To see the other types of publications on this topic, follow the link: Embedded system security.

Journal articles on the topic 'Embedded system security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Embedded system security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Koopman, P. "Embedded system security." Computer 37, no. 7 (2004): 95–97. http://dx.doi.org/10.1109/mc.2004.52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Al_Dosary, Duaa, Khattab M. Ali Alheeti, and Salah Sleibi Al-Rawi. "ICMetric Security System for Achieving Embedded Devices Security." Journal of Physics: Conference Series 1804, no. 1 (2021): 012102. http://dx.doi.org/10.1088/1742-6596/1804/1/012102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Savitha, A. C., Kumar KM Madhu, S. S. Niharika, M. S. Nisarga, and Ganapati Hegde Praghathi. "Comprehensive Security Issues in Embedded System Design." Journal of Scholastic Engineering Science and Management (JSESM), A Peer Reviewed Universities Refereed Multidisciplinary Research Journal 4, no. 5 (2025): 31–37. https://doi.org/10.5281/zenodo.15393065.

Full text
Abstract:
Many modern electronic systems---including personal computers, PDAs, cell phones, network routers, smart cards, and networked sensors to name a few---need to access, store, manipulate, or communicate sensitive information, making security a serious concern in their design. Embedded systems, which account for a wide range of products from the electronics, semiconductor, telecommunications, and networking industries, face some of the most demanding security concerns on the one hand, they are often highly resource constrained, while on the other hand, they frequently need to operate in physically
APA, Harvard, Vancouver, ISO, and other styles
4

Mehul P. Barot, Ramesh T. Prajapati, Darshan P. Patel, Hitesh H. Wandra,. "Embedded Systems Based Intelligent Bank Locker Security System." Tuijin Jishu/Journal of Propulsion Technology 44, no. 5 (2023): 1770–76. http://dx.doi.org/10.52783/tjjpt.v44.i5.2854.

Full text
Abstract:
Nowadays, security plays a big role, notably in homes, companies, and banks. This article uses embedded systems to design a bank locker security system. The Global System for Mobile (GSM) and Radio Frequency Identification (RFID) technologies are the foundation of this system. Only honest people are permitted to retrieve money or gold from bank lockers. It is created by fusing RFID and GSM technologies, allowing for real-time activation, authentication, and validation of the user and door unlocking for safe access to bank lockers. GSM and passive RFID are safer than other technologies. A micro
APA, Harvard, Vancouver, ISO, and other styles
5

Bhaskar. S et al.,, Bhaskar S. et al ,. "Impenetrable Security System Using Embedded Softwares." International Journal of Electronics, Communication & Instrumentation Engineering Research and Development 9, no. 2 (2019): 17–24. http://dx.doi.org/10.24247/ijecierddec20193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Murphy, N. "Sleight of hand [embedded system security]." Electronics Systems and Software 2, no. 5 (2004): 32–35. http://dx.doi.org/10.1049/ess:20040505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Selokar, Pradip Ram, and P. T. Karule. "Security Enhancement in Networked Embedded System." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 4 (2017): 1867. http://dx.doi.org/10.11591/ijece.v7i4.pp1867-1873.

Full text
Abstract:
<span>In the developed system ARM9 is a master and Two ARM7s are slaves. The peripherals are being controlled by two ARM7 boards. The Peripherals are connected to the ARM7 through Complex Programmable Logic Device (CPLD). The CPLD is in turn connected to the ARM7 using Serial Peripheral Interface (SPI). The ARM7 boards collect the information from the peripherals and send it to the ARM9 board. The communication between ARM7 and ARM9 is via UART (Universal Asynchronous Receiver Transmitter) over CAN (Controller Area Network). The ARM9 board has got the software intelligence. The ARM9 beha
APA, Harvard, Vancouver, ISO, and other styles
8

Pradip, Ram Selokar, and T. Karule P. "Security Enhancement in Networked Embedded System." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 4 (2017): 1867–73. https://doi.org/10.11591/ijece.v7i4.pp1867-1873.

