This document describes a smart household touch sensitive locker security system based on GSM technology. The system includes a handcrafted touch sensitive box connected to a microcontroller. If an unauthorized user touches the box, an alarm system is activated and an SMS is sent to the property holder via a GSM module. The system aims to provide reliable security, easy installation and portability without needing internet connection once programmed. The design combines a microcontroller with a GSM module to monitor the security system and send alerts when the touch sensitive box is activated by unexpected contact.
Integrated smart door system in apartment room based on internetTELKOMNIKA JOURNAL
Internet of Things (IoT) is technology which provides communication between machines without
human intervention. There are many applications that implement IoT technology e.g. smart power, smart
home, transportation management, and smart city. This paper proposes the usage of IoT to develop
electronic key that can help to improve the security in apartment. Electronic key uses Android smart phone
to access and control the door. Electronic key uses Raspberry pii, motor DC, webcam, microswitch, and
Arduino GSM. Raspberry is used to get command from server and instruct the Arduino GSM to open or
close the door and webcam is used to take picture from the environment for documentation. This research
uses three steps to verify the user who want to open or close the door i.e. using username and password,
bluetooth, and QR code scanner.
Smart security door system using SMS based energy harvestIJECEIAES
Over the last decade, different studies have been conducted to increase security to identify sensor technology and provide alternative energy with other energy harvest techniques such as vibration energy harvester and sun energy harvester. There is no combinational approach to utilize the door to create energy and use it for security measures in the literature, making our system different and unique. This proposed system comprises the security and the energy harvest; the security section utilizes a motion detector sensor to detect intruders. For instance, the magnetic door lock type firmly locks the door, which can only open with a generated password. On the other side, the energy harvest section utilizes the door motion to generate electricity for the system, which solves power shortage and limited battery life issues. Moreover, this study includes a GSM module that allows authorized owners to receive a generated password as a security enhancement. This design mainly focuses on improving or optimizing the conventional security doors' overall performance as sliding door, panel door, or revolving door. The experimental results show the system efficiency in terms of power generation and the time needed to authenticate the property owner. Notably, the power generator can generate electricity more rapidly, while the needed time to receive the mobile device's security code is around 3.6 seconds.
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...IRJET Journal
This document discusses security issues surrounding the Internet of Things (IoT). It begins with an introduction to IoT, describing how everyday devices are becoming interconnected. It then discusses some key security challenges for IoT, including limitations of IoT hardware and software, network issues, and different types of attacks. The document analyzes the components of an IoT network and how they work together. It identifies specific security problems related to hardware limitations, software limitations, networks, and protocols. Finally, it outlines security requirements for IoT and concludes that further research is still needed to address open security challenges.
Development of wireless and intelligent home automation systemTELKOMNIKA JOURNAL
The Intelligent Home Automation System (IHAS) is usually a cell phone web-based application that enables end users in order to keep track of in addition to manage home/office appliance using their mobile system. The main objective of this system is developed to facilitate home users, especially domestic electrical appliances with simple controls. In addition, it can save the cost of electricity for lighting can be controlled to suit the user. Generally, most home appliances controlled from a distance using a remote control. Has created a system for controlling home lighting from a certain distance, which replaces the remote control using mobile smartphone. To make the smartphone to function as a remote control, an application was developed using Android technology. App Inventor software used for designing applications intended. Hardware microcontroller Arduino UNO R3 which is used to connect the smartphone to the electrical equipment. The system has been tested by developing a mini model and take into account the situation in the domestic home. The test is based on the level of control for wirelessly using Bluetooth and the distance between the lamp and the smartphone. The results of this test, the system can be used on equipment or other home appliances for the purpose of controlling or adjustment. In addition, the security system was also highlighted in a typical system, using the global system for mobile (GSM), it can be warned and notified to the consumer where there is a gas leak or the presence of a person in the vicinity of the residence.
IRJET - Android based Secure and Smart Home Application using IoTIRJET Journal
This document proposes an Android-based smart home application that uses Internet of Things (IoT) technology to remotely control home security and appliances. The system uses a central raspberry pi device connected to the internet to communicate with sensors and devices in the home. An Android application allows authorized users to monitor and control the home security system and devices from anywhere. The system aims to provide an affordable and expandable smart home solution that improves security and allows remote control and automation of home functions and appliances.
This document describes the design and implementation of a security system for banks using voice recognition. The system uses a voice acknowledgment module placed at the gate of bank lockers to recognize authorized users based on their voice frequency response. The module can be programmed to allow two users for greater flexibility. A smart camera is used to monitor activity in the building for safety and security purposes. All sensors are controlled by an Arduino board. The system provides greater security than traditional key-based systems and only allows valid individuals to access lockers using a password for protection. It was concluded that the voice recognition security system was successful in providing improved bank locker security.
A Study on Device Oriented Security Challenges in Internet of Things (IoT)Eswar Publications
Internet of Things (IoT) basically discusses about the connection of various physical devices through a network
and let them take an active part by exchanging information through Internet. This paper presents important applications of IoT and the different challenges of IoT. Out of the various challenges, attacks on the devices used in IoT are of serious concern. Device oriented attacks and the defensive mechanisms are studied in this paper. A comparison is done for the specific malicious attacks on the M2M communicating devices.
This document discusses challenges and techniques for securing Internet of Things (IoT) architecture. It begins with an introduction to IoT and outlines key challenges including privacy, security, scalability, and connectivity issues that arise from the large number of interconnected devices. The document then reviews literature on techniques for securing IoT, such as using network function virtualization (NFV) and information-centric networking (ICN). It describes several proposed secure IoT architectures in detail and compares different approaches. The document concludes by discussing future directions for securing IoT architecture.
Integrated smart door system in apartment room based on internetTELKOMNIKA JOURNAL
Internet of Things (IoT) is technology which provides communication between machines without
human intervention. There are many applications that implement IoT technology e.g. smart power, smart
home, transportation management, and smart city. This paper proposes the usage of IoT to develop
electronic key that can help to improve the security in apartment. Electronic key uses Android smart phone
to access and control the door. Electronic key uses Raspberry pii, motor DC, webcam, microswitch, and
Arduino GSM. Raspberry is used to get command from server and instruct the Arduino GSM to open or
close the door and webcam is used to take picture from the environment for documentation. This research
uses three steps to verify the user who want to open or close the door i.e. using username and password,
bluetooth, and QR code scanner.
Smart security door system using SMS based energy harvestIJECEIAES
Over the last decade, different studies have been conducted to increase security to identify sensor technology and provide alternative energy with other energy harvest techniques such as vibration energy harvester and sun energy harvester. There is no combinational approach to utilize the door to create energy and use it for security measures in the literature, making our system different and unique. This proposed system comprises the security and the energy harvest; the security section utilizes a motion detector sensor to detect intruders. For instance, the magnetic door lock type firmly locks the door, which can only open with a generated password. On the other side, the energy harvest section utilizes the door motion to generate electricity for the system, which solves power shortage and limited battery life issues. Moreover, this study includes a GSM module that allows authorized owners to receive a generated password as a security enhancement. This design mainly focuses on improving or optimizing the conventional security doors' overall performance as sliding door, panel door, or revolving door. The experimental results show the system efficiency in terms of power generation and the time needed to authenticate the property owner. Notably, the power generator can generate electricity more rapidly, while the needed time to receive the mobile device's security code is around 3.6 seconds.
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...IRJET Journal
This document discusses security issues surrounding the Internet of Things (IoT). It begins with an introduction to IoT, describing how everyday devices are becoming interconnected. It then discusses some key security challenges for IoT, including limitations of IoT hardware and software, network issues, and different types of attacks. The document analyzes the components of an IoT network and how they work together. It identifies specific security problems related to hardware limitations, software limitations, networks, and protocols. Finally, it outlines security requirements for IoT and concludes that further research is still needed to address open security challenges.
Development of wireless and intelligent home automation systemTELKOMNIKA JOURNAL
The Intelligent Home Automation System (IHAS) is usually a cell phone web-based application that enables end users in order to keep track of in addition to manage home/office appliance using their mobile system. The main objective of this system is developed to facilitate home users, especially domestic electrical appliances with simple controls. In addition, it can save the cost of electricity for lighting can be controlled to suit the user. Generally, most home appliances controlled from a distance using a remote control. Has created a system for controlling home lighting from a certain distance, which replaces the remote control using mobile smartphone. To make the smartphone to function as a remote control, an application was developed using Android technology. App Inventor software used for designing applications intended. Hardware microcontroller Arduino UNO R3 which is used to connect the smartphone to the electrical equipment. The system has been tested by developing a mini model and take into account the situation in the domestic home. The test is based on the level of control for wirelessly using Bluetooth and the distance between the lamp and the smartphone. The results of this test, the system can be used on equipment or other home appliances for the purpose of controlling or adjustment. In addition, the security system was also highlighted in a typical system, using the global system for mobile (GSM), it can be warned and notified to the consumer where there is a gas leak or the presence of a person in the vicinity of the residence.
IRJET - Android based Secure and Smart Home Application using IoTIRJET Journal
This document proposes an Android-based smart home application that uses Internet of Things (IoT) technology to remotely control home security and appliances. The system uses a central raspberry pi device connected to the internet to communicate with sensors and devices in the home. An Android application allows authorized users to monitor and control the home security system and devices from anywhere. The system aims to provide an affordable and expandable smart home solution that improves security and allows remote control and automation of home functions and appliances.
This document describes the design and implementation of a security system for banks using voice recognition. The system uses a voice acknowledgment module placed at the gate of bank lockers to recognize authorized users based on their voice frequency response. The module can be programmed to allow two users for greater flexibility. A smart camera is used to monitor activity in the building for safety and security purposes. All sensors are controlled by an Arduino board. The system provides greater security than traditional key-based systems and only allows valid individuals to access lockers using a password for protection. It was concluded that the voice recognition security system was successful in providing improved bank locker security.
A Study on Device Oriented Security Challenges in Internet of Things (IoT)Eswar Publications
Internet of Things (IoT) basically discusses about the connection of various physical devices through a network
and let them take an active part by exchanging information through Internet. This paper presents important applications of IoT and the different challenges of IoT. Out of the various challenges, attacks on the devices used in IoT are of serious concern. Device oriented attacks and the defensive mechanisms are studied in this paper. A comparison is done for the specific malicious attacks on the M2M communicating devices.
This document discusses challenges and techniques for securing Internet of Things (IoT) architecture. It begins with an introduction to IoT and outlines key challenges including privacy, security, scalability, and connectivity issues that arise from the large number of interconnected devices. The document then reviews literature on techniques for securing IoT, such as using network function virtualization (NFV) and information-centric networking (ICN). It describes several proposed secure IoT architectures in detail and compares different approaches. The document concludes by discussing future directions for securing IoT architecture.
IRJET- A Survey on Secure Protocols of Communication for IoT Components i...IRJET Journal
This document summarizes a survey on secure communication protocols for Internet of Things (IoT) components in smart homes. It discusses how current smart home systems have security and privacy issues in their communication. The document proposes an improved energy-efficient, secure and privacy-preserving communication protocol for smart homes. The protocol uses encrypted codes with secret keys generated by the system to secure data transmission. It also incorporates Message Authentication Codes to guarantee data integrity and authenticity. Finally, the document reviews several related works on smart home systems and communication protocols.
