Вы находитесь на странице: 1из 20

IoT based lightweight object

security in named data networking


and Management
CONTENTS
 OBJECTIVE
 ABSTRACT
 INTRODUCTION
 LITERATURE SURVEY
 PROPOSED SYSTEM
 BLOCK DIAGRAM
 BLOCK DIAGRAM DESCRIPTION
 ALGORITHM
 SOFTWARE USED
 CONCLUSION
 REFERENCE
OBJECTIVE
 Face recognition interfaced with hardware using
microcontroller for home security system
ABSTRACT
 Information Centric Networking (ICN) is a
communication paradigm that provides content-
oriented functionality in the network and at the
network level, including content routing, caching,
multicast, mobility, data-centric security and a flexible
namespace.
 a viable solution for supporting IoT services without
requiring any centralized entity.
 the Lightweight Named Object solution: a convenient
way to represent physical IoT objects in a derived
name space, exploiting ICN.
 We present some proof-of-concept implementations of
the proposed abstraction dealing with challenging IoT
test cases
INTRODUCTION
 In general, there is no accepted definition about the Internet
of Things.
 A common idea in all the definitions that the first version of
the Internet was about data created by human, while the next
version is about data created by things, that’s why it called
Internet of things.
 The purpose of IoT is to increase the functions of the first
version of Internet and make it more useful.
 It can also be described as including embedded intelligence in
individual objects that can notice changes in their physical
state.
 The Lightweight Named Object (LNO) concept consists in
using ICN hierarchical names and their inherent security,
organizing the namespaces provided by the network with aim
of addressing specific IoT tasks.
Literature Survey
Facial deblur inference using subspace
analysis for recognition of blurred faces
Method used
 Facial recognition

Advantages
 Filtering the noise is efficient

Disadvantages
 Not Feasible
Adaptive image restoration based on local
robust blur estimation
Method used
 Spatial correlation

Advantages
 Data Estimation is valid

Disadvantages
 Not efficiency
Close the loop: Joint blind image restoration
and recognition with sparse representation
Method used
 Restoration model

Advantages
 Blur images will be Positively reduced

Disadvantages
 Complexity
Removing Camera Shake from a Single
Photograph
Method used
 Two phase Algorithm is used

Advantages
 The method is easy and simple to verify.

Disadvantages
 Only precede accurate result for the Single
photograph.
Non-uniform motion deblurring for
bilayer scenes
Method used
 Kernel segmentation

Advantages
 The segmentation is used to maintain the user
complexity less

Disadvantages
 Time consuming
BLOCK DIAGRAM

Image acquisition
Resizing

Future Extraction
Preprocessing Segmentation

RGB to Gray
conversion Classification
Webcam

Person Detection

PC

USB
Serial
BLOCK DIAGRAM
DESCRIPTION
 Face detection is localization of the face in an image.
 Track the face in between multiple frames, to reduce computational time
and preserve the identity of a face (person) between frames.
 Face preprocessing step is to normalize the coarse face detection, so that a
robust feature extraction can be achieved.
 feature extraction is to extract a compact set of interpersonal discriminating
geometrical or/and photometrical features of the face.
 Feature matching is the actual recognition process. The feature vector
obtained from the feature extraction is matched to classes (persons) of
facial images already enrolled in a database.
 A webcam is a video camera that feeds or streams an image or video in real
time to or through a computer to a computer network, such as the Internet.
 A USB adapter is a type of protocol converter which is used for
converting USB data signals to and from other communications standards.
Commonly, USB adapters are used to convert USB data to standard serial
port data and vice versa.
ALGORITHM
 LBPH Algorithm
 Human beings perform face recognition automatically
every day and practically with no effort.
 Although it sounds like a very simple task for us, it
has proven to be a complex task for a computer, as it
has many variables that can impair the accuracy of the
methods, for example: illumination variation, low
resolution, occlusion, amongst other.
 Local Binary Pattern (LBP) is a simple yet very
efficient texture operator which labels the pixels of an
image by thresholding the neighborhood of each pixel
and considers the result as a binary number.
SCREEN SHOTS
CONCLUSION
 LNO provides a convenient abstraction of
real objects supporting easy discovery,
programming and management procedures
for real or virtual Internet of Things devices.
 The proposed naming schema allows the
diffusion of names by means of the NLSR
routing protocol.
 A Proof of Concept has been implemented
using commercial IoT products and showing
objects augmentation and function chaining.
REFERENCES
 [1] A. Zanella, N. Bui, A. Castellani, L.Vangelista, and M. Zorzi,
“Internet of things for smart cities,” IEEE Internet of Things journal,
vol. 1, no. 1, pp. 22–32, 2014.
 [2] A. Botta, W. De Donato,V. Persico, and A. Pescap ´e, “Integration
of cloud computing and internet of things: a survey,” Future
Generation Computer Systems, vol. 56, pp. 684–700, 2016.
 [3] I. Ishaq, D. Carels, G. K. Teklemariam, J. Hoebeke, F.V. d. Abeele, E.
D. Poorter, I. Moerman, and P. Demeester, “Ietf standardization in
the field of the internet of things (iot): a survey,” Journal of Sensor
and Actuator Networks, vol. 2, no. 2, pp. 235–287, 2013.
 [4] W. Shang,Y.Yu, R. Droms, and L. Zhang, “Challenges in iot
networking via tcp/ip architecture,” Tech. Report NDN-0038. NDN
Project, 2016.
 [5] Y.Yu, A. Afanasyev, D. Clark,V. Jacobson, L. Zhang et al.,
“Schematizing trust in named data networking,” in Proceedings of
the 2nd International Conference on Information-Centric
Networking. ACM, 2015, pp. 177–186.

Вам также может понравиться