Full text
Abstract:
In the developed system ARM9 is a master and Two ARM7s are slaves. The peripherals are being controlled by two ARM7 boards. The Peripherals are connected to the ARM7 through Complex Programmable Logic Device (CPLD). The CPLD is in turn connected to the ARM7 using Serial Peripheral Interface (SPI). The ARM7 boards collect the information from the peripherals and send it to the ARM9 board. The communication between ARM7 and ARM9 is via UART (Universal Asynchronous Receiver Transmitter) over CAN (Controller Area Network). The ARM9 board has got the software intelligence. The ARM9 behaves as a mas
APA, Harvard, Vancouver, ISO, and other styles
9

Lokesh, P. "Embedded system-based enhanced smart security systems for intelligent monitoring applications: A review." i-manager’s Journal on Embedded Systems 12, no. 1 (2023): 16. http://dx.doi.org/10.26634/jes.12.1.20369.

Full text
Abstract:
The advanced smart security system uses palm vein technology and machine learning to enhance authentication. It combines biometric data with behavioral analysis, continuously adapting to improve security. AI integration allows for anomaly detection, distinguishing normal user interactions from suspicious activities. The user-friendly interface makes it accessible for various applications, ensuring resilient protection against evolving threats. The palm vein technology not only enhances security but also minimizes the risk of false positives and negatives, ensuring a reliable and efficient auth
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Xu Hui. "The Research on Embedded Real-Time System Security Issues in Mechanical Control." Advanced Materials Research 681 (April 2013): 65–71. http://dx.doi.org/10.4028/www.scientific.net/amr.681.65.

Full text
Abstract:
Embedded real-time systems are facing more and more security problems. Malicious attacks on the system from suspicious or malicious code and the change of system hardware state could lead to system exception, resulting in system reliability and security deteriorated. This paper summarizes the characteristics of embedded real-time system and its special requirements for security, analyses security problems faced by embedded real-time system and defects of programming languages. And then put forward methods to improve the safety of embedded real-time system, providing a new security the idea for
APA, Harvard, Vancouver, ISO, and other styles
11

Negi, Vivek, Himanshu Verma, Ipsita Singh, et al. "Network Security in Embedded System Using TLS." International Journal of Security and Its Applications 10, no. 2 (2016): 375–84. http://dx.doi.org/10.14257/ijsia.2016.10.2.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Feng, A., M. Knieser, M. Rizkalla, B. King, P. Salama, and F. Bowen. "Embedded system for sensor communication and security." IET Information Security 6, no. 2 (2012): 111. http://dx.doi.org/10.1049/iet-ifs.2010.0073.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Dharanya, S. "Embedded Based 3G Security System for Prison." Indian Journal of Science and Technology 6, no. 5 (2013): 1–4. http://dx.doi.org/10.17485/ijst/2013/v6i5.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Goyal, Sanket, Pranali Desai, and Vasanth Swaminathan. "Multi-Level Security Embedded With Surveillance System." IEEE Sensors Journal 17, no. 22 (2017): 7497–501. http://dx.doi.org/10.1109/jsen.2017.2756876.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Chen, Hong Li. "Research on Security Level Assessment Technology in Embedded Real-Time System." Applied Mechanics and Materials 696 (November 2014): 266–70. http://dx.doi.org/10.4028/www.scientific.net/amm.696.266.

Full text
Abstract:
This paper briefly describes the main ideas and implementation of technology strategy of Embedded real-time system security level assessment which is important part of mechanism to system flexibility based on embedded real-time system, designs the embedded real-time system security level assessment system based on pattern matching for the characteristics of embedded real-time systems. By building security level assessment system and simulation testing environment based on RT-Linux real-time operating system, the impact of Embedded real-time system security level assessment strategy on performa
APA, Harvard, Vancouver, ISO, and other styles
16

Shilpa and Kirti Jain. "Security Features in Fingerprint Biometric System." International Journal on Advances in Engineering, Technology and Science (IJAETS) 5, no. 1 (2024): 9–18. https://doi.org/10.5281/zenodo.10641797.

Full text
Abstract:
<em>Abstract</em>&ndash; At present, embedded systems operate in every environment on the planet. Many complex applications with previously unheard-of capability have been made possible by recent technological advancements. Regardless of the ability to shield critical data from malevolent attacks, security and privacy remained a prevalent concern for these systems. These worries are warranted since horrifying tales about embedded systems are told by the past security lapses and their aftermath. With the development of technology, the attacks are gradually changing and becoming more sophisticat
APA, Harvard, Vancouver, ISO, and other styles
17

Xie, Yu, and Attila Buchman. "A survey for Communication security of the embedded system." Carpathian Journal of Electronic and Computer Engineering 14, no. 2 (2021): 15–19. http://dx.doi.org/10.2478/cjece-2021-0009.

