Symposia and Conferences
Permanent URI for this communityhttp://repository.kln.ac.lk/handle/123456789/15606
Browse
3 results
Search Results
Item Mobile Biometrics: The Next Generation Authentication in CloudBased Databases(3rd International Conference on Advances in Computing and Technology (ICACT ‒ 2018), Faculty of Computing and Technology, University of Kelaniya, Sri Lanka., 2018) Bhatt, C.; Liyanage, S.R.In this period of data innovation, cell phones are generally utilized around the world for fundamental correspondences, as well as an apparatus to manage anyplace, whenever data. These situations require a high security level for individual data and protection assurance through individual distinguishing proof against un-approved use if there should be an occurrence of robbery or fake use in an organized society. At present, the most received technique is the check of Personal Identification Number (PIN), which is risky and won't not be anchored enough to meet this prerequisite. As is represented in a review (Clarke and Furnell, 2005), numerous cell phone clients view the PIN as badly arranged as a secret key that is sufficiently confounded and effortlessly overlooked and not very many clients change their PIN frequently for higher security. Subsequently, it is liked to apply biometrics for the security of cell phones and enhance dependability of remote administrations. As biometrics intends to perceive a man utilizing special highlights of human physiological or conduct attributes, for example, fingerprints, voice, confront, iris, stride and mark, this verification technique normally gives an abnormal state of security. Expectedly, biometrics works with particular gadgets, for instance, infrared camera for securing of iris pictures, increasing speed sensors for step obtaining and depends on expansive scale PC servers to perform ID calculations, which experiences a few issues including massive size, operational many-sided quality and greatly surprising expense. Adding a wireless dimension to biometric identification provides a more efficient and reliable method of identity management across criminal justice and civil markets. Yet deploying cost-effective portable devices with the ability to capture biometric identifiers – such as fingerprints and facial images – is only part of the solution. An end-to-end, standards-based approach is required to deliver operational efficiencies, optimize resources and impact the bottom line. While the use of mobile biometric solutions has evolved in step with the larger biometrics market for some time, the growing ubiquity of smartphones and the rapid and dramatic improvements in their features and performance are accelerating the trend. This is the right time to take a closer look at mobile biometrics and investigate in greater depth how they can be used to their potential. Consolidated with cutting edge detecting stages can identify physiological signals and create different signs, numerous biometric strategies could be executed on phones. This offers an extensive variety of conceivable applications. For example, individual protection assurance, versatile bank exchange benefit security, and telemedicine observation. The utilization of sensor information gathered by cell phones for biometric ID and verification is a rising boondock that must be progressively investigated. We review the state-of-the-art technologies for mobile biometrics in this research.Item Arduino Based Home Automation and Security System(Faculty of Computing and Technology, University of Kelaniya, Sri Lanka., 2017) Ranasinghe, R.A.N.N.; Weerasinghe, K.G.H.Home security systems are designed to minimize the risk of break-ins and protect families from crime. When studying the discipline of modern society, the homeowners are interested on having an Internet based Home Security and Automation systems with reliable method to remote securely. The Arduino Based Home Automation & Security system can recognize as a new approach to the business which will helps to complete the cheaper and most secure system for the modern society. The developed system is a low cost and flexible home appliances control and home environmental monitoring system. It employs an embedded micro – web server in Arduino Mega 2560. The IP connectivity is established via Ethernet shield for accessing and controlling devices and home appliances remotely. All components can be controlled through a web application called (SmartHomeWeb) or through an Anddroid app called (SmartHome).For the system development process,Arduino, Android, Video Streaming (for monitoring home environment) and cloud based technologies have been used. The Arduino with Ethernet technology is considered one of modern programmable device and utilize from mobile phone and internet. This framework is intended to help and give help to satisfy the needs of the elderly and the handicapped at houses. The fundamental control system uses an Ethernet shield device gives a wireless access to smart phones and any web browser. The security system includes whole surround of the home. Outside of security system is working as movement detection (by PIR Sensor) and security camera viewer. Using this system, the homeowners can control the appliances (Switch ON/OFF) and awareness of the home appliances Status from anywhere via web application or through android app. And any intruder attacks are detected from sensor and send an email to homeowner with detection time. Further the home owners can monitor the home area from Security camera using video streaming technology in whatever place. This system is designed to control electrical devices throughout the house with ease of installing it, ease of use and cost effective design and implement. At the end of the development process, evaluation was done using several testing methods, with the help of the other familiar users. The system was deployed with enhancing the processes and performances. And it can be concluded, it has user friendly interfaces and eases of maintenance and cost effective. As Future enhancements, this project can be extended for automatic doors, automatic lighting floor, Garage etc. And also using WIFI Shield, connect the electronic devices as wirelessly.Item Multi-Agent-Based Secure Textual Communication(Faculty of Computing and Technology, University of Kelaniya, Sri Lanka, 2016) Jayathunga, D.P.; Ranasinghe, R.M.I.S.; Iloshini, P.A.A.The study designed to show that the security of textual communication can improve by incorporating Agent Technology. Furthermore, the usage of dynamic encryption mechanism tightens the security of the communication. While online communication media are facilitating an effective communication, significant threats are arising day by day due to high access rate of large data. Therefore, privacy, confidentiality, and security become more significant facts in the means of Information and Communication Technology. A network attack or malicious software such as viruses and worms may cause communication failure or loss of data. An intruder can modify, steal or erase a message while it is passing through the communication media. Thus, the importance of information security is increasing rapidly. An agent-based secure communication system is proposed to make more secure transmission of data that will improve the efficiency, security, and robustness. The execution of security protocols in a fair and accessible way by incorporating software agents will be a better approach to overcome the security threats. In this study, autonomous agents have been created and simulated using Java Agent Development Environment (JADE) platform that is skilled with the knowledge of several encryption methods to select the most suitable encryption method based on the message type. Furthermore, an Agent ID is used by every agent for the purpose of identifying each other to communicate. Another essential feature of agents is the ability to communicate with each other using a specific way with the aid of Agent Communication Language (ACL), and it gives a unique way of communication in between agents. A vital aspect of this method is to ensure the security level of the encryption methodology applied. Adding software agent to this process will add one more layer of security other than the encryption. Several benefits can be possible through adopting dynamic encryption method in the system. Secrecy is high, in the means of neither the receiver nor the intruder knows the encryption method which used. Encryption, dynamic encryption, and agent-based approach used to achieve three levels of security in textual communication. Obviously, the security is improved by adding these three tiers, and it is tough to break all these three layers and retrieve the message.