Integrating Face Recognition Security System with the Internet of Things

Author(s):  
Ibrahim Mohammad Sayem ◽  
Mohammad Sanaullah Chowdhury
2014 ◽  
Vol 889-890 ◽  
pp. 671-675 ◽  
Author(s):  
Jun Jin Yang ◽  
Cheng Hua Fu ◽  
Zi Qi Dong

This paper presents a remote security system based on the Internet of things. The system uses S3C2440 as the control core, Linux operating system as the software platform, combined with remote security system construction of GPRS communication technology. The system introduces V4L2 camera video capture process based on Linux operating system, the GPRS module alarm information sending and receiving process, and the project of Android platform video monitoring software. At last, experiments show the system can monitor designated area. When meeting a critical situation,it will automatically alarm. It is of far-reaching significance.


Author(s):  
Ahmed Waleed Al-Khafaji

Physical security systems are applied to alert in advance a well-known vector of attacks. This paper presents an analysis of the research and assessment of physical security systems applying the PSMECA technique (analysis of modes, efforts, and criticality of physical security). The object of research and analysis is the physical security system of the Ministry of Education and Science of Iraq (as the infrastructure of the region's objects), as well as the area of the compact living of students and co-workers (campus). This paper discusses the organization of physical security systems, which are based on devices with low power consumption and function in the Internet of things environment. The main aim is to describe and develop a physical security system that functions in the Internet of things environment, as well as the development of a scheme for the research and development of models and methods for risk analysis, models of functions and components, models of failures and conducting research and analysis of occurrence failures of PSS. The generalized structural and hierarchical scheme of the physical security system of the infrastructure of the region is presented, as well as the applied application of the scheme is illustrated by the example of the physical security system of a student campus of one of the universities of Baghdad. The functional modeling scheme of the object is provided and is based on the use of the Raspberry Pi microcomputer and the Arduino microcontroller. The set-theoretical models of functions, components, and failures of the system under study, as well as the projection of a hierarchical failure structure in the table of the basic structural elements of the system, are presented. The IDEF0 diagram, showing a power outage scenario (accidental or intentional) in connection with lighting and video subsystems, is presented. The scheme of research and development of models and methods of analysis of risks of PSS is carried out in the paper. A PSMECA table for the CCTV system has been created, which allows you to more precisely determine the cause of the failure in the physical security system and the importance of failure criticality


2021 ◽  
Vol 20 (1) ◽  
pp. 127-132
Author(s):  
Fadilah Eka Prasetiyo ◽  
Didik Setiyadi Setiyadi

The comfort and safety of a house is the dream of any home owner, even a house that has a modern security system will be more in demand than a house with an ordinary security system. By utilizing existing technology, it is possible to create an excellent security system from theft and fire. In order to overcome these problems, a prototype of a security threat detection system was made using telegrams based on the internet of things. This can minimize the inconvenience of home owners when they are not at home in a long time, such as the owner of the house going out of town or abroad. The design of this smart home uses the NodeMCU ESP8266 Wifi Module as a controller, the telegram application as a notification when an unknown person opens a door or window, and when a fire occurs. The sensor used to detect the security of burglars is a Magnetic Door Switch, this sensor is placed on doors and windows. The sensor used to detect fire indications is the Flame Sensor which is placed on the ceiling of the house


Jurnal Teknik ◽  
2019 ◽  
Vol 8 (2) ◽  
Author(s):  
Sri Mulyati ◽  
Sumardi Sadi

Door security system wherever needed, because to protect the parts that are stored, whether in housing, warehousing, offices, or in the industrial world. Security system currently developing digitally based is by using the Internet of Things (IoT) system. Microcontrollers, HC05 Bluetooth modules and RFID modules based IoT make it possible to be a door guard. The current problem is that even though the door is locked, it still occurs theft, and assume that the cost of making security is too expensive. Solution to the problem it is making RFID and Bluetooth-based door security control prototypes with the IoT system. The purpose of this study is to make a prototype of door security control devices based RFID and Bluetooth with an IoT system. For access to the door using an ID card and Smartphone. The method used is laboratory experiments. This research produces a prototypes of door security control devices versatile based IoT RFID and Bluetooth, at a cost cheap, economical, and effective to use.    Keywords: Arduino, HC05, RFID, Servo Motor, LCD


Author(s):  
Doan Perdana ◽  
Panca Aji Pamungkas ◽  
Arif Indra Irawan

Safety is important in terms of comfort and security in a home, because a house is a place where people live and store valuable items. However, conventional keys that are widely used today are still vulnerable to break-ins. Therefore, a reliable and qualified security system is needed to safeguard a person’s home. To overcome this problem, this study proposed a security system to access the door of a house to maintain the home’s security. This door access security system is based on Palmprint, in which a certain line on a person’s palm is used to open the door and gain access into the house. Palmprint is supported by the Internet of Things system so that residents can remotely control and access the door lock. The use of biometric authentication will replace a conventional key so that the door will only be opened if the lines on the palm of the hand can be identified in accordance with the data registered by the owner. If a burglary occurs or if the lock is forced, the system will notify the residents of the house through their Palmprint application. The results show that the network system works optimally in the Line of Sight scenario with a distance of 5 meters, and it produces a data delay measuring 0.255436 s; moreover, a throughput of 8825,933 bytes/s is obtained from end-to-end testing of the total system in the 5 meter Line of Sight scenario with a total average delay of 0.570077 s and an average throughput of 11776.27 bytes/s.


2019 ◽  
Vol 22 (8) ◽  
pp. 1589-1598 ◽  
Author(s):  
Jameel Ahamed ◽  
Md. Zahid ◽  
Mohd Omar ◽  
Khaleel Ahmad

Sign in / Sign up

Export Citation Format

Share Document