Full text
Abstract:
Abstract The embedded operating system is a task-oriented computing platform that can be tailored, low-cost, and has high requirements for reliability and real-time performance. It plays an extremely important role in engineering applications. With the gradual application of embedded systems in various fields, the shortcomings of its insufficient ability to respond to security threats have gradually emerged, and many hackers have turned their attack targets into embedded systems. The important reason for these attacks is that embedded systems lack sufficient multi-layer protection mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
18

Win, Win Maw, and San Lwin San. "Text Embedded System using LSB Method." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 1818–22. https://doi.org/10.5281/zenodo.3591533.

Full text
Abstract:
An important topic in the exchange of confidential messages over the internet is the security of information conveyance. For instance, the producers and consumers of digital products are keen to know that their products are authentic and can be differentiated from those that are invalid. The science of encryption is the art of embedding data in audio files, images, videos or content in a way that would meet the above security needs. Steganography is a branch of data hiding science which aims to reach a describe level of security in the exchange of private military and commercial data which is
APA, Harvard, Vancouver, ISO, and other styles
19

Odirichukwu, J.C. "Embedded Phone Call Based Burglary Security Alert System." Journal of Embedded Systems and Processing 4, no. 1 (2019): 24–30. https://doi.org/10.5281/zenodo.2622387.

Full text
Abstract:
<em>The importance of security in our society cannot be overemphasised, as it drives economic growth. This research reviewed the problems associated with embedded alarm systems together with other embedded security system like SMS based security system. In this paper, Embedded Phone Call Burglary Security Alert System was developed which calls the house owner on detection of an intruder, so that adequate security measures may be taken to catch the burglar. It is implemented to be used with any kind of mobile phones. Also, adequate security measures can be taken by the appropriate agencies to a
APA, Harvard, Vancouver, ISO, and other styles
20

Eshwarappa Dandur, Veeresh, and Ning Weng. "Networked Embedded System Security: Technologies, Analysis and Implementation." Recent Advances in Communications and Networking Technology 5, no. 2 (2017): 90–107. http://dx.doi.org/10.2174/2215081106666161227160759.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Niu, Jun Tao, and Dong Hong Liu. "Security Mechanism Design on the Embedded Computer System." Applied Mechanics and Materials 651-653 (September 2014): 1937–40. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1937.

Full text
Abstract:
With the constant innovation and development of micro-electronics technology, and large scale integrated circuit in-depth research, more advanced embedded microcontroller processors are applied to all kinds of instruments and equipment, which has brought a new technological revolution to the modern industrial control field. And it results to the embedded system, as an important field of computer application, has gone deep in all aspects of society, and got more and more attention from people. Now the designing and implementation technique of dependable computer is one of the most important res
APA, Harvard, Vancouver, ISO, and other styles
22

Yunsi, Fei,, Eisenbarth, Thomas, and Serpanos, Dimitrios. "Guest Editorial: Special Section on Embedded System Security." IEEE Embedded Systems Letters 7, no. 1 (2015): 1–2. http://dx.doi.org/10.1109/les.2015.2404940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Dhule, Prashant1 Prof R.P.Chaudhari2. "EMBEDDED BASED SECURITY SYSTEM USING GSM AND RFID." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 1 (2017): 245–49. https://doi.org/10.5281/zenodo.246645.

Full text
Abstract:
There is a major boom in oil and gas industry around the world thanks to the seemingly insatiable demand for fossil fuels in both developed and developing countries. The product together with petrol, petrochemicals, and lubricants all of that area unit used daily need economical and adequate provide to satisfy ever increasing demand. These products are valuable and rare creations of the nature. In Current days petroleum industries were distributing petrol using tankers to respective petrol pumps; which were normally manual distribution and was totally depends on man’s loyality who was doing th
APA, Harvard, Vancouver, ISO, and other styles
24

Li, Jing, Huan Guo Zhang, Bo Zhao, Xi Guo, and Fan He. "Research on Hardware Security of Embedded System in Cloud Environment." Advanced Materials Research 488-489 (March 2012): 1480–87. http://dx.doi.org/10.4028/www.scientific.net/amr.488-489.1480.

