Enhancing Security Mechanisms for IoT-Fog Networks

Salah-Eddine Mansour, Abdelhak Sakhi, Larbi Kzaz, Abderrahim Sekkaki

Abstract


This study contributes to improving Morocco's fish canning industry by integrating artificial intelligence (AI). The primary objective involves developing an AI and image processing-based system to monitor and guarantee canning process quality in the facility. It commenced with an IoT-enabled device capable of capturing and processing images, leading to the creation of an AI-driven system adept at accurately categorizing improperly crimped cans. Further advancements focused on reinforcing communication between IoT devices and servers housing individual client's neural network weights. These weights are vital, ensuring the functionality of our IoT device. The efficiency of the IoT device in categorizing cans relies on updated neural network weights from the Fog server, crucial for continual refinement and adaptation to diverse can shapes. Securing communication integrity between devices and the server is imperative to avoid disruptions in can classification, emphasizing the need for secure channels. In this paper, our key scientific contribution revolves around devising a security protocol founded on HMAC. This protocol guarantees authentication and preserves the integrity of neural network weights exchanged between Fog computing nodes and IoT devices. The innovative addition of a comprehensive dictionary within the Fog server significantly bolsters security measures, enhancing the overall safety between these interconnected entities.

Keywords


Cloud Computing; Fog Computing; IoT; HMAC; Hashing.

Full Text:

PDF

References


S. Thouti, N. Venu, D. R. Rinku, A. Arora, and N. Rajeswaran, “Investigation on identify the multiple issues in IoT devices using Convolutional Neural Network,” Meas. Sens., vol. 24, p. 100509, Dec. 2022, doi: 10.1016/j.measen.2022.100509.

M. Ficco, A. Guerriero, E. Milite, F. Palmieri, R. Pietrantuono, and S. Russo, “Federated learning for IoT devices: Enhancing TinyML with on-board training,” Inf. Fusion, vol. 104, p. 102189, Apr. 2024, doi: 10.1016/j.inffus.2023.102189.

P. Reedy, “Interpol review of digital evidence for 2019–2022,” Forensic Sci. Int. Synergy, vol. 6, p. 100313, 2023, doi: 10.1016/j.fsisyn.2022.100313.

M. Asghar, L. Pan, and R. Doss, “An efficient voting based decentralized revocation protocol for vehicular ad hoc networks,” Digit. Commun. Netw., vol. 6, no. 4, pp. 422–432, Nov. 2020, doi: 10.1016/j.dcan.2020.03.001.

S. K. Khare, “Fast-track message authentication protocol for DSRC using HMAC and group keys,” Appl. Acoust., vol. 165, p. 107331, Aug. 2020, doi: 10.1016/j.apacoust.2020.107331.

P. Prajapati and K. Chaudhari, “KBC: Multiple Key Generation using Key Block Chaining,” Procedia Comput. Sci., vol. 167, pp. 1960–1969, 2020, doi: 10.1016/j.procs.2020.03.224.

M. E. Hameed, M. M. Ibrahim, N. A. Manap, and A. A. Mohammed, “A lossless compression and encryption mechanism for remote monitoring of ECG data using Huffman coding and CBC-AES,” Future Gener. Comput. Syst., vol. 111, pp. 829–840, Oct. 2020, doi: 10.1016/j.future.2019.10.010.

S. Jarillo and J. Barnett, “Contingent communality and community-based adaptation to climate change: Insights from a Pacific rural atoll,” J. Rural Stud., vol. 87, pp. 137–145, Oct. 2021, doi: 10.1016/j.jrurstud.2021.08.026.

M. Vít et al., “A broad tuneable birdcage coil for mouse 1H/19F MR applications,” J. Magn. Reson., vol. 329, p. 107023, Aug. 2021, doi: 10.1016/j.jmr.2021.107023.

L. L. De Taeye, M. J. Mees, and P. M. Vereecken, “Surpassing the 1 Li/Ti capacity limit in chlorine modified TiO 2 − y Cl 2 y,” Energy Storage Mater., vol. 36, pp. 279–290, Apr. 2021, doi: 10.1016/j.ensm.2020.12.030.

S. A. Abdel Hakeem and H. Kim, “Authentication and encryption protocol with revocation and reputation management for enhancing 5G-V2X security,” J. King Saud Univ. - Comput. Inf. Sci., vol. 35, no. 7, p. 101638, Jul. 2023, doi: 10.1016/j.jksuci.2023.101638.

