Description
Train communication gateways systems enable the exchange of information throughout the train. Gateways help to connect to the train communication network. They are also called protocol converters and may communicate using more than one protocol. There are two interface buses used in the TCN: Vehicle bus: Used for intra-vehicle communication, and Train bus: Used for wide information exchange. The wire train bus (WTB) gateway is used as a train bus, and a multifunction vehicle bus (MVB) gateway is used as a vehicle bus. Gateway bus technologies such as controller area network (CAN), serial links, and Ethernet train bus (ETB) are used as a vehicle bus. They provide larger bandwidths and a flexible network.
Description
Bluetooth beacons are becoming increasingly popular across industries as they are a cost effective and simple deploy model. As these beacons are supported by almost all operating systems, their demand is expected to increase. Bluetooth beacons are deployed by businesses to send content and information, which are contextually relevant, to users at specific locations. They open up the probability of connecting the online virtual world with the offline, physical world by providing context –aware information to mobile users. Bluetooth beacons devices broadcast signals and messages to smart devices under range, in the form of notifications. They basically consist of a chip and various electronic components on a small circuit board. As these devices offer a more personalized and enhanced user experience, the market for Bluetooth beacons is projected to grow at a healthy pace.
Description
A beacon is a small Bluetooth radio transmitter. It’s kind of like a lighthouse: it repeatedly transmits a single signal that other devices can see. Instead of emitting visible light, though, it broadcasts a radio signal that is made up of a combination of letters and numbers transmitted on a regular interval of approximately 1/10th of a second. A Bluetooth-equipped device like a smartphone can “see” a beacon once it’s in range, much like sailors looking for a lighthouse to know where they are.
Description
Biometrics technology is used for identification and authentication of people with the help of their biological and behavioral characteristics. An employee is asked for his user ID as soon as he logs into the retail PoS system. However, without typing in his password, he can simply scan his finger on the biometric fingerprint reader. Every time an employee tries to access a password-protected area, he is required to scan his finger. This leads to increased accountability, which ensures protection from accidental and intentional damage to the company’s data.
Description
Automotive Biometrics is an electronic device utilized for identification and authentication in vehicles for number of applications mainly, vehicular access, ignition switch, vehicle immobilizer, rationalization, and health monitoring. 
Description
Biometric technology uses human physical attributes as locks and keys, making it particularly suitable for access control systems on the buildings of large organisations. Using biometrics for security and identification requires meeting two challenges: they must be cheap enough and sufficiently simple to be used by ordinary users. Furthermore, for enhanced security, these biometric access control systems should combine two or more types of authentication, such as coupling fingerprints with key codes or passwords to provide greater trust that who is logging in is only who is expected to do so.
Description
A wireless mesh network (WMN) is a communications network made up of radio nodes organized in a mesh topology. It is also a form of wireless ad hoc network. Wireless mesh networks often consist of mesh clients, mesh routers and gateways. The mesh clients are often laptops, cell phones and other wireless devices while the mesh routers forward traffic to and from the gateways which may, but need not, be connected to the Internet. The coverage area of the radio nodes working as a single network is sometimes called a mesh cloud. Access to this mesh cloud is dependent on the radio nodes working in harmony with each other to create a radio network. A mesh network is reliable and offers redundancy. When one node can no longer operate, the rest of the nodes can still communicate with each other, directly or through one or more intermediate nodes. Wireless mesh networks can self-form and self-heal. 
Description
Cyber Security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from major cyber threats, such as cyber terrorism, cyber warfare, and cyber espionage. In their most disruptive form, cyber threats take aim at secret, political, military, or infrastructural assets of a nation, or its people.  In a computing context, security includes both Cyber Security and physical security.