scholarly journals Real Time Biometrics Based Vehicle Security System with GPS and GSM Technology

2015 ◽  
Vol 47 ◽  
pp. 471-479 ◽  
Author(s):  
N. Kiruthiga ◽  
L. latha ◽  
S. Thangasamy
Author(s):  
Bhargava R ◽  
Amulya H C ◽  
Jyothi K P ◽  
Keerthana R

As human life started to evolve on this earth, the craving for smart automobiles has increased, and adding a vehicle security system to secure the automobile from theft in parking and in unsecured places is important. This paper proposes the design and development of smart system to prevent theft that uses biometric authentication to access the door and to start the engine of the automobile. This system initially uses the fingerprint module that takes the real time fingerprint of a person trying to open the vehicle door and compares it with the authorized person’s fingerprint and then allows or denies the access to door, and secondly the camera takes the image of a person trying to start the engine and compares with the authorized person’s image to allow or deny the access to the engine. In case of detection of unauthorized fingerprint, the GSM module sends the message to the owner and in case unauthorized person detected by camera it sends the captured image with alert message to owner. The system is developed using raspberry pi, GSM module, fingerprint module, pi camera, dc and servo motor.


2018 ◽  
Vol 8 (11) ◽  
pp. 2305 ◽  
Author(s):  
S Rana ◽  
Miah Halim ◽  
M. Kabir

Internet of Things (IoT) opens new horizons by enabling automated procedures without human interaction using IP connectivity. IoT deals with devices, called things, represented as any items from our daily life that are enhanced with computing or communication facilities. Among various mobile communications, Zigbee communication is broadly used in controlling or monitoring applications due to its low data rate and low power consumption. Securing IoT systems has been the main concern for the research community. In this paper, different security threats of Zigbee networks in the IoT platform have been addressed to predict the potential security threats of Zigbee protocol and a Security Improvement Framework (SIF) has been designed for intelligent monitoring in an office/corporate environment. Our proposed SIF can predict and protect against various potential malicious attacks in the Zigbee network and respond accordingly through a notification to the system administrator. This framework (SIF) is designed to make automated decisions immediately based on real-time data which are defined by the system administrator. Finally, the designed SIF has been implemented in an office security system as a case study for real-time monitoring. This office security system is evaluated based on the capacity of detecting potential security attacks. The evaluation results show that the proposed SIF is capable of detecting and protecting against several potential security attacks efficiently, enabling a more secure way of intelligent monitoring in the IoT platform.


Author(s):  
I Komang Krisna Ade Marta ◽  
I Nyoman Buda Hartawan ◽  
I Kadek Susila Satwika

AbstrakKeamanan server merupakan hal penting yang perlu diberikan perhatian lebih saat melakukan konfigurasi server. Pada umumnya serangan yang terjadi pada server diketahui setelah terjadinya kegagalan pada server dalam memberikan layanan. Pada penelitian ini, dibangun sebuah sistem keamanan server yang dapat melakukan monitoring pada sebuah server ketika terdeteksi adanya aktivitas yang tidak wajar. Pemberitahuan akan dikirimkan melalui SMS (Short Message Service) ke handphone Administrator jaringan. Sistem yang dibangun melakukan pendeteksian intrusi pada server secara realtime menggunakan SNORT. Ketika terjadi akses yang tidak wajar pada server, maka SNORT akan mendeteksi dan mengirimkan informasi terjadinya aktivitas yang tidak wajar ke Administrator jaringan. Sistem ini diujikan dengan lima jenis serangan yakni PING Attack, DoS/DDoS Attack, Port Scanning, Telnet Access dan FTP Access. Parameter yang diamati pada penelitian ini adalah beban aktivitas yang terjadi pada sumber daya server meliputi CPU, Memory (RAM) dan beban jaringan. Hasil penelitian menunjukkan bahwa saat terjadi upaya serangan terhadap server, SNORT dapat menghasilkan alert yang akan disimpan pada log sekaligus dikirimkan ke handphone Administrator melalui SMS. AbstractServer security is an important thing that needs to be given more attention when configuring a server. In general, attacks that occur on the server are known after a failure on the server in providing services. In this study, a server security system was built that could monitor a server when an unusual activity was detected. Notifications will be sent via SMS (Short Message Service) to the network Administrator's smartphone. The system is built to detect intrusions on the server in real time using SNORT. When improper access occurs on the server, SNORT will detect and send information about the occurrence of unusual activity to the network Administrator. This system is tested with five types of attacks namely PING Attack, DoS / DDoS Attack, Port Scanning, Telnet Access and FTP Access. The parameters observed in this study are the activity load that occurs on server resources including CPU, Memory (RAM) and network load. The results showed that when an attempt was made to attack the server, SNORT could produce alerts that would be stored in a log as well as sent to the Administrator's smartphone via SMS.


Author(s):  
A. Valdez ◽  
C. Canales ◽  
D. Huamán ◽  
C. Pascual ◽  
M. Chauca ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document