Submit Search
Upload
Raspberry Pi home security
•
0 likes
•
6 views
AI-enhanced title
IRJET Journal
Follow
https://irjet.net/archives/V7/i2/IRJET-V7I2326.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET Journal
Smart and Secure Home using IoT
Smart and Secure Home using IoT
IRJET Journal
IRJET - Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
IRJET Journal
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
IRJET Journal
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
Barcoding, Inc.
IRJET- Implementation of Smart Surveillance System Based on Bio-Metrics
IRJET- Implementation of Smart Surveillance System Based on Bio-Metrics
IRJET Journal
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET Journal
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET Journal
Recommended
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET Journal
Smart and Secure Home using IoT
Smart and Secure Home using IoT
IRJET Journal
IRJET - Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
IRJET Journal
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
IRJET Journal
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
Barcoding, Inc.
IRJET- Implementation of Smart Surveillance System Based on Bio-Metrics
IRJET- Implementation of Smart Surveillance System Based on Bio-Metrics
IRJET Journal
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET Journal
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET Journal
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET Journal
IRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security Features
IRJET Journal
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET Journal
Security in IoT
Security in IoT
SKS
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
IJSRED
IRJET - Home Security System using Arduino
IRJET - Home Security System using Arduino
IRJET Journal
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
IRJET Journal
Presentation on IOT SECURITY
Presentation on IOT SECURITY
The Avi Sharma
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET Journal
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET Journal
IRJET- An Intelligent Remote Controlled System for Smart Home Automation
IRJET- An Intelligent Remote Controlled System for Smart Home Automation
IRJET Journal
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET Journal
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
IRJET Journal
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET Journal
IRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET Journal
U level asset tracking system
U level asset tracking system
Arron Zhao
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
IRJET Journal
Security in IoT
Security in IoT
gr9293
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) Devices
SanjayKumarYadav58
1 importance of light weight authentication in iot
1 importance of light weight authentication in iot
Chintan Patel
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
IRJET Journal
IRJET- IoT based Home Automation and Smart Security System
IRJET- IoT based Home Automation and Smart Security System
IRJET Journal
More Related Content
What's hot
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET Journal
IRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security Features
IRJET Journal
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET Journal
Security in IoT
Security in IoT
SKS
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
IJSRED
IRJET - Home Security System using Arduino
IRJET - Home Security System using Arduino
IRJET Journal
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
IRJET Journal
Presentation on IOT SECURITY
Presentation on IOT SECURITY
The Avi Sharma
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET Journal
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET Journal
IRJET- An Intelligent Remote Controlled System for Smart Home Automation
IRJET- An Intelligent Remote Controlled System for Smart Home Automation
IRJET Journal
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET Journal
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
IRJET Journal
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET Journal
IRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET Journal
U level asset tracking system
U level asset tracking system
Arron Zhao
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
IRJET Journal
Security in IoT
Security in IoT
gr9293
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) Devices
SanjayKumarYadav58
1 importance of light weight authentication in iot
1 importance of light weight authentication in iot
Chintan Patel
What's hot
(20)
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security Features
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
Security in IoT
Security in IoT
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
IRJET - Home Security System using Arduino
IRJET - Home Security System using Arduino
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
Presentation on IOT SECURITY
Presentation on IOT SECURITY
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- An Intelligent Remote Controlled System for Smart Home Automation
IRJET- An Intelligent Remote Controlled System for Smart Home Automation
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET- Smart Door Security System using Raspberry Pi with Telegram
U level asset tracking system
U level asset tracking system
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
Security in IoT
Security in IoT
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) Devices
1 importance of light weight authentication in iot
1 importance of light weight authentication in iot
Similar to Raspberry Pi home security
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
IRJET Journal
IRJET- IoT based Home Automation and Smart Security System
IRJET- IoT based Home Automation and Smart Security System
IRJET Journal
IRJET - Home Automation for Physically Challenged and Elder People
IRJET - Home Automation for Physically Challenged and Elder People
IRJET Journal
IRJET - Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoT
IRJET Journal
Home Security System based on IOT: A Systematic Alert System
Home Security System based on IOT: A Systematic Alert System
IRJET Journal
IRJET - Smart Door System
IRJET - Smart Door System
IRJET Journal
Home security based on Internet of things Review paper
Home security based on Internet of things Review paper
IRJET Journal
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IRJET Journal
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IRJET Journal
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
IRJET Journal
RealNET – Internet of Things in Everyday Life using Raspberry Pi
RealNET – Internet of Things in Everyday Life using Raspberry Pi
IRJET Journal
IRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking System
IRJET Journal
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET Journal
Comparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi Technology
IRJET Journal
IRJET- IoT and Bigdata Analytics Approach using Smart Home Energy Managem...
