Submit Search
Upload
home security System
•
Download as DOCX, PDF
•
0 likes
•
44 views
B
Balajibalu592666
Follow
home security System
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Recommended
Safe and secure programming practices for embedded devices
Safe and secure programming practices for embedded devices
Soumitra Bhattacharyya
Cisco Malware: A new risk to consider in perimeter security designs
Cisco Malware: A new risk to consider in perimeter security designs
Manuel Santander
Атаки на мобильные сети
Атаки на мобильные сети
Ekaterina Melnik
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
Daksh Raj Chopra
Who needs iot security?
Who needs iot security?
Justin Black
Offline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encription
malvvv
SCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имя
Ekaterina Melnik
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin Assembly
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin Assembly
Eric Larcheveque
Recommended
Safe and secure programming practices for embedded devices
Safe and secure programming practices for embedded devices
Soumitra Bhattacharyya
Cisco Malware: A new risk to consider in perimeter security designs
Cisco Malware: A new risk to consider in perimeter security designs
Manuel Santander
Атаки на мобильные сети
Атаки на мобильные сети
Ekaterina Melnik
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
Daksh Raj Chopra
Who needs iot security?
Who needs iot security?
Justin Black
Offline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encription
malvvv
SCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имя
Ekaterina Melnik
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin Assembly
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin Assembly
Eric Larcheveque
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
CODE BLUE
Careful Packing
Careful Packing
Flavio Toffalini
Attacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVE
Aleksandr Timorin
Alexander Timorin, Alexander Tlyapov - SCADA deep inside protocols, security ...
Alexander Timorin, Alexander Tlyapov - SCADA deep inside protocols, security ...
DefconRussia
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
EnergySec
Master Serial Killer - DEF CON 22 - ICS Village
Master Serial Killer - DEF CON 22 - ICS Village
Chris Sistrunk
SCADA StrangeLove 2: We already know
SCADA StrangeLove 2: We already know
qqlan
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
SHASHANK WANKHADE
iot hacking, smartlockpick
iot hacking, smartlockpick
idsecconf
Shameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocols
Slawomir Jasek
IoT on Raspberry Pi
IoT on Raspberry Pi
John Staveley
Adventures in Femtoland: 350 Yuan for Invaluable Fun
Adventures in Femtoland: 350 Yuan for Invaluable Fun
arbitrarycode
Extracting the Painful (Blue)Tooth - Presentation
Extracting the Painful (Blue)Tooth - Presentation
Opposing Force S.r.l.
ARM: Trusted Zone on Android
ARM: Trusted Zone on Android
Kan-Han (John) Lu
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Kuniyasu Suzaki
Offline bruteforce attack on WiFi Protected Setup
Offline bruteforce attack on WiFi Protected Setup
0xcite
KTLS White-paper - Cyber - Keystroke Encryption technology
KTLS White-paper - Cyber - Keystroke Encryption technology
Troy Cromwell
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Luca Bongiorni
Birdwatching using a Raspberry pi, Azure IoT Hub and Cognitive services
Birdwatching using a Raspberry pi, Azure IoT Hub and Cognitive services
John Staveley
How to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewed
Arash Ramez
SCADA deep inside:protocols and software architecture
SCADA deep inside:protocols and software architecture
qqlan
OT Security - h-c0n 2020
OT Security - h-c0n 2020
Jose Palanco
More Related Content
What's hot
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
CODE BLUE
Careful Packing
Careful Packing
Flavio Toffalini
Attacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVE
Aleksandr Timorin
Alexander Timorin, Alexander Tlyapov - SCADA deep inside protocols, security ...
Alexander Timorin, Alexander Tlyapov - SCADA deep inside protocols, security ...
DefconRussia
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
EnergySec
Master Serial Killer - DEF CON 22 - ICS Village
Master Serial Killer - DEF CON 22 - ICS Village
Chris Sistrunk
SCADA StrangeLove 2: We already know
SCADA StrangeLove 2: We already know
qqlan
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
SHASHANK WANKHADE
iot hacking, smartlockpick
iot hacking, smartlockpick
idsecconf
Shameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocols
Slawomir Jasek
IoT on Raspberry Pi
IoT on Raspberry Pi
John Staveley
Adventures in Femtoland: 350 Yuan for Invaluable Fun
Adventures in Femtoland: 350 Yuan for Invaluable Fun
arbitrarycode
Extracting the Painful (Blue)Tooth - Presentation
Extracting the Painful (Blue)Tooth - Presentation
Opposing Force S.r.l.
