7 research outputs found

    Math-Based Design of Sensing Bladders

    Get PDF
    Through the use of finite-element modeling, pressure patterns on the underside of seat foam can be computed for a variety of occupants and seating positions. A design tool has been created which allows an engineer to evaluate different layouts for a pressure-sensing bladder in just minutes

    Detection Systems for Airbag Deployment

    Get PDF
    The airbag enablement system in todayā€™s automobiles is not ideal and may allow airbags to deploy when they should not. Weight sensors detect pressure when someone sits in a passenger seat, enabling the airbag to deploy if an accident occurs. This system is flawed. For example, if a heavy box is placed in a passenger seat, the airbag will be unnecessarily enabled. The goal of this research project was to determine if different sensorsā€”not weight sensors or camerasā€”could be used to identify the occupant of an automobile seat. Using a microchip programmed in C language, a circuit was designed with three sensors: ultrasonic range, passive infrared, and temperature. The temperature sensor was placed on an automobile seat to detect heat from occupant of the chair. The passive infrared sensor was positioned in front and above the seat to detect heat movement, and in order to detect the height of the occupant, the ultrasonic sensor was placed above the seat. The sensors can conclusively determine whether the occupant is living or inanimate. The sensors cannot always determine if the occupant is specifically human or the age of the human

    Multi-Factor Authentication: A Survey

    Get PDF
    Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communications, access right management, etc. This work sheds light on the evolution of authentication systems towards Multi-Factor Authentication (MFA) starting from Single-Factor Authentication (SFA) and through Two-Factor Authentication (2FA). Particularly, MFA is expected to be utilized for human-to-everything interactions by enabling fast, user-friendly, and reliable authentication when accessing a service. This paper surveys the already available and emerging sensors (factor providers) that allow for authenticating a user with the system directly or by involving the cloud. The corresponding challenges from the user as well as the service provider perspective are also reviewed. The MFA system based on reversed Lagrange polynomial within Shamirā€™s Secret Sharing (SSS) scheme is further proposed to enable more flexible authentication. This solution covers the cases of authenticating the user even if some of the factors are mismatched or absent. Our framework allows for qualifying the missing factors by authenticating the user without disclosing sensitive biometric data to the verification entity. Finally, a vision of the future trends in MFA is discussed.Peer reviewe

    Driving Monitoring System Application With Stretchable Conductive Inks: A Review

    Get PDF
    Nowadays the automotive industry is moving towards developing system connected vehicle parameters which can monitor the driverā€™s behaviour before driving. Most drivers lose focus and are emotionally distracted while driving owing to fatigue, drowsiness and alcohol consumption, that can result in a traffic accidents. The device or equipment used to detect the driverā€™s health before driving has always posed a problem in terms of the efficiency of the system especially concerning the cable connecting the equipment. Stretchable conductive ink (SCI) via electronic devices have been widely applied in various industries such as fabric, health, automotive, communications, etc. The flexibility allows a circuit to be placed on an uneven or constantly changing surface. However, till to-date, the effective use of the stretchable conductive ink has yet to be proven in the automotive industry. The current driver monitoring system cannot integrate with many of the driver's health level tracking features at one time. A combination of the driverā€™s monitoring system methods with stretchable conductive ink (SCI) sensors layout design can be used to prevent road accidents as a result of a driverā€™s behavior and will make the driving monitoring system more effective with soft substrates technology that has the advantage of geometric deformation based on appropriate shapes

    Social, Private, and Trusted Wearable Technology under Cloud-Aided Intermittent Wireless Connectivity

    Get PDF
    There has been an unprecedented increase in the use of smart devices globally, together with novel forms of communication, computing, and control technologies that have paved the way for a new category of devices, known as high-end wearables. While massive deployments of these objects may improve the lives of people, unauthorized access to the said private equipment and its connectivity is potentially dangerous. Hence, communication enablers together with highly-secure human authentication mechanisms have to be designed.In addition, it is important to understand how human beings, as the primary users, interact with wearable devices on a day-to-day basis; usage should be comfortable, seamless, user-friendly, and mindful of urban dynamics. Usually the connectivity between wearables and the cloud is executed through the userā€™s more power independent gateway: this will usually be a smartphone, which may have potentially unreliable infrastructure connectivity. In response to these unique challenges, this thesis advocates for the adoption of direct, secure, proximity-based communication enablers enhanced with multi-factor authentication (hereafter refereed to MFA) that can integrate/interact with wearable technology. Their intelligent combination together with the connection establishment automation relying on the device/user social relations would allow to reliably grant or deny access in cases of both stable and intermittent connectivity to the trusted authority running in the cloud.The introduction will list the main communication paradigms, applications, conventional network architectures, and any relevant wearable-speciļ¬c challenges. Next, the work examines the improved architecture and security enablers for clusterization between wearable gateways with a proximity-based communication as a baseline. Relying on this architecture, the author then elaborates on the social ties potentially overlaying the direct connectivity management in cases of both reliable and unreliable connection to the trusted cloud. The author discusses that social-aware cooperation and trust relations between users and/or the devices themselves are beneļ¬cial for the architecture under proposal. Next, the author introduces a protocol suite that enables temporary delegation of personal device use dependent on diļ¬€erent connectivity conditions to the cloud.After these discussions, the wearable technology is analyzed as a biometric and behavior data provider for enabling MFA. The conventional approaches of the authentication factor combination strategies are compared with the ā€˜intelligentā€™ method proposed further. The assessment ļ¬nds signiļ¬cant advantages to the developed solution over existing ones.On the practical side, the performance evaluation of existing cryptographic primitives, as part of the experimental work, shows the possibility of developing the experimental methods further on modern wearable devices.In summary, the set of enablers developed here for wearable technology connectivity is aimed at enriching peopleā€™s everyday lives in a secure and usable way, in cases when communication to the cloud is not consistently available
    corecore