2,595 research outputs found

    Development and evaluation of a smartphone-based system for inspection of road maintenance work

    Get PDF
    Abstract. In the road construction industry, doing work inspection is a laborious and resource-consuming job because of the distributed work site. Contractors in Finland require to capture photos of every road fix they have done as proof of their work. It is well-established that with the help of smartphone technology, these kinds of manual work can be reduced. This thesis aims to develop and evaluate a smartphone-based system to capture video evidence of task completion. The system, designed and developed in this thesis, consists of an Android application named ’Road Recorder’ and a web tool for managing the content collected by Road Recorder. While mounted to a vehicle’s dashboard used in construction work, the Road Recorder can record the videos of road surface and geo-location information and some other metadata and send them to a remote server that is inspected using the web tool. Users of different backgrounds were given the system to accomplish some tasks and were observed closely. The users were interviewed at the end, and responses were analyzed to find the usability of the applications. The results indicate the high usability of the Road Recorder application and reveal possible improvements for the Road Recorder management web application. Overall, Road Recorder is a great step towards the automation of such construction work inspection. Though there were some limitations in the evaluation process, it demonstrates that Road Recorder is easy to use and can be a useful tool in the industry

    End-to-end security in embedded system for modern mobile communication technologies

    Get PDF
    Modern mobile electronic devices such as smartphones or cell phones can now be used for distant devices such as technical systems to monitor and control. While surveillance systems do not require high standards navigating about the time of transfer of the displayed data. More real-time data are needed for a remote mobile robot transfer. Therefore, it has investigated and measured not only the possibilities of employing mobile devices. But also, the supported data transmission channels, such as UMTS, GSM, Wireless LAN, and Bluetooth. The remotecontrol system is used in many applications such as smart homes, cities, smart hospitals, etc., but it must be today updated to ensure fast-changing technology. Extensive coverage, remote control, and reliable operation in realtime in the deployment of wireless security knowledge. The home automation control system delivers significant features together with a user-friendly interface. A secure remote-based end-to-end security system NTMobile, a technique that enables NAT to provide transverse and encrypted communication from end to end. This confirmed that evaluating the performance of the system in the ECHONET lite compatible smartphone ecosystem. This gives flexibility in configuring time-sensitive industrial networks and enables them to be secured. A safe and reliable remote-control system is also conceivable under the privacy of the user

    Performance analysis and application development of hybrid WiMAX-WiFi IP video surveillance systems

    Get PDF
    Traditional Closed Circuit Television (CCTV) analogue cameras installed in buildings and other areas of security interest necessitates the use of cable lines. However, analogue systems are limited by distance; and storing analogue data requires huge space or bandwidth. Wired systems are also prone to vandalism, they cannot be installed in a hostile terrain and in heritage sites, where cabling would distort original design. Currently, there is a paradigm shift towards wireless solutions (WiMAX, Wi-Fi, 3G, 4G) to complement and in some cases replace the wired system. A wireless solution of the Fourth-Generation Surveillance System (4GSS) has been proposed in this thesis. It is a hybrid WiMAX-WiFi video surveillance system. The performance analysis of the hybrid WiMAX-WiFi is compared with the conventional WiMAX surveillance models. The video surveillance models and the algorithm that exploit the advantages of both WiMAX and Wi-Fi for scenarios of fixed and mobile wireless cameras have been proposed, simulated and compared with the mathematical/analytical models. The hybrid WiMAX-WiFi video surveillance model has been extended to include a Wireless Mesh configuration on the Wi-Fi part, to improve the scalability and reliability. A performance analysis for hybrid WiMAX-WiFi system with an appropriate Mobility model has been considered for the case of mobile cameras. A security software application for mobile smartphones that sends surveillance images to either local or remote servers has been developed. The developed software has been tested, evaluated and deployed in low bandwidth Wi-Fi wireless network environments. WiMAX is a wireless metropolitan access network technology that provides broadband services to the connected customers. Major modules and units of WiMAX include the Customer Provided Equipment (CPE), the Access Service Network (ASN) which consist one or more Base Stations (BS) and the Connectivity Service Network (CSN). Various interfaces exist between each unit and module. WiMAX is based on the IEEE 802.16 family of standards. Wi-Fi, on the other hand, is a wireless access network operating in the local area network; and it is based on the IEEE 802.11 standards

