The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The trend towards the digitalization of our homes is motivated by the development of hardware and software platforms that have been researched in recent years. As in the Internet of Things, building a single, global platform that enables communication with a myriad of devices for home automation is virtually impossible. The platform proposed in this work deals, in isolation, with the problems in each...
A unidirectional security gateway is a network system in which data can travel in only one direction. Therefore, the system are used in protecting the safety and reliability of various critical infrastructures. Most of all, it has to be deployed with send and receive transceivers disconnected for one direction to ensure information security. In this paper, we introduce a unidirectional security gateway...
In this paper, an online working condition monitoring system is designed to early warn environmental quality in manufacturing industry. It is very crucial to provide real time and accurate data for staffs, stakeholders and control center to monitor factory air quality at working place. By uploading the all collected data on internet, the environmental condition can be monitored in real time by users...
A novel secure architecture for sensor networks that make use of the LoRaWAN (Long-Range Wide Area Network) protocol specification is proposed in this paper. The paper analyses potential security threats and provides the protection mechanisms and security recommendations to enable protected data transmission and to prevent unauthorized access and data loss in LoRaWAN sensor networks.
For strengthening the effective supervision of key vehicles' illegal driving which are not in accordance with the prescribed routes, and to prevent and reduce the road accidents, this paper puts forward a method of the active discrimination of key vehicle's not-according-to-the-prescribed-routes based on the gate system's passing through information. Through analyzing key vehicles' passing records...
Internet of Things (IoT) can be perceived as enabling user-specific interoperable communication services by integration of sensing and actuation technologies with other leading technologies, such as telecommunication, networking, security and cloud computing etc. Application of the ubiquitous IoT technologies to augment healthcare systems inadvertently exposes the latter to unpredictable, disruptive...
Internet of Things (IoT) and its various application domains are radically changing the lives of people, providing smart services which will ultimately constitute integral components of the living environment. The services of IoT operate based on the data flows collected from the different sensors and actuators. In this respect, the correctness and security of the sensor data transported over the...
Nowadays, security is a part that consent by many institution including academic for example in University campus, some of campus have been implement automatic system in campus area to control visitor to enter University also for the staffs and students, but the system is in standalone with introduce new gate pass. Most of University has been use Information Technology (IT) in application for academic...
Medical devices equipped with wireless connectivity and remote monitoring features are increasingly becoming connected to each other, to an outside programmer and even to the Internet. While Internet of Things technology enables health-care professionals to fine tune or modify medical device settings without invasive procedures, this also opens up large attack surfaces and introduces potential security...
The state of art secure digital computing systems heavily rely on secure hardware as the Trusted Computing Base to build upon the chain of trust for trusted computing. Attack Protection Blocks are added to the hardware to prevent an adversary from bypassing the security provided by hardware using various side channel, voltage, frequency, temperature, and other attacks. However, attackers can target...
Internet of Things (IoT) services are increasingly deployed at the edge to access and control Things. The execution of such services needs to be monitored to provide information for security, service contract, and system operation management. Although different techniques have been proposed for deploying and executing IoT services in IoT gateways and edge servers, there is a lack of generic policy...
We describe a multi-layer security system called "Application Protected Execution" (APEx) that has an "In-VM monitoring" functionality protected by out-of-band memory created within a Virtual Machine (VM) on cloud-based nodes. The In-VM monitor functionality protects execution of security related software and is triggered by hooked system events to avoid context switched overhead...
The rapid growth of Internet-of-Things (IoT) devices, such as smart-bulbs, smoke-alarms, webcams, and health-monitoring devices, is accompanied by escalating threats of attacks that can seriously compromise household and personal safety. Recent works have advocated the use of network-level solutions to detect and prevent attacks on smart-home IoT devices. In this paper we undertake a deeper exploration...
Visual analysis on network security is a new area, it consists methods and technology of visualization and network security analysis, which has new challenges. Researchers on network security visualization have done certain extent research and accumulated much. Especially with the rapid development of visual analysis, visual network security analysis achieved rich results in recent years. However,...
Anonymous communications are growing extremely fast because more and more Internet users employ anony mous systems, such as the I2P or Tor networks, as a way to hide their online activity. Therefore, these networks have been more and more studied, mainly from a security point of view. Different studies have shown important design flaws in these systems that could break users' anonymity and how these...
Several states in the European Union started to introduce distributed clinical information systems to develop new communication channels, and enhance a more effective collaboration among different healthcare institutions. These systems exchange Electronic Health Records, containing critical private information regarding patients. Not encouraging is the fact that masquerading attacks, although not...
An architecture for a service-oriented open-source cloud-based software platform for the energy domain is developed based on an analysis of the results of the FIWARE-based FINESCE project. A proposal to incrementally develop the platform through a consortium of partners from utilities, ICT companies and service providers is outlined. This collaborative approach is considered to be sustainable because...
The study has been conducted on the small real world area of JNU where the traffic trends were monitored manually. One month data has been taken into consideration for analyzing the macroscopic traffic flow of JNU. The traffic patterns were observed from the four different entrance/exist gates. In this, the realistic car mobility covering one month, 24 hour traffic in a span of 1019.38 acres region...
Crowd monitoring is an important task of security forces. If an emergency occurs during large events, authorities should take urgent measures to prevent causalities. Also understanding crowd dynamics such as tracking crowds or sparse people goups before an emergency occurs is a need. Therefore, crowd detection and analysis is a critical research area. There are several studies for crowd monitoring...
Every company and institution faces the necessity to manage its inventory. For high accuracy, security and easy operation of inventory management system it is necessary to have an easily recognizable identifier on all managed objects. The aim of our present project is to modernize the methods of automatic inventory management and asset protection with the help of the application of radio frequency...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.