7 research outputs found

    Detection and classification for group moving humans

    Get PDF
    In the case of moving group of humans the recognition algorithms more often misclassify it as vehicles or large moving object. It is there fore the aim of this project to detect and classify moving object as either Group of humans or something else. The background subtraction technique has been employed in this work as it is able to provide complete feature of the moving object. However, it is extremely sensitive to dynamic changes like change of illumination. The detected foreground pixels usually contain noise, small movements like tree leaves. These isolated pixels are filtered by some of preprocessing operations; such as median filter and sequence of morphological operations dilation and erosion. Then the object will be extracted using border extraction technique. The classification makes use the shape of the object. The performance of the proposed technique has achieved 75% accuracy based on 18 test samples. This result shows that if it possible to distinctly classify a group of humans moving in the video sequence from other large moving objects such as vehicles

    Design, implementation and evaluation of a secure and efficient key coordination algorithm for line topology network maintenance for use in maritime wireless sensor networks

    Get PDF
    There has been a significant increase in the proliferation and implementation of Wireless Sensor Networks (WSNs) in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. WSNs must regulate different sorts of data transmission such as routing protocols and secure key management protocols. An efficient WSNs architecture must address the capability for remote sensor data management, or instance encrypted transmitting data between sensor nodes. Furthermore, it should have the capability to adapt its sensor members in the network in response to environmental changes, or the condition of sensor nodes. In other words, the key management technique in WSNs should meet several requirements to be efficient. The key management technique for any secure application must provide the required security services; authenticity, confidentiality, integrity, scalability and flexibility. This Thesis presents a symmetric security scheme for a maritime coastal environment monitoring WSN, called Secure and Efficient Key Coordination Algorithm for line topology network maintenance for use in maritime WSNs (SEKCA), which has the aim of addressing a number of WSN security issues. The designed technique provides strong security services and combines the advantages of the various types of current key management schemes for WSNs. The scheme also provides security for travelling packets via individually encrypted links between authenticated neighbours, thus avoiding a reiteration of a global rekeying process. Furthermore, this scheme proposes a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party. The technique has been implemented in real time on a Waspmote test bed sensor platform and the results from both field testing and indoor bench-testing environments are discussed. The contributions of this thesis include: a) a comprehensive study of state-of-the-art WSNs and WSN applications requirements, b) design of SEKCA, c) an efficient implementation of SEKCA on a hardware platform in an outdoor environment, d) SEKCA is evaluated and compared to the other WSN specific key management schemes, and showed that the SEKCA is suitable for future secure WSNs and e) nine peer reviewed publications have resulted from the work

    Secure and efficient key coordination algorithm for line topology network maintenance for use in maritime wireless sensor networks

    Get PDF
    There has been a significant increase in the proliferation and implementation ofWireless Sensor Networks (WSNs) in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. It has now become critical to address the security issues of data communication while considering sensor node constraints. There are many proposed schemes, including the scheme being proposed in this paper, to ensure that there is a high level of security in WSNs. This paper presents a symmetric security scheme for a maritime coastal environment monitoring WSN. The scheme provides security for travelling packets via individually encrypted links between authenticated neighbors, thus avoiding a reiteration of a global rekeying process. Furthermore, this scheme proposes a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party. The technique has been implemented in real time on a Waspmote test bed sensor platform and the results from both field testing and indoor bench testing environments are discussed in this paper

    A secure end-to-end IoT solution

    No full text
    The Internet of Things (IoT) has been expanding in recent years with advancements in technologies, techniques and devices. This expansion has led to several different applications in the medical, civil, marine, military and domestic domains. Each of these domains have different requirements and challenges, with one common denominator: data security. Data security is an important aspect for any IoT network, however, in modern IoT systems simple data security may be not sufficient. This paper looks at a secure end-to-end IoT solution that allows wireless sensors/devices to connect to any PC in the world while guaranteeing data and network security. The scheme proposed in this paper can protect an IoT solution against several attacks like data breach, Denial of Service (DoS) and unauthorized access. Results obtained show that the technologies implemented, or used are superior in terms of time and energy consumption when compared to their counterparts in previously published work

    It takes two to tango: merging science and creativity to support continued innovation in the IoT domain

    Get PDF
    The Internet of Things (IoT) is a new concept that has a great appeal for researchers, businesses and the ordinary tech user. It presents new possibilities of connection between devices and people and it stimulates our need and desire to interact, to exchange ideas and to communicate with the surrounding environment. This paper briefly explores aspects of the IoT that may be important for future developments and focuses on the impact of creative methodologies, such as user centered design (UCD) in a smart parking, IoT-based system prototype. It aspires to provide an alternative perspective for an improved user experience (UX) and aims to contribute to the discussion about the challenges, findings and perspectives when merging science and creativity to maintain continuous progress in the IoT domain

    Implementing secure key coordination scheme for line topology wireless sensor networks

    Get PDF
    There has been a significant increase in the implementation of wireless sensor networks (WSNs) in different disciplines, including the monitoring of maritime environments, healthcare systems and industrial sectors. WSNs must regulate different sorts of data transmission such as routing protocols and secure key management protocols. An efficient WSNs? architecture must address the capability for remote sensor data management, for example encrypted transmitting data between nodes. This system demonstrates the capability to adapt its sensor members in the network in response to environmental changes or the condition of sensor nodes. The key management technique for any secure application must minimally provide security services such as authenticity, confidentiality, integrity, scalability (S), and flexibility. This chapter studies and analyzes different key management schemes that are implemented in WSN applications and evaluates the performance of secure key coordination algorithm for line topology WSNs. This scheme provides traveling packet for a source to end user via an individually encrypted link between authenticated sensor nodes. It will be shown how security algorithms are applied on a network, such as advanced encryption standard (AES)-based WSNs in real time, e.g., Waspmote sensor platform at the University of Limerick Campus
    corecore