International Journal of Smart Security Technologies
Latest Publications


TOTAL DOCUMENTS

25
(FIVE YEARS 25)

H-INDEX

1
(FIVE YEARS 1)

Published By IGI Global

2640-4079, 2640-4087

2022 ◽  
Vol 9 (1) ◽  
pp. 0-0

Cash vending machines are ubiquitous and although their technology vouches for its security, they are erratically stormed by the raiders. Albeit the escalating crime counts, the raiders are fleeing from the justice by virtue of evidence lacking. This research work proposes a computer vision based Anti-Raider ATM system. The proposed approach models the image, acquired from the CCTVs against the raider images based on the computer vision and deduces the fact from the MobileNetv2 architecture. Once the model identifies the raider, the image is uploaded to the Google Drive, which serves as evidence for the judicial department. The proposed research is modeled against several optimizers and the result concludes that, among them Adam optimizer has excelled in both computation time and accuracy.


2022 ◽  
Vol 9 (1) ◽  
pp. 0-0

India is a country of growing population and agriculture is the primary source of livelihood for about 58 per cent of Indians population. The Indian food industry is poised for huge growth, increasing its contribution to world food trade every year due to its immense potential for value addition, particularly within the food processing industry. Government of India is giving more priority for welfare of the farmers. In this regard it is implementing several welfare schemes to provide financial support to farmers. Various schemes were introduced by the government, but the benefits of these schemes do not reach to the common people in our case farmers due to corruption happening at the middleware. Hence there is need of a reliable, authorized and secured system to maintain and manage these transactional records. This is where blockchain comes into picture. One of the aims of our system is to ensure that the amount transferred by the authority to a particular farmer, reaches to him/her without any corruption and system manipulation using the features of blockchain and cryptography.


2021 ◽  
Vol 8 (2) ◽  
pp. 21-41
Author(s):  
Gabriel Babatunde Iwasokun ◽  
Olayinka Oluwaseun Ogunfeitimi ◽  
Oluyomi Kolawole Akinyokun ◽  
Samuel Oluwatayo Ogunlana

This paper presents how IoT and its related technologies are used to tame human kidnapping. IoT design, geo-fencing, API integration, and GPS signal formed the backbone of the proposed system. While the GSM base stations provide signals for the system, the frontends are the mobile phone devices, application interface, and the GPS. The location signal is transmitted to the server when the subject enters or exits the geofence for movement and direction tracing. The IoT component hosts the web application, MySQL and GMS are used to provide backend solutions, and the GPS guarantees communication and placement of the subject on the search map. The implementation involved suitable platforms and engines and followed up with case study of kidnapping scenarios involving 20 randomly selected individuals. The study established the practical function of the system and its good performances in areas of availability, concealment, security, location accuracy, seamless data transmission, among others. Comparative analysis with related works also established the relative strength of the new method.


2021 ◽  
Vol 8 (2) ◽  
pp. 1-20
Author(s):  
Raphael Cohen-Almagor

This paper is concerned with the social ills of bullying and cyberbullying that might lead to suicide especially when adolescents are involved. First, the author explains the two concepts. It is noted that people with monoamine oxidase-A (MAOA) have a propensity to antisocial behaviour and that they cannot relieve themselves of responsibility for their conduct. We all need to think of the consequences of our actions, and we need to ensure that internet abusers are held accountable for their wrongdoing. It is argued that parental responsibility is paramount. Parents, and society at large, need to exhibit zero tolerance to bullying and cyberbullying. Parents need to take active steps to tackle both phenomena, and, in this context, healthy communication with children and other stakeholders is key for success. Disregard for consequences of both activity and inactivity when facing all forms of bullying is immoral.


2021 ◽  
Vol 8 (2) ◽  
pp. 42-58
Author(s):  
Rajasekhar Chaganti ◽  
Deepti Gupta ◽  
Naga Vemprala

The cyber-physical system (CPS) has made tremendous progress in recent years and also disrupting technical fields ranging from health, transportation, industries, and more. However, CPS security is still one of the concerns for wide adoption owing to the high number of devices connecting to the internet and the traditional security solutions may not be suitable to protect the advanced, application-specific attacks. This paper presents a programmable device network layer architecture to combat attacks and efficient network monitoring in heterogeneous environment CPS applications. The authors leverage industrial control systems (ICS) to discuss the existing issues, highlighting the importance of advanced network layers for CPS. The programmable data plane language (P4) is introduced to detect well known HELLO flood attacks with minimal effort in the network level and show that programmable switches are suitable to implement security solutions in CPS applications.


2021 ◽  
Vol 8 (1) ◽  
pp. 16-34
Author(s):  
Bil Hallaq ◽  
Andrew Nicholson ◽  
Richard Smith ◽  
Leandros Maglaras ◽  
Allan Cook ◽  
...  

