Towards SWARM: A Smart Water Monitoring System

Author(s):  
Julian Kunze ◽  
Vincent Mayer ◽  
Lisa Thiergart ◽  
Saqib Javed ◽  
Patrick Scheppe ◽  
...  
2020 ◽  
Vol 9 (07) ◽  
pp. 25113-25115
Author(s):  
Minakshi Roy ◽  
Prakar Pradhan ◽  
Jesson George ◽  
Nikhil Pradhan

Since we are now currently present in an era of Computing Technology, it is essential for everyone and everything to be connected to the internet. IOT is a technology that brings us more and more close to this goal. Our project comprises of a smart water monitoring system which is a small prototype for flood detection and avoidance system. This paper explains the working and the workflow of all the components present inside our project. The sensors sense the environment and sends real-time data to the cloud (firebase cloud) and users can view and access this data via their mobile platform. The model gives a warning after the water level rises to a particular height. Since it is a small scaled prototype for flood detection and avoidance system, the working of this model is good. The data are uploaded and changed in the cloud in precision to the sensor and real-time changes in the mobile application is achieved. This model can be used to greatly reduce the casualties in a devastating event of flood.


Technologies ◽  
2020 ◽  
Vol 8 (4) ◽  
pp. 50
Author(s):  
Anthony Overmars ◽  
Sitalakshmi Venkatraman

Recent growth in the Internet of Things (IoT) looks promising for realizing a smart environment of the future. However, concerns about the security of IoT devices are escalating as they are inherently constrained by limited resources, heterogeneity, and lack of standard security controls or protocols. Due to their inability to support state-of-the-art secure network protocols and defense mechanisms, standard security solutions are unsuitable for dynamic IoT environments that require large and smart IoT infrastructure deployments. At present, the IoT based smart environment deployments predominantly use cloud-centric approaches to enable continuous and on-demand data exchange that leads to further security and privacy risks. While standard security protocols, such as Virtual Private Networks (VPNs), have been explored for certain IoT environments recently, the implementation models reported have several variations and are not practically scalable for any dynamically scalable IoT deployment. This paper addresses current drawbacks in providing the required flexibility, interoperability, scalability, and low-cost practical viability of a secure IoT infrastructure. We propose an adaptive end-to-end security model that supports the defense requirements for a scalable IoT infrastructure. With low-cost embedded controllers, such as the Raspberry Pi, allowing for the convergence of more sophisticated networking protocols to be embedded at the IoT monitoring interface, we propose a scalable IoT security model integrating both the IoT devices and the controller as one embedded device. Our approach is unique, with a focus on the integration of a security protocol at the embedded interface. In addition, we demonstrate a prototype implementation of our IoT security model for a smart water monitoring system. We believe that our modest first step would instill future research interests in this direction.


2020 ◽  
Author(s):  
Mohd Aminudin Jamlos ◽  
Wan Azani Mustafa ◽  
Muhammad Zahir Amin

Author(s):  
Kamalanathan Shanmugam ◽  
Muhammad Ehsan Rana ◽  
Roshenpal Singh Jaspal Singh

Sign in / Sign up

Export Citation Format

Share Document