ARM: Trusted Zone on Android
ARM: Trusted Zone on Android
Kan-Han (John) Lu
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Kuniyasu Suzaki
Offline bruteforce attack on WiFi Protected Setup
Offline bruteforce attack on WiFi Protected Setup
0xcite
KTLS White-paper - Cyber - Keystroke Encryption technology
KTLS White-paper - Cyber - Keystroke Encryption technology
Troy Cromwell
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Luca Bongiorni
Birdwatching using a Raspberry pi, Azure IoT Hub and Cognitive services
Birdwatching using a Raspberry pi, Azure IoT Hub and Cognitive services
John Staveley
How to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewed
Arash Ramez
What's hot
(20)
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Careful Packing
Careful Packing
Attacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVE
Alexander Timorin, Alexander Tlyapov - SCADA deep inside protocols, security ...
Alexander Timorin, Alexander Tlyapov - SCADA deep inside protocols, security ...
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
Master Serial Killer - DEF CON 22 - ICS Village
Master Serial Killer - DEF CON 22 - ICS Village
SCADA StrangeLove 2: We already know
SCADA StrangeLove 2: We already know
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
iot hacking, smartlockpick
iot hacking, smartlockpick
Shameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocols
IoT on Raspberry Pi
IoT on Raspberry Pi
Adventures in Femtoland: 350 Yuan for Invaluable Fun
Adventures in Femtoland: 350 Yuan for Invaluable Fun
Extracting the Painful (Blue)Tooth - Presentation
Extracting the Painful (Blue)Tooth - Presentation
ARM: Trusted Zone on Android
ARM: Trusted Zone on Android
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Offline bruteforce attack on WiFi Protected Setup
Offline bruteforce attack on WiFi Protected Setup
KTLS White-paper - Cyber - Keystroke Encryption technology
KTLS White-paper - Cyber - Keystroke Encryption technology
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Birdwatching using a Raspberry pi, Azure IoT Hub and Cognitive services
Birdwatching using a Raspberry pi, Azure IoT Hub and Cognitive services
How to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewed
Similar to home security System
SCADA deep inside:protocols and software architecture
SCADA deep inside:protocols and software architecture
qqlan
OT Security - h-c0n 2020
OT Security - h-c0n 2020
Jose Palanco
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
GangSeok Lee
[2010 CodeEngn Conference 04] window31 - Art of Keylogging 키보드보안과 관계없는 키로거들
[2010 CodeEngn Conference 04] window31 - Art of Keylogging 키보드보안과 관계없는 키로거들
GangSeok Lee
Malware Freak Show
Malware Freak Show
n|u - The Open Security Community
Malware freak show
Malware freak show
sr1nu
Attendance System using ESP8266(Wi-Fi) with MySQL
Attendance System using ESP8266(Wi-Fi) with MySQL
Sanjay Kumar
Stuxnet dc9723
Stuxnet dc9723
Iftach Ian Amit
GSM Based Security System
GSM Based Security System
Prajjwol Tripathi
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
muthulx
eSmartlock - an antipiracy dongle with integrated DRM functionalities
eSmartlock - an antipiracy dongle with integrated DRM functionalities
Yiannis Hatzopoulos
Finfisher- Nguyễn Chấn Việt
Finfisher- Nguyễn Chấn Việt
Security Bootcamp
Cryptography&Security
Cryptography&Security
Sanjeev Kumar Jaiswal
[Codientu.org] design of a microcontroller based circuit for software protection
[Codientu.org] design of a microcontroller based circuit for software protection
Hieu Le Dinh
Rootkit internales
Rootkit internales
n|u - The Open Security Community
15.Security
15.Security
Senthil Kanth
PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...
PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...