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...IRJET Journal
This document describes a home appliance controlling and monitoring system using an IoT mobile application. The system allows users to control home appliances like fans, lights, and AC remotely via an Android app connected to a microcontroller over WiFi. Sensors like a DHT11 temperature and humidity sensor are connected to the microcontroller to monitor environmental conditions. The microcontroller is programmed to connect to the local WiFi router and send messages to the Android app. Relays connect appliances to the microcontroller so they can be turned on/off remotely. The system provides convenience, energy savings, and increased home security by allowing remote monitoring and control of appliances via a mobile device connected to the IoT network.
The document discusses security issues related to the growing number of Internet of Things (IoT) devices. It summarizes several papers related to IoT security and proposes solutions. Specifically:
- The large number of interconnected IoT devices from different technologies and networks poses security and privacy risks as they can be hacked more easily.
- Some proposed solutions discussed include consumer security indexes to help consumers identify more secure devices, on-demand security configurations to enable security functions when needed, and information sharing systems to collect and analyze security-related information.
- Other proposals examined are using blockchain technology, intelligent monitoring systems in vehicles, physical unclonable functions for authentication, and remote security management servers to improve IoT device security
IRJET - Cyber Security Threats and Vulnerabilities in IoTIRJET Journal
This document summarizes cyber security threats and vulnerabilities in the Internet of Things (IoT). It discusses how the growth of interconnected devices in IoT introduces new cyber security risks. Various types of attacks that threaten IoT systems are described, such as device attacks, network attacks, and denial of service attacks. The document also examines specific vulnerabilities in IoT protocols, firmware, and applications that can enable these attacks. Finally, some potential countermeasures for improving IoT security are mentioned, like implementing secure boot processes, mutual authentication between devices, and end-to-end encryption of communications.
With rapid growth of science and information technology, Internet of things (IoT) becomes as an integral part of daily life. The applications of IoT are expanded starting from connected cars, wearables, connected health, smart retail and healthcare. However, security issues are increasing with the increase of its use. Lack of compliances on the part of IoT manufacturers, lack of user knowledge and awareness, device update and management, lack of physical hardening and botnet attacks are considered as the major reasons for security issues in IoT based applications. In this aspect, it becomes important to analyze security issues involved with IoT and its impact on the users that has been performed in the present study
IRJET- Smart Home Monitoring and Security SystemIRJET Journal
This document summarizes a smart home monitoring and security system project that was developed using a Raspberry Pi. The system uses sensors like PIR, DHT11 connected to the Raspberry Pi to detect things like motion and temperature. A Pi camera is also used to detect human faces. The system sends alerts via email or SMS if any unauthorized activity is detected while the home is empty. The project aims to remotely control and monitor home devices and maximize home security using wireless connectivity through the Raspberry Pi microcontroller.
IRJET-Smart Home Automation System using Mobile ApplicationIRJET Journal
This document describes a smart home automation system that uses a mobile application and Bluetooth technology. The system allows users to control home appliances remotely from their smartphones. It uses an Arduino board connected to home appliances via relays. The Arduino board communicates with a mobile app over Bluetooth. Users can turn appliances on and off by pressing buttons in the app. Sensors like PIR and ultrasonic are used to provide additional automation and convenience features. The system aims to provide a low-cost, user-friendly way to remotely control home devices.
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...Mehraj U Din
This document describes a smart home automation and security system using GSM and an ARM7 microcontroller. The system allows users to remotely control and monitor home appliances and security sensors via text messages. It includes sensors to detect temperature, humidity, light levels, infrared motion, and LPG gas leaks. Appliances like fans, lights, and a cooler can be automatically controlled based on sensor readings. Security features include CCTV activation, alarms for gas leaks or intrusions, and an emergency help button for elderly residents. The system provides energy savings and peace of mind by allowing remote home monitoring and control through a mobile phone.
IRJET- Home Automation using IoT: ReviewIRJET Journal
This document summarizes research on using Internet of Things (IoT) technology for home automation and security. It discusses how IoT allows devices in the home to be controlled remotely through a smartphone app and can automate tasks. The document also reviews different approaches others have taken to implement smart home security systems using sensors and microcontrollers connected to the Internet. It describes the typical architecture of an IoT system including sensor, network, and application layers. Finally, it summarizes several research papers on developing smart home and kitchen monitoring systems using technologies like Arduino, Raspberry Pi, and sensors for functions like detecting fires, gas leaks, and intruders.
Development of web-based surveillance system for Internet of Things (IoT) app...journalBEEI
With the advancement of wireless technology, our dependency on smart system has increases to a higher level than before. Without doubt, integration between different technologies becomes inevitable in order create affordable surveillance system. This paper presents the development of with web-based surveillance system with a dedicated Android-based mobile application using a Raspberry Pi and its supporting components i.e., Pi-Camera, PIR motion sensor, Ultrasonic sensor, web-based & mobile application. The designed system also utilizes Node-Red development tools as the platform to integrate all components of the system, MQTT as the communication protocol for data acquisition and ThingSpeak as the middleware. The proposed system can be implemented over the internet using any computer and mobile devices, at anywhere and anytime. The system can automatically stream live video viewed from the Android mobile application and the Raspberry Pi device can send an alert notification to users via email and SMS. The system can be one possible features in smart home system and is considered as an affordable solution, customizable and easy to implement in comparison with other commercial surveillance system products such as CCTV or IP Camera
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...journalBEEI
Internet-of-Things or IoT technology becomes essential in everyday lives. The risk of security and privacy towards IoT devices, especially smarthomes IoT gateway device, becoming apparent as IoT technology progressed. The need for affordable, secure smarthome gateway device or router that smarthome user prefer. The problem of low-performance smarthome gateways was running security programs on top of smarthome gateway programs. This problem motivates the researcher designing a secure and efficient smarthome gateway using Raspberry Pi hardware as an affordable smarthome gateway device and able to run both smarthome gateways and security programs. In this research, researchers implemented snort as intrusion detection system (IDS), openHab as IoT gateway applications, and well-known encryption algorithms for file encryption in Raspberry PI 3B+ model. The researcher evaluated Snort capability on network attacks and compared each of the well-known encryption algorithm efficiency. From the result, we found Rasefiberry customized snort configuration for Raspberry pi 60 percent of the simulated network attacks. Twofish encryption algorithms were found to have best encryption time, throughput, and power consumption compared to other encryption algorithms in the research. Rasefiberry architecture successfully processes both lightweight security programs and Openhab smarthome gateway programs with a lowperformance computing device such as Raspberry Pi.
IRJET- Smart Home Automation using IoT with Security FeaturesIRJET Journal
This document summarizes a research paper on designing a smart home automation system using IoT with security features. The proposed system uses an Arduino board connected to various sensors and appliances via relays to allow remote control and monitoring via a mobile app and cloud server. Security features like motion detection, alarms, and cameras are included to monitor the home remotely. The system is designed to be low cost while providing flexibility and security in controlling devices within the home using WiFi and password protection.
This document provides an overview of IoT security. It begins with defining IoT and describing how physical objects are connected to the internet. It then discusses current IoT usage and forecasts significant future growth. The document outlines several IoT security risks and vulnerabilities, such as insecure interfaces, lack of encryption, and poor physical security. It recommends best practices for IoT security including implementing device and user authentication, access controls, encryption, and regular software updates. Overall the document introduces the topic of IoT security and some foundational aspects to address related risks.
This document describes an electronic doorbell system that uses a keypad and GSM for home security. The system consists of a doorbell connected to a microcontroller that triggers a GSM module to send an SMS to the homeowner when the doorbell is pressed. The homeowner can then respond via button press to open the door, or a message will be displayed if they do not respond. An authorized person can enter a password on the keypad, and if multiple wrong passwords are entered, a message will be sent to the homeowner about a potential burglary attempt. The system aims to provide notification to homeowners and prevent unauthorized access through use of passwords and messaging capabilities.
IRJET- Design and Implementation of Smart Home Security System based on IoTIRJET Journal
The document summarizes a research paper on the design and implementation of a smart home security system using IoT. The proposed system uses fingerprint biometrics, a keypad, and a Wi-Fi app to control a door lock and provide access only to authorized individuals. An emergency alarm protects the system from unauthorized intruders. The system is accessed through different authentication methods and notifications are provided to users on who is entering and exiting the home. The smart lock allows convenient and secure access while monitoring activity and integrating with other smart devices in the home automation system.
This document discusses cryptography and security implementations for Internet of Things (IoT) devices. It begins with an introduction to IoT and the need for security protocols as IoT devices collect and transmit large amounts of sensitive data. Challenges to IoT security include the diversity of devices which makes vulnerabilities complex, and limited computational resources. The document then explores using symmetric and public key cryptography algorithms as well as proposed lightweight cryptography solutions for IoT security. It concludes that while traditional security solutions are inadequate, lightweight cryptography protocols have the potential to help secure IoT communications and address current challenges if standardized for diverse IoT hardware.
This document provides an introduction to IoT security. It discusses key components of IoT including sensors, actuators, microcontrollers, communication capabilities, and identification. The document outlines the ITU-T IoT reference model and describes security challenges at different levels including devices, fog networks, core networks, and data centers. It also discusses common IoT security issues such as unpredictable behavior, device similarity, problematic deployments, lack of upgrades, and lack of transparency. Finally, the document summarizes common IoT security tools including encryption, passwords, hardware security modules, two-factor authentication, and public key infrastructure certificates.
Intellectual Bank Locker Security SystemIJERA Editor
In today's modern world, security plays an important role. Every person has precious accessories like gold,
documents or cash. The main goal of this project is to design and implement a bank locker security system
based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and
provides advanced security. In this system, only authentic persons can recover money or accessories from bank
locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches,
then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door
will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The
sensors will be active during night times to provide security against thefts.
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
When Internet of Things (IoT) applications become a part of people’s daily life, security issues in IoT have caught substantial attention in both academia and industry. Compared to traditional computing systems, IoT systems have more inherent vulnerabilities, and in the intervening time, could have higher security requirements. However, the current design of IoT does not successfully address the higher security requirements postured by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to defend this emerging system. This paper purposes to examine security challenges resulted from the special characteristics of the IoT systems and the new features of the IoT applications. This could help pave the road to better security solution design. Furthermore, three architectural security designs are suggested and analyzed. Examples of how to implement these designs are discussed. Finally, for each layer in IoT architecture, open issues are also identified.
