Smart City Gnosys

Smart city article details

Title Securing Iot-Enabled Web Applications And Enhancing Women'S Safety Through Advanced Technologies
ID_Doc 47759
Authors Singh N.T.; Dhiman R.; Yadav A.L.; Tanwar H.; Kumar M.; Kumar G.; Ruhela A.K.
Year 2024
Published 2024 International Conference on Intelligent Systems for Cybersecurity, ISCS 2024
DOI http://dx.doi.org/10.1109/ISCS61804.2024.10581319
Abstract The Internet of Things (IoT) is rapidly transforming the way we connect and control physical devices, leading to increased efficiency and financial benefits in various domains, including smart homes and smart cities. However, the proliferation of IoT devices also raises concerns about security. This paper addresses the critical issue of securing online applications against unauthorized intrusions by discussing various approaches such as passwords, encryption, authentication, and integrity checks. Additionally, it suggests advanced techniques to mitigate vulnerabilities and establish robust security measures. Web applications are particularly vulnerable to security threats due to a lack of research on the relationships between attack tactics, critical parameters, and email-based attacks. To address this gap, the paper emphasizes the need for enhanced security measures in web applications. For emergency situations, a companion app is available to empower women and ensure their safety. This user-friendly app offers features such as safe zone visualization, offline mode, and continuous position tracking, accessible through SOS alerts or voice commands. Facial recognition technology plays a vital role in enhancing security across various sectors, including smart homes, self-driving cars, and surveillance applications. The paper compares advanced detection mechanisms like LBPH, SVM, AdaBoost, and Haar Classifiers to assess their accuracy and features in improving security. This research contributes to the broader discussion on security and innovation in the digital and physical realms. © 2024 IEEE.
Author Keywords facial recognition technology; internet of things (IoT); security vulnerabilities; SQL injection; web applications; women's safety


Similar Articles


Id Similarity Authors Title Published
5446 View0.868Tampubolon D.G.; Widodo G.N.; Margaretha J.S.; Gunawan A.A.S.; Edbert I.S.A Systematic Literature Review: Challenges Of Security Optimization While Maintaining A Good Accessibility In Internet Of ThingsProceedings - 2023 3rd International Conference on Electronic and Electrical Engineering and Intelligent System: Responsible Technology for Sustainable Humanity, ICE3IS 2023 (2023)
47934 View0.865Padmavathi V.; Saminathan R.Security For The Internet Of ThingsComputer and Information Security Handbook, Fourth Edition: Volumes 1-2, 1 (2024)
47990 View0.86Sharma R.; Arya R.Security Threats And Measures In The Internet Of Things For Smart City Infrastructure: A State Of ArtTransactions on Emerging Telecommunications Technologies, 34, 11 (2023)
47710 View0.858Secureguard: An Iot-Based Home Security Solution For High-Burglary AreasDigest of Technical Papers - IEEE International Conference on Consumer Electronics (2024)
47996 View0.857Chander B.; Gopalakrishnan K.Security Vulnerabilities And Issues Of Traditional Wireless Sensors Networks In IotIntelligent Systems Reference Library, 174 (2019)
32899 View0.854Sarker I.H.; Khan A.I.; Abushark Y.B.; Alsolami F.Internet Of Things (Iot) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions And Research DirectionsMobile Networks and Applications, 28, 1 (2023)
26946 View0.853Bhardwaj A.; Bharany S.; Abulfaraj A.W.; Osman Ibrahim A.; Nagmeldin W.Fortifying Home Iot Security: A Framework For Comprehensive Examination Of Vulnerabilities And Intrusion Detection Strategies For Smart CitiesEgyptian Informatics Journal, 25 (2024)
33617 View0.851Butt H.A.; Imran I.; Ahad A.; Ahad A.; Ahad A.; Farid J.; Madeira F.Iot And Wearable Devices: Security Challenges And SolutionsAI and Blockchain Applications for Privacy and Security in Smart Medical Systems (2025)
5283 View0.851Wei Z.; Wei Q.; Geng Y.; Yang Y.A Survey On Iot Security: Vulnerability Detection And ProtectionProceedings of 2024 International Conference on Artificial Intelligence of Things and Computing, AITC 2024 (2025)