SlideShare a Scribd company logo
1 of 24
By-
Iliyas Khan(T150408532)
Guided by-
Prof. V. R. Pawar
Jayawantrao Sawant College of Engineering
Department of Information Technology
Table of Contents
 Project Details
 Project Motivation
 Problem Statement
 Aims and Objectives
 Introduction
 Literature Survey
 Architecture
 Advantages & Disadvantages
 Conclusion
 Problem Statement
 References
17-03-2018 2
PROJECT DETAILS
 Project Topic: Remote Monitoring and Security
 Project Domain: Mobile Application
 Project Group Members:
-T150408532 Iliyas Khan
-T150408551 Utkarsh Patil
-T150408535 Shantanu Kulkarni
17-03-2018 3
PROJECT MOTIVATION
 As technology is getting advanced people are getting
more curious to automate things and control it
remotely.
 As there is a saying “Charity begins at home” we came
up with the idea of securing, automating and monitoring
our home remotely using android application.
17-03-2018 4
PROBLEM STATEMENT
To design and implement an android application which
will monitor, secure and automate home as well as help in
monitoring and automating irrigation system.
17-03-2018 5
Aims and Objectives
 Aim: The main aim of this project is to give overall control of
his house to the user even when he is away.
 Objective:
• To create a safe and secured home environment which
will keep thieves and burglars away.
• To automate and monitor home remotely from any corner
of the world.
17-03-2018 6
PROJECT AND SEMINAR TOPICS
 Project Topic : Remote monitoring and security
 Iliyas Khan : Secured home with 3 factor authentication
using android application.
 Utkarsh Patil: Smart home automation for elderly living
people using WSN and android application.
 Shantanu Kulkarni :Remote Monitoring and Control for
Liquid Fertilizer and Water Irrigation
17-03-2018 7
INTRODUCTION
 Smart maintenance of security has emerged as a cardinal
concern for any personnel systems, especially for an individuals
dwelling place.
 Over the last decade, the rapid rise of burglary and theft all over the
world is threatening due to the vulnerability of traditional home
security systems.
 According to Knoema.com, a company which deals with data.
Netherland is the top most country with highest rate of burglary.
17-03-2018 8
BURGLARY RATE BY COUNTRIES
(CASES PER 100,000 POPULATION)
17-03-2018 9
BURGLARY RATE –INDIA
(CASES PER 100,000 POPULATION)
17-03-2018 10
 Looking at the statistics, It is very important to create a
safe and secured home environment to avoid theft and
burglary.
 The only thing that is with us all time in today’s world is
our smartphone.
 We can carry out Remote monitoring and security of
house using a mobile application.
 It will help us to check security and monitor our homes
from any corner of the world just using an internet
connection.
17-03-2018 11
LITERATURE SURVEY
SR. NO TITLE COMMUNICATION DISADVANTAGE
1 Machine-to-machine
Communication Based
Smart
Home Security System by
NFC, Fingerprint, and
PIR Sensor with Mobile
Android Application
Machine to
Machine
Communication.
They used NFC tag,
if this tag is
misplaced and
found by anyone he
can easily pass the
security
2 SMART HOME
AUTOMATION BY GSM
USING ANDROID
APPLICATION
Communication
using GSM.
Besides micro
controller, GSM kit
is also required
which increases
the cost and
complexity.
17-03-2018 12
ARCHITECTURE
 A secured home can be created using micro-controller
like raspberry pi 3 and an android application.
 Adding 3-factor authentication will maximize the
security and make the system more robust.
 An android application with a good GUI(Graphical User
interface) will help user to check security and monitor
its house while he is away.
17-03-2018 13
3-FACTOR AUTHENTICATION
Three factors used for authentication are
1. FINGERPRINT
2. PASSWORD
3. VOICE RECOGNITION
17-03-2018 14
FINGERPRINT
Fingerprint is widely used as it uniquely identifies every person.
17-03-2018 15
PASSWORD
A combination of alphanumeric, uppercase and lowercase password is very strong and
harder to break.
17-03-2018 16
VOICE RECOGNITION
The easiest way anyone can enter his home is using voice commands; feels like iron man.
17-03-2018 17
Overall System Architecture
The overall architecture is shown using 3 factor-authentication.
17-03-2018 18
ANDROID APPLICATION
 The most popular mobile OS is Android.
 It is open source and app developers mostly prefer
Android than any other OS due to its high usability
among people.
 The best way to monitor something or configure
something is using a GUI.
 We will be creating an Android application called “SAM”
which is an abbreviation for Secure, Automate and
Monitor.
17-03-2018 19
SAM – Android Application
 This mobile app will secure, monitor and automate a
traditional home and make it a smart home.
 It will be very easy to activate and deactivate the
security levels of the house using a graphical interface.
 On a daily basis user can just activate voice recognition
to allow verified person access the home easily.
 If the family is going for a vacation the user can
activate all three factors i.e password, fingerprint and
voice recognition to achieve maximum security.
 If someone tries to break the system the user will get a
notification so that he can take action.
17-03-2018 20
Advantages
 Using 3-factor authentication maximum security is achieved.
 User can easily activate or deactivate the 3 levels of security based on
his requirement.
 User can give access remotely to anyone he wants using a one time
password.
 No worry of carrying or loosing your house key.
17-03-2018 21
Disadvantages
 Power shortage may cause the system to fail.
 internet connection is required continuously.
 Installation and maintenance cost is high.
Conclusion
 This seminar has helped us with a lot of information
regarding development of android application,
networking and hardware. We explored different micro
processors such as Arduino Uno, Raspberry Pi 3 etc.
 This will help us in developing our last year project.
17-03-2018 22
References
1. Sayidul Morsalin, A. M. Jahirul Islam, Golam R. Rahat,
Syed R. H. Pidim, Abdur Rahman, Md A. B. Siddiqe
“Machine-to-machine Communication Based Smart
Home Security System by NFC, Fingerprint, and PIR
Sensor with Mobile Android Application”,(ICEEICT) 22-24
Sept. 2016.
2. Shubham Magar, Varsha Saste, Ashwini Lahane, Sangram
Konde, Supriya Madne, “SMART HOME AUTOMATION BY
GSM USING ANDROID APPLICATION”, 2017 International
Conference on Information Communication and
Embedded Systems (ICICES)
17-03-2018 23
THANK YOU!
17-03-2018 24