H. Bühler, A. Walz, and A. Sikora, “Benchmarking of Symmetric Cryptographic Algorithms on a Deeply Embedded System,” IFAC-Pap., vol. 55, no. 4, pp. 266–271, 2022, doi: 10.1016/j.ifacol.2022.06.044.

B. Mohinder Singh and J. Natarajan, “A novel secure authentication protocol for eHealth records in cloud with a new key generation method and minimized key exchange,” J. King Saud Univ. - Comput. Inf. Sci., vol. 35, no. 7, p. 101629, Jul. 2023, doi: 10.1016/j.jksuci.2023.101629.

Y. Baek and S. Shin, “CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks,” Sensors, vol. 22, no. 7, p. 2636, Mar. 2022, doi: 10.3390/s22072636.

Q. Fei, “Traditional Chinese Medicine Treatment, Gua Sha, can Induce Subtle Molecular Changes in Gene Expression,” Biomed Env. Sci.

L. T. Piame, P. M. Kaktcham, E. M. F. Kouam, U. D. F. Techeu, R. J. Ngouénam, and F. Z. Ngoufack, “Technological characterisation and probiotic traits of yeasts isolated from Sha’a, a Cameroonian maize-based traditional fermented beverage,” Heliyon, vol. 8, no. 10, p. e10850, Oct. 2022, doi: 10.1016/j.heliyon.2022.e10850.

R. D. Sole, T. Stomeo, and L. Mergola, “Disposable Molecularly Imprinted Polymer-Modified Screen-Printed Electrodes for Rapid Electrochemical Detection of l-Kynurenine in Human Urine,” Polymers, vol. 16, no. 1, p. 3, Dec. 2023, doi: 10.3390/polym16010003.

S. Sentanoe and H. P. Reiser, “SSHkex: Leveraging virtual machine introspection for extracting SSH keys and decrypting SSH network traffic,” Forensic Sci. Int. Digit. Investig., vol. 40, p. 301337, Apr. 2022, doi: 10.1016/j.fsidi.2022.301337.

F. Breitinger, X. Zhang, and D. Quick, “A forensic analysis of rclone and rclone’s prospects for digital forensic investigations of cloud storage,” Forensic Sci. Int. Digit. Investig., vol. 43, p. 301443, Sep. 2022, doi: 10.1016/j.fsidi.2022.301443.

R. Matos et al., “Tactical Knowledge by Decision Making and Motor Efficiency of Young Football Players in Different Playing Positions during a Three-a-Side Small-Sided Game,” Behav. Sci., vol. 13, no. 4, p. 310, Apr. 2023, doi: 10.3390/bs13040310.

Z. Ma, X. Zhong, H. Xie, Y. Zhou, Y. Chen, and J. Wang, “A Combined Physical and Mathematical Calibration Method for Low-Cost Cameras in the Air and Underwater Environment,” Sensors, vol. 23, no. 4, p. 2041, Feb. 2023, doi: 10.3390/s23042041.

D. P. Hausherr and D. Berben, “(All-in-One) Power Supply System for Mobile and Network-Wired Raspberry Pi-Based Internet of Things Applications,” Hardware, vol. 1, no. 1, pp. 54–69, Dec. 2023, doi: 10.3390/hardware1010005.

A. Khan, K. S. Khattak, Z. H. Khan, T. A. Gulliver, and Abdullah, “Edge Computing for Effective and Efficient Traffic Characterization,” Sensors, vol. 23, no. 23, p. 9385, Nov. 2023, doi: 10.3390/s23239385.

S. B. Rosende, S. Ghisler, J. Fernández-Andrés, and J. Sánchez-Soriano, “Implementation of an Edge-Computing Vision System on Reduced-Board Computers Embedded in UAVs for Intelligent Traffic Management,” Drones, vol. 7, no. 11, p. 682, Nov. 2023, doi: 10.3390/drones7110682.

P. Akhil, R. Akshara, R. Athira, S. P. Kamalesh Kumar, M. Thamotharan, and S. Shobha Christila, “Smart Blind Walking Stick with Integrated Sensor,” in The 2nd International Conference on Innovative Research in Renewable Energy Technologies (IRRET 2022), p. 12, Sep. 2022, doi: 10.3390/materproc2022010012.