Smart Home Security and Intrusion Detection Systemijtsrd
Conventional security systems which are the very common form of protection to lives and properties, have certain limitations such as real time monitoring and control of activities such as intruders in the form of human beings, fire, smoke, et cetera. These limitations in most cases result in high financial loss to properties and lives. This work involves the design and construction of GSM intelligent home security system for real time monitoring of different forms of intrusion. It consist of intrusion detection sensors, pressure, Smoke Fire, Gas and PIR motion , wireless sensors, programmable microcontroller in embedded C language, regulated power supply unit, proteus circuit simulator , relays, GSM modem, mobile phone, data acquisition node and an interface program development. The design calculation and analysis was carried out before it was modelled, simulated in proteus electronic simulator environment. When the PIR finds intruders in form of variation in temperature, gas leakage, pressure , the relevant sensing device s respond and the microcontroller sends encoded alarm signal to the wireless sensor network established in home. The moment the alarm signal is received, it will send alarm short message to the users owners of the building through GSM network immediately. The design analysis and calculations were carried out and finally, a positive result was achieved. Usiade, Rex Ehiedum | Adeoye, Olayode Semiu "Smart Home Security and Intrusion Detection System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-7 , December 2022, URL: https://www.ijtsrd.com/papers/ijtsrd52543.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/52543/smart-home-security-and-intrusion-detection-system/usiade-rex-ehiedum
Design and realization of motion detector system for house securityTELKOMNIKA JOURNAL
In this paper, the design and realization of motion detector system for house security based GSM
network is presents. The development of microcontroller carried out intruder detection that supports
tracking techniques to provide vital security with control and alert operation inside and outside the home.
The pivot of security on the integration the motion detector and cameras into web applications has become
more interested. The smart surveillance Pi camera obtain the input from the motion detector and controller
which is send the video to the web server allowing the homeowner to access this video by use web
applications. An intrusion alert send to the owner by mean of message via mobile and buzzers alarms
located at suitable distance. This system is typify proficient video camera for remote sensing and tracking
with live video for succeeding play again to offers efficient and easy implementation with omnipresent
surveillance solution.
IRJET- A Survey on Secure Protocols of Communication for IoT Components i...IRJET Journal
This document summarizes a survey on secure communication protocols for Internet of Things (IoT) components in smart homes. It discusses how current smart home systems have security and privacy issues in their communication. The document proposes an improved energy-efficient, secure and privacy-preserving communication protocol for smart homes. The protocol uses encrypted codes with secret keys generated by the system to secure data transmission. It also incorporates Message Authentication Codes to guarantee data integrity and authenticity. Finally, the document reviews several related works on smart home systems and communication protocols.
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...IRJET Journal
This document describes a home appliance controlling and monitoring system using an IoT mobile application. The system allows users to control home appliances like fans, lights, and AC remotely via an Android app connected to a microcontroller over WiFi. Sensors like a DHT11 temperature and humidity sensor are connected to the microcontroller to monitor environmental conditions. The microcontroller is programmed to connect to the local WiFi router and send messages to the Android app. Relays connect appliances to the microcontroller so they can be turned on/off remotely. The system provides convenience, energy savings, and increased home security by allowing remote monitoring and control of appliances via a mobile device connected to the IoT network.
The document discusses security issues related to the growing number of Internet of Things (IoT) devices. It summarizes several papers related to IoT security and proposes solutions. Specifically:
- The large number of interconnected IoT devices from different technologies and networks poses security and privacy risks as they can be hacked more easily.
- Some proposed solutions discussed include consumer security indexes to help consumers identify more secure devices, on-demand security configurations to enable security functions when needed, and information sharing systems to collect and analyze security-related information.
- Other proposals examined are using blockchain technology, intelligent monitoring systems in vehicles, physical unclonable functions for authentication, and remote security management servers to improve IoT device security
IRJET - Cyber Security Threats and Vulnerabilities in IoTIRJET Journal
This document summarizes cyber security threats and vulnerabilities in the Internet of Things (IoT). It discusses how the growth of interconnected devices in IoT introduces new cyber security risks. Various types of attacks that threaten IoT systems are described, such as device attacks, network attacks, and denial of service attacks. The document also examines specific vulnerabilities in IoT protocols, firmware, and applications that can enable these attacks. Finally, some potential countermeasures for improving IoT security are mentioned, like implementing secure boot processes, mutual authentication between devices, and end-to-end encryption of communications.
With rapid growth of science and information technology, Internet of things (IoT) becomes as an integral part of daily life. The applications of IoT are expanded starting from connected cars, wearables, connected health, smart retail and healthcare. However, security issues are increasing with the increase of its use. Lack of compliances on the part of IoT manufacturers, lack of user knowledge and awareness, device update and management, lack of physical hardening and botnet attacks are considered as the major reasons for security issues in IoT based applications. In this aspect, it becomes important to analyze security issues involved with IoT and its impact on the users that has been performed in the present study
IRJET- Smart Home Monitoring and Security SystemIRJET Journal
This document summarizes a smart home monitoring and security system project that was developed using a Raspberry Pi. The system uses sensors like PIR, DHT11 connected to the Raspberry Pi to detect things like motion and temperature. A Pi camera is also used to detect human faces. The system sends alerts via email or SMS if any unauthorized activity is detected while the home is empty. The project aims to remotely control and monitor home devices and maximize home security using wireless connectivity through the Raspberry Pi microcontroller.
IRJET-Smart Home Automation System using Mobile ApplicationIRJET Journal
This document describes a smart home automation system that uses a mobile application and Bluetooth technology. The system allows users to control home appliances remotely from their smartphones. It uses an Arduino board connected to home appliances via relays. The Arduino board communicates with a mobile app over Bluetooth. Users can turn appliances on and off by pressing buttons in the app. Sensors like PIR and ultrasonic are used to provide additional automation and convenience features. The system aims to provide a low-cost, user-friendly way to remotely control home devices.
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...Mehraj U Din
This document describes a smart home automation and security system using GSM and an ARM7 microcontroller. The system allows users to remotely control and monitor home appliances and security sensors via text messages. It includes sensors to detect temperature, humidity, light levels, infrared motion, and LPG gas leaks. Appliances like fans, lights, and a cooler can be automatically controlled based on sensor readings. Security features include CCTV activation, alarms for gas leaks or intrusions, and an emergency help button for elderly residents. The system provides energy savings and peace of mind by allowing remote home monitoring and control through a mobile phone.
IRJET- Home Automation using IoT: ReviewIRJET Journal
This document summarizes research on using Internet of Things (IoT) technology for home automation and security. It discusses how IoT allows devices in the home to be controlled remotely through a smartphone app and can automate tasks. The document also reviews different approaches others have taken to implement smart home security systems using sensors and microcontrollers connected to the Internet. It describes the typical architecture of an IoT system including sensor, network, and application layers. Finally, it summarizes several research papers on developing smart home and kitchen monitoring systems using technologies like Arduino, Raspberry Pi, and sensors for functions like detecting fires, gas leaks, and intruders.
Development of web-based surveillance system for Internet of Things (IoT) app...journalBEEI
With the advancement of wireless technology, our dependency on smart system has increases to a higher level than before. Without doubt, integration between different technologies becomes inevitable in order create affordable surveillance system. This paper presents the development of with web-based surveillance system with a dedicated Android-based mobile application using a Raspberry Pi and its supporting components i.e., Pi-Camera, PIR motion sensor, Ultrasonic sensor, web-based & mobile application. The designed system also utilizes Node-Red development tools as the platform to integrate all components of the system, MQTT as the communication protocol for data acquisition and ThingSpeak as the middleware. The proposed system can be implemented over the internet using any computer and mobile devices, at anywhere and anytime. The system can automatically stream live video viewed from the Android mobile application and the Raspberry Pi device can send an alert notification to users via email and SMS. The system can be one possible features in smart home system and is considered as an affordable solution, customizable and easy to implement in comparison with other commercial surveillance system products such as CCTV or IP Camera
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...journalBEEI
Internet-of-Things or IoT technology becomes essential in everyday lives. The risk of security and privacy towards IoT devices, especially smarthomes IoT gateway device, becoming apparent as IoT technology progressed. The need for affordable, secure smarthome gateway device or router that smarthome user prefer. The problem of low-performance smarthome gateways was running security programs on top of smarthome gateway programs. This problem motivates the researcher designing a secure and efficient smarthome gateway using Raspberry Pi hardware as an affordable smarthome gateway device and able to run both smarthome gateways and security programs. In this research, researchers implemented snort as intrusion detection system (IDS), openHab as IoT gateway applications, and well-known encryption algorithms for file encryption in Raspberry PI 3B+ model. The researcher evaluated Snort capability on network attacks and compared each of the well-known encryption algorithm efficiency. From the result, we found Rasefiberry customized snort configuration for Raspberry pi 60 percent of the simulated network attacks. Twofish encryption algorithms were found to have best encryption time, throughput, and power consumption compared to other encryption algorithms in the research. Rasefiberry architecture successfully processes both lightweight security programs and Openhab smarthome gateway programs with a lowperformance computing device such as Raspberry Pi.
IRJET- Smart Home Automation using IoT with Security FeaturesIRJET Journal
This document summarizes a research paper on designing a smart home automation system using IoT with security features. The proposed system uses an Arduino board connected to various sensors and appliances via relays to allow remote control and monitoring via a mobile app and cloud server. Security features like motion detection, alarms, and cameras are included to monitor the home remotely. The system is designed to be low cost while providing flexibility and security in controlling devices within the home using WiFi and password protection.
This document provides an overview of IoT security. It begins with defining IoT and describing how physical objects are connected to the internet. It then discusses current IoT usage and forecasts significant future growth. The document outlines several IoT security risks and vulnerabilities, such as insecure interfaces, lack of encryption, and poor physical security. It recommends best practices for IoT security including implementing device and user authentication, access controls, encryption, and regular software updates. Overall the document introduces the topic of IoT security and some foundational aspects to address related risks.
This document describes an electronic doorbell system that uses a keypad and GSM for home security. The system consists of a doorbell connected to a microcontroller that triggers a GSM module to send an SMS to the homeowner when the doorbell is pressed. The homeowner can then respond via button press to open the door, or a message will be displayed if they do not respond. An authorized person can enter a password on the keypad, and if multiple wrong passwords are entered, a message will be sent to the homeowner about a potential burglary attempt. The system aims to provide notification to homeowners and prevent unauthorized access through use of passwords and messaging capabilities.
IRJET- Design and Implementation of Smart Home Security System based on IoTIRJET Journal
The document summarizes a research paper on the design and implementation of a smart home security system using IoT. The proposed system uses fingerprint biometrics, a keypad, and a Wi-Fi app to control a door lock and provide access only to authorized individuals. An emergency alarm protects the system from unauthorized intruders. The system is accessed through different authentication methods and notifications are provided to users on who is entering and exiting the home. The smart lock allows convenient and secure access while monitoring activity and integrating with other smart devices in the home automation system.
This document discusses cryptography and security implementations for Internet of Things (IoT) devices. It begins with an introduction to IoT and the need for security protocols as IoT devices collect and transmit large amounts of sensitive data. Challenges to IoT security include the diversity of devices which makes vulnerabilities complex, and limited computational resources. The document then explores using symmetric and public key cryptography algorithms as well as proposed lightweight cryptography solutions for IoT security. It concludes that while traditional security solutions are inadequate, lightweight cryptography protocols have the potential to help secure IoT communications and address current challenges if standardized for diverse IoT hardware.
This document provides an introduction to IoT security. It discusses key components of IoT including sensors, actuators, microcontrollers, communication capabilities, and identification. The document outlines the ITU-T IoT reference model and describes security challenges at different levels including devices, fog networks, core networks, and data centers. It also discusses common IoT security issues such as unpredictable behavior, device similarity, problematic deployments, lack of upgrades, and lack of transparency. Finally, the document summarizes common IoT security tools including encryption, passwords, hardware security modules, two-factor authentication, and public key infrastructure certificates.