More Related Content

What's hot

Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondNandita Nityanandam
 
Cyber security; one banker s perspective
Cyber security; one banker s perspectiveCyber security; one banker s perspective
Cyber security; one banker s perspectiveMohammad Ibrahim Fheili
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesBijay Senihang
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 
Advantages Of Using Cyber Security Solution
Advantages Of Using Cyber Security SolutionAdvantages Of Using Cyber Security Solution
Advantages Of Using Cyber Security SolutionCyber Infrastructure INC
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get InterestingIBM Security
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsSaad Ahmad
 
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysisnullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysisn|u - The Open Security Community
 
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...Avantika University
 
Cyber Security - Flier
Cyber Security - FlierCyber Security - Flier
Cyber Security - FlierSunit Belapure
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017Bill Chamberlin
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?Ping Identity
 
Mobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityMobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityZimperium
 
SITSecure Audits
SITSecure AuditsSITSecure Audits
SITSecure Auditsaristoslabs
 
Digital Transformation and the Role of IAM
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAMPing Identity
 

What's hot (20)

Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
Cyber security; one banker s perspective
Cyber security; one banker s perspectiveCyber security; one banker s perspective
Cyber security; one banker s perspective
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data Breaches
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
Advantages Of Using Cyber Security Solution
Advantages Of Using Cyber Security SolutionAdvantages Of Using Cyber Security Solution
Advantages Of Using Cyber Security Solution
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
 
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysisnullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
 
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
 
Cyber security basics
Cyber security basics Cyber security basics
Cyber security basics
 
Cyber Security - Flier
Cyber Security - FlierCyber Security - Flier
Cyber Security - Flier
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
 
Mobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityMobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested Reality
 
Cyber security
Cyber security Cyber security
Cyber security
 
SITSecure Audits
SITSecure AuditsSITSecure Audits
SITSecure Audits
 
Digital Transformation and the Role of IAM
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAM
 
Cyber security and Homeland security
Cyber security and Homeland securityCyber security and Homeland security
Cyber security and Homeland security
 

Similar to Secured home with 3 factor authentication using android application

IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoTIRJET Journal
 
Implementation security system using motorcycle fingerprint identification an...
Implementation security system using motorcycle fingerprint identification an...Implementation security system using motorcycle fingerprint identification an...
Implementation security system using motorcycle fingerprint identification an...TELKOMNIKA JOURNAL
 
