SlideShare a Scribd company logo
1 of 15
SMART SECURITY SYSTEM USING
IOT
Master of Computer Application
Departmentof InformationTechnology
MaulanaAbul Kalam Azad University of Technology, West
Bengal
P R E S E N T E D BY :
RAUNAK MALLICK
ROLL: 10071021038
REG: 211000571010038
G U I D E D BY:
DR. JADAV CHANDRA DAS
CONTENTS
Introduction
Motivations
Literature Review
Proposed Method
Block Diagram, Proposed Diagram & Algorithm
Requirements
Future Scope
Conclusion
INTRODUCTION
 The Internet of Things (IoT) is a network of interconnected physical devices that can communicate and
share data without the need for human involvement.
 It has been explicitly defined as a “Information Society Infrastructure” because IoT enables us to
collect data from various mediums such as humans, animals, vehicles, and kitchen equipment Thus, any
physical object that can be assigned an IP address to permit data transfer over a network can be
integrated into an IoT system by integrating it with electronic hardware such as sensors, software, and
networking gear.
MOTIVATIONS
 Smart home security makes use of an assortment of IoT-enabled technologies to enable consumers to
remotely monitor and manage the security of their houses. These systems can control the monitoring in
and around the home, as well as who has access to the doors if they have smart locks.
 Home security is a critical component of the Internet of Things. IoT and artificial intelligence are ideal
for smart security. Closely monitoring your home has never been easier with CCTV cameras, doorbells,
smart lighting, and a variety of other alarm systems.
LITERATURE REVIEW
 Govinda et al. (2014) explored the Design and Implementation of Security for Smart Homes based on GSM
technology, which presents two techniques for implementing home security utilizing IoT [1]. One method is to use
web cameras so that if motion is detected by the camera, it sounds an alarm and sends an email to the owner. This
method of detecting infiltration is highly effective, if rather costly due to the cost of the cameras used in the
process. The cameras must be of high quality, which means they must have a wide range and picture quality high
enough to detect movement. Also, moveable cameras, such as dome cameras, are more expensive than fixed
cameras.
 Karri and Daniel (2005) recommended using internet services to deliver messages or alerts to the house owner
instead of traditional SMS.[2] Jayashri and Arvind (2013) created a fingerprint-based authentication method to
access a door [3].
PROPOSED METHOD
 After an in-depth literature review, I am devising a specialized project to create a smart security
system. This system provides a fingerprint based authentication to access the door lock. A
microcontroller and sensors are utilized to detect unauthorized behavior or any unknown suspicious
fingerprint and communicate information about a suspected intruder to the Cloud through the in-house
LAN connection.
 Additional security measures would be required to deploy the suggested system. Passwords and anti-
hacking software, for example, would need to be put in the system to prevent unwanted access to the
Cloud-based system.
BLOCK DIAGRAM
PROPOSED DIAGRAM
ALGORITHM
REQUIREMENTS
I. Arduino UNO/Raspberry Pi
II. PIR Sensor
III. Camera Module
IV. R307 Fingerprint Reader Optical Sensor Module
V. ESP32 (SquadPixel – WiFi, Bluetooth, Dual Core chip development board)
VI. OLED Display Module
VII. 12V Solenoid Lock
FUTURE SCOPE
 The proposed system can be improved by
 GSM (Call, GPRS)
 Video recording surveillance
 Install a temperature sensor to keep the organization's temperature stable, and so on.
CONCLUSION
 This paper describes the design and implementation of a smart home security system with email
interaction alert Smart Phone-enabled web and door access system. PC with a low-cost single-chip
processor that can perform administrators to obtain parameters of many remote devices can at
any time convey control information to field equipment via the Internet.
ABBREVATIONS
 ECU – Electronic Control Unit
 SSH – Secure Shell
 IP – Internet Protocol
 PIR – Passive Infrared Sensors
 GSM – Global System for Mobile Communications
 GPRS – General Packet Radio Service
REFERENCE
 Research Gate: https://www.researchgate.net/
 Govinda K and Sai Krishna Prasad K and Sai Ram Susheel 2014 Intrusion detection system for smart
home using laser rays International Journal for Scientific Research & Development (IJSRD)
Karri V and Daniel Lim J S 2005 Method and Device to Communicate via SMS after a Security Intrusion
1st International Conf. on Sensing Technology Palmerston North New Zealand 21-23
Sowjanya G and Nagaraju S 2016 Design and Implementation of Door Access Control and Security
System Based on IoT Inventive Computation Technologies (ICICT), International Conference on Inventive
THANK YOU !

