Trash Monitoring and Alerting System Using Internet of Things

2020 ◽  
Vol 17 (5) ◽  
pp. 2363-2368
Author(s):  
T. Thilagam ◽  
S. N. Ananthi ◽  
T. Padmavathy ◽  
A. Lallithashri

Waste management is primitive problem faced by around the world this case is Developed or developing country. Since flooding of garbage bins the reproducing of germs and it makes awful wellbeing condition for the general population by spreading a few savage sicknesses, to keep away from such circumstance, wanting to plan a smart bins means it contains some sensors like IR sensor, weight sensor, photoelectric sensor and Radio frequency identification (RFID) CARD reader with help of these improve squander accumulation and keep up the neatness of the area. Internet of Things (IoT) is changing into associate more and more growing conception each in geographical point and out of doors of it. In this paper, we intends to structure an IoT based trash bin will consequently and constantly intimate the status of the trash in to the Municipality with help of IR sensing element it’ll send the information to the specialists United Nations office responsible for that correct space. Thus, the specific specialists can get the messages until the point that the bin is squashed and the each bin is given a specific ID it will in showcase in the screen of the revered officer and that they will take immediate action. The district laborers get the notice and they can find the region evacuate the trash receptacle supplant the enhanced one.

2022 ◽  
pp. 168-180
Author(s):  
Sasikumar Gurumoorthy ◽  
L. Venkateswara Reddy ◽  
Sudhakaran Periakaruppan

Art colonnades and museums all over the world are the first option for individuals to visit for the enhancement of the cultural life of people. To ensure their safety, museums have established numerous cultural security measures. Traditional strategies do not obstruct their pace entirely. They only use a computer in the museum to check individuals at the entrance and exit. Therefore, the authors proposed a gallery anti-stealing device created on the internet-of-things (IoT) technology that ensures security through passive readers/writers of RFID. Radio frequency identification (RFID) remains a system that practices isolated data storing and recovery and offers object tracking with a unique identity code. The system then sends sound and light warning information, while the photographic camera structure is triggered to capture a picture at the same time. The recognition of the accuracy in the hardware component of the device can be additionally enhanced by the use of this technology to increase the safety of museum equipment.


2018 ◽  
Vol 5 ◽  
pp. 352-361
Author(s):  
Amrani Ayoub ◽  
Rafalia Najat ◽  
Jaafar Abouchabaka

The Internet of things appears as a solution in order to connect people around the world. With this concept of interconnection, sharing and dissemination of information between different physical objects. Many objects and services in different fields will be created, such as smart homes, e-health, transport and logistics that will make our everyday needs easier. The main characteristic of a connected object is that it must be identifiable, using technologies such as RFID (Radio-Frequency Identification), must interact with the environment by adding sensory techniques, and finally a connected object must be able to communicate with others. The evolution of Internet of things, increase the number of connected objects. Devices with sensors, generate a huge number of data. With this evolution, the big questions come! how can we control this big data? Cloud Computing a notion that is not newer than the IoT concept, but it's a revolution has steadily been gaining ground. It's a technology that offers to end users a great services in terms of storage, elasticity, analyzing data and other services . In this paper, we cite the benefits of integrating Cloud Computing and Internet of things to manage data provided by physical object and security difficulties that may have this convergence. We also present an overview of the security algorithms proposed in the literature, based on elliptic curves, in order to secure communication between smart objects and cloud computing.


Author(s):  
Sarah Das

Abstract: Garbage bins or dust bins are those that are put in public places in cities and are currently overflowing due to an increase in waste every day. It harms people's health by spreading deadly infections. To avoid this, smart bins will be designed with sensors such as an infrared sensor, a weight sensor, a photoelectric sensor, and radio frequency identification (RFID) card reader. If someone throws trash into the smart bins, a photoelectric sensor will identify the clear representation objects, and a weight sensor will be positioned beneath the smart bin to calculate the percentage of garbage present it will forward the information to the authorities in charge of that specific location. As a result, the relevant authorities can get messages until the bin is squished, and each bin is assigned a unique ID, which will appear on the screen of the respected officer, allowing them to take fast action. If a person is within two meters radius of the bin that contains an RFID CARD READER, the RFID reader will read all of that person's information and send a message to him about what they placed into the bin, as well as an appreciation message for using the bin. Keywords: Arduino NANO, GSM Module, Smart Dustbin, IoT, Arduino Uno.


2018 ◽  
Author(s):  
Natalie Outteridge

The advancement of technology that have been produced for Internet of Things (IoT) security has grown significantly and exponentially over the years. This has caused a major impact in the world of IoT security as technological companies have to keep up with the ever-changing security protocols. The Radio Frequency Identification (RFID) technology has recently gained popularity in the world of IoT, this is due to the RFID chips involvement within credit and debit cards to allow them to become contactless. This survey will produce an in-depth discussion about the background of RFID, the relevance of RFID in today's society, related work, the advantages and disadvantages of RFID and finally a solution to the RFID contactless.