Full text
Abstract:
Cloud computing is an important innovation of current computing models. At present, the research on the security of cloud computing is mainly concentrated on PCs and servers. The security of embedded system in cloud environment does not win enough attention. This paper analysis the security threats of it, and proposes a Secure Hardware Model to provide a tamper-resistant and more reliable hardware embedded platform in cloud environment. Our model adds some new components to traditional embedded system, controls the start sequence of platform’s components, verifies the integrity of crucial info
APA, Harvard, Vancouver, ISO, and other styles
25

D, Mr Deepak. "Analyzing Embedded System Security: Exploiting Weaknesses and Implementing Robust Defenses." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 660–64. https://doi.org/10.22214/ijraset.2025.67347.

Full text
Abstract:
Embedded systems, integral to modern technology, are increasingly targeted by sophisticated cyberattacks, exposing critical vulnerabilities in their design and implementation. This paper delves into the landscape of embedded system security, focusing on identifying and analysing weaknesses exploited by attackers, including malware, hardware tampering, and sidechannel attacks. It evaluates current security challenges, explores methodologies for detecting and mitigating threats, and highlights best practices for designing robust defences. Additionally, it examines the role of secure firmware upd
APA, Harvard, Vancouver, ISO, and other styles
26

Bommanahal, Ramagiri Mata Thrigunyeshwari, Kiran Deepa, Pabhu Pooja, S. Rakshitha, and Resna SR Mrs Sandhya Rai Mrs. "Smart Security System." International Journal for Research Trends and Innovation 7, no. 7 (2022): 1711–16. https://doi.org/10.5281/zenodo.11352753.

Full text
Abstract:
The present security system takes longer time for sending security alerts. It&rsquo;s reported that they are system which sends the alert message after a duration of the occurrence of security violation. This paper mainly focuses on development of system which works rapidly for short time period. The security is important to provide safety, therefore, a smart security system is being proposed in this paper which monitor and alert regarding the un-usual activities. This security system plays a vital role in securing the location. This remote security system which is used for detection of harmfu
APA, Harvard, Vancouver, ISO, and other styles
27

Aung, Myint Aye. "LSB Based Image Steganography for Information Security System." International Journal of Trend in Scientific Research and Development 3, no. 1 (2018): 394–400. https://doi.org/10.31142/ijtsrd18995.

Full text
Abstract:
Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography w
APA, Harvard, Vancouver, ISO, and other styles
28

Dr. N. Kala and Premanand Narasimhan. "Secure by Design: Proactive Approaches to Embedded System Security." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1009–35. https://doi.org/10.32628/cseit241061147.

Full text
Abstract:
As embedded systems proliferate across industries such as healthcare, automotive, and consumer electronics, ensuring their security has become a critical imperative. The increasing complexity and connectivity of these systems expose them to a myriad of cyber and physical threats, necessitating robust strategies for risk mitigation. This paper explores the need for enhanced security in embedded systems, addressing challenges such as striking a balance between business requirements and security, managing growing connectivity, and ensuring cybersecurity and information assurance. A detailed class
APA, Harvard, Vancouver, ISO, and other styles
29

Gopadi, Mr Harish Kumar, E Samanvitha, G Deepthi, and G sahithi. "VEHICLE ANTI-THEFT SECURITY SYSTEM WITH IGNITION LOCKING USING EMBEDDED SYSTEM." Industrial Engineering Journal 54, no. 01 (2024): 70–76. https://doi.org/10.36893/iej.2024.v54i1.010.

Full text
Abstract:
The Vehicle Anti-Theft Security System is an advanced embedded solution designed to prevent unauthorized access and safeguard vehicles. This system integrates multiple technologies, including GSM communication, fingerprint authentication, and a password keypad, to provide a robust, multi-layered security framework. At its core, the system is powered by an Arduino microcontroller, which interfaces with various components: a fingerprint sensor for biometric verification, a password keypad for additional security, an LCD display for user interaction and status updates, and a GSM module for real-t
APA, Harvard, Vancouver, ISO, and other styles
30

Wang, Lei, Yalong Li, Xinyuan Tian, and Deyun Mo. "A design of the lightweight key management system for multi-level embedded devices." Applied Mathematics and Nonlinear Sciences 7, no. 2 (2022): 1093–104. http://dx.doi.org/10.2478/amns.2021.2.00319.