Intellectual Bank Locker Security SystemIJERA Editor
In today's modern world, security plays an important role. Every person has precious accessories like gold,
documents or cash. The main goal of this project is to design and implement a bank locker security system
based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and
provides advanced security. In this system, only authentic persons can recover money or accessories from bank
locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches,
then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door
will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The
sensors will be active during night times to provide security against thefts.
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
When Internet of Things (IoT) applications become a part of people’s daily life, security issues in IoT have caught substantial attention in both academia and industry. Compared to traditional computing systems, IoT systems have more inherent vulnerabilities, and in the intervening time, could have higher security requirements. However, the current design of IoT does not successfully address the higher security requirements postured by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to defend this emerging system. This paper purposes to examine security challenges resulted from the special characteristics of the IoT systems and the new features of the IoT applications. This could help pave the road to better security solution design. Furthermore, three architectural security designs are suggested and analyzed. Examples of how to implement these designs are discussed. Finally, for each layer in IoT architecture, open issues are also identified.
Smart Home Security and Intrusion Detection Systemijtsrd
Conventional security systems which are the very common form of protection to lives and properties, have certain limitations such as real time monitoring and control of activities such as intruders in the form of human beings, fire, smoke, et cetera. These limitations in most cases result in high financial loss to properties and lives. This work involves the design and construction of GSM intelligent home security system for real time monitoring of different forms of intrusion. It consist of intrusion detection sensors, pressure, Smoke Fire, Gas and PIR motion , wireless sensors, programmable microcontroller in embedded C language, regulated power supply unit, proteus circuit simulator , relays, GSM modem, mobile phone, data acquisition node and an interface program development. The design calculation and analysis was carried out before it was modelled, simulated in proteus electronic simulator environment. When the PIR finds intruders in form of variation in temperature, gas leakage, pressure , the relevant sensing device s respond and the microcontroller sends encoded alarm signal to the wireless sensor network established in home. The moment the alarm signal is received, it will send alarm short message to the users owners of the building through GSM network immediately. The design analysis and calculations were carried out and finally, a positive result was achieved. Usiade, Rex Ehiedum | Adeoye, Olayode Semiu "Smart Home Security and Intrusion Detection System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-7 , December 2022, URL: https://www.ijtsrd.com/papers/ijtsrd52543.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/52543/smart-home-security-and-intrusion-detection-system/usiade-rex-ehiedum
Design and realization of motion detector system for house securityTELKOMNIKA JOURNAL
In this paper, the design and realization of motion detector system for house security based GSM
network is presents. The development of microcontroller carried out intruder detection that supports
tracking techniques to provide vital security with control and alert operation inside and outside the home.
The pivot of security on the integration the motion detector and cameras into web applications has become
more interested. The smart surveillance Pi camera obtain the input from the motion detector and controller
which is send the video to the web server allowing the homeowner to access this video by use web
applications. An intrusion alert send to the owner by mean of message via mobile and buzzers alarms
located at suitable distance. This system is typify proficient video camera for remote sensing and tracking
with live video for succeeding play again to offers efficient and easy implementation with omnipresent
surveillance solution.
This document describes a proposed smart locker system for home keys using Internet of Things technologies. The system uses a GSM module, LCD display, proximity sensor, relay, and Arduino microcontroller. The GSM module allows two family members to control opening and closing of the locker via SMS. When keys are placed in or removed from the locker, an SMS notification is sent. If someone tries to break into the system, an alert SMS is sent to family members and security. The system aims to provide safety for keys without needing to carry them, and allows access even when owners are not home by verifying users through SMS. The components work together to securely operate the locker through remote control and notifications.
1. The document describes a smart and secure home system using IoT that allows users to control home appliances like AC and washing machines remotely through an internet connection from anywhere in the world.
2. The system uses an Arduino Mega board connected to sensors and a GSM modem to monitor temperature and motion in the home. If thresholds are exceeded, the system sends SMS alerts to users. It can also control appliances through relays.
3. The system includes a fire emergency system that uses a temperature sensor to detect fires and alert users through SMS, as well as a security system using a PIR motion sensor to detect intruders and notify users. This allows remote monitoring and control of the home while providing
GSM BASED DOOR OPEN AND CLOSE, LOCK AND UNLOCK SYSTEMIRJET Journal
This document describes a GSM-based system for remotely controlling the opening, closing, locking, and unlocking of doors. The system uses an Arduino board, GSM module, keypad, DC servo motors, buzzer, and LCD display. There are two modes of operation - using text messages or a password entered via the keypad. Text messages sent to the GSM module control the servo motors to open, close, lock, and unlock the door. If the GSM network fails, the keypad provides a backup way to control the door. The system was implemented as a prototype to control one door and could be expanded to control multiple doors remotely.
NRF based wireless light and Fan dimmer controlling system.IRJET Journal
This document discusses the design and implementation of a wireless light and fan dimmer controlling system using Near Field Communication (NRF) technology. It presents the circuit diagrams and working of the NRF transmitter, receiver for controlling a light bulb, and receiver for controlling a fan speed. The transmitter uses a digital rotor for providing input to control the light and fan remotely. The receivers use relays and TRIACs respectively to switch the light and control the fan speed based on signals received from the transmitter. The system allows wireless control of home appliances like lights and fans to enable home automation.
This document summarizes a research paper that proposes a smart home automation and security system design based on Internet of Things (IoT) applications. The key points are:
1. The proposed system uses enabling technologies like cloud computing (PubNub), Android applications, WiFi modules (ESP8266), and Raspberry Pi to allow remote monitoring and control of home devices like lighting, appliances, and security sensors.
2. Node devices connected to sensors and actuators communicate wirelessly with a Raspberry Pi base station using WiFi. The base station acts as a central controller accessible through web and mobile interfaces.
3. The system was tested by connecting various sensors to measure environmental data like temperature, humidity,
Energy Management with Disaster Intimation and Control using IoTIJEACS
In the area of digitization and automation, the life of
human being is getting simpler as almost everything is
automated. Nowadays humans have made internet an integral
part of their everyday life without which they are helpless.
Internet of things (IoT) gives a platform which allows different
devices to inter-connect, sense and control the things remotely
across a network infrastructure without any limitation to the
coverage area. In our proposed work, we stress on Wireless-
Home-Automation-System (WHAS) using IoT, it is a system uses
computers or smart phone to control basic home functions and
features automatically through internet from anywhere around
the world, an automated home is sometimes called a smart home.
The proposed system is able to monitor the entire things
connected to the internet and also to be maintaining the status of
individual devices for further action. We have built the home
automation with several devices and sensors, here sensor help to
monitor the device status and intimate the authorized person to
take particular action.
Home Security System using ESP32-CAM and Telegram ApplicationIRJET Journal
This document describes a home security system using an ESP32-CAM module and Telegram application. The system uses the ESP32-CAM to capture live video and images and send them to the user's Telegram account. Motion detection and other sensors can trigger notifications to the homeowner. The system is designed to be low-cost, easy to use, and effective at preventing burglary and security breaches while providing remote monitoring capabilities through Telegram.
[[IAA JSR 10(1)36-48, 2023.Automated Hybrid Smart Door Control System.pdfPUBLISHERJOURNAL
This research paper successfully designed, developed and implemented an automated hybrid smart door control system which has the ability to secure a home up to 92% electronically. This smart door system is designed and implemented by building a hardware made up of the Bluetooth module and fingerprint scanner which are interfaced with the Microcontroller system that uses +5V power supply. The written programs were interfaced into the microcontroller chips by plugging the Arduino USB cable into the laptop and upload the codes. The microcontroller chips helped in enrolling the users fingerprint into the fingerprint scanner and it automatically administers and saves the users fingerprint after enrollment. Furthermore, after all the processes the user places the enrolled or registered finger into the fingerprint scanner which either accepts or denies the user by triggering the solenoid lock to either unlock, lock or deny access. This process of unlocking and locking requires using Bluetooth and fingerprint to either lock or unlock the door smartly without stress and it can be done within one second that is why the Solenoid lock is used in building this security system. This automated hybrid smart door control system developed has curbed the problem of door breaking theft for about 92%, strengthened security and as well made it so easy for the physically challenged people to have access to their homes without third party assistance.
Keywords: Smart Door System, Fingerprint, Bluetooth, Security, Arduino, Microcontroller
Automated Hybrid Smart Door Control System.pdfssuser793b4e
This research paper successfully designed, developed and implemented an automated hybrid smart door control system which has the ability to secure a home up to 92% electronically. This smart door system is designed and implemented by building a hardware made up of the Bluetooth module and fingerprint scanner which are interfaced with the Microcontroller system that uses +5V power supply. The written programs were interfaced into the microcontroller chips by plugging the Arduino USB cable into the laptop and upload the codes. The microcontroller chips helped in enrolling the users fingerprint into the fingerprint scanner and it automatically administers and saves the users fingerprint after enrollment. Furthermore, after all the processes the user places the enrolled or registered finger into the fingerprint scanner which either accepts or denies the user by triggering the solenoid lock to either unlock, lock or deny access. This process of unlocking and locking requires using Bluetooth and fingerprint to either lock or unlock the door smartly without stress and it can be done within one second that is why the Solenoid lock is used in building this security system. This automated hybrid smart door control system developed has curbed the problem of door breaking theft for about 92%, strengthened security and as well made it so easy for the physically challenged people to have access to their homes without third party assistance.
IRJET- Automatic Door Monitoring SystemIRJET Journal
This document describes an automatic door monitoring system that uses an ESP-8266 WiFi module, magnetic proximity sensor, and IFTTT platform. The system monitors the status of a door through the magnetic sensor and notifies the user via email when the door opens or closes. When a person opens the door, the magnetic sensors detect the change in status and send a signal to the IFTTT platform. IFTTT then triggers a task to send an email notification with the door status and timestamp to the user. The system provides contactless monitoring of a door's status and notifies users remotely through email.
Smart home system is very popular in current days that give many kind of application that make all simple and easy to control. In modern day, home machines are using wireless equipment and can be retrieved by internet that will make populations life easier and organized. It based Home Computerization System is designed to assist the people with physical debilities and elderly to provide support as well as to control the electrical usages and monitor the room infection using mobile application. The design is using surrounded controller board and the home appliances are physically associated to output ports of this board via relays. The Home Automation is a wireless home computerization system that is supposed to be executed in existing home environments, without any variations in the infrastructure. Arun Kumar. N | Sathiyabama. T "Smart Security System (IOT)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29337.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/29337/smart-security-system-iot/arun-kumar-n
Tracking And Security System for Women’s using GPS & GSMIRJET Journal
This document describes a tracking and security system for women using GPS and GSM technologies. The system includes an ARM7 microcontroller, GPS module, GSM module, panic button, buzzer, and emergency button. When the panic or emergency buttons are pressed, the ARM7 uses the GPS module to get the woman's location and sends an alert SMS with a link to the location via the GSM module to pre-stored phone numbers. This allows authorities to quickly locate and assist any woman in distress. The system is designed to increase women's safety and allow them to call for help discreetly during threatening situations.
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEMijistjournal
This document presents a smart security system using Zigbee wireless technology, GSM, sensors, and a smartphone. The system allows a homeowner to monitor and control their home security from a remote location. When a sensor detects an intrusion, a signal is sent to a microcontroller and then to the homeowner's phone via Zigbee and GSM. The owner can then make a video call to view their home and optionally activate a gas spray or lock the doors for added protection. The system provides remote monitoring and control of a home security system in a low-cost and easy to install package.
