The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the evolution of computing from using personal computers to use of online Internet of Things (IoT) services and applications, security risks have also evolved as a major concern. The use of Fog computing enhances reliability and availability of the online services due to enhanced heterogeneity and increased number of computing servers. However, security remains an open challenge. Various trust...
Over the years Internet of Things-like environments have been gaining popularity. Increasingly, security and privacy issues have emerged as a major challenge to the wide-scale adoption of Internet of Things-like technologies. In this paper, we propose a basic model for managing governance and evaluate some considerations of Internet of Things-like environments.
The concern for security increases due to the advances in the falsification technology. Biometrics is the only authentication method which truly identifies an individual when compared to other methods like PINs and passwords. Even though there are numerous biometric approaches, these are not robust. In this paper, we aimed at building a protocol which focuses on Electrocardiogram (ECG) being used...
Security is one of the basic needs of a system. New methods of providing security need to be found. To overcome all the security issues in current protocol, a new protocol is defined. The protocol makes use of visual cryptography technique by which images can be used as password. Here, we use the visual secret sharing scheme to protect the data that cannot afford getting hacked. Authentication is...
Wireless sensor network (WSN) is made up two or more interconnected sensor nodes wirelessly. These nodes may be deployed either in open or closed environment. As these nodes communicates wirelessly and deployed in open environment there are always threat of security of nodes as well as data communicated. In order to making secure communication over WSN there should be some security mechanism. In this...
We outline the design of a system to exploit the TV whitespaces for dynamically gathering video feeds from public buses in a city. The system consists of the following components: (1) A FPGA based SDR board to be fixed on buses to collect the video feed from inside the bus and transmit it to the central location, (2) An open source software (GNU-radio) to configure and control the hardware and, (3)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.