ICACT20220335 Question.1 Questioner: jianms@nfu.edu.tw 2022-02-15 ¿ÀÈÄ 9:27:26 |
ICACT20220335 Answer.1 Answer by Auhor matasemsaleh@gmail.com 2022-02-15 ¿ÀÈÄ 9:27:26
Chrome Click!! |
Since the encryption is added, does this research measure the delay or performance?
In addition, some researches proposed that the encryption can be based on the MAC address of IoT device. Does this research also consider these algorithm? |
Thanks a lot for your interest in our research. Yes, the encryption technique elapsed time and performance were included in our research, while the MAC address of the IoT device was not considered. |
ICACT20220335 Question.2 Questioner: phamdinhlam@kgu.ac.kr 2022-02-15 ¿ÀÈÄ 10:17:16 |
ICACT20220335 Answer.2 Answer by Auhor matasemsaleh@gmail.com 2022-02-15 ¿ÀÈÄ 10:17:16
Chrome Click!! |
As we all know, there are many IoT devices being used today. How to implement your approach into existing IoT devices? |
Thank you for taking an interest in our study. Yes, your inquiry is relevant to the primary purpose of our investigation. The number of IoT devices, as well as their structure, is continuously expanding. To address this need, we made our study, framework, and codes open-source so that the research community may use them on other devices, and we expect that will help in generalizing our model. |
ICACT20220335 Question.3 Questioner: faryal.nosheen@ceme.nust.edu.pk 2022-02-15 ¿ÀÈÄ 10:12:03 |
ICACT20220335 Answer.3 Answer by Auhor matasemsaleh@gmail.com 2022-02-15 ¿ÀÈÄ 10:12:03
Chrome Click!! |
First of all I like to appreciate your work. As you have mentioned in data preprocessing slide, you also have done feature selection, I like to know which techniqie you have been implemented for feature selection. |
Thanks a lot for your beautiful words and interest in our research. Different feature selection techniques were used such as Random Forest and Decision Tree feature importance, besides correlation coefficient, which was used to eliminate one of 2 highly correlated features. Furthermore, we conducted various analyses to understand better the impact of key and message size on CPU utilization, Performance, and Elapsed time. |
ICACT20220335 Question.4 Questioner: tomayoon@ieee.org 2022-02-16 ¿ÀÀü 12:17:56 |
ICACT20220335 Answer.4 Answer by Auhor matasemsaleh@gmail.com 2022-02-16 ¿ÀÀü 12:17:56
Chrome Click!! |
First of all, thank you for the good research paper and presentation contents. I would like to know more about the research environment used in this study, and also in detail about the equipment & operating systems, development languages and software libraries you used. |
Thanks a lot for your beautiful words and interest in our research. The framework was created using python IDE. We used 3 devices and those are Raspberry-Pi 3, Raspberry-Pi Zero and Pocket Beagleboard. Raspberry-Pi 3 runs Raspbian OS (32-bit), whilst Raspberry-Pi Zero and Pocket run a lightweight version of the Debian Linux distribution. Our framework made use of the RUSAGE and Ps profilers. All the material will be given in our upcoming publication, as well as our framework for others who want to expand our work. |
ICACT20220335 Question.5 Questioner: akmoon@etri.re.kr 2022-02-16 ¿ÀÀü 12:04:00 |
ICACT20220335 Answer.5 Answer by Auhor matasemsaleh@gmail.com 2022-02-16 ¿ÀÀü 12:04:00
Chrome Click!! |
What kind of encryption algorithms specifically did you choose from the python repository? |
I appreciate your interest in our research. Below are the encryption techniques we used in our research
The symmetric encryption techniques
AES, DES, 3DES, Fernet, Blowfish, ARC2, ARC4 , ChaCha, Salsa, RC5
Asymmetric
RSA, EMO-1, Schimedt-Samoa, Sphincs, BLS, Ed255192, ECDSA, Lamport
Lightweight encryption
Clefia, LEA, Present, Rabbit, Simon, Skinny, TEA, XTEA, XXTEA, Xtwine
|
ICACT20220335 Question.6 Questioner: namacabale@gmail.com 2022-02-16 ¿ÀÀü 12:33:14 |
ICACT20220335 Answer.6 Answer by Auhor matasemsaleh@gmail.com 2022-02-16 ¿ÀÀü 12:33:14
Chrome Click!! |
Dear Author, you have a very good research. In many Engineering work it's hard to address issues all at the same time. Somehow to address some issues you need to trade or give up some advantages. In your work, what specific aspect(s) was/were sacrificed or ignored to achieve your goal. Like for example, the more complex encryption becomes the more hardware becomes expensive and complex too. |
Thank you for your beautiful words and for taking an interest in our study. I agree that it is difficult to include all of the characteristics that affect the IoT device resources. Those characteristics can be within the encryption algorithm, as you mentioned, such as key size, number of rounds, and algorithm complexity, or within the IoT device itself, such as the number of processors, frequency, or even the type of operating system, or they can be in the environment surrounding the IoT device, such as temperature since our research experiment operates in multidimensional problems, which is why we addressed Machine Learning as a perfect solution for such issues. However, because the dataset was not available to us, it wasn't easy to evaluate all of the characteristics during our test, so we excluded several aspects in each of the sectors listed above. Some examples of ignored attributes are power consumption, the surrounding temperature, operating system impact (lightweight vs full version), limited number of key size and message size, and limited number of IoT devices. We hope that by making our framework open-source, the research community will be able to engage in incorporating all of the characteristics we have ignored. |
ICACT20220335 Question.7 Questioner: namacabale@gmail.com 2022-02-16 ¿ÀÈÄ 9:21:21 |
ICACT20220335 Answer.7 Answer by Auhor matasemsaleh@gmail.com 2022-02-16 ¿ÀÈÄ 9:21:21
Chrome Click!! |
Dear Author, you have a very good research. Is there an existing technology almost similar to your proposal that has been deployed in real world environment? What does it lack that your work specifically addressed? Thank you and stay safe. |
I appreciate your interest in our study. There is no comparable technology to the best of our knowledge, whether in the research field or the actual world. |
ICACT20220335 Question.8 Questioner: 326995871@qq.com 2022-02-19 ¿ÀÈÄ 7:32:04 |
ICACT20220335 Answer.8 Answer by Auhor matasemsaleh@gmail.com 2022-02-19 ¿ÀÈÄ 7:32:04
Chrome Click!! |
Dear Author, you have a very good research. How exactly did you choose the experimental equipment? Thank you and stay safe. |
|