SlideShare a Scribd company logo
SMART SECURITY SYSTEM USING
IOT
Master of Computer Application
Departmentof InformationTechnology
MaulanaAbul Kalam Azad University of Technology, West
Bengal
P R E S E N T E D BY :
RAUNAK MALLICK
ROLL: 10071021038
REG: 211000571010038
G U I D E D BY:
DR. JADAV CHANDRA DAS
CONTENTS
Introduction
Motivations
Literature Review
Proposed Method
Block Diagram, Proposed Diagram & Algorithm
Requirements
Future Scope
Conclusion
INTRODUCTION
 The Internet of Things (IoT) is a network of interconnected physical devices that can communicate and
share data without the need for human involvement.
 It has been explicitly defined as a “Information Society Infrastructure” because IoT enables us to
collect data from various mediums such as humans, animals, vehicles, and kitchen equipment Thus, any
physical object that can be assigned an IP address to permit data transfer over a network can be
integrated into an IoT system by integrating it with electronic hardware such as sensors, software, and
networking gear.
MOTIVATIONS
 Smart home security makes use of an assortment of IoT-enabled technologies to enable consumers to
remotely monitor and manage the security of their houses. These systems can control the monitoring in
and around the home, as well as who has access to the doors if they have smart locks.
 Home security is a critical component of the Internet of Things. IoT and artificial intelligence are ideal
for smart security. Closely monitoring your home has never been easier with CCTV cameras, doorbells,
smart lighting, and a variety of other alarm systems.
LITERATURE REVIEW
 Govinda et al. (2014) explored the Design and Implementation of Security for Smart Homes based on GSM
technology, which presents two techniques for implementing home security utilizing IoT [1]. One method is to use
web cameras so that if motion is detected by the camera, it sounds an alarm and sends an email to the owner. This
method of detecting infiltration is highly effective, if rather costly due to the cost of the cameras used in the
process. The cameras must be of high quality, which means they must have a wide range and picture quality high
enough to detect movement. Also, moveable cameras, such as dome cameras, are more expensive than fixed
cameras.
 Karri and Daniel (2005) recommended using internet services to deliver messages or alerts to the house owner
instead of traditional SMS.[2] Jayashri and Arvind (2013) created a fingerprint-based authentication method to
access a door [3].
PROPOSED METHOD
 After an in-depth literature review, I am devising a specialized project to create a smart security
system. This system provides a fingerprint based authentication to access the door lock. A
microcontroller and sensors are utilized to detect unauthorized behavior or any unknown suspicious
fingerprint and communicate information about a suspected intruder to the Cloud through the in-house
LAN connection.
 Additional security measures would be required to deploy the suggested system. Passwords and anti-
hacking software, for example, would need to be put in the system to prevent unwanted access to the
Cloud-based system.
BLOCK DIAGRAM
PROPOSED DIAGRAM
ALGORITHM
REQUIREMENTS
I. Arduino UNO/Raspberry Pi
II. PIR Sensor
III. Camera Module
IV. R307 Fingerprint Reader Optical Sensor Module
V. ESP32 (SquadPixel – WiFi, Bluetooth, Dual Core chip development board)
VI. OLED Display Module
VII. 12V Solenoid Lock
FUTURE SCOPE
 The proposed system can be improved by
 GSM (Call, GPRS)
 Video recording surveillance
 Install a temperature sensor to keep the organization's temperature stable, and so on.
CONCLUSION
 This paper describes the design and implementation of a smart home security system with email
interaction alert Smart Phone-enabled web and door access system. PC with a low-cost single-chip
processor that can perform administrators to obtain parameters of many remote devices can at
any time convey control information to field equipment via the Internet.
ABBREVATIONS
 ECU – Electronic Control Unit
 SSH – Secure Shell
 IP – Internet Protocol
 PIR – Passive Infrared Sensors
 GSM – Global System for Mobile Communications
 GPRS – General Packet Radio Service
REFERENCE
 Research Gate: https://www.researchgate.net/
 Govinda K and Sai Krishna Prasad K and Sai Ram Susheel 2014 Intrusion detection system for smart
home using laser rays International Journal for Scientific Research & Development (IJSRD)
Karri V and Daniel Lim J S 2005 Method and Device to Communicate via SMS after a Security Intrusion
1st International Conf. on Sensing Technology Palmerston North New Zealand 21-23
Sowjanya G and Nagaraju S 2016 Design and Implementation of Door Access Control and Security
System Based on IoT Inventive Computation Technologies (ICICT), International Conference on Inventive
THANK YOU !

