scholarly journals Design and implementation of an adaptive multilevel wireless security system using IoT

Author(s):  
Mohammed M. Sultan ◽  
Amer T. Saeed ◽  
Ahmed M. Sana

Securing property plays a crucial role in human life. Therefore, an adaptive multilevel wireless security system (ML-WSS) based on the internet of things (IoT) has been proposed to observe and secure a certain place. ML-WSS consists of hardware and software components, such as a set of sensors, Wi-Fi module, and operation and monitoring mobile application (OMM). The OMM application is designed to remotely monitor and control the proposed system through the Internet and by using ThingSpeak cloud as a data store. The proposed scheme is based on dividing the required zone of the place into three regions (levels), low-risk region (LRR) as level-1, moderate-risk region (MRR) level-2, and high-risk region (HRR) as level-3. Each level may contain one or set of sensors, so the number of sensors, their placement, and under which level is labelled is specified according to the security requirements. Several processes are done based on these levels when a breach occurs in the system. Mathematical model and pseudocode were created to illustrate the mechanism of the proposed system. The results show that the proposed system has been implemented successfully and the number of breaches that occurs in level-3 area was reduced by 50% as compared to level-1.

UNISTEK ◽  
2021 ◽  
Vol 8 (1) ◽  
pp. 68-75
Author(s):  
Wiyanto Wiyanto ◽  
Yayan Oktavianti

Current technological developments have penetrated into human life, such as the development of a smart home called a smart home, that can provide convenience, comfort, safety and efficiency for users. Internet of Things (IoT) can be used in smart homes to control electronic equipment such as lights and home gates. This research designed an automatic controller and light gate based IoT (Internet of Things) smart home system using a NodeMCU microcontroller with a prototype method that aims to save electricity, make it effective and efficient, and make it easier for schoolkeepers to turn on lights and control the gate automatically through the Google assistant. The results of this study are in the form of an automatic light and gate control system using the Google assistant application based on the Internet of Things Using a NodeMCU v3 microcontroller. Can be concluded with the automatic light and gate control system using the google assistant application by giving commands to the google assistant connected to the NodeMCU V3 microcontroller, it can make it easier for school administrators to make efficient and efficient lights or gates using the google assistant application and can facilitate school administrators to maintain the security of the Internet-based school of Things.


Author(s):  
Octavio SÁNCHEZ-DELGADO ◽  
Alfonso NOGUERON-SOTO ◽  
Julio César ALFARO-HERRERA ◽  
Julieta Edith HERNÁNDEZ-GUZMÁN

In the first months of 2019, in some regions of Mexico there has been an increase in home theft, as is the case of the municipality of Tehuacán in Puebla. It is then that an alternative is generated that implements the Internet of Things with the aim of reducing the rate of home theft, a system is generated that controls the opening of doors and the activation of alarms in case of undue opening, with it It seeks to benefit the people of Tehuacán and the country. The security system with internet of things allows the user to manage and control access to the doors of the home, the system works thanks to an application that is installed on a smartphone, which in turn will have a connection with the devices that will be installed in the doors, in this way only the user with the application and a key can open the doors safely, otherwise an alarm is triggered that alerts the owner of the house wherever he is and can call emergency numbers to avoid being a victim of a crime.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3584 ◽  
Author(s):  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag. However, the scope of this survey includes only passive tags protocols, due to the large scale of the RFID framework. We examined some of the recent RFID protocols in term of security requirements, computation, and attack resistance. We conclude that only five protocols resist all of the major attacks, while only one protocol satisfies all of the security requirements of the RFID system.


2021 ◽  
Vol 34 (02) ◽  
pp. 1032-1038
Author(s):  
Arya Majidi

Population growth and urbanization have led to an increase in the rate of waste production, the lack of timely and proper management of which will have adverse effects on human life and the environment. Since most of the waste management costs are spent on waste collection and transportation, it is necessary to find solutions to control the huge costs of this sector. On the other hand, today, intelligent technologies are used globally as solutions to meet challenges in various fields such as agriculture to improve agro-industrial production, transportation, and waste management, which creates a concept called smart cities. One of the categories that has changed the concept of cities and made them have easier and smarter answers to various events and needs is the "Internet of Things", in which many cases and infrastructures with new hardware technologies and Software are integrated. Waste collection is no exception to this rule and efforts have been made to make it smarter. In this research, some of the latest innovations presented globally in order to make trash smarter have been examined.


2014 ◽  
Vol 998-999 ◽  
pp. 1374-1377
Author(s):  
Da Hui Li

This article introduces the services and development of the Internet of Things, and analyzes the driving forces and obstacles behind such development. Looking at application types and the different development stages of the Internet of Things, this article categorizes its services into four types: identity related services, information aggregation services, collaborative-aware services, and ubiquitous services. For the first two types of services, applications and system framework are discussed; for the last two types, development trends are discussed. Services provided by the Internet of Things will gradually be integrated into human life and society; with the development of the Internet of Things, applications will evolve from relatively simple identity-related and information aggregation-related applications, to collaboratively-aware and finally ubiquitous applications. It will then be possible for the Internet of Things to be fully integrated with Internet and telecommunications networks


2022 ◽  
pp. 51-68
Author(s):  
Vijay Prakash ◽  
Lalit Garg ◽  
Luke Camilleri ◽  
Joseph Curmi ◽  
Darren Camilleri

5G is a new universal wireless standard, a new form of mobile network engineered to bring everyone and everything virtually together. 5G is not only for mobile phones, but it is also the foundation for virtual reality (VR), the internet of things (IoT), and autonomous driving, connecting many electronic devices to the internet. Having good healthcare is very important as it affects all parts of human life and social well-being. Moreover, it is crucial to have a great healthcare system if we want economic growth, workforce productivity, and society to advance. Despite all the hard work done by scientists and medical professionals, today's healthcare is mainly inefficient, and a significant overhaul is required. This chapter discusses the primary advantages, including the 5G's main features in healthcare and their limitations and probable solutions and applications to the latest scenario.


2018 ◽  
Vol 7 (4.36) ◽  
pp. 700
Author(s):  
N. Koteswara Rao ◽  
Gandharba Swain

The proliferation of smart objects with capability of sensing, processing and communication has grown in recent years. In this scenario, the Internet of Things (IoT) connects these objects to the Internet and provides communication with users and devices. IoT enables a huge amount of new applications, with which academics and industries can benefit, such as smart cities, health care and automation. In this environment, compose of constrained devices, the widespread adoption of this paradigm depends of security requirements like secure communication between devices, privacy and anonymity of its users. This paper presents the main security challenges and solutions to provide authentication and authorization on the Internet of Things. 


2019 ◽  
Vol 6 (1) ◽  
pp. 15-30 ◽  
Author(s):  
Yasmine Labiod ◽  
Abdelaziz Amara Korba ◽  
Nacira Ghoualmi-Zine

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.


Sign in / Sign up

Export Citation Format

Share Document