Smart Security System Using IoT and Mobile Assistance

The digital era has witnessed giant strides in the utilization of security systems, which perform certain pre-programmed tasks when a secured zone is breached. The prevailing traditional security systems have evolved embracing the cutting-edge technologies from time to time. The avalanche-like explosion of things and their connectivity through Internet have opened several new boulevards of exploration. The unification of security system based on the IoT platform has the potential of interrelating real time with the devices and makes them smart, with issues like privacy. To keep the issues in the bay, a new intrusion detection system is the need of the hour. Hence, a wireless intrusion detection smart security system is designed and developed to overcome the research gaps in the existing systems. The smart security system is built on the Internet of things. The system is a lightweight, low cost, extensible, flexible wireless IoT-based-smart security system which will permit the mobile devices and computers to remotely trail the happenings at the location, record the activities and save them in the prefixed cloud storage account. The system uses the hardware (things) to sense and fetch the data which is processed by the embedded software. On the occurrence of an abnormal activity (like breaching by an intruder), a valid signal is detected, and it sends signal to the board directing it to run the alert module. The alert module activates the GSM API to immediately alert the end-user by mobile. This system thus provides a wireless, incessant service to all the stakeholders by phone regarding the breaches occurring in the environment. This implemented smart security system using IoT with mobile assistance also integrates the various alarms, sends alert as pre-programmed, tracks the movements automatically, uses the state-of-the-art appropriate latest technologies to alert the concerned stakeholders and waits for actions to be taken.

[1]  J. Indumathi,et al.  Customized Privacy Preservation Using Unknowns to Stymie Unearthing Of Association Rules , 2007 .

[2]  Nazmun Nessa Moon,et al.  Smart Security for an Organization based on IoT , 2017 .

[3]  Ramjee Prasad,et al.  Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) , 2010, CNSA.

[4]  Galileo Galilei,et al.  An Agent Based Burgeoning Framework for Privacy Preserving Information Harvesting Systems , 2007 .

[5]  G. V. Uma,et al.  A Bespoked Secure Framework for an Ontology-Based Data-Extraction System , 2008 .

[6]  G. V. Uma,et al.  A novel framework for optimised privacy preserving data mining using the innovative desultory technique , 2009, Int. J. Comput. Appl. Technol..

[7]  J. Indumathi,et al.  A Comparative Study of SPKI/SDSI and K-SPKI/SDSI Systems , 2007 .

[8]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[9]  J. Indumathi Amelioration of Anonymity Modus Operandi for Privacy Preserving Data Publishing , 2014 .

[10]  Ming Yan,et al.  SMART LIVING USING BLUETOOTH- BASED ANDROID SMARTPHONE , 2013 .

[11]  Sean Carlisto de Alvarenga,et al.  A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..

[12]  Veljko M. Milutinovic,et al.  Web Performance Evaluation for Internet of Things Applications , 2016, IEEE Access.

[13]  Nan Lin,et al.  The research on Internet of things application architecture based on web , 2014, 2014 IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA).

[14]  Babangida Abubakar,et al.  Customary homes to smart homes using Internet of Things (IoT) and mobile application , 2017, 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon).

[15]  J. Indumathi,et al.  A New flustering approach for Privacy Preserving Data Fishing in Tele-Health Care Systems , 2008 .

[16]  Walaa Hamouda,et al.  A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems , 2018, IEEE Communications Surveys & Tutorials.

[17]  Rolf H. Weber,et al.  Internet of things: Privacy issues revisited , 2015, Comput. Law Secur. Rev..

[18]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[19]  J. Indumathi,et al.  Using Privacy Preserving Techniques to Accomplish a Secure Accord , 2007 .

[20]  Sheetal Kalra,et al.  Secure authentication scheme for IoT and cloud servers , 2015, Pervasive Mob. Comput..

[21]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[22]  J. Indumathi A Generic Scaffold Housing the Innovative Modus Operandi for Selection of the Superlative Anonymisation Technique for Optimized Privacy Preserving Data Mining , 2012 .