More Related Content

What's hot

Home security system
Home security systemHome security system
Home security system
Chandan mishra
 
8 sem final report print copy (1)
8 sem final report print copy (1)8 sem final report print copy (1)
8 sem final report print copy (1)
Jha Bhargav
 
Smart door lock
Smart door lockSmart door lock
Smart door lock
aswin5432
 
Project report on home automation using Arduino
Project report on home automation using Arduino Project report on home automation using Arduino
Project report on home automation using Arduino
AMIT SANPUI
 
java mini project for college students
java mini project for college students java mini project for college students
java mini project for college students
SWETALEENA2
 
Report smart dustbin
Report smart dustbinReport smart dustbin
Report smart dustbin
Charmi Chokshi
 
Arduino Based Parking Lot System
Arduino Based Parking Lot SystemArduino Based Parking Lot System
Arduino Based Parking Lot System
United International University
 
Final Project Report of College Management System
Final Project Report of College Management SystemFinal Project Report of College Management System
Final Project Report of College Management System
MuhammadHusnainRaza
 
SRS For Online Store
SRS For Online StoreSRS For Online Store
SRS For Online Store
Ahsan Rizwan
 
Women safety device with gps tracking and alerts
Women safety device with gps tracking  and alertsWomen safety device with gps tracking  and alerts
Women safety device with gps tracking and alerts
Praween Lakra
 
Internet of Things (Iot) Based Robotic Arm
Internet of Things (Iot) Based Robotic ArmInternet of Things (Iot) Based Robotic Arm
Internet of Things (Iot) Based Robotic Arm
IRJET Journal
 
Mobile Based Attendance System
Mobile Based Attendance System Mobile Based Attendance System
Mobile Based Attendance System
Abhishek Jha
 
Home automation using android phones-Project 2nd phase ppt
Home automation using android phones-Project 2nd phase pptHome automation using android phones-Project 2nd phase ppt
Home automation using android phones-Project 2nd phase ppt
thrishma reddy
 
Smart Intelligent trolley
Smart Intelligent trolley Smart Intelligent trolley
Smart Intelligent trolley
yokesh waran
 
Information of online food system
Information of online food systemInformation of online food system
Information of online food system
Arpitsaxena79
 
Automated Plant Watering System
Automated Plant Watering SystemAutomated Plant Watering System
Automated Plant Watering System
Soumyadeep Kal
 
AUTOMATIC RAILWAY GATE CONTROL SYSTEM
AUTOMATIC RAILWAY GATE CONTROL SYSTEMAUTOMATIC RAILWAY GATE CONTROL SYSTEM
AUTOMATIC RAILWAY GATE CONTROL SYSTEM
JOLLUSUDARSHANREDDY
 
Smart mirror
Smart mirrorSmart mirror
Smart mirror
Technical Hub
 
Women Safety Night Patrolling Robot Using IOT
Women Safety Night Patrolling Robot Using IOTWomen Safety Night Patrolling Robot Using IOT
Women Safety Night Patrolling Robot Using IOT
Dr. Amarjeet Singh
 
CSE Final Year Project Presentation on Android Application
CSE Final Year Project Presentation on Android ApplicationCSE Final Year Project Presentation on Android Application
CSE Final Year Project Presentation on Android Application
Ahammad Karim
 

What's hot (20)

Home security system
Home security systemHome security system
Home security system
 
8 sem final report print copy (1)
8 sem final report print copy (1)8 sem final report print copy (1)
8 sem final report print copy (1)
 
Smart door lock
Smart door lockSmart door lock
Smart door lock
 
Project report on home automation using Arduino
Project report on home automation using Arduino Project report on home automation using Arduino
Project report on home automation using Arduino
 
java mini project for college students
java mini project for college students java mini project for college students
java mini project for college students
 
Report smart dustbin
Report smart dustbinReport smart dustbin
Report smart dustbin
 
Arduino Based Parking Lot System
Arduino Based Parking Lot SystemArduino Based Parking Lot System
Arduino Based Parking Lot System
 
Final Project Report of College Management System
Final Project Report of College Management SystemFinal Project Report of College Management System
Final Project Report of College Management System
 
SRS For Online Store
SRS For Online StoreSRS For Online Store
SRS For Online Store
 
Women safety device with gps tracking and alerts
Women safety device with gps tracking  and alertsWomen safety device with gps tracking  and alerts
Women safety device with gps tracking and alerts
 
Internet of Things (Iot) Based Robotic Arm
Internet of Things (Iot) Based Robotic ArmInternet of Things (Iot) Based Robotic Arm
Internet of Things (Iot) Based Robotic Arm
 