More Related Content

What's hot

Home automation- An Iot application
Home automation- An Iot applicationHome automation- An Iot application
Home automation- An Iot applicationArchana Golhar
 
Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.sayed78
 
Home Automation using IOT
Home Automation using IOTHome Automation using IOT
Home Automation using IOTNaveensing87
 
Presentation slides on Child Tracking System
Presentation slides on Child Tracking SystemPresentation slides on Child Tracking System
Presentation slides on Child Tracking SystemMd Kafiul Islam
 
Home automation system
Home automation systemHome automation system
Home automation systemNaman Gautam
 
Internet of things for Smart Home
Internet of things for Smart Home Internet of things for Smart Home
Internet of things for Smart Home Khwaja Aamer
 
Bluetooth based Home Automation
Bluetooth based Home AutomationBluetooth based Home Automation
Bluetooth based Home AutomationJagannath Kartik
 
Internet of Things (IoT) and its applications
Internet of Things (IoT) and its applicationsInternet of Things (IoT) and its applications
Internet of Things (IoT) and its applicationsSarwan Singh
 
SMART HOME AUTOMATION USING MOBILE APPLICATION
SMART HOME AUTOMATION USING MOBILE APPLICATIONSMART HOME AUTOMATION USING MOBILE APPLICATION
SMART HOME AUTOMATION USING MOBILE APPLICATIONEklavya Sharma
 
Home Automation using Iot
Home Automation using IotHome Automation using Iot
Home Automation using IotRabiya Mustafa
 
Seminar on Home Automation Using Raspberry Pi
Seminar on Home Automation Using Raspberry PiSeminar on Home Automation Using Raspberry Pi
Seminar on Home Automation Using Raspberry PiBittu Kumar
 
Airborne Internet
Airborne InternetAirborne Internet
Airborne InternetLokesh Loke
 
The sixth sense technology seminar
The sixth sense technology seminarThe sixth sense technology seminar
The sixth sense technology seminarRam
 

What's hot (20)

Home automation- An Iot application
Home automation- An Iot applicationHome automation- An Iot application
Home automation- An Iot application
 
Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.
 
Iot based home automation
Iot based home automationIot based home automation
Iot based home automation
 
IoT Home Automation System
IoT Home Automation SystemIoT Home Automation System
IoT Home Automation System
 
Home Automation using IOT
Home Automation using IOTHome Automation using IOT
Home Automation using IOT
 
Home automation with arduino
Home automation with arduinoHome automation with arduino
Home automation with arduino
 
Presentation slides on Child Tracking System
Presentation slides on Child Tracking SystemPresentation slides on Child Tracking System
Presentation slides on Child Tracking System
 
Home automation ppt
Home automation pptHome automation ppt
Home automation ppt
 
Home automation system
Home automation systemHome automation system
Home automation system
 
Presentation on Green IoT
Presentation on Green IoTPresentation on Green IoT
Presentation on Green IoT
 
Internet of things for Smart Home
Internet of things for Smart Home Internet of things for Smart Home
Internet of things for Smart Home
 
Bluetooth based Home Automation
Bluetooth based Home AutomationBluetooth based Home Automation
Bluetooth based Home Automation
 
Internet of Things (IoT) and its applications
Internet of Things (IoT) and its applicationsInternet of Things (IoT) and its applications
Internet of Things (IoT) and its applications
 
SMART HOME AUTOMATION USING MOBILE APPLICATION
SMART HOME AUTOMATION USING MOBILE APPLICATIONSMART HOME AUTOMATION USING MOBILE APPLICATION
SMART HOME AUTOMATION USING MOBILE APPLICATION
 
Home Automation using Iot
Home Automation using IotHome Automation using Iot
Home Automation using Iot
 
Seminar on Home Automation Using Raspberry Pi
Seminar on Home Automation Using Raspberry PiSeminar on Home Automation Using Raspberry Pi
Seminar on Home Automation Using Raspberry Pi
 
Home automation using IOT
Home automation using IOTHome automation using IOT
Home automation using IOT
 
Airborne Internet
Airborne InternetAirborne Internet
Airborne Internet
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
The sixth sense technology seminar
The sixth sense technology seminarThe sixth sense technology seminar
The sixth sense technology seminar
 

Similar to SMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptx

IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET Journal
 
Home security system using internet of things
Home security system using internet of thingsHome security system using internet of things
Home security system using internet of thingspoovarasu maniandan
 
A Review Paper On Intelligent Home Automation Using Goggle Assistant
A Review Paper On Intelligent Home Automation Using Goggle AssistantA Review Paper On Intelligent Home Automation Using Goggle Assistant
A Review Paper On Intelligent Home Automation Using Goggle AssistantSteven Wallach
 
Smart Security System IOT
Smart Security System IOTSmart Security System IOT
Smart Security System IOTijtsrd
 
Integrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internetIntegrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internetTELKOMNIKA JOURNAL
 
Internet of things for the “smart home”
Internet of things for the “smart home”Internet of things for the “smart home”
Internet of things for the “smart home”Virendra Thakur
 
