1,434 research outputs found

    Towards wireless sensor networks with enhanced vision capabilities

    Get PDF
    Wireless sensor networks are expected to become an important tool for various security, surveillance and/or monitoring applications. The paper discusses selected practical aspects of development of such networks. First, design and implementation of an exemplary wireless sensor network for intrusion detection and classification are briefly presented. The network consists of two levels of nodes. At the first level, relatively simple microcontroller-based nodes with basic sensing devices and wireless transmission capabilities are used. These nodes are used as preliminary detectors of prospective intrusions. The second-level sensor node is built around a high performance FPGA controlling an array of cameras. The second-level nodes can be dynamically reconfigured to perform various types of visual data processing and analysis algorithms used to confirm the presence of intruders in the scene and to classify approximately the intrusion, if any. The paper briefly presents algorithms and overviews hardware of the network. In the last part of the paper, prospective directions for wireless sensor networks are analyzed and certain recommendations are included

    End to End Encrypted Smart Lock Using RSA based on Opinion from Social Media Review Comments

    Get PDF
    In the modern era, from big apartments to small houses, startups to corporate buildings, protecting assets or preventing unauthorized persons are crucial problems. Often traditional locks like padlocks are prone to security risks since they can be easily bypassed. Existing smart lock systems are prone to Man in middle Attacks where digital keys can easily be duplicated. The review comments about prevailing smart locks technologies have been collected from various sources such as blogs and microblogs.  The data set is analyzed to discover the opinion of the people about the smartlock product. In this proposed system, an innovative smartlock system prototype is designed using current technologies. A smart lock system has been proposed which is encrypted end-to-end using the RSA algorithm. This system uses a one-time password sent to registered users combined with the master code to unlock the door. This system is designed as such only the users who are connected to a wireless local area network are able to access the smart lock system, this adds an additional layer of security. It is connected to the cloud and logs all the activity from booting to shutting down. The breach detection system along with image capture is also included to detect forced intrusions. The client functionality can be easily ported to any platform which supports HTTP protocol which tends to be the major advantage of the proposed work

    Intrusion Detection System using Bayesian Network Modeling

    Get PDF
    Computer Network Security has become a critical and important issue due to ever increasing cyber-crimes. Cybercrimes are spanning from simple piracy crimes to information theft in international terrorism. Defence security agencies and other militarily related organizations are highly concerned about the confidentiality and access control of the stored data. Therefore, it is really important to investigate on Intrusion Detection System (IDS) to detect and prevent cybercrimes to protect these systems. This research proposes a novel distributed IDS to detect and prevent attacks such as denial service, probes, user to root and remote to user attacks. In this work, we propose an IDS based on Bayesian network classification modelling technique. Bayesian networks are popular for adaptive learning, modelling diversity network traffic data for meaningful classification details. The proposed model has an anomaly based IDS with an adaptive learning process. Therefore, Bayesian networks have been applied to build a robust and accurate IDS. The proposed IDS has been evaluated against the KDD DAPRA dataset which was designed for network IDS evaluation. The research methodology consists of four different Bayesian networks as classification models, where each of these classifier models are interconnected and communicated to predict on incoming network traffic data. Each designed Bayesian network model is capable of detecting a major category of attack such as denial of service (DoS). However, all four Bayesian networks work together to pass the information of the classification model to calibrate the IDS system. The proposed IDS shows the ability of detecting novel attacks by continuing learning with different datasets. The testing dataset constructed by sampling the original KDD dataset to contain balance number of attacks and normal connections. The experiments show that the proposed system is effective in detecting attacks in the test dataset and is highly accurate in detecting all major attacks recorded in DARPA dataset. The proposed IDS consists with a promising approach for anomaly based intrusion detection in distributed systems. Furthermore, the practical implementation of the proposed IDS system can be utilized to train and detect attacks in live network traffi

    Intrusion Detection In Wireless Sensor Networks

    Get PDF
    There are several applications that use sensor motes and researchers continue to explore additional applications. For this particular application of detecting the movement of humans through the sensor field, a set of Berkley mica2 motes on TinyOS operating system is used. Different sensors such as pressure, light, and so on can be used to identify the presence of an intruder in the field. In our case, the light sensor is chosen for the detection. When an intruder crosses the monitored environment, the system detects the changes of the light values, and any significant change meaning that a change greater than a pre-defined threshold. This indicates the presence of an intruder. An integrated web cam is used to take snapshot of the intruder and transmit the picture through the network to a remote station. The basic motivation of this thesis is that a sensor web system can be used to monitor and detect any intruder in a specific area from a remote location

