3 research outputs found

    CAPTCHA Types and Breaking Techniques: Design Issues, Challenges, and Future Research Directions

    Full text link
    The proliferation of the Internet and mobile devices has resulted in malicious bots access to genuine resources and data. Bots may instigate phishing, unauthorized access, denial-of-service, and spoofing attacks to mention a few. Authentication and testing mechanisms to verify the end-users and prohibit malicious programs from infiltrating the services and data are strong defense systems against malicious bots. Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) is an authentication process to confirm that the user is a human hence, access is granted. This paper provides an in-depth survey on CAPTCHAs and focuses on two main things: (1) a detailed discussion on various CAPTCHA types along with their advantages, disadvantages, and design recommendations, and (2) an in-depth analysis of different CAPTCHA breaking techniques. The survey is based on over two hundred studies on the subject matter conducted since 2003 to date. The analysis reinforces the need to design more attack-resistant CAPTCHAs while keeping their usability intact. The paper also highlights the design challenges and open issues related to CAPTCHAs. Furthermore, it also provides useful recommendations for breaking CAPTCHAs

    A Robust Internet of Drones Security Surveillance Communication Network Based on IOTA

    Get PDF
    cations. The rise in drone usage underscores privacy and security challenges concerning flight boundaries, data collection in public and private domains, and data storage and dissemination. Such issues highlight the drones’ capability to communicate and securely store data over potentially insecure channels. Recognizing these challenges and gaps in the research, this paper introduces an efficient and secure security surveillance model for the Internet of Drones (IoD). Our model ensures secure communication between Ground Stations (GS) and Drones, effectively addressing various attack types. Particularly, surveillance drones are vulnerable to physical capture attacks. We delve into a scenario where a network drone is physically apprehended. Leveraging the information stored within the drone, the attacker could potentially access the session. This paper proposes a solution to counter such threats. Through experiments using MATLAB and VScode, we evaluate our network’s efficiency and scalability in relation to the surge in transactions. The findings reveal our model’s prowess in handling large-scale networks. Specifically, when transactions surpass 1000 per minute, our model achieves approximately a 20% reduction in processing time compared to existing studies. Moreover, our approach facilitates about 80% enhanced communication efficiency relative to the contemporary state- of-the-art frameworks. A security analysis via AVISPA further corroborates the robustness and security of our proposed communication strategy against diverse attack types

    Enhancing Workplace Safety: PPE_Swin—A Robust Swin Transformer Approach for Automated Personal Protective Equipment Detection

    No full text
    Accidents occur in the construction industry as a result of non-compliance with personal protective equipment (PPE). As a result of diverse environments, it is difficult to detect PPE automatically. Traditional image detection models like convolutional neural network (CNN) and vision transformer (ViT) struggle to capture both local and global features in construction safety. This study introduces a new approach for automating the detection of personal protective equipment (PPE) in the construction industry, called PPE_Swin. By combining global and local feature extraction using the self-attention mechanism based on Swin-Unet, we address challenges related to accurate segmentation, robustness to image variations, and generalization across different environments. In order to train and evaluate our system, we have compiled a new dataset, which provides more reliable and accurate detection of personal protective equipment (PPE) in diverse construction scenarios. Our approach achieves a remarkable 97% accuracy in detecting workers with and without PPE, surpassing existing state-of-the-art methods. This research presents an effective solution for enhancing worker safety on construction sites by automating PPE compliance detection
    corecore