scholarly journals Design and Implementation of Security Reconfiguration for Effective Security Management of Mobile Communication Device

2009 ◽  
Vol 16C (6) ◽  
pp. 691-698 ◽  
Author(s):  
Gaeil An ◽  
Kiyoung Kim ◽  
Dongil Seo
2016 ◽  
Vol 83 (11) ◽  
pp. 687 ◽  
Author(s):  
G. I. Greĭsukh ◽  
E. G. Ezhov ◽  
S. V. Kazin ◽  
S. A. Stepanov

2019 ◽  
Vol 22 (3) ◽  
pp. 172-179
Author(s):  
Sama Samaan

In the past few years, all over the world, crime against children has been on the rise, and parents always worry about their children whenever they are outside. For this reason, tracking and monitoring children have become a considerable necessity. This paper presents an outdoor IoT tracking system which consists of a child module and a parent module. The child module monitors the child location in real time and sends the information to a database in the cloud which forwards it to the parent module (represented as a mobile application). This information is shown in the application as a location on Google maps.  The mobile application is designed for this purpose in addition to a number of extra functions. A Raspberry Pi Zero Wireless is used with a GSM/GPS module on shield to provide mobile communication, internet and to determine location. Implementation results for the suggested system are provided which shows that when the child leaves a pre-set safe area, a warring message pops up on the parent’s mobile and a path from the current parent location to the child location is shown on a map.


2020 ◽  
Vol 20 ◽  
pp. 95-108
Author(s):  
Zhiyong Shan ◽  
Vinod Namboodiri

In recent years, the emerged network worms and attacks have distributive characteristics, which can spread globally in a short time. Security management crossing network to co-defense network-wide attacks and improve the efficiency of security administration is urgently needed. This paper proposes a hierarchical distributed network security management system (HD-NSMS), which can centrally manage security across networks. First describes the system in macrostructure and microstructure; then discusses three key problems when building HD-NSMS: device model, alert mechanism, and emergency response mechanism; at last, it describes the implementation of HD-NSMS. The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).


Sign in / Sign up

Export Citation Format

Share Document