Mobile Based Attendance System
Mobile Based Attendance System Mobile Based Attendance System
Mobile Based Attendance System
 
Home automation using android phones-Project 2nd phase ppt
Home automation using android phones-Project 2nd phase pptHome automation using android phones-Project 2nd phase ppt
Home automation using android phones-Project 2nd phase ppt
 
Smart Intelligent trolley
Smart Intelligent trolley Smart Intelligent trolley
Smart Intelligent trolley
 
Information of online food system
Information of online food systemInformation of online food system
Information of online food system
 
Automated Plant Watering System
Automated Plant Watering SystemAutomated Plant Watering System
Automated Plant Watering System
 
AUTOMATIC RAILWAY GATE CONTROL SYSTEM
AUTOMATIC RAILWAY GATE CONTROL SYSTEMAUTOMATIC RAILWAY GATE CONTROL SYSTEM
AUTOMATIC RAILWAY GATE CONTROL SYSTEM
 
Smart mirror
Smart mirrorSmart mirror
Smart mirror
 
Women Safety Night Patrolling Robot Using IOT
Women Safety Night Patrolling Robot Using IOTWomen Safety Night Patrolling Robot Using IOT
Women Safety Night Patrolling Robot Using IOT
 
CSE Final Year Project Presentation on Android Application
CSE Final Year Project Presentation on Android ApplicationCSE Final Year Project Presentation on Android Application
CSE Final Year Project Presentation on Android Application
 

Similar to SMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptx

IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
IRJET Journal
 
Home security system using internet of things
Home security system using internet of thingsHome security system using internet of things
Home security system using internet of things
poovarasu maniandan
 
A Review Paper On Intelligent Home Automation Using Goggle Assistant
A Review Paper On Intelligent Home Automation Using Goggle AssistantA Review Paper On Intelligent Home Automation Using Goggle Assistant
A Review Paper On Intelligent Home Automation Using Goggle Assistant
Steven Wallach
 
Smart Security System IOT
Smart Security System IOTSmart Security System IOT
Smart Security System IOT
ijtsrd
 
Integrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internetIntegrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internet
TELKOMNIKA JOURNAL
 
Internet of things for the “smart home”
Internet of things for the “smart home”Internet of things for the “smart home”
Internet of things for the “smart home”
Virendra Thakur
 
IRJET- A Survey on Secure Protocols of Communication for IoT Components i...
IRJET-  	  A Survey on Secure Protocols of Communication for IoT Components i...IRJET-  	  A Survey on Secure Protocols of Communication for IoT Components i...
IRJET- A Survey on Secure Protocols of Communication for IoT Components i...
IRJET Journal
 
IOT Based Smart Home System Technologies
IOT Based Smart Home System TechnologiesIOT Based Smart Home System Technologies
IOT Based Smart Home System Technologies
IJERDJOURNAL
 
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTEnergy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoT
IJEACS
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile application
Alexander Decker
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
ijsrd.com
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
KanagarajanSwamiappa
 
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET Journal
 
Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...
journalBEEI
 
Smart and Secure Home using IoT
Smart and Secure Home using IoTSmart and Secure Home using IoT
Smart and Secure Home using IoT
IRJET Journal
 
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET Journal
 
IRJET - Smart Classroom Automation based on IoT
IRJET -  	  Smart Classroom Automation based on IoTIRJET -  	  Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoT
IRJET Journal
 
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET-  	  Design and Implementation of Smart Home Security System based on IoTIRJET-  	  Design and Implementation of Smart Home Security System based on IoT
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET Journal
 
Home security based on Internet of things Review paper
Home security based on Internet of things Review paperHome security based on Internet of things Review paper
Home security based on Internet of things Review paper
IRJET Journal
 
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Conference Papers
 

Similar to SMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptx (20)

IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
 
Home security system using internet of things
Home security system using internet of thingsHome security system using internet of things
Home security system using internet of things
 
A Review Paper On Intelligent Home Automation Using Goggle Assistant
A Review Paper On Intelligent Home Automation Using Goggle AssistantA Review Paper On Intelligent Home Automation Using Goggle Assistant
A Review Paper On Intelligent Home Automation Using Goggle Assistant
 
Smart Security System IOT
Smart Security System IOTSmart Security System IOT
Smart Security System IOT
 
Integrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internetIntegrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internet
 
Internet of things for the “smart home”
Internet of things for the “smart home”Internet of things for the “smart home”
Internet of things for the “smart home”
 
IRJET- A Survey on Secure Protocols of Communication for IoT Components i...
IRJET-  	  A Survey on Secure Protocols of Communication for IoT Components i...IRJET-  	  A Survey on Secure Protocols of Communication for IoT Components i...
IRJET- A Survey on Secure Protocols of Communication for IoT Components i...
 