Full text
Abstract:
Abstract Embedded devices often face security risks such as device loss, cracking, key disclosure and side-channel attacks. Owing to the relative meagreness characterising the availability of computing as well as storage resources, it might be said that embedded devices themselves have limited resources, and traditional key management solutions are thus not fully suitable for embedded device usage scenarios. In addition, embedded device key management also necessitates consideration of the dynamic changes of devices, such as device joining and withdrawal, and blacklist management and control.
APA, Harvard, Vancouver, ISO, and other styles
31

Ai, Hong, and Xuebin Cheng. "Research on embedded access control security system and face recognition system." Measurement 123 (July 2018): 309–22. http://dx.doi.org/10.1016/j.measurement.2018.04.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Qin, Hao Hua, Wu Sheng Hao, and Wei Shao. "Research and Development of an Embedded Security Network Card Based on AM 1808." Applied Mechanics and Materials 532 (February 2014): 235–40. http://dx.doi.org/10.4028/www.scientific.net/amm.532.235.

Full text
Abstract:
In this paper, a design scheme is proposed of security network card based on AM 1808 for an embedded system. In the card, embedded firewall, network security device, hard-disk protection and restoration, encryption machine and other network security products are integrated. According to practical needs, the function of embedded security network card is extended and reduced.
APA, Harvard, Vancouver, ISO, and other styles
33

Avani, Dave, and Dave Krunal. "Survey of attack resilient embedded systems design." Journal of Scientific and Engineering Research 7, no. 12 (2020): 242–49. https://doi.org/10.5281/zenodo.13337765.

Full text
Abstract:
The advancement of industrial 4.0 has increased the utilization of resource constrained embedded and IOT devices in application ranging from Internet of Things (<em>IoT</em>) and CyberPhysical Systems (<em>CPS</em>). These systems are often involve in security-critical user data and/or information transfers. This makes them increasingly popular target for attacks to gain access of security-critical user data and/or information. The resiliency of a system is defined by its ability to detect, prevent and recover from the attacks. Crypto primitives such as secure boot, attestation, TPM, control f
APA, Harvard, Vancouver, ISO, and other styles
34

Krunal, Dave, and Dave Avani. "Survey of attack resilient embedded systems design." Journal of Scientific and Engineering Research 7, no. 12 (2020): 242–49. https://doi.org/10.5281/zenodo.12772515.

Full text
Abstract:
The advancement of industrial 4.0 has increased the utilization of resource constrained embedded and IOT devices in application ranging from Internet of Things (<em>IoT</em>) and CyberPhysical Systems (<em>CPS</em>). These systems are often involve in security-critical user data and/or information transfers. This makes them increasingly popular target for attacks to gain access of security-critical user data and/or information. The resiliency of a system is defined by its ability to detect, prevent and recover from the attacks. Crypto primitives such as secure boot, attestation, TPM, control f
APA, Harvard, Vancouver, ISO, and other styles
35

Magar, Dinesh, Sanket Gadge, Shraddha Gadakh, and Prof Seema S. Lavate. "Embedded Based Vehicle Security using GSM -and GPS System." IJIREEICE 5, no. 4 (2017): 58–63. http://dx.doi.org/10.17148/ijireeice.2017.5411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Wolf, Tilman, and Sri Parameswaran. "Guest editorial for special issue on embedded system security." Design Automation for Embedded Systems 12, no. 3 (2008): 171–72. http://dx.doi.org/10.1007/s10617-008-9029-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Shrivastava, Aviral, Jian-Jia Chen, Akash Kumar, and Anup Das. "ACM TECS Special Issue on Embedded System Security Tutorials." ACM Transactions on Embedded Computing Systems 22, no. 3 (2023): 1–2. http://dx.doi.org/10.1145/3594872.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Ikegwu, Anayo Chukwu, Victoria Chibuzo Uzuegbu, and Uzoma Alo. "Review of Embedded Systems and Cyber Threat Intelligence for Enhancing Data Security in Mobile Health." Journal of Electronic & Information Systems 7, no. 1 (2025): 98–120. https://doi.org/10.30564/jeis.v7i1.10050.