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET Journal
 
Development of anti theft security system
Development of anti theft security systemDevelopment of anti theft security system
Development of anti theft security system96452128
 
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Clouditalia Telecomunicazioni
 
Integrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internetIntegrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internetTELKOMNIKA JOURNAL
 
Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Rick Bouter
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Capgemini
 
Smart Door Monitoring and Locking system
Smart Door Monitoring and Locking systemSmart Door Monitoring and Locking system
Smart Door Monitoring and Locking systemIRJET Journal
 
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...
IRJET - Safety and Security Aspects of Smart Home Applications using Face...IRJET Journal
 
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONIRJET Journal
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...IJECEIAES
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docxaulasnilda
 
Design and realization of motion detector system for house security
Design and realization of motion detector system for house securityDesign and realization of motion detector system for house security
Design and realization of motion detector system for house securityTELKOMNIKA JOURNAL
 
Smart home automation towards the development of smart cities
Smart home automation towards the development  of smart citiesSmart home automation towards the development  of smart cities
Smart home automation towards the development of smart citiesCSITiaesprime
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceCigdem Sengul
 
Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT IJECEIAES
 
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of ThingIRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of ThingIRJET Journal
 

Similar to Secured home with 3 factor authentication using android application (20)

IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
 
Implementation security system using motorcycle fingerprint identification an...
Implementation security system using motorcycle fingerprint identification an...Implementation security system using motorcycle fingerprint identification an...
Implementation security system using motorcycle fingerprint identification an...
 
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET- Authentication System in Social Networks
IRJET- Authentication System in Social Networks
 
Development of anti theft security system
Development of anti theft security systemDevelopment of anti theft security system
Development of anti theft security system
 
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
 
Integrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internetIntegrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internet
 
Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
 
Smart Door Monitoring and Locking system
Smart Door Monitoring and Locking systemSmart Door Monitoring and Locking system
Smart Door Monitoring and Locking system
 
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
 
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
 
IoT
IoTIoT
IoT
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
 
Design and realization of motion detector system for house security
Design and realization of motion detector system for house securityDesign and realization of motion detector system for house security
Design and realization of motion detector system for house security
 
Security analysis of emerging smart home applications 11.2016
Security analysis of emerging smart home applications 11.2016Security analysis of emerging smart home applications 11.2016
Security analysis of emerging smart home applications 11.2016
 
Smart home automation towards the development of smart cities
Smart home automation towards the development  of smart citiesSmart home automation towards the development  of smart cities
Smart home automation towards the development of smart cities
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT
 
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of ThingIRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of Thing
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Secured home with 3 factor authentication using android application

