In the present days, chattel crimes are increasing rapidly. Around 10 million cases are recorded annually. Vehicle crime is a predominant criminal activity observed globally. This is causing a panic to the owners of the vehicles in terms of monetary loss and mental agony. To curb this, many researchers have bought out several preventive measures in terms of security during the fleet. The present work is a step towards providing security to vehicles under the control of the owner. The proposed work is implemented by incorporating IoT platforms for the safety and security of the vehicles. The present work is implemented by incorporating a GPS module in the vehicle. Once the vehicle is missing, the owner gets an alert message on the mobile. The message received the geographical location of the vehicle. On receiving the message, the owner enters into the mobile app and clicks on the "STOP" button which locks the engine instantly. The present work is a step towards incorporating security to vehicles from thefts, assisting the owners from huge damages and fleet management. The developed system is the cheap alternative for vehicle security.
Cloud computing is the new technique adopted recently by many IT companies and business organizations, with the intention to minimize the cost spent on the data stored. There are many cloud service providers like Amazon, Microsoft, etc. By moving to a cloud servers, a department of maintaining a own data center can be eliminated and core business can be concentrated more, because the data management will be done by the cloud service providers itself. The data stored in the cloud is private and should be allowed to access only after authorization, so that only legitimate users can access the data. The access control matrix method is used to authorize the users when a request is made toward the data stored in the cloud server. But access control matrix has little flaws, these flaws can be eliminated and few improvements can be made to make the access control matrix method still efficient.
In computer networks, security is one of the most important aspects of protecting the network from various attacks. Especially in wireless networks, security can prevent unauthorized data access and save systems from potential threats. The security protocols in the wireless networks help to achieve the security process. Many protocols are designed to accomplish wireless security, which includes Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA) and WiFi Protected Access 2 (WPA2). This research paper discusses on the prominent wireless security protocols, that is, Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA) and WiFi Protected Access (WPA2) by providing a comparative analysis in terms of strengths and weaknesses of each protocol. In addition to that, the paper assesses each protocol in terms of authentication and encryption mechanisms and recommends the best wireless security protocol for a corporate network, which helps the network from unauthorized attacks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.