CODE BLUE
Cyber tooth
Cyber tooth
Andrew Sispoidis
CV_Arshad_21June16
CV_Arshad_21June16
Arshad Mohammad
G05215356
G05215356
IOSR-JEN
Similar to home security System
(20)
SCADA deep inside:protocols and software architecture
SCADA deep inside:protocols and software architecture
OT Security - h-c0n 2020
OT Security - h-c0n 2020
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
[2010 CodeEngn Conference 04] window31 - Art of Keylogging 키보드보안과 관계없는 키로거들
[2010 CodeEngn Conference 04] window31 - Art of Keylogging 키보드보안과 관계없는 키로거들
Malware Freak Show
Malware Freak Show
Malware freak show
Malware freak show
Attendance System using ESP8266(Wi-Fi) with MySQL
Attendance System using ESP8266(Wi-Fi) with MySQL
Stuxnet dc9723
Stuxnet dc9723
GSM Based Security System
GSM Based Security System
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
eSmartlock - an antipiracy dongle with integrated DRM functionalities
eSmartlock - an antipiracy dongle with integrated DRM functionalities
Finfisher- Nguyễn Chấn Việt
Finfisher- Nguyễn Chấn Việt
Cryptography&Security
Cryptography&Security
[Codientu.org] design of a microcontroller based circuit for software protection
[Codientu.org] design of a microcontroller based circuit for software protection
Rootkit internales
Rootkit internales
15.Security
15.Security
PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...
PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...
Cyber tooth
Cyber tooth
CV_Arshad_21June16
CV_Arshad_21June16
G05215356
G05215356
Recently uploaded
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
humanexperienceaaa
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
Recently uploaded
(20)
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
home security System
1.
19bec1224 ChallengingTask-1Home SecuritySystem: Write a
program to designhome securitysystemthatconsistsof twomainmodules(1) Intruder detection(2) passwordbaseddoorlocksystem.The intruderdetectionsystemconsistsof PIRsensor interfacedwithprocessingunittodetectandalertunderhumanpresence condition.Inpassword baseddoorlock systemnumerickeypadtoacceptthe password(last4-digitof yourreg.no) from userand LCD to displaythe message whetherpermissionisgrantedornot.Upon receivingcorrect passwordsignal,enablemotortoopenthe door.In case of passwordmismatchor intruder detectionconditionactivate the buzzer.SimulateandverifythislogiconArduinoUnousing Tinkercadcircuitsimulator. APIUsed: lcd.begin() lcd.write() Serial.begin() delay() keypad.getKey() Code: #include <Keypad.h> #include <LiquidCrystal.h> LiquidCrystal lcd(6,7,2,3,4,5); const byte ROWS= 4; const byte COLS= 4; char keys[ROWS][COLS] ={ {'1','2','3','A'}, {'4','5','6','B'}, {'7','8','9','C'}, {'*','0','#','D'} };
2.
byte rowPins[ROWS]={A3,A2,A1,A0}; byte colPins[COLS]={11,10,9,8}; intLCDRow
= 0; intdoor = 12; inti=0; intc=0; char password[4] = {'1','2','2','5'}; intfl = 0; Keypadkeypad=Keypad( makeKeymap(keys),rowPins,colPins,ROWS,COLS); voidsetup() { Serial.begin(9600); pinMode(door,OUTPUT); pinMode(13,INPUT); pinMode(1,OUTPUT); lcd.begin(16,2); lcd.clear(); lcd.setCursor(LCDRow,0); lcd.print("Enteryourcode:"); delay(3000); lcd.clear(); } voidloop() { char key= keypad.getKey();
3.
if(key) { Serial.print(key); lcd.print("*"); if(password[LCDRow]!=key) fl=1; lcd.setCursor(++LCDRow,0); } if(LCDRow>=4) { if(fl==1) { lcd.setCursor(0,1); lcd.print("WrongPassword"); digitalWrite(1,HIGH); delay(2000); digitalWrite(1,LOW); fl = 0; lcd.clear(); LCDRow=
0; } else { lcd.setCursor(0,1); lcd.print("CorrectPassword"); digitalWrite(door,HIGH); delay(5000);
4.
digitalWrite(door,LOW); lcd.clear(); fl=0; LCDRow= 0; } } if(digitalRead(13)==HIGH) { digitalWrite(1,HIGH); delay(2000); digitalWrite(1,LOW); delay(2000); } } Output:
5.
TinkerCADLink: https://www.tinkercad.com/things/6tyAyAQuXof-stunning- curcan/editel?sharecode=QCKpLmdqdMSQQ4wM_pEaIRw2jYl_zxowFtxFUDJqujc Result: Thus,the logichasbeenimplementedsuccessfullyandverifiedinTinkercad
Download now