Skip to content

Biggest Security concerns

Stage 1 of Vehicle Monitoring and Security System

Vehicle Monitoring and Security System

The Vehicle Monitoring and Security System is a GPS based vehicle tracking system that is used for security applications. The project uses two main underlying concepts. These are GPS (Global Positioning System) and GSM (Global System for Mobile Communication).

Honeypot in cyber security


A honeypot is used in the area of computer and Internet security . It is a security resource, whose value lies in being probed, attacked or compromised. They are special decoy servers to catch the‚ Blackhats (people with evil and illegal intents). Honeypots attract the hackers to attack a vulnerable computer system, which is under observation, by a security team. All the information about the attackers is logged, and monitored.

Security Requirements in Wireless Sensor Networks

Security requirements in Wireless Sensor Networks

The confidentiality objective is required in sensors environment to protect information traveling between the sensor nodes of the network or between the sensors and the base station from disclosure, since an adversary having the appropriate equipment may eavesdrop on the communication.

Monitoring underwater communication networks using autonomous moving vehicles

Securing underwater wireless communication networks

Underwater wireless communication is the wireless communication in which acoustic signals carry digital information through an underwater channel. Underwater wireless communication networks are constituted by sensors and autonomous underwater vehicles (AUVs) that interact to perform specific applications such as underwater monitoring.

Password paradigm

Password Paradigm

A password in the virtual world is something like a lock in the world of reality. A password is an information associated with an entity that confirms the entity’s identity. Let us understand what is password paradigm?