    Experience Report on the Challenges and Opportunities in Securing Smartphones Against Zero-Click Attacks

    Full text link
    Zero-click attacks require no user interaction and typically exploit zero-day (i.e., unpatched) vulnerabilities in instant chat applications (such as WhatsApp and iMessage) to gain root access to the victim's smartphone and exfiltrate sensitive data. In this paper, we report our experiences in attempting to secure smartphones against zero-click attacks. We approached the problem by first enumerating several properties we believed were necessary to prevent zero-click attacks against smartphones. Then, we created a security design that satisfies all the identified properties, and attempted to build it using off-the-shelf components. Our key idea was to shift the attack surface from the user's smartphone to a sandboxed virtual smartphone ecosystem where each chat application runs in isolation. Our performance and usability evaluations of the system we built highlighted several shortcomings and the fundamental challenges in securing modern smartphones against zero-click attacks. In this experience report, we discuss the lessons we learned, and share insights on the missing components necessary to achieve foolproof security against zero-click attacks for modern mobile devices

    Smart Dairy Cattle Farming and In-Heat Detection through the Internet of Things (IoT)

    Get PDF
    The Internet of Things (IoT) technology has been being revolutionized in various aspects of agriculture around the world ever since. Its application has already found its success in some countries. On the contrary, this technology has yet to find its substantial breakthrough in the Philippines. This study shows the application of IoT in improving the detection efficiency of standing-heat behaviors of cows through automated detection using Pan-tilt-zoom cameras and a Python-driven Web Application. The dimensions of the barn were measured, and the Cameras' Field of Views (FOVs) were pre-calculated for the strategic positions of the cameras atop of the cowshed. The program detects the cows and any estrus events through the surveillance cameras. The results will be sent to the cloud server to display on the web application for analysis. The web app can allow updates on cow information, inseminations, pregnancy, and calving records, estimate travel time from the user's geolocation to the farm, provide live monitoring and remote camera accessibility and control through the cameras and deliver reliable cross-platform push-notification and call alerts on the user's device(s) whenever an estrus event is detected. Based on the results, the program performed satisfactorily at 50% detection efficiency

    Spying on the Spy: Security Analysis of Hidden Cameras

    Full text link
    Hidden cameras, also called spy cameras, are surveillance tools commonly used to spy on people without their knowledge. Whilst previous studies largely focused on investigating the detection of such a camera and the privacy implications, the security of the camera itself has received limited attention. Compared with ordinary IP cameras, spy cameras are normally sold in bulk at cheap prices and are ubiquitously deployed in hidden places within homes and workplaces. A security compromise of these cameras can have severe consequences. In this paper, we analyse a generic IP camera module, which has been packaged and re-branded for sale by several spy camera vendors. The module is controlled by mobile phone apps. By analysing the Android app and the traffic data, we reverse-engineered the security design of the whole system, including the module's Linux OS environment, the file structure, the authentication mechanism, the session management, and the communication with a remote server. Serious vulnerabilities have been identified in every component. Combined together, they allow an adversary to take complete control of a spy camera from anywhere over the Internet, enabling arbitrary code execution. This is possible even if the camera is behind a firewall. All that an adversary needs to launch an attack is the camera's serial number, which users sometimes unknowingly share in online reviews. We responsibly disclosed our findings to the manufacturer. Whilst the manufacturer acknowledged our work, they showed no intention to fix the problems. Patching or recalling the affected cameras is infeasible due to complexities in the supply chain. However, it is prudent to assume that bad actors have already been exploiting these flaws. We provide details of the identified vulnerabilities in order to raise public awareness, especially on the grave danger of disclosing a spy camera's serial number.Comment: 19 pages. Conference: NSS 2023: 17th International Conference on Network and System Securit
    • …
    corecore