H. Chen, X. Chen, L. Peng, and Y. Bai, “Personalized Fair Split Learning for Resource-Constrained Internet of Things,” Sensors, vol. 24, no. 1, p. 88, 2023.

T. Vandervelden, D. Deac, R. Van Glabbeek, R. De Smet, A. Braeken, and K. Steenhaut, “Evaluation of 6LoWPAN Generic Header Compression in the Context of a RPL Network,” Sensors, vol. 24, no. 1, p. 73, Dec. 2023, doi: 10.3390/s24010073.

A. S. Al-Khaleefa, G. F. K. Al-Musawi, and T. J. Saeed, “IoT-Based Framework for COVID-19 Detection Using Machine Learning Techniques,” Sci, vol. 6, no. 1, p. 2, 2023.

M. Biabani, N. Yazdani, and H. Fotouhi, “Developing a Novel Hierarchical VPLS Architecture Using Q-in-Q Tunneling in Router and Switch Design,” Computers, vol. 12, no. 9, p. 180, Sep. 2023, doi: 10.3390/computers12090180.

A. Munshi, “Hybrid Detection Technique for IP Packet Header Modifications Associated with Store-and-Forward Operations,” Appl. Sci., vol. 13, no. 18, p. 10229, Sep. 2023, doi: 10.3390/app131810229.

T. Xiao, T. Cui, S. M. R. Islam, and Q. Chen, “Joint Content Placement and Storage Allocation Based on Federated Learning in F-RANs,” Sensors, vol. 21, no. 1, p. 215, Dec. 2020, doi: 10.3390/s21010215.

A. Bani-Bakr et al., “Optimizing the Number of Fog Nodes for Finite Fog Radio Access Networks under Multi-Slope Path Loss Model,” Electronics, vol. 9, no. 12, p. 2175, Dec. 2020, doi: 10.3390/electronics9122175.

A. Aldalbahi, M. A. Jasim, N. Siasi, M. Bouzguenda, H. Enshasy, and R. Sumsudeen, “Clustered and Distributed Caching Methods for F-RAN-Based mmWave Communications,” Appl. Sci., vol. 12, no. 14, p. 7111, Jul. 2022, doi: 10.3390/app12147111.

I. Ungurean and N. C. Gaitan, “A Dynamic IIoT Framework Based on the Publish–Subscribe Paradigm,” Sensors, vol. 23, no. 24, p. 9829, Dec. 2023, doi: 10.3390/s23249829.

Ö. Şeker, G. Dalkılıç, and U. C. Çabuk, “MARAS: Mutual Authentication and Role-Based Authorization Scheme for Lightweight Internet of Things Applications,” Sensors, vol. 23, no. 12, p. 5674, Jun. 2023, doi: 10.3390/s23125674.

F. Páez and H. Kaschel, “Design and Testing of a Computer Security Layer for the LIN Bus,” Sensors, vol. 22, no. 18, p. 6901, Sep. 2022, doi: 10.3390/s22186901.

A. Alotaibi, A. Ibrahim, R. Ahmed, and T. Abualait, “Effectiveness of Partial Body Weight-Supported Treadmill Training on Various Outcomes in Different Contexts among Children and Adolescents with Cerebral Palsy: A Systematic Review and Meta-Analysis,” Children, vol. 11, no. 1, p. 9, Dec. 2023, doi: 10.3390/children11010009.

K. Joseph, O. S. Eyobu, P. Kasyoka, and T. J. Oyana, “A Link Fabrication Attack Mitigation Approach (LiFAMA) for Software Defined Networks,” Electronics, vol. 11, no. 10, p. 1581, May 2022, doi: 10.3390/electronics11101581.

W. Fan, Q. Liu, X. Zhang, Y. Gao, X. Qi, and X. Wang, “A Symmetric and Multilayer Reconfigurable Architecture for Hash Algorithm,” Electronics, vol. 12, no. 13, p. 2872, Jun. 2023, doi: 10.3390/electronics12132872.

A. F. Gentile, D. Macrì, F. De Rango, M. Tropea, and E. Greco, “A VPN Performances Analysis of Constrained Hardware Open Source Infrastructure Deploy in IoT Environment,” Future Internet, vol. 14, no. 9, p. 264, Sep. 2022, doi: 10.3390/fi14090264.

