Safety-critical systems have to be fault tolerant and also meet stringent temporal constraints. Various redundancy strategies are built into such mission-critical applications to ensure the overall success of the mission. This paper implements a fault tolerant scheduling scheme on a dual processor system, wherein the redundancy is made at the task level. The system continues to function with graceful degradation under failure conditions. The redundancy management employed in the proposed scheme enhances the performance capability of the system. Based on this approach, the scheme is implemented with hardware simulation using LPC-2148 development boards. This simulation when used for implementing any practical safetycritical application can contribute to efficient utilization of computing resources and can prove to be highly cost effective as the number of processors increase.
Abstract:IoT has emerged as a new concept for smart-security oriented system. IoT is basically connecting embedded devices to internet. IoT includes embedded devices along with software, sensors, actuators and network connectivity to collect and exchange data across the network. IoT has become an integral part in security domain. Bluetooth technology from mobile combined with real time monitoring system can be used for security and automation. Instead of using traditional locking system (ex. key-lock), Bluetooth can be used as an alternative. Bluetooth can be used for securing portals like doors, lockers, etc. but Bluetooth can be spoofed. To overcome this, two way authentication can be introduced where first step will be Bluetooth pairing, second will be answering a predefined question via Morse code interface and also using an authenticator generating time based code. This will reduce the chance of Bluetooth spoofing and provide better security in the field of IoT.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.