IRJET- IoT and Bigdata Analytics Approach using Smart Home Energy Managem...
IRJET Journal
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
IRJET Journal
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET Journal
IRJET- Ambient Reflector– An IoT based Smart Notice Board System
IRJET- Ambient Reflector– An IoT based Smart Notice Board System
IRJET Journal
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured Areas
IRJET Journal
IRJET - IoT based Motor Monitoring System
IRJET - IoT based Motor Monitoring System
IRJET Journal
Similar to Raspberry Pi home security
(20)
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
IRJET- IoT based Home Automation and Smart Security System
IRJET- IoT based Home Automation and Smart Security System
IRJET - Home Automation for Physically Challenged and Elder People
IRJET - Home Automation for Physically Challenged and Elder People
IRJET - Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoT
Home Security System based on IOT: A Systematic Alert System
Home Security System based on IOT: A Systematic Alert System
IRJET - Smart Door System
IRJET - Smart Door System
Home security based on Internet of things Review paper
Home security based on Internet of things Review paper
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
RealNET – Internet of Things in Everyday Life using Raspberry Pi
RealNET – Internet of Things in Everyday Life using Raspberry Pi
IRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking System
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of Thing
Comparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi Technology
IRJET- IoT and Bigdata Analytics Approach using Smart Home Energy Managem...
IRJET- IoT and Bigdata Analytics Approach using Smart Home Energy Managem...
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Ambient Reflector– An IoT based Smart Notice Board System
IRJET- Ambient Reflector– An IoT based Smart Notice Board System
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured Areas
IRJET - IoT based Motor Monitoring System
IRJET - IoT based Motor Monitoring System
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
vipinkmenon1
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
RajaP95
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Recently uploaded
(20)
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Raspberry Pi home security
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1562 Raspberry Pi Based Intelligent Security System Omkar Khaire1, Mihir Sawant2, Shreyas Gangadhar3, Aniket Gamre4 1,2,3,4Student, Department of Electronics Engineering, Atharva College OF Engineering, Mumbai ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Our system focuses on the all-round security of the users keeping their comfort levels intact. We will be using an RFID card and reader for the authorized people who would scan the card and an OTP would be generated automatically and sent to the registered number depending on the RFID number where we would be providing a touch- screen display to enter the OTP. Users would be asked to enter the OTP to unlock the door. For unauthorized people the PIR sensor is used to send the image of the person after waiting for a stipulated time so that the user gets a fair chance to do the needful if he is an authorized person. Once the time is over the camera which is connected to the microcontroller would send the photo of the unauthorized person through the application which we would be developing for the ease of the digitally inclined world. In this application we would provide two administrators per lock who would be having a notification in the application and would get a pop-up which would ask the admin whether to unlock the door for that person or not. Once the decision is made to unlock one more pop-up would come up to confirm their decision and if it's again granted then the door would be unlocked else the door remains locked. This would not just level up the security of the place but also the level of comfort for the users. Key Words: Home Security, IoT, Raspberry Pi, Real- Time Security 1. INTRODUCTION The Internet of things (IoT) is one of the growing features in modern technology. IoT enables us to control various physical devices through the use of software. That means access to any connected device irrespective of place and time. As the passage of time, Internet of Things (IoT) has matured and evolved into a comprehensive system encompassing wireless networks, internet, embedded system and with further development AI and ML can also be integrated in it. In its most practical form, IoT, in the rapid orchestration of messages across objects in the Internet, allows objects sharing using remote accessibility across existing network organization. Practically IoT is through the use of internet infrastructure to share objects or packets of data via the internet thus enabling the remote aspect of IoT. This helps achieve better productivity, accuracy and economic benefit at the cost of human involvement. A Passive Infrared (PIR) sensor works by sensing variations