scispace - formally typeset
Search or ask a question
Book ChapterDOI

Smart Security System Using IoT and Mobile Assistance

01 Jan 2020-pp 441-453
TL;DR: A wireless intrusion detection smart security system is designed and developed to overcome the research gaps in the existing systems and is a lightweight, low cost, extensible, flexible wireless IoT-based-smart security system which will permit the mobile devices and computers to remotely trail the happenings at the location, record the activities and save them in the prefixed cloud storage account.
Abstract: The digital era has witnessed giant strides in the utilization of security systems, which perform certain pre-programmed tasks when a secured zone is breached. The prevailing traditional security systems have evolved embracing the cutting-edge technologies from time to time. The avalanche-like explosion of things and their connectivity through Internet have opened several new boulevards of exploration. The unification of security system based on the IoT platform has the potential of interrelating real time with the devices and makes them smart, with issues like privacy. To keep the issues in the bay, a new intrusion detection system is the need of the hour. Hence, a wireless intrusion detection smart security system is designed and developed to overcome the research gaps in the existing systems. The smart security system is built on the Internet of things. The system is a lightweight, low cost, extensible, flexible wireless IoT-based-smart security system which will permit the mobile devices and computers to remotely trail the happenings at the location, record the activities and save them in the prefixed cloud storage account. The system uses the hardware (things) to sense and fetch the data which is processed by the embedded software. On the occurrence of an abnormal activity (like breaching by an intruder), a valid signal is detected, and it sends signal to the board directing it to run the alert module. The alert module activates the GSM API to immediately alert the end-user by mobile. This system thus provides a wireless, incessant service to all the stakeholders by phone regarding the breaches occurring in the environment. This implemented smart security system using IoT with mobile assistance also integrates the various alarms, sends alert as pre-programmed, tracks the movements automatically, uses the state-of-the-art appropriate latest technologies to alert the concerned stakeholders and waits for actions to be taken.
Citations
More filters
Journal ArticleDOI
TL;DR: This framework harnesses the benefits of Block Chain like reduced cost, speed, automation, immutability, near-impossible loss of data, permanence, removal of intermediaries, decentralization of consensus, legitimate access to health data, data safekeeping, accrual-based imbursement mechanisms, and medical supply chain efficacy.
Abstract: The most burning topic of today, calls for a holistic solution that is reliable, secure, privacy preserved, cost effective Cloud storage that can tide over the turbulent conditions of the rapidly budding digital storage technologies. This send an outcry for a devoted solution, in the form of an individualized, patient-centric care - IoMT that augments precise disease identifications, decrease in errors, reduction in costs of care through the support of technology, allows patients to direct health information data to doctors,manage drugs, keep Personal Health Records, caters to remote medical supports Care, provides proactive approach to preserving Good Health, improves and Accelerates Clinician Workflows, empowers extreme connectivity due to better automation and perceptions in the DNA of IoMT functions. But IoMT adoption is like a rose with thorns like constraints of increased administrative costs, deficiency of universal data access, present-day electronic medical records. The BCT is used in the framework to overcome the security issues of IoMT through the use of latest encryptions. Furthermore, this framework harnesses the benefits of Block Chain like reduced cost, speed, automation, immutability, near-impossible loss of data, permanence, removal of intermediaries, decentralization of consensus, legitimate access to health data, data safekeeping, accrual-based imbursement mechanisms, and medical supply chain efficacy. The outcomes in this paper are (i)A systematic investigation of the current IoMT, Block Chain and Cloud Storage in Health Care;(ii) Explore the challenges and necessities for the confluence of Block Chain (BC), Internet of Medical Things (IoMT), Cloud Computing (CC);(iii)Formulate the requirements necessary for the real-time remote Health Care of one-to-one care structure, which, supports the vital functions that are critical to the Patient Centric Health Care;(iv) Design and develop a novel BC IoMT U6 HCS (Block Chain based Internet of Medical Things for Uninterrupted, Ubiquitous, User-friendly, Unflappable, Unblemished, Unlimited Health Care Services) Layered Architecture, to support the vital functions critical for Patient Centric Health Care and (v) Implement and test with the previous established and proven techniques. The integrity of the Layered Architecture is validated with the already existing ones in terms of audit performances. The results from the Layered Architecture are validated and are proven to be competent in achieving safe auditing and surpass the former ones. The technology is in the sprouting phases, it is perilous that affiliates of the Health Care community realize the rudimentary ideas behind Block Chain, and detect its feasible impact on the future of patient centric medical care. Finally, and most importantly, this paper also gives a panoramic view on the current research status, and imminent directions of Secure Internet of Medical Things Using Block Chain.

43 citations


Cites background from "Smart Security System Using IoT and..."

  • ...A few worth mentioning and the pertinent concepts of preserving privacy are prevailing in literatures, [26]–[29], [38]–[51], [66]–[68], [81], [90]....

    [...]

Book ChapterDOI
01 Jan 2022
TL;DR: In this paper, the authors have developed and installed IoT-based security system for agriculture fields capable to detect and communicate presence of wild animals using PIR sensor and GSM module.
Abstract: Farmers face well-known challenges of crop protection from insect pests, diseases, and weeds along with protection from contrary weather conditions like hail or frost. However, they face another important challenge of protecting crops from wild animals that may cause severe damage to their grown crops by feeding on plant parts or trampling over the crops. As most of farmers stay away from their fields, continuous monitoring of fields is not possible due to distance as well as costs involved to appoint manpower for this purpose. Present technologies have made it possible to provide low cost, easy to install, and user friendly solution to such problems. This paper aims to develop and install IoT-based security system for agriculture fields capable to detect and communicate presence of wild animals using PIR sensor and GSM module. It generates SMS alerts on the farmer’s mobile phone whenever some animal crosses specific area. It helps farmers to take timely action for crop protection. The security system is deployed in real environment to validate its applicability and possible future extensions.