As technology becomes more advanced and modernized; more features are added to the existing system
for the purpose of satisfying the increasing security needs of the people. Deploying wireless technologies
for security and control in home offers attractive benefits along with user friendly interface. In this paper
we present a smart security system comprises of Zigbee, GSM, Sensors and Smartphone for Security
monitoring and control, when the user is at remote premises. Three sensors namely P
IR, vibration and door sensor are installed at windows and doors. Whenever there is a security breach the
sensors sends the signal to the Pic microcontroller. The Max 232 converter provides serial interface
between the microcontroller and the zigbee. The Zigbee end device then transmits the signal to the Zigbee
coordinator. The ZC at the control console communicates with MCU using max 232 converters. MCU
would in turn access and control the GSM module via AT commands and automatically sends SMS to the
owner's mobile phone informing him about the security breach. On receiving the SMS, user can make a
video call using Skype account; Smartphone installed at home will feed us with a live video. On viewing
the video the user can know whether an intruder has entered or not. Then accordingly faint gas valve and
door lock can be controlled by the user. Thus whenever there is an intrusion, our system lets the user to
monitor and control his premises from any part of the world.
Design and Implementation of a Contactless Smart House Network System IJECEIAES
The Internet of Things (IoT) technology is every object around us and it is used to connect these objects to the Internet to verify Machine to Machine (M2M) communication. The smart house system is the most important application of IoT technology; it is increase the quality of life and decrease the efforts. There were many problems that faced the existing smart house networking systems, including the high cost of implementation and upgrading, high power consumption, and supported limited features. Therefore, this paper presents the design and implementation of smart house network system (SHNS) using Raspberry Pi and Arduino platforms as network infrastructure with ZigBee technology as wireless communication. SHNS consists of two main parts: the main station part and the wireless house nodes part. The local wireless communication between the house nodes and the main station is done through ZigBee technology with low power and low data rate. The mode of operation of these house nodes can be configured dynamically by the end user and determined multicast or broadcast operation according to the user requirements. The implementation and upgrading of SHNS are costless, flexible and required less power comparing with other reviewed systems.
This document provides an introduction and overview of an embedded systems project that uses a fingerprint module, GSM module, and keypad with an XMEGA 256A3BU microcontroller for high security applications. The main objectives of the project are to design an intelligent and programmable security system that only allows authorized persons to enter a room using three modes of access: fingerprint, keypad, or GSM-activated keypad. The document then provides background information on embedded systems, their applications in various sectors such as automotive, aerospace, telecommunications, consumer electronics, railroads, and electronic payment solutions.
Smart Security Lock for Access Control Applications based on GSMIRJET Journal
The document describes a proposed smart security lock system based on GSM (Global System for Mobile Communication) that provides access control for electronic devices. The system uses a microcontroller-based lock installed between a device's power supply and the device. It can be locked with a numeric password up to 15 digits long and associated with a unique phone number. The lock notifies the owner of access attempts via SMS and allows the owner to control the lock remotely by SMS like changing the password. It aims to provide a reliable, low-cost security solution for access control applications.
IRJET - Safety and Security Aspects of Smart Home Applications using Face...IRJET Journal
1. The document proposes a smart home security system using face recognition to automatically open doors for authorized users.
2. The system uses sensors like vibration, sound and IR sensors to detect unauthorized activity and intruders. It sends notifications to the home owner and police if intrusions are detected.
3. The system is implemented using an Arduino Mega microcontroller connected to sensors. It uses MQTT and Python to transmit sensor data and notifications. Face recognition is done using the Harr cascade algorithm to match faces to stored datasets.
Similar to Design prototype of a smart household touch sensitive locker security system based on GSM technology (20)
The aim of this research is the speed tracking of the permanent magnet synchronous motor (PMSM) using an intelligent Neural-Network based adapative backstepping control. First, the model of PMSM in the Park synchronous frame is derived. Then, the PMSM speed regulation is investigated using the classical method utilizing the field oriented control theory. Thereafter, a robust nonlinear controller employing an adaptive backstepping strategy is investigated in order to achieve a good performance tracking objective under motor parameters changing and external load torque application. In the final step, a neural network estimator is integrated with the adaptive controller to estimate the motor parameters values and the load disturbance value for enhancing the effectiveness of the adaptive backstepping controller. The robsutness of the presented control algorithm is demonstrated using simulation tests. The obtained results clearly demonstrate that the presented NN-adaptive control algorithm can provide good trackingperformances for the speed trackingin the presence of motor parameter variation and load application.
The document presents a new method for fault classification and direction discrimination in transmission lines using 1D convolutional neural networks (1D-CNNs). A 132kV transmission line model is simulated to generate training and testing data for the 1D-CNN algorithm. The proposed 1D-CNN approach directly uses the voltage and current signals from one end as input, merging feature extraction and classification into a single learning process. Testing shows the 1D-CNN method accurately classifies and discriminates fault direction with higher accuracy than conventional neural network and fuzzy neural network methods under different fault conditions.
Among the most widespread renewable energy sources is solar energy; Solar panels offer a green, clean, and environmentally friendly source of energy. In the presence of several advantages of the use of photovoltaic systems, the random operation of the photovoltaic generator presents a great challenge, in the presence of a critical load. Among the most used solutions to overcome this problem is the combination of solar panels with generators or with the public grid or both. In this paper, an energy management strategy is proposed with a safety aspect by using artificial neural networks (ANNs), in order to ensure a continuous supply of electricity to consumers with a maximum solicitation of renewable energy.
In this paper, the artificial neural network (ANN) has been utilized for rotating machinery faults detection and classification. First, experiments were performed to measure the lateral vibration signals of laboratory test rigs for rotor-disk-blade when the blades are defective. A rotor-disk-blade system with 6 regular blades and 5 blades with various defects was constructed. Second, the ANN was applied to classify the different x- and y-axis lateral vibrations due to different blade faults. The results based on training and testing with different data samples of the fault types indicate that the ANN is robust and can effectively identify and distinguish different blade faults caused by lateral vibrations in a rotor. As compared to the literature, the present paper presents a novel work of identifying and classifying various rotating blade faults commonly encountered in rotating machines using ANN. Experimental data of lateral vibrations of the rotor-disk-blade system in both x- and y-directions are used for the training and testing of the network.
This paper focuses on the artificial bee colony (ABC) algorithm, which is a nonlinear optimization problem. is proposed to find the optimal power flow (OPF). To solve this problem, we will apply the ABC algorithm to a power system incorporating wind power. The proposed approach is applied on a standard IEEE-30 system with wind farms located on different buses and with different penetration levels to show the impact of wind farms on the system in order to obtain the optimal settings of control variables of the OPF problem. Based on technical results obtained, the ABC algorithm is shown to achieve a lower cost and losses than the other methods applied, while incorporating wind power into the system, high performance would be gained.
The significance of the solar energy is to intensify the effectiveness of the Solar Panel with the use of a primordial solar tracking system. Here we propounded a solar positioning system with the use of the global positioning system (GPS) , artificial neural network (ANN) and image processing (IP) . The azimuth angle of the sun is evaluated using GPS which provide latitude, date, longitude and time. The image processing used to find sun image through which centroid of sun is calculated and finally by comparing the centroid of sun with GPS quadrate to achieve optimum tracking point. Weather conditions and situation observed through AI decision making with the help of IP algorithms. The presented advance adaptation is analyzed and established via experimental effects which might be made available on the memory of the cloud carrier for systematization. The proposed system improve power gain by 59.21% and 10.32% compare to stable system (SS) and two-axis solar following system (TASF) respectively. The reduced tracking error of IoT based Two-axis solar following system (IoT-TASF) reduces their azimuth angle error by 0.20 degree.
Kosovo has limited renewable energy resources and its power generation sector is based on fossil fuels. Such a situation emphasizes the importance of active research and efficient use of renewable energy potential. According to the analysis of meteorological data for Kosovo, it can be concluded that among the most attractive potential wind power sites are the locations known as Kitka (42° 29' 41" N and 21° 36' 45" E) and Koznica (42° 39′ 32″ N, 21° 22′30″E). The two terrains in which the analysis was carried out are mountain areas, with altitudes of 1142 m (Kitka) and 1230 m (Koznica). the same measuring height, about 84 m above the ground, is obtained for these average wind speeds: Kitka 6,667 m/s and Koznica 6,16 m/s. Since the difference in wind speed is quite large versus a difference in altitude that is not being very large, analyses are made regarding the terrain characteristics including the terrain relief features. In this paper it will be studied how much the roughness of the terrain influences the output energy. Also, that the assumption to be taken the same as to how much they will affect the annual energy produced.
The document summarizes a research paper that proposes using a battery energy storage system (BESS) with droop control to reduce frequency fluctuations in a multi-machine power system connected to a large-scale photovoltaic (PV) plant. The paper develops a droop control strategy for the BESS that incorporates a frequency error signal and dead-band. Simulation results using PSCAD/EMTDC software show that the proposed droop control-based BESS can efficiently curtail frequency oscillations caused by fluctuations in PV power injection due to changing solar irradiance.
This study investigates experimentally the performance of two-dimensional solar tracking systems with reflector using commercial silicon based photovoltaic module, with open and closed loop control systems. Different reflector materials were also investigated. The experiments were performed at the Hashemite University campus in Zarqa at a latitude of 32⁰, in February and March. Photovoltaic output power and performance were analyzed. It was found that the modified photovoltaic module with mirror reflector generated the highest value of power, while the temperature reached a maximum value of 53 ̊ C. The modified module suggested in this study produced 5% more PV power than the two-dimensional solar tracking systems without reflector and produced 12.5% more PV power than the fixed PV module with 26⁰ tilt angle.
This paper focuses on the modeling and control of a wind energy conversion chain using a permanent magnet synchronous machine. This system behaves a turbine, a generator, DC/DC and DC/AC power converters. These are connected on both sides to the DC bus, where the inverter is followed by a filter which is connected to the grid. In this paper, we have been used two types of controllers. For the stator side converter, we consider the Takagi-Sugeno approach where the parameters of controller have been computed by the theory of linear matrix inequalities. The stability synthesis has been checked using the Lyapunov theory. According to the grid side converter, the proportional integral controller is exploited to keep a constant voltage on the DC bus and control both types of powers. The simulation results demonstrate the robustness of the approach used.
The development of modeling wind speed plays a very important in helping to obtain the actual wind speed data for the benefit of the power plant planning in the future. The wind speed in this paper is obtained from a PCE-FWS 20 type measuring instrument with a duration of 30 minutes which is accumulated into monthly data for one year (2019). Despite the many wind speed modeling that has been done by researchers. Modeling wind speeds proposed in this study were obtained from the modified Rayleigh distribution. In this study, the Rayleigh scale factor (Cr) and modified Rayleigh scale factor (Cm) were calculated. The observed wind speed is compared with the predicted wind characteristics. The data fit test used correlation coefficient (R2), root means square error (RMSE), and mean absolute percentage error (MAPE). The results of the proposed modified Rayleigh model provide very good results for users.