  • 1. By- Iliyas Khan(T150408532) Guided by- Prof. V. R. Pawar Jayawantrao Sawant College of Engineering Department of Information Technology
  • 2. Table of Contents  Project Details  Project Motivation  Problem Statement  Aims and Objectives  Introduction  Literature Survey  Architecture  Advantages & Disadvantages  Conclusion  Problem Statement  References 17-03-2018 2
  • 3. PROJECT DETAILS  Project Topic: Remote Monitoring and Security  Project Domain: Mobile Application  Project Group Members: -T150408532 Iliyas Khan -T150408551 Utkarsh Patil -T150408535 Shantanu Kulkarni 17-03-2018 3
  • 4. PROJECT MOTIVATION  As technology is getting advanced people are getting more curious to automate things and control it remotely.  As there is a saying “Charity begins at home” we came up with the idea of securing, automating and monitoring our home remotely using android application. 17-03-2018 4
  • 5. PROBLEM STATEMENT To design and implement an android application which will monitor, secure and automate home as well as help in monitoring and automating irrigation system. 17-03-2018 5
  • 6. Aims and Objectives  Aim: The main aim of this project is to give overall control of his house to the user even when he is away.  Objective: • To create a safe and secured home environment which will keep thieves and burglars away. • To automate and monitor home remotely from any corner of the world. 17-03-2018 6
  • 7. PROJECT AND SEMINAR TOPICS  Project Topic : Remote monitoring and security  Iliyas Khan : Secured home with 3 factor authentication using android application.  Utkarsh Patil: Smart home automation for elderly living people using WSN and android application.  Shantanu Kulkarni :Remote Monitoring and Control for Liquid Fertilizer and Water Irrigation 17-03-2018 7
  • 8. INTRODUCTION  Smart maintenance of security has emerged as a cardinal concern for any personnel systems, especially for an individuals dwelling place.  Over the last decade, the rapid rise of burglary and theft all over the world is threatening due to the vulnerability of traditional home security systems.  According to Knoema.com, a company which deals with data. Netherland is the top most country with highest rate of burglary. 17-03-2018 8
  • 9. BURGLARY RATE BY COUNTRIES (CASES PER 100,000 POPULATION) 17-03-2018 9
  • 10. BURGLARY RATE –INDIA (CASES PER 100,000 POPULATION) 17-03-2018 10
  • 11.  Looking at the statistics, It is very important to create a safe and secured home environment to avoid theft and burglary.  The only thing that is with us all time in today’s world is our smartphone.  We can carry out Remote monitoring and security of house using a mobile application.  It will help us to check security and monitor our homes from any corner of the world just using an internet connection. 17-03-2018 11
  • 12. LITERATURE SURVEY SR. NO TITLE COMMUNICATION DISADVANTAGE 1 Machine-to-machine Communication Based Smart Home Security System by NFC, Fingerprint, and PIR Sensor with Mobile Android Application Machine to Machine Communication. They used NFC tag, if this tag is misplaced and found by anyone he can easily pass the security 2 SMART HOME AUTOMATION BY GSM USING ANDROID APPLICATION Communication using GSM. Besides micro controller, GSM kit is also required which increases the cost and complexity. 17-03-2018 12
  • 13. ARCHITECTURE  A secured home can be created using micro-controller like raspberry pi 3 and an android application.  Adding 3-factor authentication will maximize the security and make the system more robust.  An android application with a good GUI(Graphical User interface) will help user to check security and monitor its house while he is away. 17-03-2018 13
  • 14. 3-FACTOR AUTHENTICATION Three factors used for authentication are 1. FINGERPRINT 2. PASSWORD 3. VOICE RECOGNITION 17-03-2018 14
  • 15. FINGERPRINT Fingerprint is widely used as it uniquely identifies every person. 17-03-2018 15
  • 16. PASSWORD A combination of alphanumeric, uppercase and lowercase password is very strong and harder to break. 17-03-2018 16
  • 17. VOICE RECOGNITION The easiest way anyone can enter his home is using voice commands; feels like iron man. 17-03-2018 17
  • 18. Overall System Architecture The overall architecture is shown using 3 factor-authentication. 17-03-2018 18
  • 19. ANDROID APPLICATION  The most popular mobile OS is Android.  It is open source and app developers mostly prefer Android than any other OS due to its high usability among people.  The best way to monitor something or configure something is using a GUI.  We will be creating an Android application called “SAM” which is an abbreviation for Secure, Automate and Monitor. 17-03-2018 19
  • 20. SAM – Android Application  This mobile app will secure, monitor and automate a traditional home and make it a smart home.  It will be very easy to activate and deactivate the security levels of the house using a graphical interface.  On a daily basis user can just activate voice recognition to allow verified person access the home easily.  If the family is going for a vacation the user can activate all three factors i.e password, fingerprint and voice recognition to achieve maximum security.  If someone tries to break the system the user will get a notification so that he can take action. 17-03-2018 20
  • 21. Advantages  Using 3-factor authentication maximum security is achieved.  User can easily activate or deactivate the 3 levels of security based on his requirement.  User can give access remotely to anyone he wants using a one time password.  No worry of carrying or loosing your house key. 17-03-2018 21 Disadvantages  Power shortage may cause the system to fail.  internet connection is required continuously.  Installation and maintenance cost is high.
  • 22. Conclusion  This seminar has helped us with a lot of information regarding development of android application, networking and hardware. We explored different micro processors such as Arduino Uno, Raspberry Pi 3 etc.  This will help us in developing our last year project. 17-03-2018 22
  • 23. References 1. Sayidul Morsalin, A. M. Jahirul Islam, Golam R. Rahat, Syed R. H. Pidim, Abdur Rahman, Md A. B. Siddiqe “Machine-to-machine Communication Based Smart Home Security System by NFC, Fingerprint, and PIR Sensor with Mobile Android Application”,(ICEEICT) 22-24 Sept. 2016. 2. Shubham Magar, Varsha Saste, Ashwini Lahane, Sangram Konde, Supriya Madne, “SMART HOME AUTOMATION BY GSM USING ANDROID APPLICATION”, 2017 International Conference on Information Communication and Embedded Systems (ICICES) 17-03-2018 23