Z. Sui, H. Shu, F. Kang, Y. Huang, and G. Huo, “A Comprehensive Review of Tunnel Detection on Multilayer Protocols: From Traditional to Machine Learning Approaches,” Appl. Sci., vol. 13, no. 3, p. 1974, Feb. 2023, doi: 10.3390/app13031974.

Q. Xia et al., “Using Phenol Formaldehyde Resin, Hexamethylenetetramine and Matrix Asphalt to Synthesize Hard-Grade Asphalts for High-Modulus Asphalt Concrete,” Sustainability, vol. 14, no. 23, p. 15689, Nov. 2022, doi: 10.3390/su142315689.

A. Venčkauskas, N. Morkevicius, K. Bagdonas, R. Damaševičius, and R. Maskeliūnas, “A Lightweight Protocol for Secure Video Streaming,” Sensors, vol. 18, no. 5, p. 1554, May 2018, doi: 10.3390/s18051554.

M. Iwański et al., “Stiffness Evaluation of Laboratory and Plant Produced Foamed Bitumen Warm Asphalt Mixtures with Fiber Reinforcement and Bio-Flux Additive,” Materials, vol. 16, no. 5, p. 1950, Feb. 2023, doi: 10.3390/ma16051950.

N. A. Mohd Khatib, A. Roseliza-Murni, S. Mohd Hoesni, and J. Manap, “Adolescent Connectedness: Testing Confirmatory Factor Analysis of the Hemingway: Measure of Adolescent Connectedness–Bahasa Melayu Version (HMAC–BM),” Int. J. Environ. Res. Public. Health, vol. 19, no. 19, p. 12189, Sep. 2022, doi: 10.3390/ijerph191912189.

K. Chakraborty, D. Kapila, S. Kumar, Bhupati, N. Shaik, and A. Singh, “Intelligent Machine Learning Based Internet of Things (IoT) Resource Allocation,” in RAiSE-2023, p. 73, Dec. 2023, doi: 10.3390/engproc2023059073.

E. V. D. Subramaniam, K. Srinivasan, S. M. Qaisar, and P. Pławiak, “Interoperable IoMT Approach for Remote Diagnosis with Privacy-Preservation Perspective in Edge Systems,” Sensors, vol. 23, no. 17, p. 7474, Aug. 2023, doi: 10.3390/s23177474.

A. A. Khamis et al., “Development and Performance Evaluation of an IoT-Integrated Breath Analyzer,” Int. J. Environ. Res. Public. Health, vol. 20, no. 2, p. 1319, Jan. 2023, doi: 10.3390/ijerph20021319.

J. L. Gonzalez-Compean, V. J. Sosa-Sosa, J. J. Garcia-Hernandez, H. Galeana-Zapien, and H. G. Reyes-Anastacio, “A Blockchain and Fingerprinting Traceability Method for Digital Product Lifecycle Management,” Sensors, vol. 22, no. 21, p. 8400, Nov. 2022, doi: 10.3390/s22218400.

C. Fu et al., “SqueezeGCN: Adaptive Neighborhood Aggregation with Squeeze Module for Twitter Bot Detection Based on GCN,” Electronics, vol. 13, no. 1, p. 56, Dec. 2023, doi: 10.3390/electronics13010056.

Z. Yao et al., “Identification of Milk Adulteration in Camel Milk Using FT-Mid-Infrared Spectroscopy and Machine Learning Models,” Foods, vol. 12, no. 24, p. 4517, Dec. 2023, doi: 10.3390/foods12244517.

X. Zheng, R. Feng, J. Fan, W. Han, S. Yu, and J. Chen, “MSISR-STF: Spatiotemporal Fusion via Multilevel Single-Image Super-Resolution,” Remote Sens., vol. 15, no. 24, p. 5675, Dec. 2023, doi: 10.3390/rs15245675.

A. N. Alvi, B. Ali, M. S. Saleh, M. Alkhathami, D. Alsadie, and B. Alghamdi, “TETES: Trust Based Efficient Task Execution Scheme for Fog Enabled Smart Cities,” Appl. Sci., vol. 13, no. 23, p. 12799, Nov. 2023, doi: 10.3390/app132312799.

