Internet‐of‐things architectures for secure cyber–physical spaces: The VISOR experience report.
Published In: Journal of Software: Evolution & Process, 2023, v. 35, n. 7. P. 1 1 of 3
Database: Academic Search Ultimate 2 of 3
Authored By: De Pascale, Daniel; Cascavilla, Giuseppe; Sangiovanni, Mirella; Tamburri, Damian A.; van den Heuvel, Willem‐Jan 3 of 3
Abstract
Internet of things (IoT) technologies are becoming a more and more widespread part of civilian life in common urban spaces, which are rapidly turning into cyber–physical spaces. Simultaneously, the fear of terrorism and crime in such public spaces is ever‐increasing. Due to the resulting increased demand for security, video‐based IoT surveillance systems have become an important area for research. Considering the large number of devices involved in the illicit recognition task, we conducted a field study in a Dutch Easter music festival in a national interest project called VISOR to select the most appropriate device configuration in terms of performance and results. We iteratively architected solutions for the security of cyber–physical spaces using IoT devices. We tested the performance of multiple federated devices encompassing drones, closed‐circuit television, smart phone cameras, and smart glasses to detect real‐case scenarios of potentially malicious activities such as mosh pits and pick‐pocketing. Our results pave the way to select optimal IoT architecture configurations—that is, a mix of CCTV, drones, smart glasses, and camera phones in our case—to make safer cyber–physical spaces' a reality. [ABSTRACT FROM AUTHOR]
Additional Information
- Source:Journal of Software: Evolution & Process. 2023/07, Vol. 35, Issue 7, p1
- Document Type:Article
- Subject Area:Computer Science
- Publication Date:2023
- ISSN:2047-7473
- DOI:10.1002/smr.2511
- Accession Number:164656128
- Copyright Statement:Copyright of Journal of Software: Evolution & Process is the property of Wiley-Blackwell and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Looking to go deeper into this topic? Look for more articles on EBSCOhost.