Presentation is loading. Please wait.

Presentation is loading. Please wait.

Raspberry Pi.

Similar presentations


Presentation on theme: "Raspberry Pi."— Presentation transcript:

1 Raspberry Pi

2 What is a Raspberry Pi? Raspberry Pi is : Made in the UK
It is a credit card size computer. ARM Processor Primarily made to teach kids how to code . It has 1.2 GHZ 64/32-bit quad-core 1GB LPDDR2 RAM at 900 MHZ

3 Raspberry Pi 3 Architecture

4 RASPberry Pi Raspberry Pi Chart Pictures of Processor Raspberry PI
Date Released Raspberry Pi (1) ARM1176JZ-F Model B (2012) Improvement Model A (2014) Raspberry Pi(2) 900MHZ quad-core ARM Cortex-A7 2015 Raspberry Pi(3) 1.2 GHZ 64/32-bit quad-core 1 GB LPDDR2 RAM at 900 MHZ 2017 [2]

5 The Official Operating Systems
[3]

6 Third Party Operating SyStems
[3]

7 Other Raspberry Pi software
The Link below showcase more Raspberry Pi software option: Raspberry Pi Software

8 How to install New Out OF The Box (NoOBS) Software
[3]

9 Writing SD Cards from Windows with Win32 Disk Imager

10 Locate the folder

11 Win32

12 Press Write

13 RASPBERRY PI 3 Keyboard and Mouse Setting

14 Desktop view of NOOBS

15 Blue J Java Ide [1]

16 GeAny Programmer’s Editor

17 Scratch

18 Raspberry Pi - Prototype Board

19 GPIO: General Purpose Input Output pins (3v3)
[2]

20 GPIO- General Purpose Input Output
[2]

21 Python [2]

22 Dissertation Topic A Low Weight Encryption And Authentication Algorithm For Wireless Sensor

23 Sensors join the network in Plain text
(Trust Center) Gateway AES 128 Encrypted

24 Wireless Sensor Network Attacks Categories
Based on Membership of attacker- (Inside Attacker and Outside Attacker) Based on Strength- (Mote, Laptop) Based on action taken upon data-(Passive and Active) Based on security requirements.(Network Availability, Secret and Authentication Information Attacker)

25 ECC 224-bit is just as secure as a RSA- 2048 bit
Asymmetric algorithms- ensures key establishment and it is an important feature in digital signatures. The two most popular SSL asymmetric protocols are: > RSA – the most widely used asymmetric algorithm. Large keys Computational intensive and not suitable for sensors. >ECCDH – Smaller keys. Great to use for low computational devices, because it is fast processing with the same level of security.

26 Experiment Secure Communication between the Raspberry Pi

27 References 1.BlueJ Retrieved from 2.LeMasney, J,.(May 26,2015) Introduction to Raspberry Pi LiveLessons(Video Training) Retrieved From 3.Raspberry Pi Foundation, Raspberry Pi, Retrieved from


Download ppt "Raspberry Pi."

Similar presentations


Ads by Google