Syed Farid Syed Adnan
Universiti Teknologi MARA

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Analysis of Wireless Power Transfer on the inductive coupling resonant Cik Ku Haroswati Che Ku Yahaya; Syed Farid Syed Adnan; Murizah Kassim; Ruhani Ab Rahman; Mohamad Fazrul bin Rusdi
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: November 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i2.pp592-599

Abstract

Wireless power transfer through inductive coupling is proposed in this paper. Based on the concept of Tesla, the circuit was designed using two parallel inductors that are mutually coupled. The designed was split into two which are transmitter part and receiver part. The circuit was simulated using proteus simulation software. The results had shown that the changes in a number of turn of the inductor coils and distance of the two resonators affecting the efficiency of the power transfer. The wireless power transfer can be described as the transmission of electrical energy from the power source to the electrical load without any current-carrying wire connecting them. Wireless power transfer is deemed to be very useful in some circumstances where connecting wires are inconvenient. Wireless power transfer problems are different from wireless telecommunications such as radio. Commonly, wireless power transfers are conducted using an inductive coupling and followed by magnetic induction characteristics. In this project, we use magnetic induction using copper wire with a different diameter. By using these different diameters of wires, we are going to see the power transfer performance of each wire. It is possible to achieve wireless power transfer up to 30 centimeters between the transmitter and the receiver with a higher number of coil's turn. As concern as it may seem, the wireless power transfer field would be in high demand for electric power to be supplied in the future.
Testbed versus simulation approach on RF communication with AAβ asymmetric encryption scheme on internet of things devices Syed Farid Syed Adnan; Mohd Anuar Mat Isa; Habibah Hashim
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 1: April 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i1.pp353-359

Abstract

The revolution of the Internet of Things (IoT) has given a better way of monitoring things including anything that could gather data and share the information over the internet. Most of the connected things are using Device to Device (D2D) connection to make it available on the internet such as client to a broker or client to a server. However, when IoT devices such as embedded devices and sensors that are connected to the internet, it becomes an open path for attackers to acquire the data and data vulnerably will become an issue. Thus, data integrity might become an issue, or the attackers could temper the data and could cause a disastrous domino effect to the interconnected IoT devices. Therefore, the data security collected from the sensors is substantial even though it could be a single character transmitted. However, IoT sensors are low powered devices in term of CPU, storage, memory and batteries. Securing the devices such as integrating the encryption algorithm computations might give overhead to the sensors and draining the batteries even faster than it is predicted. Alternatively, this paper attempts to explore the capabilities of the asymmetric scheme on resource constrained devices for its communications. Thus, this paper presents an RF communication analysis of a low consumption asymmetric encryption, the AAβ (AA-Beta) especially on encryption section that is likely to be feasible on IoT devices to preserve the data integrity. The design of RF transmission has been considered to suit the RF transceiver capability to prevent data losses and error from occurring. The result shows that 2.35 times of RF transmits runtime increased compared to RF simulation runtime. Meanwhile, at the receiver side, the runtime increases 60% compared to the simulation.
RF Simulations for AAβ Cryptosystem, an Asymmetric Encryption Scheme Syed Farid Syed Adnan; Mohd Anuar Mat Isa; Habibah Hashim
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i2.pp542-548

Abstract

Internet of Things (IoT) is a way of providing data with the physical thing that interconnected to the network, which is the Internet. The IoT devices connected to the internet, broadcast of the data to the broker or a server, becomes an open route for attackers to gain the data and making the data becomes vulnerable. Thus, the data could be altered or spoofed by an attacker which led to security issues especially on data integrity. Therefore, the data security collected from the sensors is as important as on the servers that eventually become the big data. However, most sensors are low powered devices in term of CPU, storage, memory and batteries that cryptographic algorithm computations might give overhead to the sensors and reduce the batteries even faster than it is supposed to be. Instead of looking at symmetric encryption scheme, this paper tries to explore the capabilities of the asymmetric scheme on resource constrained devices communications. Thus, this paper presents an RF communication analysis of a low consumption asymmetric encryption, the AAβ (AA-Beta) that promising to implement on the IoT devices to secure the IoT networks. The result shows only 14% size increased in ciphertext from plaintext and the RF simulation communications show a better result in Raspbian OS environment compare to windows environment even though with same configurations