scispace - formally typeset
Search or ask a question
Author

N. Asha

Bio: N. Asha is an academic researcher from Anna University. The author has contributed to research in topics: The Internet & Mobile device. The author has an hindex of 1, co-authored 1 publications receiving 2 citations.

Papers
More filters
Book ChapterDOI
01 Jan 2020
TL;DR: A wireless intrusion detection smart security system is designed and developed to overcome the research gaps in the existing systems and is a lightweight, low cost, extensible, flexible wireless IoT-based-smart security system which will permit the mobile devices and computers to remotely trail the happenings at the location, record the activities and save them in the prefixed cloud storage account.
Abstract: The digital era has witnessed giant strides in the utilization of security systems, which perform certain pre-programmed tasks when a secured zone is breached. The prevailing traditional security systems have evolved embracing the cutting-edge technologies from time to time. The avalanche-like explosion of things and their connectivity through Internet have opened several new boulevards of exploration. The unification of security system based on the IoT platform has the potential of interrelating real time with the devices and makes them smart, with issues like privacy. To keep the issues in the bay, a new intrusion detection system is the need of the hour. Hence, a wireless intrusion detection smart security system is designed and developed to overcome the research gaps in the existing systems. The smart security system is built on the Internet of things. The system is a lightweight, low cost, extensible, flexible wireless IoT-based-smart security system which will permit the mobile devices and computers to remotely trail the happenings at the location, record the activities and save them in the prefixed cloud storage account. The system uses the hardware (things) to sense and fetch the data which is processed by the embedded software. On the occurrence of an abnormal activity (like breaching by an intruder), a valid signal is detected, and it sends signal to the board directing it to run the alert module. The alert module activates the GSM API to immediately alert the end-user by mobile. This system thus provides a wireless, incessant service to all the stakeholders by phone regarding the breaches occurring in the environment. This implemented smart security system using IoT with mobile assistance also integrates the various alarms, sends alert as pre-programmed, tracks the movements automatically, uses the state-of-the-art appropriate latest technologies to alert the concerned stakeholders and waits for actions to be taken.

11 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This framework harnesses the benefits of Block Chain like reduced cost, speed, automation, immutability, near-impossible loss of data, permanence, removal of intermediaries, decentralization of consensus, legitimate access to health data, data safekeeping, accrual-based imbursement mechanisms, and medical supply chain efficacy.
Abstract: The most burning topic of today, calls for a holistic solution that is reliable, secure, privacy preserved, cost effective Cloud storage that can tide over the turbulent conditions of the rapidly budding digital storage technologies. This send an outcry for a devoted solution, in the form of an individualized, patient-centric care - IoMT that augments precise disease identifications, decrease in errors, reduction in costs of care through the support of technology, allows patients to direct health information data to doctors,manage drugs, keep Personal Health Records, caters to remote medical supports Care, provides proactive approach to preserving Good Health, improves and Accelerates Clinician Workflows, empowers extreme connectivity due to better automation and perceptions in the DNA of IoMT functions. But IoMT adoption is like a rose with thorns like constraints of increased administrative costs, deficiency of universal data access, present-day electronic medical records. The BCT is used in the framework to overcome the security issues of IoMT through the use of latest encryptions. Furthermore, this framework harnesses the benefits of Block Chain like reduced cost, speed, automation, immutability, near-impossible loss of data, permanence, removal of intermediaries, decentralization of consensus, legitimate access to health data, data safekeeping, accrual-based imbursement mechanisms, and medical supply chain efficacy. The outcomes in this paper are (i)A systematic investigation of the current IoMT, Block Chain and Cloud Storage in Health Care;(ii) Explore the challenges and necessities for the confluence of Block Chain (BC), Internet of Medical Things (IoMT), Cloud Computing (CC);(iii)Formulate the requirements necessary for the real-time remote Health Care of one-to-one care structure, which, supports the vital functions that are critical to the Patient Centric Health Care;(iv) Design and develop a novel BC IoMT U6 HCS (Block Chain based Internet of Medical Things for Uninterrupted, Ubiquitous, User-friendly, Unflappable, Unblemished, Unlimited Health Care Services) Layered Architecture, to support the vital functions critical for Patient Centric Health Care and (v) Implement and test with the previous established and proven techniques. The integrity of the Layered Architecture is validated with the already existing ones in terms of audit performances. The results from the Layered Architecture are validated and are proven to be competent in achieving safe auditing and surpass the former ones. The technology is in the sprouting phases, it is perilous that affiliates of the Health Care community realize the rudimentary ideas behind Block Chain, and detect its feasible impact on the future of patient centric medical care. Finally, and most importantly, this paper also gives a panoramic view on the current research status, and imminent directions of Secure Internet of Medical Things Using Block Chain.

