Vehicle Theft Identification and Intimation Using GSM & IOT
M Eswar Kumar,G. Thippa Reddy,Sudheer K,M. Praveen Kumar Reddy,Rajesh Kaluri,Dharmendra Singh Rajput,Kuruva Lakshmanna +6 more
- Vol. 263, Iss: 4, pp 042062
TLDR
In this application, the vehicle is identified, controlled and connected updates with Internet in a simple way by utilization of AT commands of GSM module and action can be taken by sending a reply to G SM module to stop motor of vehicle.Abstract:
Internet of Things is the most predominant innovation associates the things through web. IoT is a technology which interfaces things from different places on the planet. Home mechanization is a wide range innovation in IoT technology on the planet. Home automation constitutes in security issues, controlling gadgets and so on. In existing model, the vehicle theft is distinguished and controlled by physically with GSM module. Furthermore, there are a few in controlling the vehicle is major issue for owner from theft. Here in this paper a technique described to overcome issue of existing one. In this the vehicle is identified, controlled and connected updates with Internet in a simple way. By utilization of AT commands of GSM module a message will be send to the owner that the vehicle is recognized. Action can be taken by sending a reply to GSM module to stop motor of vehicle. Arduino uno board is used to interface the GSM and engine of vehicle with appropriate sensors. Visual studio, Arduino uno are the programming software used to outline this application.read more
Citations
More filters
Journal ArticleDOI
KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks
Celestine Iwendi,Zunera Jalil,Abdul Rehman Javed,G. Thippa Reddy,Rajesh Kaluri,Gautam Srivastava,Ohyun Jo +6 more
TL;DR: This paper proposes a novel blind Zero code based Watermark detection approach named KeySplitWatermark, for the protection of software against cyber-attacks, and shows that the proposed approach reports promising results against Cyber-attacks that are powerful and viable.
Journal ArticleDOI
Load balancing of energy cloud using wind driven and firefly algorithms in internet of everything
R. M. Swarna Priya,Sweta Bhattacharya,Praveen Kumar Reddy Maddikunta,Siva Rama Krishnan Somayaji,Kuruva Lakshmanna,Rajesh Kaluri,Aseel Hussien,Thippa Reddy Gadekallu +7 more
TL;DR: Energy Efficient Cloud Based Internet of Everything (EECloudIoE) architecture is proposed in this study, which acts as an initial step in integrating these two wide areas thereby providing valuable services to the end users.
Journal ArticleDOI
A review on deep learning for future smart cities
Sweta Bhattacharya,Siva Rama Krishnan Somayaji,Thippa Reddy Gadekallu,Mamoun Alazab,Praveen Kumar Reddy Maddikunta +4 more
TL;DR: In this article an attempt is made to survey several state‐of‐the art on usage of Deep Learning on Smart City data.
Journal ArticleDOI
Realizing Efficient Security and Privacy in IoT Networks
Joseph Henry Anajemba,Yue Tang,Celestine Iwendi,Akpesiri Ohwoekevwo,Gautam Srivastava,Ohyun Jo +5 more
TL;DR: This research proposes an efficient sequential convex estimation optimization (SCEO) algorithm to mitigate this challenge and improve the security of physical layer (PHY) in a three-node wireless communication network and employs the use of rate constraint together with self-interference of the full-duplex transmission at the receiving node.
Journal ArticleDOI
Elite Oppositional Farmland Fertility Optimization Based Node Localization Technique for Wireless Networks
N. Bharathiraja,Pydimarri Padmaja,S. Rajeshwari,Jagadish S. Kallimani,Ahmed Mateen Buttar,T. B. Lingaiah +5 more
TL;DR: The EOBL concept makes it easier to populate the FFO algorithm’s population initialization, which results in an increase in the exploration rate and the results described the sovereignty of the EOFFO-NLWN method associated to existing techniques.
References
More filters
Journal ArticleDOI
On the security of public key protocols
Danny Dolev,Andrew Chi-Chih Yao +1 more
TL;DR: Several models are formulated in which the security of protocols can be discussed precisely, and algorithms and characterizations that can be used to determine protocol security in these models are given.
Journal ArticleDOI
SCADA security in the light of Cyber-Warfare
TL;DR: This paper surveys ongoing research and provides a coherent overview of the threats, risks and mitigation strategies in the area of SCADA security.
Journal ArticleDOI
Cyber-Threats to Critical National Infrastructure: An Intelligence Challenge
TL;DR: British intelligence sources indicate that the United Kingdom is being bombarded by thousands of cyber attacks daily, perpetrated by hackers and state-sponsored organizations targeting government and business so as to steal secrets or disable networked computerized systems.
Journal ArticleDOI
Assessing risks from threats to process plants: Threat and vulnerability analysis
TL;DR: This paper describes an approach that accomplishes process security management objectives using straight forward and easily applied methods to assess security risks using techniques that can be employed in a variety of situations and at varying levels of detail.
Journal ArticleDOI
Object Classification based Context Management for Identity Management in Internet of Things
TL;DR: This paper presents the logical framework for object classification in context aware IoT, as richer contextual information creates an impact on the access control.