The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Remote patient monitoring systems (RMS) have gained increasing popularity in recent years. RMS have great potential to improve medical services by providing more affordable, timely, and accessible care. This paper describes an effective low-cost RMS that is readily deployable. The system targets chronic disease patients and attempts to reduce patient visits to the hospital and healthcare costs. The...
In this paper, an online working condition monitoring system is designed to early warn environmental quality in manufacturing industry. It is very crucial to provide real time and accurate data for staffs, stakeholders and control center to monitor factory air quality at working place. By uploading the all collected data on internet, the environmental condition can be monitored in real time by users...
As the number of devices (things) connected to the Internet (Internet of things: IoT) is growing, achieving robust security and privacy (S&P) is becoming increasingly challenging. With the heavy use of medical things (MT), the S&P in the medical domain poses a serious issue that continues to grow. Due to the criticality and sensitivity of the data in the healthcare domain, ensuring...
Internet of Things (IoT) and its various application domains are radically changing the lives of people, providing smart services which will ultimately constitute integral components of the living environment. The services of IoT operate based on the data flows collected from the different sensors and actuators. In this respect, the correctness and security of the sensor data transported over the...
Nowadays, Internet of Things is one of the future developing directions. Some of the most important challenges it faces are related to security. Several massive distributed denial of service attacks have been deployed in the last months using “smart” devices, such as baby monitors or refrigerators. Connecting electronic devices without considering security can lead to severe problems. Using encryption...
In this work, an advanced vehicle monitoring and tracking system is proposed and designed for the purpose of monitoring the vehicles which are moving from one place to the other in order to provide safety and security. The proposed method puts together superior exercise of contemporary technology by means of Embedded C programming language and the unit developed via LPC2148 and its sophisticated features...
This study focuses on the application of the Internet of Things in intelligent security - the intelligent extension cord in the concept of Maker. The application of the Internet of Things in the extension cord is based on remote network monitoring, combined with current sensing and automatic control as auxiliary technology. Intelligent extension cord to adopt polylactide as material, form by 3D Printer...
Security has been a growing concern for large organizations, especially financial and governmental institutions, as security breaches in the systems they depend on have repeatedly resulted in billions of dollars in losses per year, and this cost is on the rise. A primary reason for these breaches is that the systems in question are socio-technical — a mix of people, processes, technology and infrastructure...
In this paper, we describe smart sensors, actors, user, alarm system, smart appliances of our proposed smart home model. We also describe the main problems of the smart home which are safety, security and energy saving. In our smart home model wireless sensor, actors, smart appliances, and user communicate with each other and with the central system. Sensors collect data about abnormal home situations...
Security is becoming a major issue everywhere. Home Security is becoming necessary nowadays as the possibilities of intrusion is increasing day by day. Safety from theft, leaking of raw gas and fire are the necessary requirements for home security system. However, the GSM (global system for mobile communication) based security systems provides enhanced security as whenever a signal from sensor occurs,...
As the number of everyday objects connected to the Internet grows rapidly, securing these connected devices is a big security challenge. Key establishment in Internet of Things (IoT) becomes a challenging problem when considering the resource constrained sensor nodes. In spite of the fact that many clever solutions have been proposed, no practical and suitable scheme has emerged, especially for the...
With the rapid technological advancements of sensors, Wireless Sensor Networks (WSNs) have become a popular technology for the Internet of Things (IoT). We investigated the security of WSNs in an environmental monitoring application with the goal to demonstrate the overall security. We implemented a Secure Temperature Monitoring System (STMS), which served as our WSN application. Our results revealed...
Many smart house systems have been presented, but there are still some limitations in terms of the high cost, less functionality, difficulty of use that are not satisfactorily reliable and cannot be developed. Therefore, the aim of this research project was to design and develop a prototype for a smart house system that is low cost, has a user-friendly interface, and is scalable and reliable by using...
Internet of things (IoT) has become a new trend after Internet in Information Technology. Traditional Home Automation techniques and Wireless Home automation with the aid of internet of things (IoT) are gradually gaining popularity. The main challenges with these systems are security and user friendliness. In this paper we propose a system based on the secure authentication systems of social networking...
Sensor networks is a solid basis for the Internet of Things (IoT) to provide resources, business models and opportunities to build potential industrial systems improving manufacturing systems with efficient operations. In this context, IoT devices and sensor networks have a dynamic behavior and changes often modifying the production environment. Nevertheless, severe threats are increasing the complexity...
The Internet of Things is an emerging research area promising many interesting solutions to various problems encountered in various domains. The ever-expanding networks of sensors, actuators and smart devices on the Internet of Things, will raise interesting challenges for service and network management. This paper explores these challenges and expands on an already proposed management platform for...
Railway is one of the most used means of transportation. For the railway system to operate flawlessly constant monitoring and inspection of railway tracks is required. Currently railway track inspection and monitoring is done manually which is time taking and not accurate, due to the high chance of human error occurrence. Moreover, practically it is impossible to inspect and monitor the railway track...
Nowadays, despite there are many advanced technological applications to maintain the security of buildings, premises or regions, human intervention is necessary when considering both economical facts and the effectiveness of the systems especially for the security of military zones. In the presented work, a highly secure system has been designed. With the system to be implemented, the location, postures...
The NFR (Non Functional Requirements) framework was used to quantitatively evaluate software architectures. Assurance cases using GSN (Goal Structuring Notation) have not been applied to quantitatively evaluate software architectures. In this paper, GSN will be extended to define quantitative attributes for this purpose. Then, the architecture evaluation method based on the attributed GSN method will...
This paper proposes an intelligent gateway system for SCADA networks to avoid DOS attacks. The proposed approach provides details about an SIG system architecture which establishes the connection between Master SIGs and Perimeter SIGs, the traffic flow, major alerts, and minor alerts. Simulation experiments are an indispensable phase to analyze and assess the security of SCADA (Supervisory Control...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.