Research Papers - Dept of Information Technology
Permanent URI for this collectionhttps://rda.sliit.lk/handle/123456789/593
Browse
3 results
Filters
Advanced Search
Filter by
Settings
Search Results
Publication Open Access IoT Focus on Security Using Blockchain(researchgate.net, 2021-05) Wijayarathne, S. NIn the area of information technology, cyber security plays a significant role. One of the biggest challenges in the present day is the privacy and security of the information we have. ‘Cybercrimes’ is the first thing that comes to mind whenever we think about cybersecurity. In order to prevent these cybercrimes, various governments and companies are taking many measures. One of the solutions that have come up for these cybercrimes is the usage of Blockchain. The introduction and implementation of the Industrial Internet of Things (IIoT) have started a worldwide insurgency. The volume and assortment of information that is gathered and prepared in businesses are consistently expanding because of the boundless acknowledgment of current advances such as the Internet of Things (IoT). With the exponential increment of IIoTassociated devices has also incremented the number of threats of security and privacy breaches. Disadvantages such as low processing power, limited capacity abilities, and poor productivity standards are often found on IoT devices. In this specific situation, blockchain innovation can assist with taking out the security weaknesses looked at by the IIoT frameworks and gives broad assurance from information robberies, cyberattacks, and information debasement. Blockchain, with its disseminated design, offers shared systems administration and empowers auditable and straightforward exchanges. This report explores the concept of the Internet of Things (IoT), focusing on security by the usage of Blockchain. We further explore the evolution of the IoT security and the evolution of Blockchain, the future development of the IoT devices with the security of Blockchain, under the topic of IoT focus on security using Blockchain.Publication Open Access Gesture driven smart home solution for bedridden people(Association for Computing Machinery, 2020-09-21) Jayaweera, N; Gamage, B; Samaraweera, M; Liyanage, S; Lokuliyana, S; Kuruppu, TConversion of ordinary houses into smart homes has been a rising trend for past years. Smart house development is based on the enhancement of the quality of the daily activities of normal people. But many smart homes have not been designed in a way that is user friendly for differently-abled people such as immobile, bedridden (disabled people with at least one hand movable). Due to negligence and forgetfulness, there are cases where the electrical devices are left switched on, regardless of any necessity. It is one of the most occurred examples of domestic energy wastage. To overcome those challenges, this research represents the improved smart home design: MobiGO that uses cameras to capture gestures, smart sockets to deliver gesture-driven outputs to home appliances, etc. The camera captures the gestures done by the user and the system processes those images through advanced gesture recognition and image processing technologies. The commands relevant to the gesture are sent to the specific appliance through a specific IoT device attached to them. The basic literature survey content, which contains technical words, is analyzed using Deep Learning, Convolutional Neural Network (CNN), Image Processing, Gesture recognition, smart homes, IoT. Finally, the authors conclude that the MobiGO solution proposes a smart home system that is safer and easier for people with disabilitiesPublication Embargo Analysis of network techniques and cybersecurity for improving performance of big data IoT and cyber-physical communication internetwork(IEEE, 2019-02-13) Sen, S; Jayawardena, CThe Internet of Things (IoT) and Cyber-Physical Systems (CPS), are generating wide spread data. The success of these trio depends on a well performed cyber-communication infrastructure. This necessitates improving the performance of the cyber-communication internetwork; this performance improvement includes optimization of network techniques as well as the security of the cyber-network. Internet infrastructure has been upgraded to higher level ever than before, where we are enjoying technologies like fibre, 10-gig ethernet and even 100-gig ethernet, but there is no guarantee of communication in the cyber space, internet still providing packet delivery on "best effort" basis. On the other side, cyber hackers are targeting big physical infrastructures, industrial hardware in addition to the financial institutions. Therefore, it has become vital to address secure and faster data communications, in order to improve the Performance of the Internetwork.
