,vol. 24, no. 4, pp. 118–120, 124, Jul. 2007.

      [6] Candes, E. J.; Wakin, M. B.: An introduction to compressive sampling. Signal Processing Magazine, IEEE, vol.25, no.2, pp.21,30, March 2008, doi: 10.1109/MSP.2007.914731.

      [7] Sreedhanya, A.V.; Soman, K. P.: Secrecy of Cryptography with Compressed Sensing. 2012 International Conference on Advances in Computing and Communications. IEEE, 2012, p. 207-210. DOI: 10.1109/ICACC.2012.48.

      [8] M.Tanooj Kumar, Dr.M.Babu Reddy, compressive sensing based simultaneous data compression and convergent encryption for secure deduplication, International Journal of computer science and Information security, Vol. 15,No. 9.,2017, pp 144-147.

      [9] Mayiami, M. R.; Seyfe, B.; Bafghi; H. G.: Perfect Secrecy via Compressed Sensing. Communication and Information Theory (IWCIT), 2013 Iran Workshop on , vol., no., pp.1,5, 8-9 May2013. doi: 10.1109/IWCIT.2013.6555751/

      [10] Orsdemir, A.; Altun, H. O.; Sharma, G.; Bocko, M. F.: On the Security and Robustness Encryption via Compressed Sensing. MILCOM 2008-2008 IEEE Military Comm Conference. 2008. DOI: 10.1109/milcom.2008.4753187.

      [11] Sreedhanya , A.V.; Soman , K. P.: Secrecy of Cryptography with Compressed Sensing. 2012 International Conference on Advances in Computing and Communications. IEEE, 2012, p. 207-210. DOI: 10.1109/ICACC.2012.48.

      [12] ANNABATTULA, J., KOTESWARA RAO, S., SAMPATH DAKSHINA MURTHY, A., SRIKANTH, K.S. and DAS, R.P., 2015. Underwater passive target tracking in constrained environment. Indian Journal of Science and Technology, 8(35), pp. 1-4.

      [13] HUSSAIN, S.N. and KISHORE, K.H., 2016. Computational Optimization of Placement and Routing using Genetic Algorithm. Indian Journal of Science and Technology, 9(47),.

      [14] Vudatha, C.P., Nalliboena, S., Jammalamadaka, S.K.R., Duvvuri, B.K.K., Reddy, L.S.S., Automated generation of test cases from output domain of an embedded system using Genetic algorithms, ICECT 2011 - 2011 3rd International Conference on Electronics Computer Technology 5,5941989, pp. 216-220

      [15] Sastry, J.K.R., Suresh, A., Bhanu, S.J., Building heterogeneous distributed embedded systems through rs485 communication protocol, ARPN Journal of Engineering and Applied Sciences, 2015, 10(16), pp. 6793-6803

  • Downloads

  • How to Cite

    Kumar, M. T., Praveena, T., Lakshman, T., & Sai Krishna, M. (2018). Optimized and secured data collection and recovery for IoT applications. International Journal of Engineering & Technology, 7(2.7), 433-435. https://doi.org/10.14419/ijet.v7i2.7.10857