This paper deals with an advanced design for a pump powered by solar energyto supply agricultural lands with water and also the maximum power point is used to extract the maximum value of the energy available inside the solar panels and comparing between techniques MPPT such as Incremental conductance, perturb & observe, fractional short current circuit, and fractional open voltage circuit to find the best technique among these. The solar system is designed with main parts: photovoltaic (PV) panel, direct current/direct current (DC/DC) converter, inverter, filter, and in addition, the battery is used to save energy in the event that there is an increased demand for energy and not to provide solar radiation, as well as saving energy in the case of generation more than demand. This work was done using the matrix laboratory (MATLAB) simulink program.
The objective of this paper is to provide an overview of the current state of renewable energy resources in Bangladesh, as well as to examine various forms of renewable energies in order to gain a comprehensive understanding of how to address Bangladesh's power crisis issues in a sustainable manner. Electricity is currently the most useful kind of energy in Bangladesh. It has a substantial influence on a country's socioeconomic standing and living standards. Maintaining a stable source of energy at a cost that is affordable to everyone has been a constant battle for decades. Bangladesh is blessed with a wealth of natural resources. Bangladesh has a huge opportunity to accelerate its economic development while increasing energy access, livelihoods, and health for millions of people in a sustainable way due to the renewable energy system.
When the irradiance distribution over the photovoltaic panels is uniform, the pursuit of the maximum power point is not reached, which has allowed several researchers to use traditional MPPT techniques to solve this problem Among these techniques a PSO algorithm is used to have the maximum global power point (GMPPT) under partial shading. On the other hand, this one is not reliable vis-à-vis the pursuit of the MPPT. Therefore, in this paper we have treated another technique based on a new modified PSO algorithm so that the power can reach its maximum point. The PSO algorithm is based on the heuristic method which guarantees not only the obtaining of MPPT but also the simplicity of control and less expensive of the system. The results are obtained using MATLAB show that the proposed modified PSO algorithm performs better than conventional PSO and is robust to different partial shading models.
A stable operation of wind turbines connected to the grid is an essential requirement to ensure the reliability and stability of the power system. To achieve such operational objective, installing static synchronous compensator static synchronous compensator (STATCOM) as a main compensation device guarantees the voltage stability enhancement of the wind farm connected to distribution network at different operating scenarios. STATCOM either supplies or absorbs reactive power in order to ensure the voltage profile within the standard-margins and to avoid turbine tripping, accordingly. This paper present new study that investigates the most suitable-location to install STATCOM in a distribution system connected wind farm to maintain the voltage-levels within the stability margins. For a large-scale squirrel cage induction generator squirrel-cage induction generator (SCIG-based) wind turbine system, the impact of STATCOM installation was tested in different places and voltage-levels in the distribution system. The proposed method effectiveness in enhancing the voltage profile and balancing the reactive power is validated, the results were repeated for different scenarios of expected contingencies. The voltage profile, power flow, and reactive power balance of the distribution system are observed using MATLAB/Simulink software.
The electrical and environmental parameters of polymer solar cells (PSC) provide important information on their performance. In the present article we study the influence of temperature on the voltage-current (I-V) characteristic at different temperatures from 10 °C to 90 °C, and important parameters like bandgap energy Eg, and the energy conversion efficiency η. The one-diode electrical model, normally used for semiconductor cells, has been tested and validated for the polemeral junction. The PSC used in our study are formed by the poly(3-hexylthiophene) (P3HT) and [6,6]-phenyl C61-butyric acid methyl ester (PCBM). Our technique is based on the combination of two steps; the first use the Least Mean Squares (LMS) method while the second use the Newton-Raphson algorithm. The found results are compared to other recently published works, they show that the developed approach is very accurate. This precision is proved by the minimal values of statistical errors (RMSE) and the good agreement between both the experimental data and the I-V simulated curves. The obtained results show a clear and a monotonic dependence of the cell efficiency on the studied parameters.
The inverter is the principal part of the photovoltaic (PV) systems that assures the direct current/alternating current (DC/AC) conversion (PV array is connected directly to an inverter that converts the DC energy produced by the PV array into AC energy that is directly connected to the electric utility). In this paper, we present a simple method for detecting faults that occurred during the operation of the inverter. These types of faults or faults affect the efficiency and cost-effectiveness of the photovoltaic system, especially the inverter, which is the main component responsible for the conversion. Hence, we have shown first the faults obtained in the case of the short circuit. Second, the open circuit failure is studied. The results demonstrate the efficacy of the proposed method. Good monitoring and detection of faults in the inverter can increase the system's reliability and decrease the undesirable faults that appeared in the PV system. The system behavior is tested under variable parameters and conditions using MATLAB/Simulink.
The document describes a proposed modified bridge-type nonsuperconducting fault current limiter (NSFCL) for distribution networks. The NSFCL consists of a bridge rectifier, two DC reactors (one small in series and one large in parallel), and an IGBT semiconductor switch controlled by a command circuit. During normal operation, the IGBT is on and the parallel reactor is bypassed, making the NSFCL invisible. During a fault, the IGBT turns off, inserting the parallel reactor to limit fault current. Simulation results showed the design effectively limits fault current while minimally affecting normal operation.
This paper provides a new approach to reducing high-order harmonics in 400 Hz inverter using a three-level neutral-point clamped (NPC) converter. A voltage control loop using the harmonic compensation combined with NPC clamping diode control technology. The capacitor voltage imbalance also causes harmonics in the output voltage. For 400 Hz inverter, maintain a balanced voltage between the two input (direct current) (DC) capacitors is difficult because the pulse width modulation (PWM) modulation frequency ratio is low compared to the frequency of the output voltage. A method of determining the current flowing into the capacitor to control the voltage on the two balanced capacitors to ensure fast response reversal is also given in this paper. The combination of a high-harmonic resonator controller and a neutral-point voltage controller working together on the 400 Hz NPC inverter structure is given in this paper.
Direct current (DC) electronic load is a useful equipment for testing the electrical system. It can emulate various load at a high rating. The electronic load requires a power converter to operate and a linear regulator is a common option. Nonetheless, it is hard to control due to the temperature variation. This paper proposed a DC electronic load using the boost converter. The proposed electronic load operates in the continuous current mode and control using the integral controller. The electronic load using the boost converter is compared with the electronic load using the linear regulator. The results show that the boost converter able to operate as an electronic load with an error lower than 0.5% and response time lower than 13 ms.
More from International Journal of Power Electronics and Drive Systems (20)
Rainfall intensity duration frequency curve statistical analysis and modeling...bijceesjournal
Using data from 41 years in Patna’ India’ the study’s goal is to analyze the trends of how often it rains on a weekly, seasonal, and annual basis (1981−2020). First, utilizing the intensity-duration-frequency (IDF) curve and the relationship by statistically analyzing rainfall’ the historical rainfall data set for Patna’ India’ during a 41 year period (1981−2020), was evaluated for its quality. Changes in the hydrologic cycle as a result of increased greenhouse gas emissions are expected to induce variations in the intensity, length, and frequency of precipitation events. One strategy to lessen vulnerability is to quantify probable changes and adapt to them. Techniques such as log-normal, normal, and Gumbel are used (EV-I). Distributions were created with durations of 1, 2, 3, 6, and 24 h and return times of 2, 5, 10, 25, and 100 years. There were also mathematical correlations discovered between rainfall and recurrence interval.
Findings: Based on findings, the Gumbel approach produced the highest intensity values, whereas the other approaches produced values that were close to each other. The data indicates that 461.9 mm of rain fell during the monsoon season’s 301st week. However, it was found that the 29th week had the greatest average rainfall, 92.6 mm. With 952.6 mm on average, the monsoon season saw the highest rainfall. Calculations revealed that the yearly rainfall averaged 1171.1 mm. Using Weibull’s method, the study was subsequently expanded to examine rainfall distribution at different recurrence intervals of 2, 5, 10, and 25 years. Rainfall and recurrence interval mathematical correlations were also developed. Further regression analysis revealed that short wave irrigation, wind direction, wind speed, pressure, relative humidity, and temperature all had a substantial influence on rainfall.
Originality and value: The results of the rainfall IDF curves can provide useful information to policymakers in making appropriate decisions in managing and minimizing floods in the study area.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
2. ISSN: 2088-8694
Int J Pow Elec & Dri Syst Vol. 10, No. 4, Dec 2019 : 1923 – 1931
1924
Circuit), USN (Ubiquitous Sensors Network) and implemented through FPGA (Field Programmable Gate
Arrays), DSP (Digital Signal Processor), and MCU (Memory Control Unit/Microcontroller Unit).
Installation and maintenance cost of a GSM based home security system is much cheaper than other
home security system. It is also very flexible and durable. The great advantage of this system is not to be
hacked because it involves only a mobile network. Besides, the users of the other GSM based security
systems has to count money every day for each SMS. So, by simplifying the system, the researchers are
trying to keep the installation and maintenance cost low. In the past, several SMS based home security
systems were developed. Rozita, Ahmed, Chan and Hoong in [1], developed a full control home based
automation system using a PIC16F887 microcontroller which was integrated with GSM module
communicating at a baud rate of 9600 bps. In [2], microcontroller AT89C55 will be interfaced with a GSM
module through RS-232 communication protocol for interaction between the users’ mobile phone and the
security system. Baris, Alper, Tosun, Kaan and Ali in [3], ex-plain the home automation system using GSM,
internet and speech recognition. In these systems, the home gateway is internet based which requires a
personal computer (PC). However, it's hard to manage PC and keep it ON all the time. Also, it consumes
more power. Khandare and Mahajan in [4], where a GSM module was inter-faced with a desktop computer.
Here, clients were connected to the computer through Wi-Fi access points and the home appliances have
wired connection to the computer. Another such system was developed in [5], used a PIC18F452
microcontroller to monitor doors and windows of a home which could be accessed only by entering the
proper ID.
A few years back, Inderpreet Kaur did a research entitled “Microcontroller Based Home Automation
System with Security” and got an automated home could be used for simple grouping of controls where any
appliance that is plugged into electrical power is remotely controlled [6]. Moreover, Ahmed ElShafee and
Karim Alaa Hamed did another research entitled “Design and Implementation of a WiFi Based Home
Automation System” and they had concluded their system could support a wide range of home automation
devices like power management components, and security components as well [7]. Visa M. Ibrahim and
Asogwa A. Victor had developed a design entitled “Microcontroller Based Anti-theft Security System Using
GSM Networks with Text Message as Feedback”. Particularly, in this paper, they had designed an anti-theft
security system using an embedded system design with Dual Tone Multi-Frequency (DTMF) and a
GSM to monitor as a safeguard for car [8]. Rozita Teymourzadeh and his team did a research on “Smart
GSM based Home Automation System” and their final results show an accuracy of ≥ 98% with a maximum
of four loads [9].
