wireless security
Recently Published Documents


TOTAL DOCUMENTS

281
(FIVE YEARS 44)

H-INDEX

20
(FIVE YEARS 2)

Author(s):  
Sanskruti Dharme

Abstract: In terms of house security, the door is pivotal. To keep the hearthstone secure, the proprietor will keep the door locked at all times. Still, owing to a rush when leaving the house, the proprietor may forget to lock the door, or they may be doubtful if they’ve closed the door or not. Wireless security grounded operation have fleetly increased due to the dramatic enhancement of ultramodern technologies. Numerous access control systems were designed and/or enforced grounded on different types of wireless communication technologies by different people. Radio Frequency identification (RFID) is a contactless technology that’s extensively used in several diligences for tasks like access control system, book shadowing in libraries, tollgate system, forced chain operation, and so on. For enforcing this design, we will be using Arduino mega 2560 pro mini, a fingerprint sensor, Keypad module. ESP-32 CAM module, RFID sensor, solenoid lock and ESP8266. We have also created an application for monitoring and controlling the security features of the door lock. We can also open the door through mobile fingerprint. Keywords: Arduino mega 2560 pro mini, ESP32-CAM, ESP8266, Fingerprint sensor, Keypad module, RFID sensor.


2021 ◽  
Vol 18 (12) ◽  
pp. iii-vi
Author(s):  
Yingchang Liang ◽  
Yue Gao ◽  
Liang Xiao ◽  
Yulong Zou ◽  
Guoru Ding

2021 ◽  
Author(s):  
◽  
Dennis Michael DiGiusto

<p>Threats arising from wireless hacking have been recently acknowledged both within academic literature and in the mainstream media. Additionally, it has been reported that many users of wireless networks make no attempt to activate security measures on their networks. This report replicates and expands upon research found in Woon, Tan and Low (2005) in order to ascertain characteristics of home wireless network users in New Zealand. The first research area asks the question: aside from the people who activate and those who do not, are there also people who are worried about wireless security and those who are not? This was proven to be true and that there is indeed a subgroup of wireless router users in New Zealand who are worried about wireless security. The second research area seeks to determine what factors affect a person's intention to enable or not enable security features on a home wireless network. The results showed that: The more people notice an increase in the degree of risk posed by wireless hacking, the more they feel like they could autonomously enable security features. The more people feel vulnerable to threats of wireless hacking, the more they feel that they would need help in setting up security features on their wireless network. The more people feel susceptible to wireless hacking, the more they feel that enabling security features would require extra efforts of time and money on their part. In order to get users to secure wireless networks, they must be convinced that enabling security features will deter hacker attacks. In order to get users to secure networks they need to feel that they could actually enable security features by themselves without some form of human assistance to help them do it.</p>


2021 ◽  
Author(s):  
◽  
Dennis Michael DiGiusto

<p>Threats arising from wireless hacking have been recently acknowledged both within academic literature and in the mainstream media. Additionally, it has been reported that many users of wireless networks make no attempt to activate security measures on their networks. This report replicates and expands upon research found in Woon, Tan and Low (2005) in order to ascertain characteristics of home wireless network users in New Zealand. The first research area asks the question: aside from the people who activate and those who do not, are there also people who are worried about wireless security and those who are not? This was proven to be true and that there is indeed a subgroup of wireless router users in New Zealand who are worried about wireless security. The second research area seeks to determine what factors affect a person's intention to enable or not enable security features on a home wireless network. The results showed that: The more people notice an increase in the degree of risk posed by wireless hacking, the more they feel like they could autonomously enable security features. The more people feel vulnerable to threats of wireless hacking, the more they feel that they would need help in setting up security features on their wireless network. The more people feel susceptible to wireless hacking, the more they feel that enabling security features would require extra efforts of time and money on their part. In order to get users to secure wireless networks, they must be convinced that enabling security features will deter hacker attacks. In order to get users to secure networks they need to feel that they could actually enable security features by themselves without some form of human assistance to help them do it.</p>


2021 ◽  
Vol 23 (2) ◽  
Author(s):  
Vian Ardiyansyah Saputro ◽  
Suwanto Raharjo ◽  
Eko Pramono

Author(s):  
Mohammed M. Sultan ◽  
Amer T. Saeed ◽  
Ahmed M. Sana

Securing property plays a crucial role in human life. Therefore, an adaptive multilevel wireless security system (ML-WSS) based on the internet of things (IoT) has been proposed to observe and secure a certain place. ML-WSS consists of hardware and software components, such as a set of sensors, Wi-Fi module, and operation and monitoring mobile application (OMM). The OMM application is designed to remotely monitor and control the proposed system through the Internet and by using ThingSpeak cloud as a data store. The proposed scheme is based on dividing the required zone of the place into three regions (levels), low-risk region (LRR) as level-1, moderate-risk region (MRR) level-2, and high-risk region (HRR) as level-3. Each level may contain one or set of sensors, so the number of sensors, their placement, and under which level is labelled is specified according to the security requirements. Several processes are done based on these levels when a breach occurs in the system. Mathematical model and pseudocode were created to illustrate the mechanism of the proposed system. The results show that the proposed system has been implemented successfully and the number of breaches that occurs in level-3 area was reduced by 50% as compared to level-1.


2021 ◽  
Vol 18 (4) ◽  
pp. 99-114
Author(s):  
Xu Wang ◽  
Liang Jin ◽  
Yangming Lou ◽  
Xiaoming Xu

Sign in / Sign up

Export Citation Format

Share Document