4,053 research outputs found
Recommended from our members
Techno-surveillance of the roads: High impact and low interest
Copyright © 2010 Palgrave Macmillan. This is a post-peer-review, pre-copyedit version of an article published in Crime Prevention and Community Safety. The definitive publisher-authenticated version Crime Prevention and Community Safety 10(1): 1-18 is available online at the link below.Road crashes and road crime are huge international problems produced by global society’s increasing dependence on motorised transport. To help reduce these crash and crime statistics, roads technology is rapidly developing to prevent the former and deter the latter. This technology largely works by vehicle surveillance, and as with surveillance technology used in other arenas of crime prevention, drawbacks and dangers go along with the safety and security enhancing aspects.
This paper reviews some key emerging roads technologies, the theoretical concerns raised by them and how, through various theoretical frameworks, they could be explored by the discipline of criminology. It urges that the surveillance aspects of road crime prevention and the study of vehicle-related crime more generally would benefit from criminological consideration and be theoretically rewarding. Moreover, in view of the centrality of the roads in contemporary life and the extent of global harm caused there, it contends that criminology should engage with this terrain
A Cognitive Framework to Secure Smart Cities
The advancement in technology has transformed Cyber Physical Systems and their interface with IoT into a more sophisticated and challenging paradigm. As a result, vulnerabilities and potential attacks manifest themselves considerably more than before, forcing researchers to rethink the conventional strategies that are currently in place to secure such physical systems. This manuscript studies the complex interweaving of sensor networks and physical systems and suggests a foundational innovation in the field. In sharp contrast with the existing IDS and IPS solutions, in this paper, a preventive and proactive method is employed to stay ahead of attacks by constantly monitoring network data patterns and identifying threats that are imminent. Here, by capitalizing on the significant progress in processing power (e.g. petascale computing) and storage capacity of computer systems, we propose a deep learning approach to predict and identify various security breaches that are about to occur. The learning process takes place by collecting a large number of files of different types and running tests on them to classify them as benign or malicious. The prediction model obtained as such can then be used to identify attacks. Our project articulates a new framework for interactions between physical systems and sensor networks, where malicious packets are repeatedly learned over time while the system continually operates with respect to imperfect security mechanisms
Crowdsensing Application on Coalition Game Using GPS and IoT Parking in Smart Cities
This paper provides an overview of crowdsensing and some of its applications. Crowdsensing is a part of the collecting data situations also; it’s built on a data system on multiple customer interactions. Moreover, writing the general information of the smart cities can be used to boost to received number frequency to send messages. This work mentioned the Crowdsensing layers that describe Mobile crowdsensing. The article focuses on crowdsensing layers, developed an application in Coalition Game using crowdsensing in terms of GPS. In addition, this paper discussed the Mobile crowdsensing system and how important the cloud is in serving the wireless network, the Internet of things (IoT), and data collection. Furthermore, this research also has developed a smart crowdsensing parking system that will help by reducing the time-wasting users
Security Evaluation of Cyber-Physical Systems in Society- Critical Internet of Things
In this paper, we present evaluation of security
awareness of developers and users of cyber-physical systems. Our
study includes interviews, workshops, surveys and one practical
evaluation. We conducted 15 interviews and conducted survey with
55 respondents coming primarily from industry. Furthermore, we
performed practical evaluation of current state of practice for a
society-critical application, a commercial vehicle, and reconfirmed
our findings discussing an attack vector for an off-line societycritical
facility. More work is necessary to increase usage of security
strategies, available methods, processes and standards. The security
information, currently often insufficient, should be provided in the
user manuals of products and services to protect system users. We
confirmed it lately when we conducted an additional survey of
users, with users feeling as left out in their quest for own security
and privacy. Finally, hardware-related security questions begin to
come up on the agenda, with a general increase of interest and
awareness of hardware contribution to the overall cyber-physical
security. At the end of this paper we discuss possible
countermeasures for dealing with threats in infrastructures,
highlighting the role of authorities in this quest
- …