Arduino Based Wireless Intrusion Detection Using IR Sensor and GSM?Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 5)
Publication Date: 2013-05-15
Authors : Prakash Kumar Pradeep Kumar;
Page : 417-424
Keywords : Wireless Intrusion Detection System (WIDS); Global system for mobile communication (GSM); Radio Frequency (RF); Success point; sensor; Arduino; WEP; C2DM;
Intrusion detection systems (IDS) strive to catch computer system intrusion & utilize by any garnering and analyzing data. Wireless IDSs garner all local wireless transmissions and generate alerts based either on predefined signatures or on anomalies in the traffic. These wireless IDS can monitor and analyze user and system activities of known attacks, identity abnormal network activity and detect policy violations. Intrusion detection systems (IDSs) should be designed to facilitate the detection of attempted and actual unauthorized entry into designated areas and should complement the security response by providing the security force with prompt notification of the detected activity from which an assessment can be made and a response initiated. We intended to avoid the access and keep track of the intruder’s attempts and intensions. A clear and emerging new channel in the space of banking and payments is mobile. A key challenge with gaming user adopting of mobile banking and payment is the customer’s lack of confidence in security of the services. The economic growth in wireless network faults, vulnerabilities and attacks make the wireless local area network (WLAN) security management a challenging research area. Deficiencies of security methods like cryptography (WEP) and firewalls, causes the uses of more complex security systems.
Other Latest Articles
- Stimulus-Response Behavior of Moving Agents?
- SPEAKER RECOGNITION AND AUTHENTICATION?
- A STUDY OF PRIVACY-PRESERVING WHILE SHARING SENSITIVE INFORMATION?
- An Efficient Back Propagation Neural Network Based Face Recognition System Using Haar Wavelet Transform and PCA?
- An Efficient Pixel-shuffling Based Approach to Simultaneously Perform Image Compression, Encryption and Steganography?
Last modified: 2013-05-31 21:16:52