scispace - formally typeset
Open AccessJournal ArticleDOI

Vehicle Theft Identification and Intimation Using GSM & IOT

TLDR
In this application, the vehicle is identified, controlled and connected updates with Internet in a simple way by utilization of AT commands of GSM module and action can be taken by sending a reply to G SM module to stop motor of vehicle.
Abstract
Internet of Things is the most predominant innovation associates the things through web. IoT is a technology which interfaces things from different places on the planet. Home mechanization is a wide range innovation in IoT technology on the planet. Home automation constitutes in security issues, controlling gadgets and so on. In existing model, the vehicle theft is distinguished and controlled by physically with GSM module. Furthermore, there are a few in controlling the vehicle is major issue for owner from theft. Here in this paper a technique described to overcome issue of existing one. In this the vehicle is identified, controlled and connected updates with Internet in a simple way. By utilization of AT commands of GSM module a message will be send to the owner that the vehicle is recognized. Action can be taken by sending a reply to GSM module to stop motor of vehicle. Arduino uno board is used to interface the GSM and engine of vehicle with appropriate sensors. Visual studio, Arduino uno are the programming software used to outline this application.

read more

Citations
More filters
Journal ArticleDOI

KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks

TL;DR: This paper proposes a novel blind Zero code based Watermark detection approach named KeySplitWatermark, for the protection of software against cyber-attacks, and shows that the proposed approach reports promising results against Cyber-attacks that are powerful and viable.
Journal ArticleDOI

Load balancing of energy cloud using wind driven and firefly algorithms in internet of everything

TL;DR: Energy Efficient Cloud Based Internet of Everything (EECloudIoE) architecture is proposed in this study, which acts as an initial step in integrating these two wide areas thereby providing valuable services to the end users.
Journal ArticleDOI

A review on deep learning for future smart cities

TL;DR: In this article an attempt is made to survey several state‐of‐the art on usage of Deep Learning on Smart City data.
Journal ArticleDOI

Realizing Efficient Security and Privacy in IoT Networks

TL;DR: This research proposes an efficient sequential convex estimation optimization (SCEO) algorithm to mitigate this challenge and improve the security of physical layer (PHY) in a three-node wireless communication network and employs the use of rate constraint together with self-interference of the full-duplex transmission at the receiving node.
Journal ArticleDOI

Elite Oppositional Farmland Fertility Optimization Based Node Localization Technique for Wireless Networks

TL;DR: The EOBL concept makes it easier to populate the FFO algorithm’s population initialization, which results in an increase in the exploration rate and the results described the sovereignty of the EOFFO-NLWN method associated to existing techniques.
References
More filters
Journal ArticleDOI

On the security of public key protocols

TL;DR: Several models are formulated in which the security of protocols can be discussed precisely, and algorithms and characterizations that can be used to determine protocol security in these models are given.
Journal ArticleDOI

SCADA security in the light of Cyber-Warfare

TL;DR: This paper surveys ongoing research and provides a coherent overview of the threats, risks and mitigation strategies in the area of SCADA security.
Journal ArticleDOI

Cyber-Threats to Critical National Infrastructure: An Intelligence Challenge

TL;DR: British intelligence sources indicate that the United Kingdom is being bombarded by thousands of cyber attacks daily, perpetrated by hackers and state-sponsored organizations targeting government and business so as to steal secrets or disable networked computerized systems.
Journal ArticleDOI

Assessing risks from threats to process plants: Threat and vulnerability analysis

TL;DR: This paper describes an approach that accomplishes process security management objectives using straight forward and easily applied methods to assess security risks using techniques that can be employed in a variety of situations and at varying levels of detail.
Journal ArticleDOI

Object Classification based Context Management for Identity Management in Internet of Things

TL;DR: This paper presents the logical framework for object classification in context aware IoT, as richer contextual information creates an impact on the access control.
Related Papers (5)