International Journal of Engineering
Trends and Technology

Research Article | Open Access | Download PDF

Volume 57 | Number 1 | Year 2018 | Article Id. IJETT-V57P206 | DOI : https://doi.org/10.14445/22315381/IJETT-V57P206

Reinforcing Smart Home Security System


Jennifer D, Loshiga M, Sowndharya Lakshmi R, Vidhyalakshmi.M

Citation :

Jennifer D, Loshiga M, Sowndharya Lakshmi R, Vidhyalakshmi.M, "Reinforcing Smart Home Security System," International Journal of Engineering Trends and Technology (IJETT), vol. 57, no. 1, pp. 28-30, 2018. Crossref, https://doi.org/10.14445/22315381/IJETT-V57P206

Abstract

With advancement of latest technology, life is getting simpler and easier in all aspects. In today’s world Automatic systems are being preferred over manual system. With the rapid increase in the number of users of internet over the past decade has made Internet a part and parcel of life, and IoT is the latest and emerging internet technology. Internet of things is a growing network of everyday objectfrom industrial machine to consumer goods that can share information and complete tasks while you are busy with other activities. Nowadays the idea of smart home has been so prevalent; it can be viewed as intelligent or automated home where the house can be monitored remotely. This paper describes about the development of home security system based on human motion detection and remotely monitoring the home. In this proposed method fingerprint and face recognition based home security, automation and also monitoring system using arm 11 processor. This project implement to all the home members fingerprint and face images are stored in database, So easily identify the authorized user or not in this system. And also sensors are used to monitor the home status. If any unknown person is detected to receive the unknown person image to the android application.


Keywords

Home automation; Smart homes; Wireless sensor networks; Access control; Raspberry Pi. 

References

[1] C. Suh and Y.-B. Ko, “Design and implementation of intelligent home control systems based on active sensor networks,” IEEE Transactions on Consumer Electronics, vol. 54, no. 3, pp. 1177–1184, 2008.
[2] B. Fouladi, S. Ghanoun, “Security Evaluation of the ZWave Wireless Protocol,” Black hat USA, Aug. 2013.
[3] Wenye Wang, Zhuo Lu, “Cyber security in the Smart Grid: Survey and challenges,” Computer Networks, Volume 57, Issue 5, Pages 1344-1371, April 2013.
[4] N. Komninos, E. Philippou and A. Pitsillides, "Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures," in IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 1933-1954, Fourthquarter 2014.
[5] C. Karlof, D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures”, Ad Hoc Networks, vol. 1, pp. 293–315, 2003.
[6] Y. Hu, A. Perrig, D. Johnson, “Wormhole attacks in wireless networks”, IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 370–380, Feb. 2006.
[7] Y. Mo and B. Sinopoli, "Secure control against replay attacks," 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, pp. 911-918, 2009.
[8] D. Deadman, “Forecasting residential burglary,” International Journal of Forecasting, vol. 19, no. 4, pp. 567–578, 2003.
[9] UNODC, “International Burglary, Car Theft and Housebreaking Statistics,” United Nations Office on Drugs and Crime (UNODC), Technical Report, 2015.

Time: 0.0018 sec Memory: 32 KB
Current: 1.88 MB
Peak: 4 MB