    Small UAS Detect and Avoid Requirements Necessary for Limited Beyond Visual Line of Sight (BVLOS) Operations

    Get PDF
    Potential small Unmanned Aircraft Systems (sUAS) beyond visual line of sight (BVLOS) operational scenarios/use cases and Detect And Avoid (DAA) approaches were collected through a number of industry wide data calls. Every 333 Exemption holder was solicited for this same information. Summary information from more than 5,000 exemption holders is documented, and the information received had varied level of detail but has given relevant experiential information to generalize use cases. A plan was developed and testing completed to assess Radio Line Of Sight (RLOS), a potential key limiting factors for safe BVLOS ops. Details of the equipment used, flight test area, test payload, and fixtures for testing at different altitudes is presented and the resulting comparison of a simplified mathematical model, an online modeling tool, and flight data are provided. An Operational Framework that defines the environment, conditions, constraints, and limitations under which the recommended requirements will enable sUAS operations BVLOS is presented. The framework includes strategies that can build upon Federal Aviation Administration (FAA) and industry actions that should result in an increase in BVLOS flights in the near term. Evaluating approaches to sUAS DAA was accomplished through five subtasks: literature review of pilot and ground observer see and avoid performance, survey of DAA criteria and recommended baseline performance, survey of existing/developing DAA technologies and performance, assessment of risks of selected DAA approaches, and flight testing. Pilot and ground observer see and avoid performance were evaluated through a literature review. Development of DAA criteria—the emphasis here being well clear— was accomplished through working with the Science And Research Panel (SARP) and through simulations of manned and unmanned aircraft interactions. Information regarding sUAS DAA approaches was collected through a literature review, requests for information, and direct interactions. These were analyzed through delineation of system type and definition of metrics and metric values. Risks associated with sUAS DAA systems were assessed by focusing on the Safety Risk Management (SRM) pillar of the SMS (Safety Management System) process. This effort (1) identified hazards related to the operation of sUAS in BVLOS, (2) offered a preliminary risk assessment considering existing controls, and (3) recommended additional controls and mitigations to further reduce risk to the lowest practical level. Finally, flight tests were conducted to collect preliminary data regarding well clear and DAA system hazards

    Optimizing the performance of an integrated process planning and scheduling problem: an AIS-FLC based approach

    Get PDF
    The present market scenario demands an integration of process planning and scheduling to stay competitive with others. In the present work, an integrated process planning and scheduling model encapsulating the salient features of outsourcing strategy has been proposed. The paper emphasizes on the role of outsourcing strategy in optimizing the performance of enterprises in rapidly changing environment. In the present work authors have proposed an artificial immune system based AIS-FLC algorithm embedded with the fuzzy logic controller to solve the complex problem prevailing under such scenario, while simultaneously optimizing the performance. The authors have shown the efficacy of the proposed algorithm by comparing the results with other random search methods

    Cyber Babel: Finding the Lingua Franca in Cybersecurity Regulation

    Get PDF
    Cybersecurity regulations have proliferated over the past few years as the significance of the threat has drawn more attention. With breaches making headlines, the public and their representatives are imposing requirements on those that hold sensitive data with renewed vigor. As high-value targets that hold large amounts of sensitive data, financial institutions are among the most heavily regulated. Regulations are necessary. However, regulations also come with costs that impact both large and small companies, their customers, and local, national, and international economies. As the regulations have proliferated so have those costs. The regulations will inevitably and justifiably diverge where different governments view the needs of their citizens differently. However, that should not prevent regulators from recognizing areas of agreement. This Note examines the regulatory regimes governing the data and cybersecurity practices of financial institutions implemented by the Securities and Exchange Commission, the New York Department of Financial Services, and the General Data Protection Regulations of the European Union to identify areas where requirements overlap, with the goal of suggesting implementations that promote consistency, clarity, and cost reduction
    corecore