IOT Based Smart Home System Technologies
IOT Based Smart Home System TechnologiesIOT Based Smart Home System Technologies
IOT Based Smart Home System Technologies
 
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTEnergy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoT
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile application
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
 
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
 
Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...
 
Smart and Secure Home using IoT
Smart and Secure Home using IoTSmart and Secure Home using IoT
Smart and Secure Home using IoT
 
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
 
IRJET - Smart Classroom Automation based on IoT
IRJET -  	  Smart Classroom Automation based on IoTIRJET -  	  Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoT
 
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET-  	  Design and Implementation of Smart Home Security System based on IoTIRJET-  	  Design and Implementation of Smart Home Security System based on IoT
IRJET- Design and Implementation of Smart Home Security System based on IoT
 
Home security based on Internet of things Review paper
Home security based on Internet of things Review paperHome security based on Internet of things Review paper
Home security based on Internet of things Review paper
 
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
 

More from Maulana Abul Kalam Azad University of Technology

Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT) Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)
Maulana Abul Kalam Azad University of Technology
 
IOT BASED RFID SMART DOOR LOCK SYSTEM USING NODE MCU - MAJOR.pptx
IOT BASED RFID SMART DOOR LOCK SYSTEM USING NODE MCU - MAJOR.pptxIOT BASED RFID SMART DOOR LOCK SYSTEM USING NODE MCU - MAJOR.pptx
IOT BASED RFID SMART DOOR LOCK SYSTEM USING NODE MCU - MAJOR.pptx
Maulana Abul Kalam Azad University of Technology
 
Analysis of Algorithm - Binary Search.pptx
Analysis of Algorithm - Binary Search.pptxAnalysis of Algorithm - Binary Search.pptx
Analysis of Algorithm - Binary Search.pptx
Maulana Abul Kalam Azad University of Technology
 
Interprocess Communication.pptx
Interprocess Communication.pptxInterprocess Communication.pptx
Interprocess Communication.pptx
Maulana Abul Kalam Azad University of Technology
 
Green house gases & effects
Green house gases & effectsGreen house gases & effects
8085 Microprocessor
8085 Microprocessor8085 Microprocessor
Samsung Galaxy S9+
Samsung Galaxy S9+Samsung Galaxy S9+
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
Normalization in DBMS
Normalization in DBMSNormalization in DBMS
Introduction to manufacturing process
Introduction to manufacturing processIntroduction to manufacturing process
Introduction to manufacturing process
Maulana Abul Kalam Azad University of Technology
 
Samsung Galaxy S8 Plus
Samsung Galaxy S8 PlusSamsung Galaxy S8 Plus
Robotic Science
Robotic ScienceRobotic Science

More from Maulana Abul Kalam Azad University of Technology (12)

Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT) Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)
 
IOT BASED RFID SMART DOOR LOCK SYSTEM USING NODE MCU - MAJOR.pptx
IOT BASED RFID SMART DOOR LOCK SYSTEM USING NODE MCU - MAJOR.pptxIOT BASED RFID SMART DOOR LOCK SYSTEM USING NODE MCU - MAJOR.pptx
IOT BASED RFID SMART DOOR LOCK SYSTEM USING NODE MCU - MAJOR.pptx
 
Analysis of Algorithm - Binary Search.pptx
Analysis of Algorithm - Binary Search.pptxAnalysis of Algorithm - Binary Search.pptx
Analysis of Algorithm - Binary Search.pptx
 
Interprocess Communication.pptx
Interprocess Communication.pptxInterprocess Communication.pptx
Interprocess Communication.pptx
 
Green house gases & effects
Green house gases & effectsGreen house gases & effects
Green house gases & effects
 
8085 Microprocessor
8085 Microprocessor8085 Microprocessor
8085 Microprocessor
 
Samsung Galaxy S9+
Samsung Galaxy S9+Samsung Galaxy S9+
Samsung Galaxy S9+
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless Technology
 
Normalization in DBMS
Normalization in DBMSNormalization in DBMS
Normalization in DBMS
 
Introduction to manufacturing process
Introduction to manufacturing processIntroduction to manufacturing process
Introduction to manufacturing process
 
Samsung Galaxy S8 Plus
Samsung Galaxy S8 PlusSamsung Galaxy S8 Plus
Samsung Galaxy S8 Plus
 
