The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In present time due to increase in number of kidnapping and road accident cases, parents always worry about their children. This paper recommends a SMS based solution which assists parents to track their children location in real time. To track the location GPS module is used and to identify the identity of the child a RFID card is used which is in built in the system. Whenever a child boards a bus,...
Security in Wireless Sensor Network (WSN) has become a key issue due to demanding areas in which WSNs are being applied. With scarce resources in sensor nodes seasoned techniques like Diffie-Hellman, RSA and elliptic curve cryptography (ECC) cannot be used because they have resource demanding computations. Key pre-distribution has proved to be the most feasible amongst key management schemes in WSNs...
Steganography is the practice of hiding information and is well known for concealing the existence of the communication. This technique deals with the insertion of the secret message in an appropriate carrier like image, audio or video. Out of these carriers digital images are mostly preferred because of their wide usage on the Internet. LabVIEW software has been used for execution of steganography...
The application of vibration and acoustic wireless sensor networks (WSN) for intrusion detection has been proposed previously. In such networks, signals produced due to natural disturbances, like wind induced vibration or noise, can lead to excessive computation and data transaction leading to drainage of the power source due to power hungry RF data transmission. Such unwanted bursts of data transaction...
We propose information processing techniques for CCTV based surveillance systems employed in (a) work environments and (b) public places and transport, for automated identification of scenes of inter-personal crime. Although both the scenarios presented in this work employ similar signal processing and learning algorithms, the objective involved are significantly different. In (a) we aim to preserve...
Biometrics are used for security purpose. It is used to recognize a person based on their unique characteristics. Among several biometrics, Fingerprint is the most widely used and acceptable biometrics. Biometric system has several advantages over traditional methods. But it can be affected by several attacks. The type 1 attack is performed at the sensor level. Differentiating a genuine biometric...
A Wireless Sensor Network (WSN) is a network comprised of hundreds to thousands of tiny self-organizing sensor nodes. Security in WSNs has become a major issue especially in critical sectors such like battle field monitoring in the military. Research work has been conducted in key management, which is one of the most important security primitives. Though the use of public key cryptography schemes...
There are security threats in compromised machines which is used to spread malware and spam. The spamming activities and malware activities are the key to recruit compromised machines, an effective Spamming and malware detection system is generated to detect any compromised machine on the network. RTOSP is called Ratio test of Sequential Probability. The spam detection system monitors the outgoing...
In this work, we present the architecture for infield update of firmware in embedded devices. This architecture uses a PC based application which acts as a server, which can distribute firmware updates to the devices those are connected in the network. The main objective is to achieve firmware up-gradation without halting the normal operations of the embedded device and also provide facility to roll...
The growing direct or spoofing fraudulent attacks of thieves has motivated us to focus our prime concern on the security over money transaction. The accuracy of biometrics in identification is increasing its usage extensively. The method proposed in this paper focuses on how the money transaction in an ATM machine will be secured by providing personal identification by analyzing biometrics like fingerprints...
VANETs (Vehicular Adhoc Networks) is the Subclass of MANETs (Mobile Adhoc Networks). It provides remote communication among vehicles to roadside equipments and it gives the innovation that uses moving cars as a hub in a system to make the portable system that is each car which is participating is either a remote switch or hub. As, VANETs finds the applications in industry as well as commercial. The...
This paper describes a steganography technique in which text is concealed in an image. The lower nibble of each image byte is modified so as to contain each nibble of the input text. The steganography algorithm used in this implementation maximises on data capacity and also ensures security. The Java programming language is used for its comprehensive libraries and ease of use. A simple GUI has been...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.