in the amount of infrared radiation impacting upon it, which varies depending on the temperature and surface characteristics of the objects in front of the sensor. When an object, like an individual, passes ahead of the background, like a wall, the temperature at that time within the sensor's field of view will rise from room temperature due to blood being at a different temperature than the room and will fall back when the person passes the field of vision. The change is detected by the sensor and an output voltage is generated. Each object has a distinct infrared emission pattern based on the surface characteristics irrespective of the temperature. Smart security system using IoT with PIR sensor and camera module is an interesting idea to involve detection of sensing of the moving objects. This system can be integrated along with a lock system consisting of a RFID system to generate a one-time password that can be used to control the lock. The security is increased due to multiple layers of authentication thus increasing the security. Thus, surveillance systems can also be used as a security system. 2. LITERATURE REVIEW Home based IoT automation and Surveillance System using Internet of Things are some major applications in the current world. It is used to analyse and collect the information from the various sensors and actuators and it then sends the data to the user over a wireless connection. Security is an imperative issue nowadays as the opportunity for intrusions is growing. In this paper, the proposed system is designed on Raspberry Pi 3B. The Raspberry Pi 3B is interfaced with a door strike to control the door lock and also a camera is connected to the Raspberry Pi- 3B Board. Nowadays people use technology to automate their tasks. Cameras present in particular places are greatly helpful, as users can monitor the feed and record video. The sensors automate the task of alerting the user via mail, mobile applications and various software’s. Since, the sensors can be used to detect activity and perform predetermined tasks. The task can be ranging from simple in nature to complex tasks [1]. Next generation appliances are developed with the thought of automation in consideration. Sensors can sense the temperature, gas leakage, humidity, light etc. increasing functional abilities to include smart alarm systems, and controlling the household appliances from a remote location. These systems are specially designed for home automation with some increased functionalities and using Internet connection protocol i.e. Wi-Fi as a connecting link between the device and the user [2].
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1563 3. BLOCK DIAGRAM Block Diagram of the System The main operating block of the system is Raspberry Pi 3B as it is the main controller of the system. The system consists of many devices. The RFID Scanner is used to identify the user. The Display acts as a user interface of the system. The PIR Sensor is used to detect motion and the camera is used to capture the detected motion. When the correct passcode is entered into the system the door is unlocked via the relay. Fig 1. Raspberry Pi 3B Fig 2. Raspberry Pi Display Fig 3. Raspberry Pi Camera Fig 4. PIR Sensor Fig 5. RFID Reader and Tags Fig 6. Relay 4. WORKING The PIR Sensor used in the project gets activated when it detects motion when the amount of infrared radiation impacting on the sensor varies. A timer of 60 seconds gets
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1564 activated upon the activation of the PIR Sensor. And the camera starts recording until the timer reaches 0. If no RFID input is detected the user is alerted of possible intrusion. If RFID input is detected the recording stops after 60 seconds and is stored in the database. Each RFID Tag is distinct for each user. The user inputs its user specific password as doing such the user can be identified. After giving the correct password to the system an OTP is generated and sent to the user registered mobile number to increase security. After the OTP is entered correctly the relay gets activated and the door is unlocked. 5. FLOWCHART Flowchart 1
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1565 Flowchart 2 6. CONCLUSION This system can be used to increase home security next level, since this method is cost effective and highly reliable. This system can be implemented in a real-time environment. This system can reduce human intervention and it is an effective solution to real-time security. 7. REFERENCES [1] Manali Chaudhary and Srinu Dharvath, “Study of Smart Sensors and their Applications”, International Journal of Advanced Research in Computer and Communication Engineering, January 2014. [2] Swapna Badabaji and Dr. V Siva Nagaraju,” An IoT Based Smart Home Service System”, International Journal of Pure and Applied Mathematics,2018 [3] S. Kaliappan, A. Ezhilarasi, S. Abhianaya Priya, N. J. Nivetha, “Embedded System Based Home Security Surveillance using Raspberry PI”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), December 2018.
Download now