Browsing by Author "Sam, Anael"
Now showing 1 - 4 of 4
- Results Per Page
- Sort Options
Item Early fire detection system in Tanzania market places(MDPI, 2020-11-15) Philemon, Rotich; Rambo, Hilary; Geofrey, Anna; Sam, AnaelApplication of wireless sensor networks (WSN) and Internet of Things (IoT) used to provide real-time monitoring of fire outbreak in markets. The system integrates three subsystems namely; sensing subsystem which uses multiple sensors for detecting fire outbreaks. Data processing subsystem which collects data from the sensing subsystem through Xbee, analyses, and uploads data to the cloud. If values exceed sensor threshold, an alarm is triggered and notification is sent to stakeholders via mobile application subsystem. The integration between sensing, data processing, and mobile application subsystems pave a new way for the mitigation of fire outbreaks at its early stage.Item Early fire detection system in Tanzania market places(2020-11-15) Philemon, Rotich; Rambo, Hilary; Geofrey, Anna; Sam, AnaelApplication of wireless sensor networks (WSN) and Internet of Things (IoT) used to provide real-time monitoring of fire outbreak in markets. The system integrates three subsystems namely; sensing subsystem which uses multiple sensors for detecting fire outbreaks. Data processing subsystem which collects data from the sensing subsystem through Xbee, analyses, and uploads data to the cloud. If values exceed sensor threshold, an alarm is triggered and notification is sent to stakeholders via mobile application subsystem. The integration between sensing, data processing, and mobile application subsystems pave a new way for the mitigation of fire outbreaks at its early stage. Keywords: wireless sensor networks; Internet of Things; real-time monitoring; Xbee; integrationItem Enhanced security model for mobile banking systems in Tanzania(International journal of technology enhancements and emerging engineering research, 2013) Nyamtiga, Baraka W; Sam, Anael; Laizer, Loserian SIn mobile banking schemes; financial services are availed and banking services are provided using mobile devices. GSM services are greatly utilized for data transmission by the technologies used in conducting mobile transactions. In their operations; these technologies send data in plaintext. Financial service providers tend to rely on the security services provided by the GSM which has been proved to be susceptible to cryptanalytic attacks. The used algorithms for crypto mechanisms are flawed leaving data carried through the network vulnerable upon interception. Operators need to take precaution by enforcing some protective measures on the information to be transmitted. This paper describes an SMS based model designed with security features to enhance data protection across mobile networks. Features for data encryption, integrity, secure entry of security details on the phone, and improved security policies in the application server are incorporated. We address issues of data confidentiality, user authentication and message integrity in order to provide end-to-end security of data carried on GSM networks.Item Security perspectives for ussd versus sms in conducting mobile transactions: a case study of Tanzania(International journal of technology enhancements and emerging engineering research, 2013) Nyamtiga, Baraka W; Sam, Anael; Laizer, Loserian SPerforming transactions using mobile devices is increasing rapidly in developing countries, Tanzania inclusive. USSD and SMS are among the technologies widely used in conducting mobile transactions. These two technologies have their strengths and weaknesses from perspectives of security of systems. They both utilize GSM Services and GSM Security is known to have inherent flaws in its encryption and au thentication algorithms. A description for these platforms is given in this paper of what they are, their modes of operations, and an evaluation of thei r security as related to mobile banking systems. From the evaluations made; this paper suggests a method that is more secure for use in mobile banking systems. As a solution we propose some security features being added to the existing systems in order to improve data confidentiality, message integrit y and user authenticity. The suggestions are based on the capabilities for the technology to accommodate these additional features to protect data that will supplement the protection offered by the GSM.