Full text
Abstract:
Embedded systems play a vital role in mobile health (mHealth) by enabling real-time health monitoring and personalized care through devices like wearables and sensors. However, these systems handle sensitive health data, making them vulnerable to cyber threats such as data breaches and unauthorized access. Traditional security measures are often inadequate against evolving attacks, raising concerns over data safety. This paper reviews how cyber threat intelligence (CTI) can be integrated with embedded systems in mHealth to enhance security. CTI provides real-time insights into potential threat
APA, Harvard, Vancouver, ISO, and other styles
39

Dr., Thida Aung. "Parking Lot Security System using RFID Technology." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 906–10. https://doi.org/10.5281/zenodo.3589856.

Full text
Abstract:
Radio Frequency Identification RFID technology is widely used in various applications such as attendance system, tracking system, monitoring system or parking system. In this paper, the Parking Lot Security System using RFID technology and embedded technology is presented. In conventional parking system, manual entrance system is applied that permission must be requested from the security guard to access the premise. Therefore, a security guard has to be hired to monitor the premise. In addition, the security guards need to monitor all movement of the vehicle that enters or leave the premise.
APA, Harvard, Vancouver, ISO, and other styles
40

S., Kanagamalliga, S. Vasuki Dr., Vishnu Priya A., and Viji V. "A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM." International Journal of Information Sciences and Techniques (IJIST) 4, no. 3 (2014): 173–78. https://doi.org/10.5281/zenodo.7192438.

Full text
Abstract:
As technology becomes more advanced and modernized; more features are added to the existing system for the purpose of satisfying the increasing security needs of the people. Deploying wireless technologies for security and control in home offers attractive benefits along with user friendly interface. In this paper we present a smart security system comprises of Zigbee, GSM, Sensors and Smartphone for Security monitoring and control, when the user is at remote premises. Three sensors namely PIR, vibration and door sensor are installed at windows and doors. Whenever there is a security breach th
APA, Harvard, Vancouver, ISO, and other styles
41

Saranya, G., C. Senthamilarasi, and B. Vidhya. "Integrated Security System for Residential Home." Journal of Computational and Theoretical Nanoscience 16, no. 2 (2019): 585–87. http://dx.doi.org/10.1166/jctn.2019.7774.

Full text
Abstract:
In today's growing concern for home security, we have developed an advanced security system using integrated digital signature and DNA cryptography. The digital signature is formed using multifeature biometric traits which include both fingerprints as well as iris image. We further increase the security by using DNA cryptography which is embedded on a smart card. In order to prevent unauthorized access manually or digitally, we use geo-detection which compares the unregistered devices location with the user's location using any of their personal devices such as smart phone or tab.
APA, Harvard, Vancouver, ISO, and other styles
42

Fujikawa, Masaki. "Study of Vulnerability Diagnosis and Sustaining Integrity of the Embedded Devices." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 2 (2013): 2231–40. http://dx.doi.org/10.24297/ijct.v11i2.1180.

Full text
Abstract:
Security vulnerability of the embedded devices with Internet connectivity is frequently reported these days. In this paper, a diagnosis was made for a security vulnerability in the controller that is an element of the security system installed in homes and offices and connected to the Internet. The results showed a part of the functions of the controller may be suspended and the integrity of the security system may be lost due to an attack of known malware. In the latter part of this paper, the possible impacts on the controller and the security system were predicted based on the attack scenar
APA, Harvard, Vancouver, ISO, and other styles
43

Li, Yang, Qing Hong Wu, and Xue Xiao. "Based Embedded System Applications in Intelligent Home Remote Monitoring." Applied Mechanics and Materials 602-605 (August 2014): 2317–20. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.2317.

Full text
Abstract:
With the continuous improvement of security awareness, home security has become the focus of attention. The actual demand for home video surveillance system, designed a cheap, practical, small size and low power consumption of video surveillance systems, this paper uses microprocessor S3C2440 ARM9 core as the core hardware control, embedded Linux operating system with software the control core, and cheap, generic USB camera video capture device as a front end to complete the design of a home video surveillance system.
APA, Harvard, Vancouver, ISO, and other styles
44

M, Varaprasad Rao1, and Ch Bharta Chryulu N. "SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS." International Journal of Ubiquitous Computing (IJU) 6, no. 2 (2023): 7. https://doi.org/10.5281/zenodo.8233607.

