Electronic fee collection - Secure monitoring for autonomous toll systems

2020 ◽  
Keyword(s):  
Author(s):  
Priscilla Swee Pei Poh ◽  
◽  
Rafidah Ngadengon ◽  

Securing and monitoring the territory have become a big challenge for everyone as the number of vehicle users have increased. The premise area must be secure with enforced entrances and exits. It should have an automated and efficient security and monitoring system. For this purpose, an automated vehicle access system with accurate and secure monitoring of vehicle entry and exit was developed with Graphical User Interface (GUI) and vehicle’s user database along with the prototype of Ultra-High Frequency RFID. The suitable configuration for the hardware prototype has also been evaluated to maximize the system’s capabilities. This system operates on frequencies from 400MHz to 950MHz and is performed at distances of 7 meters. The passive tag was attached to the various condition and sizes of the car. The result shows showed that the system was optimally performed with the speed of the vehicle up to 50 km/h, 7 m of reading range and a maximum 20% tinted windshield. The ideal angle for the reader is around 60ᵒ to 70ᵒ with 2 meters of mounting pole. For future improvement, it is suggested that the registered vehicle user data was linked with the official premise’s database and the data is saved in an off-site location (cloud storage). The GUI is also able to support more than 1 reader at a time depending on demand.


Sensors ◽  
2019 ◽  
Vol 19 (23) ◽  
pp. 5258 ◽  
Author(s):  
Md. Abdur Rahman ◽  
Md. Mamunur Rashid ◽  
Julien Le Kernec ◽  
Bruno Philippe ◽  
Stuart J. Barnes ◽  
...  

Once diagnosed with cancer, a patient goes through a series of diagnosis and tests, which are referred to as “after cancer treatment”. Due to the nature of the treatment and side effects, maintaining quality of life (QoL) in the home environment is a challenging task. Sometimes, a cancer patient’s situation changes abruptly as the functionality of certain organs deteriorates, which affects their QoL. One way of knowing the physiological functional status of a cancer patient is to design an occupational therapy. In this paper, we propose a blockchain and off-chain-based framework, which will allow multiple medical and ambient intelligent Internet of Things sensors to capture the QoL information from one’s home environment and securely share it with their community of interest. Using our proposed framework, both transactional records and multimedia big data can be shared with an oncologist or palliative care unit for real-time decision support. We have also developed blockchain-based data analytics, which will allow a clinician to visualize the immutable history of the patient’s data available from an in-home secure monitoring system for a better understanding of a patient’s current or historical states. Finally, we will present our current implementation status, which provides significant encouragement for further development.


Author(s):  
Uwe Reischl ◽  
Olga Salinas ◽  
Ron Oberleitner ◽  
Budimir Mijovic

Smartphone technologies have transformed the way people interact with each other around the world. The technology offers new approaches and opportunities for collecting, storing and sharing information. A novel smartphone technology application (app) originally developed for Patient Behavior Health applications was tested to determine if the proficiency of nursing students demonstrating a standardized seasonal influenza immunization protocol could be accurately recorded and subsequently evaluated remotely. The student performance was rated by four university instructors independently of each other. Each instructor used a standardized competency check-list to score these students. The study showed that by using the new smart-phone application, the remote evaluation of clinical nursing student proficiencies could be accomplished quickly and easily. However, the inter-rater agreement indicated that training of the evaluators in the use of the new app prior to scoring student performances will be needed. While the new smartphone application proved to be effective in documenting student performance, the technology promises to have practical uses in additional fields such as the secure monitoring of specialized training for paramedics, firefighters, police, skilled tradesmen, aircraft crews, etc.


2021 ◽  
Author(s):  
Vincent Koo

Due to recent advances in wireless communication technologies, mobile ad hoc networks (MANETs) have become the networks of choice for use in various applications. Unfortunately, this advantage comes with serious security concerns, particularly from a wireless channel prospective, where MANETs may be vulnerable to collaborative wormhole attacks, in particular, packet dropping and message tampering attacks. Recently, two secured routing protocols against these types of attacks (the so-called Highly Secured Approach Method or HSAM and the so-called Securing AODV against Wormhole Attacks in emergency MANET Multimedia Communications or AODV-WADR-AES) were proposed. These schemes are investigated in-depth to identify their weaknesses and a novel secured routing scheme (so-called Timed and Secure Monitoring Implementation against Wormhole Attacks in MANETs or TSMI) is proposed, with the goal to mitigate collaborative wormhole attacks in MANETs while maintaining the performance levels of both the HSAM and AODVWADR- AES schemes. Simulation results are presented to validate the stated goal using various performance metrics.


Sign in / Sign up

Export Citation Format

Share Document