Robotic Science
Robotic ScienceRobotic Science
Robotic Science
 

Recently uploaded

Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 

Recently uploaded (20)

Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 

SMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptx

  • 1. SMART SECURITY SYSTEM USING IOT Master of Computer Application Departmentof InformationTechnology MaulanaAbul Kalam Azad University of Technology, West Bengal P R E S E N T E D BY : RAUNAK MALLICK ROLL: 10071021038 REG: 211000571010038 G U I D E D BY: DR. JADAV CHANDRA DAS
  • 2. CONTENTS Introduction Motivations Literature Review Proposed Method Block Diagram, Proposed Diagram & Algorithm Requirements Future Scope Conclusion
  • 3. INTRODUCTION  The Internet of Things (IoT) is a network of interconnected physical devices that can communicate and share data without the need for human involvement.  It has been explicitly defined as a “Information Society Infrastructure” because IoT enables us to collect data from various mediums such as humans, animals, vehicles, and kitchen equipment Thus, any physical object that can be assigned an IP address to permit data transfer over a network can be integrated into an IoT system by integrating it with electronic hardware such as sensors, software, and networking gear.
  • 4. MOTIVATIONS  Smart home security makes use of an assortment of IoT-enabled technologies to enable consumers to remotely monitor and manage the security of their houses. These systems can control the monitoring in and around the home, as well as who has access to the doors if they have smart locks.  Home security is a critical component of the Internet of Things. IoT and artificial intelligence are ideal for smart security. Closely monitoring your home has never been easier with CCTV cameras, doorbells, smart lighting, and a variety of other alarm systems.
  • 5. LITERATURE REVIEW  Govinda et al. (2014) explored the Design and Implementation of Security for Smart Homes based on GSM technology, which presents two techniques for implementing home security utilizing IoT [1]. One method is to use web cameras so that if motion is detected by the camera, it sounds an alarm and sends an email to the owner. This method of detecting infiltration is highly effective, if rather costly due to the cost of the cameras used in the process. The cameras must be of high quality, which means they must have a wide range and picture quality high enough to detect movement. Also, moveable cameras, such as dome cameras, are more expensive than fixed cameras.  Karri and Daniel (2005) recommended using internet services to deliver messages or alerts to the house owner instead of traditional SMS.[2] Jayashri and Arvind (2013) created a fingerprint-based authentication method to access a door [3].
  • 6. PROPOSED METHOD  After an in-depth literature review, I am devising a specialized project to create a smart security system. This system provides a fingerprint based authentication to access the door lock. A microcontroller and sensors are utilized to detect unauthorized behavior or any unknown suspicious fingerprint and communicate information about a suspected intruder to the Cloud through the in-house LAN connection.  Additional security measures would be required to deploy the suggested system. Passwords and anti- hacking software, for example, would need to be put in the system to prevent unwanted access to the Cloud-based system.
  • 10. REQUIREMENTS I. Arduino UNO/Raspberry Pi II. PIR Sensor III. Camera Module IV. R307 Fingerprint Reader Optical Sensor Module V. ESP32 (SquadPixel – WiFi, Bluetooth, Dual Core chip development board) VI. OLED Display Module VII. 12V Solenoid Lock
  • 11. FUTURE SCOPE  The proposed system can be improved by  GSM (Call, GPRS)  Video recording surveillance  Install a temperature sensor to keep the organization's temperature stable, and so on.
  • 12. CONCLUSION  This paper describes the design and implementation of a smart home security system with email interaction alert Smart Phone-enabled web and door access system. PC with a low-cost single-chip processor that can perform administrators to obtain parameters of many remote devices can at any time convey control information to field equipment via the Internet.
  • 13. ABBREVATIONS  ECU – Electronic Control Unit  SSH – Secure Shell  IP – Internet Protocol  PIR – Passive Infrared Sensors  GSM – Global System for Mobile Communications  GPRS – General Packet Radio Service
  • 14. REFERENCE  Research Gate: https://www.researchgate.net/  Govinda K and Sai Krishna Prasad K and Sai Ram Susheel 2014 Intrusion detection system for smart home using laser rays International Journal for Scientific Research & Development (IJSRD) Karri V and Daniel Lim J S 2005 Method and Device to Communicate via SMS after a Security Intrusion 1st International Conf. on Sensing Technology Palmerston North New Zealand 21-23 Sowjanya G and Nagaraju S 2016 Design and Implementation of Door Access Control and Security System Based on IoT Inventive Computation Technologies (ICICT), International Conference on Inventive