IRJET- A Survey on Secure Protocols of Communication for IoT Components i...
IRJET-  	  A Survey on Secure Protocols of Communication for IoT Components i...IRJET-  	  A Survey on Secure Protocols of Communication for IoT Components i...
IRJET- A Survey on Secure Protocols of Communication for IoT Components i...IRJET Journal
 
IOT Based Smart Home System Technologies
IOT Based Smart Home System TechnologiesIOT Based Smart Home System Technologies
IOT Based Smart Home System TechnologiesIJERDJOURNAL
 
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTEnergy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTIJEACS
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile applicationAlexander Decker
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfKanagarajanSwamiappa
 
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET Journal
 
Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...journalBEEI
 
Smart and Secure Home using IoT
Smart and Secure Home using IoTSmart and Secure Home using IoT
Smart and Secure Home using IoTIRJET Journal
 
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...
IRJET - Safety and Security Aspects of Smart Home Applications using Face...IRJET Journal
 
IRJET - Smart Classroom Automation based on IoT
IRJET -  	  Smart Classroom Automation based on IoTIRJET -  	  Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoTIRJET Journal
 
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET-  	  Design and Implementation of Smart Home Security System based on IoTIRJET-  	  Design and Implementation of Smart Home Security System based on IoT
IRJET- Design and Implementation of Smart Home Security System based on IoTIRJET Journal
 
Home security based on Internet of things Review paper
Home security based on Internet of things Review paperHome security based on Internet of things Review paper
Home security based on Internet of things Review paperIRJET Journal
 
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...Journal Papers
 

Similar to SMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptx (20)

IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
 
Home security system using internet of things
Home security system using internet of thingsHome security system using internet of things
Home security system using internet of things
 
A Review Paper On Intelligent Home Automation Using Goggle Assistant
A Review Paper On Intelligent Home Automation Using Goggle AssistantA Review Paper On Intelligent Home Automation Using Goggle Assistant
A Review Paper On Intelligent Home Automation Using Goggle Assistant
 
Smart Security System IOT
Smart Security System IOTSmart Security System IOT
Smart Security System IOT
 
Integrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internetIntegrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internet
 
Internet of things for the “smart home”
Internet of things for the “smart home”Internet of things for the “smart home”
Internet of things for the “smart home”
 
IRJET- A Survey on Secure Protocols of Communication for IoT Components i...
IRJET-  	  A Survey on Secure Protocols of Communication for IoT Components i...IRJET-  	  A Survey on Secure Protocols of Communication for IoT Components i...
IRJET- A Survey on Secure Protocols of Communication for IoT Components i...
 
IOT Based Smart Home System Technologies
IOT Based Smart Home System TechnologiesIOT Based Smart Home System Technologies
IOT Based Smart Home System Technologies
 
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTEnergy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoT
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile application
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
 
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
 
Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...
 
Smart and Secure Home using IoT
Smart and Secure Home using IoTSmart and Secure Home using IoT
Smart and Secure Home using IoT
 
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
 
IRJET - Smart Classroom Automation based on IoT
IRJET -  	  Smart Classroom Automation based on IoTIRJET -  	  Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoT
 
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET-  	  Design and Implementation of Smart Home Security System based on IoTIRJET-  	  Design and Implementation of Smart Home Security System based on IoT
IRJET- Design and Implementation of Smart Home Security System based on IoT
 
Home security based on Internet of things Review paper
Home security based on Internet of things Review paperHome security based on Internet of things Review paper
Home security based on Internet of things Review paper
 
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
 

More from Maulana Abul Kalam Azad University of Technology (12)

Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT) Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)
 
IOT BASED RFID SMART DOOR LOCK SYSTEM USING NODE MCU - MAJOR.pptx
IOT BASED RFID SMART DOOR LOCK SYSTEM USING NODE MCU - MAJOR.pptxIOT BASED RFID SMART DOOR LOCK SYSTEM USING NODE MCU - MAJOR.pptx
IOT BASED RFID SMART DOOR LOCK SYSTEM USING NODE MCU - MAJOR.pptx
 
Analysis of Algorithm - Binary Search.pptx
Analysis of Algorithm - Binary Search.pptxAnalysis of Algorithm - Binary Search.pptx
Analysis of Algorithm - Binary Search.pptx
 
Interprocess Communication.pptx
Interprocess Communication.pptxInterprocess Communication.pptx
Interprocess Communication.pptx
 
Green house gases & effects
Green house gases & effectsGreen house gases & effects
Green house gases & effects
 
8085 Microprocessor
8085 Microprocessor8085 Microprocessor
8085 Microprocessor
 
Samsung Galaxy S9+
Samsung Galaxy S9+Samsung Galaxy S9+
Samsung Galaxy S9+
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless Technology
 
