Title: Formulation of a two-level electronic security and protection system for malls

Authors: T. Thirumurugan; Leena Bojaraj; R. Lavanya; T.J. Nagalakshmi

Addresses: Department of Electronics and Communication Engineering, Christ College of Engineering and Technology, Puducherry, India ' Department of Electronics and Communication Engineering, KGISL Institute of Technology, Coimbatore, India ' Department of Electronics and Communication Engineering, N.G.P Institute of Technology, Coimbatore, India ' Department of Electronics and Communication Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, Tamil Nadu, India

Abstract: Electronics are everywhere around us these days, and many of them help us maintain security in different locations. However, there are still numerous security issues that banks, residences, and other establishments must deal with. The real-time identification of possibly suspicious actions in shopping malls is the main goal of the comprehensive expert system we present in this article. Our video surveillance technique makes a number of creative suggestions that combine to create a solid application that effectively tracks people's movements and identifies suspicious activity in a retail setting. The discussion of several present and developing solutions aimed at obtaining a high level of trust in IoT applications follows the discussion of security concerns. Four potential technologies blockchain, edge devices, cloud technologies, and machine learning are examined. An experiment demonstrates that in the same dependable network environment of DCNs, our responsibility security routing system performs better.

Keywords: electrical gadgets; video monitoring in malls; background removal; RFID tags; barcode reader.

DOI: 10.1504/IJESDF.2024.136019

International Journal of Electronic Security and Digital Forensics, 2024 Vol.16 No.1, pp.63 - 72

Received: 13 Jul 2022
Accepted: 27 Oct 2022

Published online: 12 Jan 2024 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article