multilevel security
Recently Published Documents


TOTAL DOCUMENTS

177
(FIVE YEARS 22)

H-INDEX

13
(FIVE YEARS 2)

2021 ◽  
Author(s):  
Anirudh R ◽  
Chandru V ◽  
Harish V

The main aim of our project is to implement the door lock system using the fingerprint sensor. There are many modern locks that replace the regular locks due to the high security, while we use this we are able to both lock (or) unlock the door lock using the fingerprint sensor. You are not supposed to carry the bundle of keys wherever you go, so that we can implement this idea and for the high security too. The possibilities of threats occurring in regular locks is less compared to the wireless biometric lock (i.e.) modern lock. Only a particular person can open the door lock (or) unlock it. It is not like the regular lock means if X person opening the lock using a key means the lock will release on its own. In modern lock there is no possibility that only the developer will open it, if someone wants to access using smartphone we should get verification from the user by getting the OTP and login the app.


Author(s):  
Konstantinos Tsiknas ◽  
Dimitrios Taketzis ◽  
Konstantinos Demertzis ◽  
Charalabos Skianis

In today’s Industrial IoT (IIoT) environment, where different systems interact with the physical world, the state proposed by the Industry 4.0 standards can lead to escalating vulnerabilities, especially when these systems receive data streams from multiple intermediaries, requiring multilevel security approaches, in addition to link encryption. At the same time taking into account the heterogeneity of the systems included in the IIoT ecosystem and the non-institutionalized interoperability in terms of hardware and software, serious issues arise as to how to secure these systems. In this framework, given that the protection of industrial equipment is a requirement inextricably linked to technological developments and the use of the IoT, it is important to identify the major vulnerabilities, the associated risks and threats and to suggest the most appropriate countermeasures. In this context, this study provides a description of the attacks against IIoT systems, as well as a thorough analysis of the solutions against these attacks, as they have been proposed in the most recent literature.


Author(s):  
Santosh Kumar Sharma ◽  
Bonomali Khuntia

The entire world is running behind the smart technology to accomplish the daily needs in a smart way such as smart farming, smart irrigation system, smart transportation system, smart medical management, handling of smart home appliances, smart security, etc. Smart technology is the soul property of internet services and accessing data from virtual servers, which raises the alarm of security vulnerability and threats. In recommended system we have focused on application layer security which are concerned with application interface and queue manager for service exchange. As application layer is the closest to end user and produces the big threat to the application platform it motivates us to recommend strong multilevel security system to identify the different activity of handlers and identify their roles to enroute of accessing confidential data services. Subsequently, our work is to assure that every user should have an authentication key with specific privileges to get the desired information. In focus, we see the security management by integrating the Kerberos authentication protocol with honey encryption technique to provide strong multilevel security system.


IEEE Network ◽  
2020 ◽  
Vol 34 (5) ◽  
pp. 114-119 ◽  
Author(s):  
Jaspreet Singh ◽  
Ahmed Refaey ◽  
Abdallah Shami

Sign in / Sign up

Export Citation Format

Share Document