Normalization in DBMS
Normalization in DBMSNormalization in DBMS
Normalization in DBMS
 
Introduction to manufacturing process
Introduction to manufacturing processIntroduction to manufacturing process
Introduction to manufacturing process
 
Samsung Galaxy S8 Plus
Samsung Galaxy S8 PlusSamsung Galaxy S8 Plus
Samsung Galaxy S8 Plus
 
Robotic Science
Robotic ScienceRobotic Science
Robotic Science
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

SMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptx

  • 1. SMART SECURITY SYSTEM USING IOT Master of Computer Application Departmentof InformationTechnology MaulanaAbul Kalam Azad University of Technology, West Bengal P R E S E N T E D BY : RAUNAK MALLICK ROLL: 10071021038 REG: 211000571010038 G U I D E D BY: DR. JADAV CHANDRA DAS
  • 2. CONTENTS Introduction Motivations Literature Review Proposed Method Block Diagram, Proposed Diagram & Algorithm Requirements Future Scope Conclusion
  • 3. INTRODUCTION  The Internet of Things (IoT) is a network of interconnected physical devices that can communicate and share data without the need for human involvement.  It has been explicitly defined as a “Information Society Infrastructure” because IoT enables us to collect data from various mediums such as humans, animals, vehicles, and kitchen equipment Thus, any physical object that can be assigned an IP address to permit data transfer over a network can be integrated into an IoT system by integrating it with electronic hardware such as sensors, software, and networking gear.
  • 4. MOTIVATIONS  Smart home security makes use of an assortment of IoT-enabled technologies to enable consumers to remotely monitor and manage the security of their houses. These systems can control the monitoring in and around the home, as well as who has access to the doors if they have smart locks.  Home security is a critical component of the Internet of Things. IoT and artificial intelligence are ideal for smart security. Closely monitoring your home has never been easier with CCTV cameras, doorbells, smart lighting, and a variety of other alarm systems.
  • 5. LITERATURE REVIEW  Govinda et al. (2014) explored the Design and Implementation of Security for Smart Homes based on GSM technology, which presents two techniques for implementing home security utilizing IoT [1]. One method is to use web cameras so that if motion is detected by the camera, it sounds an alarm and sends an email to the owner. This method of detecting infiltration is highly effective, if rather costly due to the cost of the cameras used in the process. The cameras must be of high quality, which means they must have a wide range and picture quality high enough to detect movement. Also, moveable cameras, such as dome cameras, are more expensive than fixed cameras.  Karri and Daniel (2005) recommended using internet services to deliver messages or alerts to the house owner instead of traditional SMS.[2] Jayashri and Arvind (2013) created a fingerprint-based authentication method to access a door [3].
  • 6. PROPOSED METHOD  After an in-depth literature review, I am devising a specialized project to create a smart security system. This system provides a fingerprint based authentication to access the door lock. A microcontroller and sensors are utilized to detect unauthorized behavior or any unknown suspicious fingerprint and communicate information about a suspected intruder to the Cloud through the in-house LAN connection.  Additional security measures would be required to deploy the suggested system. Passwords and anti- hacking software, for example, would need to be put in the system to prevent unwanted access to the Cloud-based system.
  • 10. REQUIREMENTS I. Arduino UNO/Raspberry Pi II. PIR Sensor III. Camera Module IV. R307 Fingerprint Reader Optical Sensor Module V. ESP32 (SquadPixel – WiFi, Bluetooth, Dual Core chip development board) VI. OLED Display Module VII. 12V Solenoid Lock
  • 11. FUTURE SCOPE  The proposed system can be improved by  GSM (Call, GPRS)  Video recording surveillance  Install a temperature sensor to keep the organization's temperature stable, and so on.
  • 12. CONCLUSION  This paper describes the design and implementation of a smart home security system with email interaction alert Smart Phone-enabled web and door access system. PC with a low-cost single-chip processor that can perform administrators to obtain parameters of many remote devices can at any time convey control information to field equipment via the Internet.
  • 13. ABBREVATIONS  ECU – Electronic Control Unit  SSH – Secure Shell  IP – Internet Protocol  PIR – Passive Infrared Sensors  GSM – Global System for Mobile Communications  GPRS – General Packet Radio Service
  • 14. REFERENCE  Research Gate: https://www.researchgate.net/  Govinda K and Sai Krishna Prasad K and Sai Ram Susheel 2014 Intrusion detection system for smart home using laser rays International Journal for Scientific Research & Development (IJSRD) Karri V and Daniel Lim J S 2005 Method and Device to Communicate via SMS after a Security Intrusion 1st International Conf. on Sensing Technology Palmerston North New Zealand 21-23 Sowjanya G and Nagaraju S 2016 Design and Implementation of Door Access Control and Security System Based on IoT Inventive Computation Technologies (ICICT), International Conference on Inventive