43 citations

Book ChapterDOI
01 Jan 2022
TL;DR: In this paper, the authors have developed and installed IoT-based security system for agriculture fields capable to detect and communicate presence of wild animals using PIR sensor and GSM module.
Abstract: Farmers face well-known challenges of crop protection from insect pests, diseases, and weeds along with protection from contrary weather conditions like hail or frost. However, they face another important challenge of protecting crops from wild animals that may cause severe damage to their grown crops by feeding on plant parts or trampling over the crops. As most of farmers stay away from their fields, continuous monitoring of fields is not possible due to distance as well as costs involved to appoint manpower for this purpose. Present technologies have made it possible to provide low cost, easy to install, and user friendly solution to such problems. This paper aims to develop and install IoT-based security system for agriculture fields capable to detect and communicate presence of wild animals using PIR sensor and GSM module. It generates SMS alerts on the farmer’s mobile phone whenever some animal crosses specific area. It helps farmers to take timely action for crop protection. The security system is deployed in real environment to validate its applicability and possible future extensions.

1 citations

Journal ArticleDOI
TL;DR: In this article , a highly effective face recognition system has been proposed by incorporating genetic algorithms for better search strategy, the proposed model works in two-step processes: face feature extraction and face pattern matching.
Abstract: In the modern environment, the innovations emerging in information technology has driven us to focus on strengthening the security process. This led to the recent advancement in face recognition technology and special attention is given to the recognition process by applying a biometric system for personal identification. Face recognition is renowned as one of the efficacious applications of picture study, popularly applied for reliable biometric where security is the important quality attribute to be achieved. In this paper, a highly effective face recognition system has been proposed by incorporating genetic algorithms for better search strategy. The proposed model works in two-step processes: face feature extraction and face pattern matching. The Haralick features and features extracted from face databases using PCA are used for face recognition. The most eminent artificial firefirefly swarm optimization algorithm is employed for better searching and matching of facial features. From the simulation experiments performed on the faces warehoused in the OUR database, the result has shown that the model is highly efficient, the PCA method has achieved 80.6% of recognition rate and the AFSA has acquired 88.9% accuracy in correct recognition rate.
Journal ArticleDOI
TL;DR: In this paper , a context-aware threat intelligence and response model identifies the states of the aligned smart devices to distinguish between real-world typical and attack scenarios, and dynamically writes specific rules for protection against potential cyber threats.
Abstract: Smart cities, businesses, workplaces, and even residences have all been converged by the Internet of Things (IoT). The types and characteristics of these devices vary depending on the industry 4.0 and have rapidly increased recently, especially in smart homes. These gadgets can expose users to serious cyber dangers because of a variety of computing constraints and vulnerabilities in the security-by-design concept. The smart home network testbed setup presented in this study is used to evaluate and validate the protection of the smart cyber-physical system. The context-aware threat intelligence and response model identifies the states of the aligned smart devices to distinguish between real-world typical and attack scenarios. It then dynamically writes specific rules for protection against potential cyber threats. The context-aware model is trained on IoT Research and Innovation Lab - Smart Home System (IRIL-SHS) testbed dataset. The labeled dataset is utilized to create a random forest model, which is subsequently used to train and test the context-aware threat intelligence SHS model's effectiveness and performance. Finally, the model's logic is used to gain rules to be included in Suricata signatures and the firewall rulesets for the response system. Significant values of the measuring parameters were found in the results. The presented model can be used for the real-time security of smart home cyber-physical systems and develops a vision of security challenges for Industry 4.0.
Proceedings ArticleDOI
09 Nov 2022
TL;DR: In this article , the Reed sensor and GSM Module are used to implement the suggested system, and there is a switch that may be turned on at any time to prevent intrusions.
Abstract: Intelligent burglars frequently circumvent security systems, thus new techniques must constantly be developed to ensure that residences are properly secured. Utilizing cutting-edge technologies will significantly improve protection up until the technology is made available to everyone. Our project's goal is to create door access control and security utilizing an Internet of Things server. The Reed sensor and GSM Module are used to implement the suggested system. Additionally, there is a switch that may be turned on at any time.