Wireless Security System Incorporating Tilt Sensors and Web Cameras

Author(s):  
Hong-Chul Kim ◽  
Woo-Sung Kim ◽  
Dong-Hyuk Im ◽  
Geun-Duk Park
2018 ◽  
Vol 5 (1) ◽  
pp. 13
Author(s):  
Tri Febriana Handayani ◽  
Pande Ketut Sudiarta ◽  
I Made Oka Widyantara

VoIP is a technology used to communicate voice remotely and directly using data communication lines with TCP / IP protocol. But basically, VoIP communication does not guarantee data security when doing communication. A very important security system is added in VoIP communications to maintain the confidentiality of communication, so that communication can not be recorded and played back. To build a security when communicating VoIP, then in this study added an SRTP-TLS security system. The study was conducted on wireless networks by comparing the security of data communications when using the SRTP-TLS security system and without using a security system.Keywords: Wireless, Security System, VoIP


As the technology is advancing day by day, there are various alternatives occurring for the already present or previous technologies. This article suggests the working of an wireless camera. The article gives a brief idea of various technologies or software being used for to security purpose. The main goal of our design was to develop a network that allowed for the transmitting and receiving of images from camera nodes to a base station. The main objective is self powered wireless security camera.


Author(s):  
Mohammed M. Sultan ◽  
Amer T. Saeed ◽  
Ahmed M. Sana

Securing property plays a crucial role in human life. Therefore, an adaptive multilevel wireless security system (ML-WSS) based on the internet of things (IoT) has been proposed to observe and secure a certain place. ML-WSS consists of hardware and software components, such as a set of sensors, Wi-Fi module, and operation and monitoring mobile application (OMM). The OMM application is designed to remotely monitor and control the proposed system through the Internet and by using ThingSpeak cloud as a data store. The proposed scheme is based on dividing the required zone of the place into three regions (levels), low-risk region (LRR) as level-1, moderate-risk region (MRR) level-2, and high-risk region (HRR) as level-3. Each level may contain one or set of sensors, so the number of sensors, their placement, and under which level is labelled is specified according to the security requirements. Several processes are done based on these levels when a breach occurs in the system. Mathematical model and pseudocode were created to illustrate the mechanism of the proposed system. The results show that the proposed system has been implemented successfully and the number of breaches that occurs in level-3 area was reduced by 50% as compared to level-1.


Sign in / Sign up

Export Citation Format

Share Document