2018 ◽  
Author(s):  
Natalie Outteridge

The advancement of technology that have been produced for Internet of Things (IoT) security has grown significantly and exponentially over the years. This has caused a major impact in the world of IoT security as technological companies have to keep up with the ever-changing security protocols. The Radio Frequency Identification (RFID) technology has recently gained popularity in the world of IoT, this is due to the RFID chips involvement within credit and debit cards to allow them to become contactless. This survey will produce an in-depth discussion about the background of RFID, the relevance of RFID in today's society, related work, the advantages and disadvantages of RFID and finally a solution to the RFID contactless.


Author(s):  
Jordan Frith

The phrase the Internet of things was originally coined in a 1999 presentation about attaching radio frequency identification (RFID) tags to individual objects. These tags would make the objects machine-readable, uniquely identifiable, and, most importantly, wirelessly communicative with infrastructure. This chapter evaluates RFID as a piece of mobile communicative infrastructure, and it examines two emerging forms: near-field communication (NFC) and Bluetooth low-energy beacons. The chapter shows how NFC and Bluetooth low-energy beacons may soon move some types of RFID to smartphones, in this way evolving the use of RFID in payment and transportation and enabling new practices of post-purchasing behaviors.


2018 ◽  
Vol 14 (8) ◽  
pp. 155014771879512 ◽  
Author(s):  
Madiha Khalid ◽  
Umar Mujahid ◽  
Muhammad Najam-ul-Islam

Internet of Things is one of the most important components of modern technological systems. It allows the real time synchronization and connectivity of devices with each other and with the rest of the world. The radio frequency identification system is used as node identification mechanism in the Internet of Thing networks. Since Internet of Things involve wireless channel for communication that is open for all types of malicious adversaries, therefore many security protocols have been proposed to ensure encryption over wireless channel. To reduce the overall cost of radio frequency identification enabled Internet of Thing network security, the researchers use simple bitwise logical operations such as XOR, AND, OR, and Rot and have proposed many ultralightweight mutual authentication protocols. However, almost all the previously proposed protocols were later found to be vulnerable against several attack models. Recently, a new ultralightweight mutual authentication protocol has been proposed which involves only XOR and Rotation functions in its design and claimed to be robust against all possible attack models. In this article, we have performed cryptanalysis of this recently proposed ultralightweight mutual authentication protocol and found many pitfalls and vulnerabilities in the protocol design. We have exploited weak structure of the protocol messages and proposed three attacks against the said protocol: one desynchronization and two full disclosure attacks.


Author(s):  
Sini-Kaisu Kinnunen ◽  
Antti Ylä-Kujala ◽  
Salla Marttonen-Arola ◽  
Timo Kärri ◽  
David Baglee

The emerging Internet of Things (IoT) technologies could rationalize data processes from acquisition to decision making if future research is focused on the exact needs of industry. This article contributes to this field by examining and categorizing the applications available through IoT technologies in the management of industrial asset groups. Previous literature and a number of industrial professionals and academic experts are used to identify the feasibility of IoT technologies in asset management. This article describes a preliminary study, which highlights the research potential of specific IoT technologies, for further research related to smart factories of the future. Based on the results of literature review and empirical panels IoT technologies have significant potential to be applied widely in the management of different asset groups. For example, RFID (Radio Frequency Identification) technologies are recognized to be potential in the management of inventories, sensor technologies in the management of machinery, equipment and buildings, and the naming technologies are potential in the management of spare parts.


2021 ◽  
pp. 1-10
Author(s):  
Jintao Tang ◽  
Lvqing Yang ◽  
Jiangsheng Zhao ◽  
Yishu Qiu ◽  
Yihui Deng

With the development of the Internet of Things and Radio Frequency Identification (RFID), indoor positioning technology as an important part of positioning technology, has been attracting much attention in recent years. In order to solve the problems of low precision, high cost and signal collision between readers, a new indoor positioning algorithm based on a single RFID reader combined with a Double-order Gated Recurrent Unit (GRU) are proposed in this paper. Firstly, the reader is moved along the specified direction to collect the sequential tag data. Then, the tag’s coordinate is taken as the target value to train models and compare them with existing algorithms. Finally, the best Gated Recurrent Unit positioning model is used to estimate the position of the tags. Experiment results show that the proposed algorithm can effectively improve positioning accuracy, reduce the number of readers, cut down the cost and eliminate the collisions of reader signals.


2019 ◽  
Vol 8 (4) ◽  
pp. 1743-1745

Vehicular traffic can hardly escape the list of critical problems in the world that demand to be resolved at the earliest. Attempting to eradicate the factors that led to this menace is a process too long for the current critical situation to wait for and stay unattended. Considering the serious consequences that ensue as a result of traffic jams, some solution that can bring an expeditious remedy needs to be found in order to handle the current situation. And this paper is aimed at proposing one such solution which can considerably ameliorate the degree of the mayhem that is prevailing, using Radio Frequency IDentification (RFID) technology.


Sign in / Sign up

Export Citation Format

Share Document