A. I. A. Alzahrani, A. Al-Rasheed, A. Ksibi, M. Ayadi, M. M. Asiri, and M. Zakariah, “Anomaly Detection in Fog Computing Architectures Using Custom Tab Transformer for Internet of Things,” Electronics, vol. 11, no. 23, p. 4017, Dec. 2022, doi: 10.3390/electronics11234017.

M. Balfaqih, W. Jabbar, M. Khayyat, and R. Hassan, “Design and Development of Smart Parking System Based on Fog Computing and Internet of Things,” Electronics, vol. 10, no. 24, p. 3184, Dec. 2021, doi: 10.3390/electronics10243184.

Z. Wei, R. He, Y. Li, and C. Song, “DRL-Based Computation Offloading and Resource Allocation in Green MEC-Enabled Maritime-IoT Networks,” Electronics, vol. 12, no. 24, p. 4967, Dec. 2023, doi: 10.3390/electronics12244967.

R. Terris-Gallego, I. Fernandez-Hernandez, J. A. López-Salcedo, and G. Seco-Granados, “E1-E6 SDR Platform Based on BladeRF for Testing Galileo-Assisted Commercial Authentication Service,” Engineering Proceedings, vol. 54, no. 1, p. 29, 2023.

D. Gupta, S. Wadhwa, S. Rani, Z. Khan, and W. Boulila, “EEDC: An Energy Efficient Data Communication Scheme Based on New Routing Approach in Wireless Sensor Networks for Future IoT Applications,” Sensors, vol. 23, no. 21, p. 8839, Oct. 2023, doi: 10.3390/s23218839.

S. Sadhwani, B. Manibalan, R. Muthalagu, and P. Pawar, “A Lightweight Model for DDoS Attack Detection Using Machine Learning Techniques,” Appl. Sci., vol. 13, no. 17, p. 9937, Sep. 2023, doi: 10.3390/app13179937.

H. N. Noura, R. Melki, A. Chehab, and J. Hernandez Fernandez, “Efficient and secure message authentication algorithm at the physical layer,” Wirel. Netw., pp. 1-15, Jun. 2020, doi: 10.1007/s11276-020-02371-7.

D. Dinculeană and X. Cheng, “Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices,” Appl. Sci., vol. 9, no. 5, p. 848, Feb. 2019, doi: 10.3390/app9050848.

M. Bolanowski, A. Paszkiewicz, T. Żabiński, G. Piecuch, M. Salach, and K. Tomecki, “System Architecture for Diagnostics and Supervision of Industrial Equipment and Processes in an IoE Device Environment,” Electronics, vol. 12, no. 24, p. 4935, Dec. 2023, doi: 10.3390/electronics12244935.

S. Tjukovs, D. Surmacs, J. Grizans, C. V. Iheanacho, and D. Pikulins, “Implementation of Buck DC-DC Converter as Built-In Chaos Generator for Secure IoT,” Electronics, vol. 13, no. 1, p. 20, Dec. 2023, doi: 10.3390/electronics13010020.

T. Cultice, J. Clark, W. Yang, and H. Thapliyal, “A Novel Hierarchical Security Solution for Controller-Area-Network-Based 3D Printing in a Post-Quantum World,” Sensors, vol. 23, no. 24, p. 9886, Dec. 2023, doi: 10.3390/s23249886.

S. Ju and Y. Park, “Provably Secure Lightweight Mutual Authentication and Key Agreement Scheme for Cloud-Based IoT Environments,” Sensors, vol. 23, no. 24, p. 9766, Dec. 2023, doi: 10.3390/s23249766.

S. Shuai, Z. Hu, B. Zhang, H. B. Liaqat, and X. Kong, “Decentralized Federated Learning-Enabled Relation Aggregation for Anomaly Detection,” Information, vol. 14, no. 12, p. 647, Dec. 2023, doi: 10.3390/info14120647.

A. Podevyn, S. Van Vlierberghe, P. Dubruel, and R. Hoogenboom, “Design and Synthesis of Hybrid Thermo-Responsive Hydrogels Based on Poly(2-oxazoline) and Gelatin Derivatives,” Gels, vol. 8, no. 2, p. 64, Jan. 2022, doi: 10.3390/gels8020064.

G. Serrano et al., “Physiological Performance and Biosorption Capacity of Exiguobacterium sp. SH31 Isolated from Poly-Extreme Salar de Huasco in the Chilean Altiplano: A Study on Rare-Earth Element Tolerance,” Processes, vol. 12, no. 1, p. 47, 2024.