Incident response teams cannot prepare for every situation or predict every crisis, especially when they involve cyber-physical systems. As a result, training activities need to be provided to support operating in challenging situations to develop concrete guidance, procedures, and tools to help individuals collectively react in different, unpredictable situations. Experiential learning is a training technique based on the assumed importance of experimenting and involvement, proposing that active engagement in a scenario develops personal experiences that form the basis of understanding. Exercises are a form of serious games that are a proven method of delivering experiential learning. This article presents CYRAN, a realistic environment used for cyber warfare training, cyber resiliency testing, and cyber technology development. CYRAN is a low-cost cyber range that can be easily used for experiments on realistic scenarios for various educational and training purposes and for the collection of labelled datasets for further research.


2021 ◽  
Vol 8 (1) ◽  
pp. 35-48
Author(s):  
Hamza Zemrane ◽  
Youssef Baddi ◽  
Abderrahim Hasbi

Nowadays, the use of wireless technology has invaded the market of telecommunications networks. There are two main families of wireless networks: networks with infrastructure and networks without infrastructure or AdHoc. In the networks with infrastructure, communications are made via a fixed base station; however, communications in an AdHoc network occur in the absence of any fixed communication infrastructure. There are three types of AdHoc networks: mobile AdHoc networks, mesh networks, and sensor networks. This research applied the mobile AdHoc network to the intelligent transportation systems that improve the traditional transport system with reducing the risk of human errors and with the effective management of traffic congestion. The authors focus in the work especially on the routing protocols inside the MANETs to come out with four routing protocols (AODV, OLSR, DSR, and TORA), and this paper compared their performances in case of using HTTP application, FTP application, email application, voice application, and the rate of the routing control traffic.


2021 ◽  
Vol 8 (1) ◽  
pp. 49-65
Author(s):  
Winfred Yaokumah ◽  
Richard Nunoo Clottey ◽  
Justice Kwame Appati

The open nature of the internet of things network makes it vulnerable to cyber-attacks. Intrusion detection systems aid in detecting and preventing such attacks. This paper offered a systematic review of studies on intrusion detection in IoT, focusing on metrics, methods, datasets, and attack types. This review used 33 network intrusion detection papers in 31 journals and 2 conference proceedings. The results revealed that the majority of the studies used generated or private datasets. Machine learning (ML)-based methods (85%) were used in the studies, while the rest used statistical methods. Eight categories of metrics were identified as prominent in evaluating IoT performance, and 94.9% of the ML-based methods employed average detection rate. Moreover, over 20 attacks on IoT networks were detected, with denial of service (DoS) and sinkhole being the majority. Based on the review, the future direction of research should focus on using public datasets, machine learning-based methods, and metrics such as resource consumption, energy consumption, and power consumption.


2021 ◽  
Vol 8 (1) ◽  
pp. 1-15
Author(s):  
Mustapha El Hamzaoui ◽  
Faycal Bensalah

Inside organizations (enterprise, administration, etc.), operation/management and decision-making activities use dependently different types of information. The organization-information interactions are generally divided into five main operations (storage, manipulation, security, communication, and management) and employ IS (information system) and/or ICTs (information and communication technologies) that represent the major uses of new technologies (NT) inside organizations. Technically, the modernization of information exploitation inside organizations, through NT, is still an interesting research topic where questions mainly concern the concepts such as information, data, IS, and ICTs themselves (definitions, mutual relations, locations, etc.). This paper presents an extension of the basic theoretical model NT-ODP which illustrated the possible relations which could occur inside organizations, between new technologies (NT) tools and the organizations digital patrimony (ODP). By modifying the way in which the fundamental aspects of the basic model are applied, this new extension aims to illustrate the accurate manner in which to organize the different departments of an organization in order to be able to profit effectively from the organization digital patrimony.


2020 ◽  
Vol 7 (2) ◽  
pp. 22-37
Author(s):  
Adewale Olumide Sunday ◽  
Boyinbode Olutayo ◽  
Salako E. Adekunle

The detection of a false individual who had not been enrolled as a genuine participant in an election could be potentially detected in electronic voting systems as against paper-based methods. In recent time, one-time password and biometrics have been used to curtail false acceptance of imposters. However, imposters had unlawfully stolen the credentials of genuine individuals, gained unauthorized access, and polled illegitimate votes due to poor authentication methodology. The accuracy of a multi-biometric system is a function of the data type used and fusion method adopted. This paper presented a computational fusion approach that involved the use of fingerprint and randomly generated voter identification number to effectively satisfy the authentication security requirement of the electronic voting system. New architectural and mathematical equations on the proposed approach were presented to tackle the problem of false acceptance rate and improve on the true acceptance rate of a biometric system. Algorithm to achieve the proposed approach was presented in this paper as well.


Sign in / Sign up

Export Citation Format

Share Document