Embedded Based 3G Security System for Prison
نویسندگان
چکیده
منابع مشابه
Web Based Security Protocols for Embedded System
Security can mean resistance to casual or prankster attacks like most viruses and security can also mean resistance to DOS attacks. But in this paper, security will mean the embedded devices’ ability to contain sensitive information and to hold down its end of a secure communication. In this paper we also are studying about various types of protocols which are used in networks security. These a...
متن کاملEmbedded System Security
F rom cars to cell phones, video equipment to MP3 players, and dishwashers to home ther-mostats—embedded computers increasingly permeate our lives. But security for these systems is an open question and could prove a more difficult long-term problem than security does today for desktop and enterprise computing. Security issues are nothing new for embedded systems. In 2001, Peter Shipley and Sim...
متن کاملSecurity for the Third Generation (3G) Mobile System
The original first generation analogue mobile employed a simple electronic serial number to confirm that the terminal should be allowed access to the service. It was not long before the protection afforded to this number was broken. Eventually, devices appeared that could read these electronic serial numbers from the air, and access an unsuspecting user’s account for a short time, before moving...
متن کاملEmbedded System for Security Services Integration
There are several tools and techniques that can inhibit different and malicious attacks. However, the incorrect use and the lack of data exchange among these security applications can create vulnerability points. In this paper, we propose an Embedded System for Security Services Integration (SSI) and discuss aspects about its architecture and performance when it is implemented in FPGA.
متن کاملCollaborative Monitors for Embedded System Security
This paper presents a hardware based approach to embedded systems security. Usage of on-chip monitors is proposed for identifying attacks on embedded systems by tracking the operation of the system. Two types of monitors: a processing monitor and thermal monitor are presented with their detailed operation and results. The effectiveness of this security system can be enhanced by correlating info...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indian Journal of Science and Technology
سال: 2013
ISSN: 0974-6846,0974-5645
DOI: 10.17485/ijst/2013/v6i5.17