A. Sideris, T. Sanida, and M. Dasygenis, “A Novel Hardware Architecture for Enhancing the Keccak Hash Function in FPGA Devices,” Information, vol. 14, no. 9, p. 475, Aug. 2023, doi: 10.3390/info14090475.

A. Dolmeta, M. Martina, and G. Masera, “Comparative Study of Keccak SHA-3 Implementations,” Cryptography, vol. 7, no. 4, p. 60, Nov. 2023, doi: 10.3390/cryptography7040060.

H. Mestiri and I. Barraj, “High-Speed Hardware Architecture Based on Error Detection for KECCAK,” Micromachines, vol. 14, no. 6, p. 1129, May 2023, doi: 10.3390/mi14061129.

Y. B. Kim, T.-Y. Youn, and S. C. Seo, “Chaining Optimization Methodology: A New SHA-3 Implementation on Low-End Microcontrollers,” Sustainability, vol. 13, no. 8, p. 4324, Apr. 2021, doi: 10.3390/su13084324.

A. Braeken, “Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak,” Sensors, vol. 20, no. 8, p. 2160, Apr. 2020, doi: 10.3390/s20082160.

N. C. Valencia, M. Izadifar, N. Ukrainczyk, and E. Koenders, “Coarse-Grained Monte Carlo Simulations with Octree Cells for Geopolymer Nucleation at Different pH Values,” Materials, vol. 17, no. 1, p. 95, 2024.

H. Hashim, A. R. Alzighaibi, A. F. Elessawy, I. Gad, H. Abdul-Kader, and A. Elsaid, “Securing Financial Transactions with a Robust Algorithm: Preventing Double-Spending Attacks,” Computers, vol. 12, no. 9, p. 171, Aug. 2023, doi: 10.3390/computers12090171.

P. Zielonka et al., “Stress Relaxation Behaviour Modeling in Rigid Polyurethane (PU) Elastomeric Materials,” Materials, vol. 16, no. 8, p. 3156, Apr. 2023, doi: 10.3390/ma16083156.

A. Galligan et al., “Increased Thyroidal Activity on Routine FDG-PET/CT after Combination Immune Checkpoint Inhibition: Temporal Associations with Clinical and Biochemical Thyroiditis,” Cancers, vol. 15, no. 24, p. 5803, Dec. 2023, doi: 10.3390/cancers15245803.

P. Marinova et al., “Synthesis, Characterization, and Antibacterial Studies of New Cu(II) and Pd(II) Complexes with 6-Methyl-2-Thiouracil and 6-Propyl-2-Thiouracil,” Appl. Sci., vol. 13, no. 24, p. 13150, Dec. 2023, doi: 10.3390/app132413150.

G. Venitourakis et al., “Neural Network-Based Solar Irradiance Forecast for Edge Computing Devices,” Information, vol. 14, no. 11, p. 617, Nov. 2023, doi: 10.3390/info14110617.

J. Ližbetin and J. Pečman, “Possibilities of Using Bluetooth Low Energy Beacon Technology to Locate Objects Internally: A Case Study,” Technologies, vol. 11, no. 2, p. 57, Apr. 2023, doi: 10.3390/technologies11020057.

M. Zhang, M. Li, L. Guo, and J. Liu, “A Low-Cost AI-Empowered Stethoscope and a Lightweight Model for Detecting Cardiac and Respiratory Diseases from Lung and Heart Auscultation Sounds,” Sensors, vol. 23, no. 5, p. 2591, Feb. 2023, doi: 10.3390/s23052591.




DOI: https://doi.org/10.18196/jrc.v5i1.20745

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Salah-Eddine Mansour, Abdelhak Sakhi, Larbi Kzaz, Abderrahim Sekkaki

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

 


Journal of Robotics and Control (JRC)

P-ISSN: 2715-5056 || E-ISSN: 2715-5072
Organized by Peneliti Teknologi Teknik Indonesia
Published by Universitas Muhammadiyah Yogyakarta in collaboration with Peneliti Teknologi Teknik Indonesia, Indonesia and the Department of Electrical Engineering
Website: http://journal.umy.ac.id/index.php/jrc
Email: jrcofumy@gmail.com


Kuliah Teknik Elektro Terbaik