Towards security on internet of things: applications and challenges in technology

KM Sadique, R Rahmani, P Johannesson - Procedia Computer Science, 2018 - Elsevier
Abstract The Internet of Things (IoT) paradigm refers to the network of physical objects or"
things" embedded with electronics, software, sensors, and connectivity to enable objects to …

Choice of application layer protocols for next generation video surveillance using internet of video things

T Sultana, KA Wahid - IEEE Access, 2019 - ieeexplore.ieee.org
Video surveillance has become ubiquitous due to the increasing security requirements in
every sphere of life. The next generation video surveillance system (VSS) possesses great …

Analysis of vulnerabilities in MQTT security using Shodan API and implementation of its countermeasures via authentication and ACLs

MS Harsha, BM Bhavani… - … Conference on Advances …, 2018 - ieeexplore.ieee.org
Among the technologies evolved in the recent years, a remarkable one is the IoT (Internet of
Things), wherein thething'in IoT could be smart phones, tablets, PCs and almost anything …

[PDF][PDF] Developed security and privacy algorithms for cyber physical system

DD Khudhur, MS Croock - International Journal of Electrical and …, 2021 - academia.edu
Cyber-physical system (CPS) is a modern technology in the cyber world, and it integrates
with wireless sensor network (WSN). This system is widely used in many applications such …

[PDF][PDF] Smart parking guidance system using 360o camera and haar-cascade classifier on iot system

RFO Salma, MM Arman - Int. J. Recent Technol. Eng, 2019 - irep.iium.edu.my
Nowadays, smart parking guidance system is a crucial research for people's convenience.
The main objective of this research is to develop and analyze on a smart parking guidance …

[PDF][PDF] Evil twin attack mitigation techniques in 802.11 networks

R Muthalagu, S Sanjay - International Journal of Advanced …, 2021 - researchgate.net
IEEE standard. The attack poses a threat to wireless connections. Evil Twin Wi-Fi attack is
one of the attacks which has been there for a long time. Once the Evil Twin Wi-Fi attack is …

An experimental analysis of security vulnerabilities in industrial internet of things services

TD Diwan - Information Technology in Industry, 2021 - it-in-industry.org
Abstract Information exchange by device to device was mainly active while in beginning of
the IoT. The approach has increasingly expanded to incorporate human experiences as …

S mart car parking system using openCV

M Goel, A Singh, D Goyal, A Rajak… - Recent Trends in …, 2021 - taylorfrancis.com
Nowadays, system of Smart Parking becomes the pivotal exploration for comfort of people.
This article objective is basically to spread as well as scrutinize a well-maintained parking …

Image handling and processing for efficient parking space detection and navigation aid

CS Tutika, C Vallapaneni - arXiv preprint arXiv:1807.02424, 2018 - arxiv.org
This paper aims to develop a robust and flexible algorithm for vacant parking space
detections using the image processing capabilities of OpenCV. It removes the need for …

[PDF][PDF] TECHNIQUES FOR MITIGATING EVIL TWIN ATTACKS IN 802.11 NETWORKS

AK MISHRA - fuzzy-tversu.com
I. INTRODUCTION In today's world, wireless connections are becoming more important day
by day. Almost all the appliance in use gets connected to the internet to customize, improve …