Jayashri Bangali and Arvind Shaligram did a research on Design and Implementation of Security
Systems for Smart Home based on GSM technology and this research paper suggest two types of security
system. One system had based on web camera another system had based on GSM technology [10]. Raqibull
Hasan and his team designed a Microcontroller Based Home Security System with GSM Technology. A
Compiler Code Vision AVR is used to design a program that controls the system along with maintaining all
security functions [11]. Mohammad Amanullah “Microcontroller Based Reprogrammable Digital Door Lock
Security System by Using Keypad & GSM/CDMA Technology”. In this system, a matrix keypad had used
for a change it any time due to the password is stored in PROM. Besides, an IPS circuit had used for giving
backup in case of an emergency when there is a power failure [12]. Zamshed Iqbal Chowdhury and his team
did a research entitled with “Design and implementation of Pyroelectric Infrared sensor-based security
system using microcontroller”. Actually, in this paper, the development of a Low-cost security system using
small PIR (Pyroelectric Infrared) sensor had built using microcontroller [13].
The system presented in this paper is a combination of GSM and MCU. GSM pro-vides wide
coverage as GSM association estimates 90% of the global mobile market using GSM standard. The proposed
system provides reliable security, effortless installation and portability. In this work once the system is
programmed, neither computer nor internet connection are required, thus ensuring simplicity of use. In this
paper, we present the theft prevention using a technological solution namely “Smart Household Touch
Sensitive Locker Security System Based on GSM Technology”. A locker (touch sensitive box) covered by
touch plates is connected to the device. If the locker feels any unauthorized touch, an alarm system will be
activated without any delay & the owner will get a SMS from the server via GSM module to protect the
locker. The categorization of this paper: Section-II describes about components used in the system, Section-II
depicts the methodology of the system compiled of both hardware and software implementation, Section-IV
holds the experimental results and Section-V concludes the paper.
2. EQUIPMENT FAMILIARIZATION
The circuit is designed considering simplicity of uses. The overall system contains different
functional units combined together, those interact with each other to provide the total functionality of a
3. Int J Pow Elec & Dri Syst ISSN: 2088-8694
Design prototype of a smart household touch sensitive locker security system based … (Mohammad Zeyad)
1925
security system. The microcontroller and the GSM module will be chosen as the main components for
designing the circuit. Other components like capacitors, resistors, buck converter, crystal oscillator, adapters,
transistor etc. are also used to accomplish the design goal. The following equipment are main components of
the system those are used to provide the total functionality.
2.1. Microcontroller
An 8-bit microcontroller called ATmega328p will be used in this project. It is a low-power
microcontroller based on AVR enhanced RISC architecture. It is a 28-pin microcontroller. ATmega328p has
32 KB programmable flash memory and static RAM of 2 KB. The ATmega328/P provides the following
features: 32Kbytes of In-System Programmable Flash with Read-While-Write capabilities, 1Kbytes
EEPROM, 2Kbytes SRAM, 23 general purpose I/O lines, 32 general purpose working registers, Real Time
Counter (RTC), three flexible Timer/Counters with compare modes and PWM, 1 serial programmable
USARTs , 1 byte oriented 2-wire Serial Interface (I2C), a 6-channel 10-bit ADC (8 channels in TQFP and
QFN/MLF packages) , a programmable Watchdog Timer with internal Oscillator, an SPI serial port, and six
software selectable power saving modes [14]. The Arithmetic Logic Unit (ALU) is directly connected with
all 32 registers. Although, allowing two independent registers to be accessed in one single instruction
executed in one clock cycle. Achieving throughputs up to ten times faster than conventional CISC
microcontrollers then the resulting architecture is more code efficient.
2.2. Global system for mobile communication (GSM)
SIM800L evaluation board will be used, which is controlled by the microcontroller ATmega328p. A
SIM800L evaluation board is used to make the development process easier and faster. SIM800L is a quad-
band GSM/GPRS module, that works on frequencies GSM850MHz, EGSM900MHz, DSC1800Mhz and
PCS1900MHz. SIM800L features GPRS multi-slot class 12/class 10 (optional) and supports the GPRS
coding schemes CS-1, CS-2, CS-3 and CS-4 [15]. This is also a low power device which has a tiny size-
15.8*17.8*2.4mm which helps in putting it with a microcontroller on a breadboard in a small sized box to
form our device. SIM800L can meet al-most all the space requirements in user applications, such as smart
phone, PDA and other mobile devices.
2.3. Buck converter
The buck converter is an omnipresent DC-DC converter that effectively changes over a high voltage
to a low voltage proficiently [16]. Proficient power transformation expands battery life, lessens warm, and
takes into account littler contraptions to be built. The buck converter can be utilized as a part of heaps of cool
applications. This article gives a concise prologue to the buck converter and spreads a couple of cool
utilization of buck converter circuits and its cousin the half-bridge and gives connects to assets where
intrigued per users can take in more about particular chips to use in their designs. The basic operation of the
buck converter has the current in an inductor controlled by two switches (as a rule a transistor and a diode)
[8]. In the glorified converter, every one of the parts is thought to be great. In particular, the switch and the
diode have zero voltage drop when on and zero current stream when off, and the inductor has zero
arrangement protection [17]. Further, it is accepted that the information and yield voltages don't change
throughout a cycle (this would imply the output capacitance as being vast) [17].
3. METHODOLOGY
GSM plays a key role in the process of receiving and transmitting information in wireless security
control networks that will affect the communication distance, node power consumption, network stability and
other indicators directly.
3.1. Hardware design of the system
The entire system design is being divided into two parts- hardware implementation and software
simulation. The hardware is designed according to the rules of the embedded system. The system is
composed of three different units: The control unit, the alarm unit and the touch sensitive box. The latter is to
make an inventive C-code for programming the MCU and GSM module to monitor and control the
secured environment.
- The control unit: it works together with the detection part and manages the alarm circuit to control
the alarm function.
- The alarm unit: a buzzer is used to give an alarm.
- Touch sensitive box: A touch sensation sheet was designed by using Vero board to protect the
objects which will not work until it feels any unauthorized touch. A detection circuit connected to
4. ISSN: 2088-8694
Int J Pow Elec & Dri Syst Vol. 10, No. 4, Dec 2019 : 1923 – 1931
1926
the device which will detect an unexpected error and give an immediate signal to begin turn on the
system. The general block diagram of the proposed system is shown in Figure 1.
Figure 1. Block diagram of proposed system
3.2. Working principle of the system
A microcontroller is a self-contained system with peripherals, memory and a processor that can be
used as an embedded system [18]. Most programmable microcontrollers that are used today are embedded in
other consumer products or machinery including phones, peripherals, automobiles and household appliances
for automated systems. Due to that fact, another name for a microcontroller is "embedded controller" [19].
Transmitting & receiving functions can be done easily & accurately by using microcontroller, so that design
microcontroller-based technology SIM800L module is used to complete the proposed system. To accomplish
the task, we controlled the device by using AT mega328p MCU.
Microcontroller is the most demanded programmable chip which is used for designing a home
automated system [18]. To complete this hardware implementation, a microcontroller and two adapters (5V,
2A) had used for the conversion of 220V AC to 5V DC which is an appropriate voltage for a microcontroller
[19]. Figure 2 shows the circuit diagram of proposed system.
Figure 2. Circuit diagram of proposed system
5. Int J Pow Elec & Dri Syst ISSN: 2088-8694
Design prototype of a smart household touch sensitive locker security system based … (Mohammad Zeyad)
1927
Firstly, at the time of running the circuit, some unexpected negative polarity was present in it. To
reduce the negative polarity, a crystal oscillator had used which also reduced some voltage of the
microcontroller as well. In Figure 1, the microcontroller is represented by ‘MCU’ which receives the
command through an adapter (5V, 2A) for the conversion of 220V AC to 5V DC. The SIM800L module is
represented by “GSM” which is an entire Quad-band GSM/GPRS arrangement in an SMT sort that can be
inserted in the client applications [18]. A buck converter was used, because initially, some unexpected
negative polarity was present in the circuit. Buck Converter is also connected with an adapter (5V, 2A) for
the conversion of 220V AC to 5V DC which is an appropriate voltage for the SIM800L module. This buck
converter is responsible for the reduction of some voltage of the microcontroller as well [19]. A handmade
touch sensitive box is connected with the MCU which helps to alert and notify through sending an SMS to
the property holder by any unexpected users.
In this circuit, initially, 220V AC is stepped down to 5V DC by using adapters. Two different value
capacitors were used to energize the device. A handmade touch box circuit was connected with the A5 pin of
the microcontroller. An alarm was rung and sent an alert message to the user through the microcontroller
after receiving the earlier given instruction and the threshold value. The microcontroller and GSM module
communicated with each other through USART communication. Figure 3 shows the schematic diagram of
the touch box circuit of the proposed system.
Figure 3. Schematic diagram of touch circuit operation
The microcontroller sends an SMS using the GSM module on the occurrence of two events: (a)
when it feels any unauthorized touch, (b) receives an acknowledgment reply from the authorized user.
Whenever the touch box detects unauthorized touch, the GSM module, buzzer alarm & lights will be
activated without any delay. The GSM module operates through the operating SIM and sends the SMS. Any
instructions that come or go to the user will come to the module using the operating SIM number. The
module then decodes the upcoming message from the user and sends commands according to the operating
microcontroller. The microcontroller receives SMS through the GSM module and retrieves the new
configuration settings from the SMS and saves the same in the microcontroller. The module also receives the
signal from the operating microcontroller and sends the message to the user subsequently. So, the GSM
module works as a bridge connector between the security system and the user.
A touch-sensitive box was designed to complete the work. There are many touch-pads, touch plates,
metal plates are available in the market which are used for security scheme. But in order to make the system
cost effective, we designed a handmade touch box for a smart domestic locker security system. The touch
box circuit was designed considering low cost & the simplicity of uses. A Vero board had chosen as the main
component for the touch box circuit design. Other components like an NPN transistor (BC547), two different
value resistors (i.e. R1=1K & R2=220Ω), a LED, an adapter (5V, 2A) etc. are also used to accomplish the
design goal. After proper verification on the breadboard, the design was transferred to a Vero board for a
permanent construction. A box was made by the Vero board so that each module can be easily identified.
Before proper soldering, a component plan was drawn to pay a particular attention for minimizing the
distances between the points & connections. After that, all other components were connected to implement
the circuit. Finally, touch box circuit was connected to the A5 pin of ATmega328p. Thus, the touch box
design was completed for smart domestic locker security system.
6. ISSN: 2088-8694
Int J Pow Elec & Dri Syst Vol. 10, No. 4, Dec 2019 : 1923 – 1931
1928
3.3. Software design of the system
First of all, the system file was loaded into the ATmega328p. The system was initialized to
implement the specific task, such as checking touch system, GSM communication and so on. After that, each
module was reset to run commands. A touch sensing system was programmed in a graphical user interface
using the C programming language. This program was used to control the GSM terminal. The alarm system
will be activated on the failure of authentication. Alarm system was used to notify the presence of
unauthorized user. When the alarm system will be turned on, an alert message will be sent to the locker
owner regarding the presence of theft attempt. Alarm system will be deactivated only when it receives
specified SMS from the authorized user otherwise system error will be there.
This process will be activated only when hardware and software chain are inter-connected. At first,
the system will initialize the system clock. After that, the system will execute the system codes to open
interrupting task. The whole system was built around a MCU. The MCU requires to be burned with software
written for specific applications. The code was written using ASSEMBLY language and compiled using
Arduino. Arduino generates a hex file which was burned using a burner into the IC. The touch box works
simply as a switch for MCU. At the beginning of the program or during the healthy condition, the external
interruption of the MCU remains disable. Therefore, any signal input on the pin A5 cannot generate an
interruption. When there is no disturbance to the touch box, the box acts like an open circuit, the signal is
LOW and when the disturbance occurs, the box works as the closed circuit, therefore the signal is HIGH on
pin A5. The MCU repeatedly keeps on checking the switch status of the system.
