secure monitoring
Recently Published Documents


TOTAL DOCUMENTS

40
(FIVE YEARS 15)

H-INDEX

4
(FIVE YEARS 2)

Author(s):  
Priscilla Swee Pei Poh ◽  
◽  
Rafidah Ngadengon ◽  

Securing and monitoring the territory have become a big challenge for everyone as the number of vehicle users have increased. The premise area must be secure with enforced entrances and exits. It should have an automated and efficient security and monitoring system. For this purpose, an automated vehicle access system with accurate and secure monitoring of vehicle entry and exit was developed with Graphical User Interface (GUI) and vehicle’s user database along with the prototype of Ultra-High Frequency RFID. The suitable configuration for the hardware prototype has also been evaluated to maximize the system’s capabilities. This system operates on frequencies from 400MHz to 950MHz and is performed at distances of 7 meters. The passive tag was attached to the various condition and sizes of the car. The result shows showed that the system was optimally performed with the speed of the vehicle up to 50 km/h, 7 m of reading range and a maximum 20% tinted windshield. The ideal angle for the reader is around 60ᵒ to 70ᵒ with 2 meters of mounting pole. For future improvement, it is suggested that the registered vehicle user data was linked with the official premise’s database and the data is saved in an off-site location (cloud storage). The GUI is also able to support more than 1 reader at a time depending on demand.


2021 ◽  
Author(s):  
Vincent Koo

Due to recent advances in wireless communication technologies, mobile ad hoc networks (MANETs) have become the networks of choice for use in various applications. Unfortunately, this advantage comes with serious security concerns, particularly from a wireless channel prospective, where MANETs may be vulnerable to collaborative wormhole attacks, in particular, packet dropping and message tampering attacks. Recently, two secured routing protocols against these types of attacks (the so-called Highly Secured Approach Method or HSAM and the so-called Securing AODV against Wormhole Attacks in emergency MANET Multimedia Communications or AODV-WADR-AES) were proposed. These schemes are investigated in-depth to identify their weaknesses and a novel secured routing scheme (so-called Timed and Secure Monitoring Implementation against Wormhole Attacks in MANETs or TSMI) is proposed, with the goal to mitigate collaborative wormhole attacks in MANETs while maintaining the performance levels of both the HSAM and AODVWADR- AES schemes. Simulation results are presented to validate the stated goal using various performance metrics.


2021 ◽  
Author(s):  
Vincent Koo

Due to recent advances in wireless communication technologies, mobile ad hoc networks (MANETs) have become the networks of choice for use in various applications. Unfortunately, this advantage comes with serious security concerns, particularly from a wireless channel prospective, where MANETs may be vulnerable to collaborative wormhole attacks, in particular, packet dropping and message tampering attacks. Recently, two secured routing protocols against these types of attacks (the so-called Highly Secured Approach Method or HSAM and the so-called Securing AODV against Wormhole Attacks in emergency MANET Multimedia Communications or AODV-WADR-AES) were proposed. These schemes are investigated in-depth to identify their weaknesses and a novel secured routing scheme (so-called Timed and Secure Monitoring Implementation against Wormhole Attacks in MANETs or TSMI) is proposed, with the goal to mitigate collaborative wormhole attacks in MANETs while maintaining the performance levels of both the HSAM and AODVWADR- AES schemes. Simulation results are presented to validate the stated goal using various performance metrics.


2021 ◽  
Author(s):  
J.S. Prasath

Internet of things based industrial automation systems are widely used for process monitoring, and control applications. The security threats increase due to the internet is an open environment. This proposed work is the implementation of secure monitoring of plant information through the Supervisory Control and Data Acquisition (SCADA) system. The modified asymmetric and hash algorithm is proposed which generates the large key size of 4096-bit and 512-bit respectively. This proposed security algorithm is implemented using the ARM Cortex A53 processor which performs data encryption and decryption. It provides authentication and integrity of process information across the internet. It achieves a data transfer rate of 300 Megabits per second and more than 95 percent efficiency. This proposed work can be applied for securing the internet-enabled industrial automation process and allows secure monitoring of plant information in remote areas. The security of sensitive process parameters is enhanced through the proposed large key size in asymmetric algorithms. This proposed security algorithm prevents the damage to industrial devices from unauthorized access and modification. It assures the smooth functioning of plant operations and also provides safety to plant operators.


2021 ◽  
Vol 40 (1) ◽  
pp. 1417-1442
Author(s):  
Jalaluddin Khan ◽  
Jian Ping Li ◽  
Amin Ul Haq ◽  
Ghufran Ahmad Khan ◽  
Sultan Ahmad ◽  
...  

The emerging technologies with IoT (Internet of Things) systems are elevated as a prototype and combination of the smart connectivity ecosystem. These ecosystems are appropriately connected in a smart healthcare system which are generating finest monitoring activities among the patients, well-organized diagnosis process, intensive support and care against the traditional healthcare operations. But facilitating these highly technological adaptations, the preserving personal information of the patients are on the risk with data leakage and privacy theft in the current revolution. Concerning secure protection and privacy theft of the patient’s information. We emphasized this paper on secure monitoring with the help of intelligently recorded summary’s keyframe extraction and applied two rounds lightweight cosine-transform encryption. This article includes firstly, a regimented process of keyframe extraction which is employed to retrieve meaningful frames of image through visual sensor with sending alert (quick notice) to authority. Secondly, employed two rounds of lightweight cosine-transform encryption operation of agreed (detected) keyframes to endure security and safety for the further any kinds of attacks from the adversary. The combined methodology corroborates highly usefulness with engendering appropriate results, little execution of encryption time (0.2277-0.2607), information entropy (7.9996), correlation coefficient (0.0010), robustness (NPCR 99.6383, UACI 33.3516), uniform histogram deviation (R 0.0359, G 0.0492, B 0.0582) and other well adopted secure ideology than any other keyframe or image encryption approaches. Furthermore, this incorporating method can effectively reduce vital communication cost, bandwidth issues, storage, data transmission cost and effective timely judicious analysis over the occurred activities and keep protection by using effective encryption methodology to remain attack free from any attacker or adversary, and provide confidentiality about patient’s privacy in the smart healthcare system.


2020 ◽  
Vol 137 (7) ◽  
pp. 370-374
Author(s):  
Clemens Gnauer ◽  
Harald Pichler ◽  
Christoph Schmittner ◽  
Markus Tauber ◽  
Korbinian Christl ◽  
...  

Abstract Facing food insecurity and overuse of resources due to effects of climate change, humanity needs to find new ways to secure food production and produce close to consumers. Vertical farming, where plants are grown in vertical arrays inside buildings with help of Information and Communication Technology (ICT) components, could contribute to solving this issue. Such systems integrate heterogeneous devices on different computing layers and acquire a lot of data to monitor and optimize the production process. We created an indoor testing unit in which growing conditions can be monitored and controlled to optimize growth of microgreens. This setup includes an Indoor Farming Support as a Service (IFSaaS) prototype that provides safe and secure monitoring and controlling, as well as self-adaption of an indoor farming system. In this article we provide information about the combination of most suitable technologies.


2020 ◽  
Vol 107 ◽  
pp. 443-457
Author(s):  
Alexandre Viejo ◽  
David Sánchez
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document