全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

A Secure Model for Preventing the Spread of COVID-19 in Bangladesh

DOI: 10.4236/etsn.2022.111003, PP. 34-46

Keywords: Face-Mask, COVID-19, Awareness, Public Health, MAC, Hash

Full-Text   Cite this paper   Add to My Lib

Abstract:

An alarmingly high mortality and morbidity rate has been observed in COVID-19. As a new disease (similar group of SARS-CoV 2), it has been spread to more than two hundred countries and millions of people. However, COVID-19 infection is increasing in Bangladesh also. Therefore, an effective public health response is needed to control the outbreak of the mentioned new disease. If this high increasing factor turns out of control then it provides potential negative impact on social, economic, and political life of Bangladeshi people. One of the most effective ways to reduce or prevent the growth of COVID-19 is to wear masks. Many variants of COVID-19 are available in the world currently. Latest, there is a variant of omicron. This variant is too infectious. It means the vaccine seems to be not perfect against this deadliest disease COVID-19. However, people are not conscious enough about this matter generally. Nowadays, they are very reluctant to wear a mask. Their main thought is to get vaccinated and it can protect themselves. Definitely, the vaccine can protect at a certain level. However, Omicron proves that vaccine is not the ultimate solution. But, we can protect ourselves to wear a mask and keeping physical distance. This is the borderline of our research work. In this work, we proposed a system that will monitor the people who are outside the home/office via a close circuit camera. It evaluates whether the people are mask-free or not. If one does not wear a mask then an image will be captured and compared with database of national-data center for example NID server. As sensitive data, it needs security and protection. Hence, we adopt a cryptographic solution such as authenticated encryption or tag generation. As a result, receiver will be assured that a valid sender provides data to the valid receiver. The goal of this system proposal is to ensure wear face masks. As well, people will be punished based on the findings of mask-wearing. Furthermore, message authentication or tag generation secures sensitive information or data, because of accessing NID server. Specially, this model will be suitable for Bangladesh and other overcrowded countries. Because manmade or policing for all-time monitoring system is quite impossible for the populated country. Hence, we should start an automated system

References

[1]  Venkatesan, P. (2021) NICE Guideline on Long COVID. The Lancet Respiratory Medicine, 9, 129.
https://doi.org/10.1016/S2213-2600(21)00031-X
[2]  Green, J., et al. (2021) The Implications of Face Masks for Babies and Families during the COVID-19 Pandemic: A Discussion Paper. Journal of Neonatal Nursing, 27, 21-25.
https://doi.org/10.1016/j.jnn.2020.10.005
[3]  Anwar, S., et al. (2020) COVID-19 and Bangladesh: Challenges and How to Address Them. Frontiers in Public Health, 8, Article No. 154.
https://doi.org/10.3389/fpubh.2020.00154
[4]  Message Authentication.
https://www.tutorialspoint.com/cryptography/message_authentication.htm
[5]  Alkhurayyif, Y. (2013) National ID Cards. International Journal of Computing Science and Information Technology, 1, 44-48.
[6]  Mittal, R., et al. (2020) A Mathematical Framework for Estimating Risk of Airborne Transmission of COVID-19 with Application to Face Mask Use and Social Distancing. Physics of Fluids, 32, Article ID: 101903.
https://doi.org/10.1063/5.0025476
[7]  https://docs.opencv.org
[8]  Keras API Reference.
https://keras.io/api
[9]  Preneel, B. (1997) Hash Functions and MAC Algorithms Based on Block Ciphers. IMA International Conference on Cryptography and Coding, Vol. 1355, 270-282.
https://doi.org/10.1007/BFb0024473
[10]  Paar, C. and Pelzl, J. (2009) Understanding Cryptography: A Textbook for Students and Practitioners. Springer Science & Business Media, Berlin.
https://doi.org/10.1007/978-3-642-04101-3
[11]  Black, J., Rogaway, P. and Shrimpton, T. (2002) Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV. In: Annual International Cryptology Conference, Springer, Berlin, 320-335.
https://doi.org/10.1007/3-540-45708-9_21
[12]  Socket Programming in Python. Geeks for Geeks.
https://www.geeksforgeeks.org/socket-programming-python
[13]  How to Transfer Files in the Network Using Sockets in Python.
https://www.thepythoncode.com/article/send-receive-files-using-sockets-python
[14]  SDLC Waterfall Model.
https://www.tutorialspoint.com/tutorial_view.htm?cid=sdlc&pid=sdlc_waterfall_model.htm
[15]  Stallings, W. (2006) Cryptography and Network Security. Pearson Education, Delhi.
[16]  Barreto, P.S.L.M. and Rijmen, V. (2000) The Whirlpool Hashing Function. In First Open NESSIE.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133