MCU breaks out of the signal checking loop and waits for the switch to be closed. Whenever the
input signal state is HIGH on A5, MCU interprets it as the true detection of motion of any unwanted body. In
this case, MCU will turn on the alarm sys-tem and send proper AT commands to the GSM modem to initiate
a SMS to a pre-defined number. After sending the SMS, MCU will wait for a pre-defined time before
executing following instructions through the device owner. This wait state allows the SMS to be completed
successfully. After that, MCU goes to SLEEP mode. Enabling the SLEEP mode ensures that MCU will wake
up from the SLEEP mode whenever there is a LOW to HIGH transition on A5, i.e. when the switch gets
opened. When an external interruption occurs, MCU wakes up from sleep mode and disable the external
interruption and the program goes to the beginning of the algorithm. A flowchart represents the locker
security system model in Figure 4.
Figure 4. System acquisition flow chart
7. Int J Pow Elec & Dri Syst ISSN: 2088-8694
Design prototype of a smart household touch sensitive locker security system based … (Mohammad Zeyad)
1929
3.4. Implemented system
This experiment mainly aims at domestic locker security system which plays an alarm sound to
draw attention and at the same time, an alert message was sent to the locker owner by sensing touch based on
the touch box. The system entity diagram had shown in Figure 5.
To operate the smart household locker security system, some accessible keywords had used which
will help the user to access the GSM-based system by sending SMS from anywhere. Perhaps, to secure the
system with non-observant people’s different keywords can be used for different users personally.
Accessible keywords are:
#a1 --- Buzzer, Light ON
#a0 --- Buzzer, Light OFF
Figure 5. Schematic diagram of touch circuit operation
4. EXPERIMENTAL RESULTS AND ANALYSIS
During the ON mode of the device, device gained voltage and current. By using a Multimeter, we
measured the voltage & current for different circumstances. After finding the voltage & current values,
power consumption was calculated. If voltage, current & power is denoted by V, I & P respectively, then
power formula is expressed as: P=VI (1) [20]. Table 1 represents the Power Consumption of the system.
Table 1. System power consumption
Conditions No. Voltage, V (V) Current, I (A) Power, P (W) Remarks
1 1.66 0.97 1.61 When touch box not touched
2 4.95 1.91 9.45 When touch box touched
3 4.99 1.96 9.78 When touch box touched
To test the touch box circuit, we checked the correct power supply at TP1 with respect to TP0.
When the touch box was not touched, the estimated frequency at TP2 was 1 kHz. This frequency disappeared
when the touch box feels any unauthorized touch. Verified voltage levels are indicated in Table 2 at TP3 and
TP4. Table 2 shows the System Feedback Data on different test point of the touch box.
Table 2. System feedback data
Test point (TP)
System feedback
Remarks
Buzzer GSM module
TP0 Off Off 0V; GND
TP1 Off Off +5V
TP2 Off Off 1kHz; when touch box not touched
TP3 Off Off 0.6V; when touch box not touched
TP4 Off Off 0V; when touch box not touched
TP5 On (Alarmed) On (SMS sent through the system) +5V; when touch box touched
To control the mobile phone through its ports for the communication between mobile phone and
GSM module, AT (AT is the abbreviation of ATTENTION) was used for commands, provided by the
merchant companies. The GSM module was connected with MCU & controlled by AT commands had
known by us. Hence, AT commands were used to access and control the built-in commands of the mobile
phone. Table 3 shows AT commands that are used in the proposed system.
8. ISSN: 2088-8694
Int J Pow Elec & Dri Syst Vol. 10, No. 4, Dec 2019 : 1923 – 1931
1930
Table 3. System AT commands
AT command Descriptions
AT+CNMI New SMS message indications
AT+CMGF Select SMS message format
AT+CMGD Delete unauthorized SMS
AT+CMGS Send SMS to specific number
(It’s a security SMS from your asset. Please Check)
AT+CMGR Read authorized SMS
AT+CMEE To report mobile equipment error
5. CONCLUSION
This paper successfully implements a domestic security system based on emerging wireless
technology, microcontroller and GSM. The system was used along with an android application to maintain
security at any location through a panic-button. The system is intelligent enough to monitor the secure
environment and let the user know about the security infringement. The remote user can control his premises
from any part of the world through the GSM network. As GSM is a wireless technology, the user can get
alerts anywhere in the world thus making the system independent of location. For instance, the owner is
alerted through an SMS if any motion is detected in the touch box while the system was activated. MCU is
programmed for the system and main part of it. AT commands will be used in the system to explore the
services of mobile and control the services flexibly. The factors on which time is taken to send a message
depends on the range of a specified network and its coverage area. For global communication, GSM module
is used to communicate between the user and system. Traditional burglar alarm mode is also used to ensure
reliability. The GSM communication provides worldwide coverage, easy, and a low-cost way of information
interchange. The MCU provides interoperability of GSM and also makes this system portable and easy to
install as the system is embedded and does not require computer once programmed. A handmade touch
sensible circuit box had designed for the system which is the most attractive part of the system. Hence, the
touch sensible circuit makes the device cost low. So, it can provide a low-cost, fast and reliable security
service for any user to be used at their homes.
In this paper, it is shown that how an affordable, reliable home appliance controlling system can be
implemented where the controlling is possible anywhere within the GSM coverage area. There is no need of
an expert person to operate the system because the system is very easy to control. Additionally, it is possible
to implement the whole system in iOS and Windows operating system as well. Since the whole system is
done following the Android operating system. In the future, we will try to accommodate the biometric system
and face recognition techniques for locking and unlocking the system in the proposed model. We are working
on the project to expand it for complete building security and automation and also to interface it to the
internet through Wi-Fi networks. The proposed system can be able to help the whole economic situation in
any developing country if the system will be implemented in a larger field like banks, ATM booths,
universities, restaurants, hotels, industries, garments and many more. Specially, the system will save some
valuable time and reduce human efforts as well. It could be concluded that the proposed system considerably
have more scopes for further research and development in the near future that makes the system more
comfortable and user friendly.
REFERENCES
[1] Teymourzadeh R., Ahmed SA, Chan KW, and Hoong MV., “Smart gsm based home automation system,” arXiv
preprint arXiv:180603715. 2018.
[2] Elkamchouchi H. and ElShafee A., “Design and prototype implementation of SMS based home automation
system,” Electronics Design, Systems and Applications (ICEDSA), 2012 IEEE International Conference, 2012.
[3] Yuksekkaya B, Kayalar AA, Tosun MB, Ozcan MK, and Alkar AZ., “A GSM, internet and speech controlled
wireless interactive home automation system,” IEEE Transactions on Consumer Electronics, vol. 52(3),
pp. 837-43, 2006.
[4] Khandare MS and Mahajan A., “Mobile monitoring system for smart home,” Emerging Trends in Engineering and
Technology (ICETET), 2010 3rd International Conference, 2010.
[5] Islam MS, “Home security system based on pic18f452 microcontroller,” Electro/Information Technology (EiT),
2014 IEEE International Conference, 2014.
[6] Kaur I. Microcontroller based home automation system with security. International journal of advanced computer
science and applications. 2010;1(6):60-5.
[7] ElShafee A, Hamed KA. Design and implementation of a WIFI based home automation system. World academy of
science, engineering and technology. 2012;68:2177-80.
[8] Ibrahim VM, Victor AA. Microcontroller based anti-theft security system using GSM networks with text message
as feedback. International Journal of Engineering Research and Development. 2012;2(10):18-22.
9. Int J Pow Elec & Dri Syst ISSN: 2088-8694
Design prototype of a smart household touch sensitive locker security system based … (Mohammad Zeyad)
1931
[9] Teymourzadeh R, Ahmed SA, Chan KW, Hoong MV, editors. Smart gsm based home automation system. 2013
IEEE Conference on Systems, Process & Control (ICSPC); 2013: IEEE.
[10] Bangali J, Shaligram A. Design and Implementation of Security Systems for Smart Home based on GSM
technology. International Journal of Smart Home. 2013;7(6):201-8.
[11] Hasan R, Khan MM, Ashek A, Rumpa IJ. Microcontroller Based Home Security System with GSM Technology.
Open Journal of Safety Science and Technology. 2015;5(02):55.
[12] Amanullah M. Microcontroller based reprogrammable digital door lock security system by using keypad &
GSM/CDMA technology. IOSR Journal of electrical and Electronics Engineering (IOSR-JEEE). 2013;4(6):38-42.
[13] Chowdhury ZI, Imtiaz MH, Azam MM, Sumi MRA, Nur NS, editors. Design and implementation of pyroelectric
infrared sensor based security system using microcontroller. IEEE Technology Students' Symposium; 2011: IEEE.
[14] Coorporation A. Atmel atmega328p datasheet. ed; 2011.
[15] Amadi DN and Triono J., “Smart Home Development For Home Security With Android Based,” International
Journal of Advanced Research in Computer Science, vol. 8(9), 2017.
[16] Fossas E. and Olivar G., “Study of chaos in the buck converter,” IEEE Transactions on Circuits and Systems I:
Fundamental Theory and Applications, vol. 43(1), pp. 13-25, 1996.
[17] Schelle D. and Castorena J., Buck-converter design demystified. Power Electronics Technology, 2006.
[18] Delgado AR, Picking R, and Grout V., Remote-controlled home automation systems with different network
technologies. 2006.
[19] Zeyad M., Biswas P., Iqbal MZ, Ghosh S., and Biswas P., “Designing of Microcontroller Based Home Appliances
Governor Circuits,” Journal of Networks, vol. 3(2), pp. 58-63, 2018.
[20] Braginsky VB, Mitrofanov V, and Panov VI., Systems with small dissipation. University of Chicago Press, 1985
BIOGRAPHIES OF AUTHORS
Mohammad Zeyad received his BSc in Electrical and Electronic Engineering degree from
American International University-Bangladesh (AIUB) in 2017 with a concentration in the field
of Power Electronics. His area of interest is in Power Electronics Engineering, Internet of Things
(IoT), Biomedical Engineering, Wireless Communication, Microcontroller based system, signal
processing etc. (mohammadzeyad.aiub@gmail.com)
Susmita Ghosh obtained her BSc degree in EEE (2011) and MEng degree in MTEL (2013),
Faculty of Engineering from American International University-Bangladesh (AIUB). Currently
she is working as Assistant Professor in AIUB under the department of EEE, Faculty of
Engineering. Her research interests are in the field of Power System Analysis, Renewable
Energy and Smart Transportation System. (susmitaghosh29@gmail.com)
S.M. Masum Ahmed received his Bachelor of Science in Electrical & Electronic Engineering
degree from American International University-Bangladesh in 2018 with concentration in field
of Renewable Energy. His area of interest is in Renewable Energy (Concentrated Solar power
and Solar PV), Power Engineering (Micro-Grid & Power System Protection), Power Electronics,
Internet of Things (IoT), VHDL and Microcontroller based system.
(masum.ahmed.aiub@gmail.com)