1 citations

Journal ArticleDOI
TL;DR: In this article , a highly effective face recognition system has been proposed by incorporating genetic algorithms for better search strategy, the proposed model works in two-step processes: face feature extraction and face pattern matching.
Abstract: In the modern environment, the innovations emerging in information technology has driven us to focus on strengthening the security process. This led to the recent advancement in face recognition technology and special attention is given to the recognition process by applying a biometric system for personal identification. Face recognition is renowned as one of the efficacious applications of picture study, popularly applied for reliable biometric where security is the important quality attribute to be achieved. In this paper, a highly effective face recognition system has been proposed by incorporating genetic algorithms for better search strategy. The proposed model works in two-step processes: face feature extraction and face pattern matching. The Haralick features and features extracted from face databases using PCA are used for face recognition. The most eminent artificial firefirefly swarm optimization algorithm is employed for better searching and matching of facial features. From the simulation experiments performed on the faces warehoused in the OUR database, the result has shown that the model is highly efficient, the PCA method has achieved 80.6% of recognition rate and the AFSA has acquired 88.9% accuracy in correct recognition rate.
Journal ArticleDOI
TL;DR: In this paper , a context-aware threat intelligence and response model identifies the states of the aligned smart devices to distinguish between real-world typical and attack scenarios, and dynamically writes specific rules for protection against potential cyber threats.
Abstract: Smart cities, businesses, workplaces, and even residences have all been converged by the Internet of Things (IoT). The types and characteristics of these devices vary depending on the industry 4.0 and have rapidly increased recently, especially in smart homes. These gadgets can expose users to serious cyber dangers because of a variety of computing constraints and vulnerabilities in the security-by-design concept. The smart home network testbed setup presented in this study is used to evaluate and validate the protection of the smart cyber-physical system. The context-aware threat intelligence and response model identifies the states of the aligned smart devices to distinguish between real-world typical and attack scenarios. It then dynamically writes specific rules for protection against potential cyber threats. The context-aware model is trained on IoT Research and Innovation Lab - Smart Home System (IRIL-SHS) testbed dataset. The labeled dataset is utilized to create a random forest model, which is subsequently used to train and test the context-aware threat intelligence SHS model's effectiveness and performance. Finally, the model's logic is used to gain rules to be included in Suricata signatures and the firewall rulesets for the response system. Significant values of the measuring parameters were found in the results. The presented model can be used for the real-time security of smart home cyber-physical systems and develops a vision of security challenges for Industry 4.0.
Proceedings ArticleDOI
09 Nov 2022
TL;DR: In this article , the Reed sensor and GSM Module are used to implement the suggested system, and there is a switch that may be turned on at any time to prevent intrusions.
Abstract: Intelligent burglars frequently circumvent security systems, thus new techniques must constantly be developed to ensure that residences are properly secured. Utilizing cutting-edge technologies will significantly improve protection up until the technology is made available to everyone. Our project's goal is to create door access control and security utilizing an Internet of Things server. The Reed sensor and GSM Module are used to implement the suggested system. Additionally, there is a switch that may be turned on at any time.
References
More filters
Journal ArticleDOI
TL;DR: This survey is directed to those who want to approach this complex discipline and contribute to its development, and finds that still major issues shall be faced by the research community.

12,539 citations

Journal ArticleDOI
TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.

9,593 citations

Journal ArticleDOI
TL;DR: This paper compares security issues between IoT and traditional network, and discusses opening security issues of IoT, and analyzes the cross-layer heterogeneous integration issues and security issues in detail and discusses the security issues as a whole.
Abstract: Internet of Things (IoT) is playing a more and more important role after its showing up, it covers from traditional equipment to general household objects such as WSNs and RFID. With the great potential of IoT, there come all kinds of challenges. This paper focuses on the security problems among all other challenges. As IoT is built on the basis of the Internet, security problems of the Internet will also show up in IoT. And as IoT contains three layers: perception layer, transportation layer and application layer, this paper will analyze the security problems of each layer separately and try to find new problems and solutions. This paper also analyzes the cross-layer heterogeneous integration issues and security issues in detail and discusses the security issues of IoT as a whole and tries to find solutions to them. In the end, this paper compares security issues between IoT and traditional network, and discusses opening security issues of IoT.

1,060 citations

Journal ArticleDOI
TL;DR: A survey of IDS research efforts for IoT is presented to identify leading trends, open issues, and future research possibilities, and classified the IDS proposed in the literature according to the following attributes: detection method, IDS placement strategy, security threat and validation strategy.

675 citations

Book ChapterDOI
23 Jul 2010
TL;DR: This paper gives an overview, analysis and taxonomy of security and privacy challenges in IoT, and Security Model for IoT has been proposed.
Abstract: IoT is an intelligent collaboration of tiny sensors and devices giving new challenges to security and privacy in end to end communication of things. Protection of data and privacy of things is one of the key challenges in the IoT. Lack of security measures will result in decreased adoption among users and therefore is one of the driving factors in the success of the IoT. This paper gives an overview, analysis and taxonomy of security and privacy challenges in IoT. Finally, Security Model for IoT has been proposed.

263 citations