Full text
Abstract:
Ubiquitous Computing uses mobile phones or tiny devices for application development with sensors embedded in mobile phones. The information generated by these devices is a big task in collection and storage. For further, the data transmission to the intended destination is delay tolerant. In this paper, we made an attempt to propose a new security algorithm for providing security to Pervasive Computing Environment (PCE) system using Public-key Encryption (PKE) algorithm, Biometric Security (BS) algorithm and Visual Cryptography Scheme (VCS) algorithm. In the proposed PCE monitoring system it a
APA, Harvard, Vancouver, ISO, and other styles
45

Khadse, Tushar S., and Swapnili P. Karmore. "A Novel Approach for Fault Tolerance Control System and Embedded System Security." Procedia Computer Science 78 (2016): 799–806. http://dx.doi.org/10.1016/j.procs.2016.02.059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Di, Ju Xing, Jian Guang Zhao, Ya Chao Si, and Jing Jin Fan. "Research on Embedded GPS/GPRS Intelligent Building Security Technology." Advanced Materials Research 756-759 (September 2013): 4161–65. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.4161.

Full text
Abstract:
This paper studied GPS location information of the collection, processing, GPRS data transmission network, intelligent building security system features. Based on this techniques, we designed an embedded GPS/GPRS intelligent building security system, which is composed of ARM9 microprocessor S3C2410, GPS/GPRS module and some peripheral devices. The system is running under Linux OS. The characteristics of the system are flexible, powerful, and high practicality.
APA, Harvard, Vancouver, ISO, and other styles
47

Yan, Tian Yun, Kai Kuo Xu, Min Wei, and Jia He. "Studies on Security Communications of Embedded Devices." Advanced Materials Research 216 (March 2011): 609–12. http://dx.doi.org/10.4028/www.scientific.net/amr.216.609.

Full text
Abstract:
The theory and technology of cryptography including the block cipher, stream cipher and public-key cryptosystem. The usual cryptographic algorithms, such as DES, RSA, AES and message digest algorithms are discussed. Basing on these studies, a design of secure communication is presented. It combines the data encryption with the authentication, can be applied to principal and subordinate system. It can provide a reliable protection for the secure communications for embedded devices. Finally, the core source code is shown.
APA, Harvard, Vancouver, ISO, and other styles
48

Pimentel, Andy D. "A Case for Security-Aware Design-Space Exploration of Embedded Systems." Journal of Low Power Electronics and Applications 10, no. 3 (2020): 22. http://dx.doi.org/10.3390/jlpea10030022.

Full text
Abstract:
As modern embedded systems are becoming more and more ubiquitous and interconnected, they attract a world-wide attention of attackers and the security aspect is more important than ever during the design of those systems. Moreover, given the ever-increasing complexity of the applications that run on these systems, it becomes increasingly difficult to meet all security criteria. While extra-functional design objectives such as performance and power/energy consumption are typically taken into account already during the very early stages of embedded systems design, system security is still mostly
APA, Harvard, Vancouver, ISO, and other styles
49

Xu, Shengzhe, Zicheng Zhou, and Ying Guo. "Practical Security of Continuous Variable Quantum Key Distribution Ascribable to Imperfect Modulator for Fiber Channel." Mathematics 12, no. 9 (2024): 1356. http://dx.doi.org/10.3390/math12091356.

Full text
Abstract:
An amplitude modulator plays an essential role in the implementation of continuous-variable quantum key distribution (CVQKD), whereas it may bring about a potential security loophole in the practical system. The high-frequency modulation of the actual transmitter usually results in the high rate of the system. However, an imperfect amplitude modulator (AM) can give birth to a potential information leakage from the modulation of the transmitter. To reveal a potential security loophole from the high-frequency AM embedded in the transmitter, we demonstrate an influence on the practical security o
APA, Harvard, Vancouver, ISO, and other styles
50

Kanagamalliga, S., S. Vasuki,, A. Vishnu Priya, and V. Viji,. "A Zigbee And Embedded Based Security Monitoring And Control System." International Journal of Information Sciences and Techniques 4, no. 3 (2014): 173–78. http://dx.doi.org/10.5121/ijist.2014.4321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!