ANTI THEFT SECURITY SYSTEM WITH IMAGE FEEDBACK USING RASPBERRY Pi AND IoT

2020 ◽  
Vol 10 (3) ◽  
pp. 8
Author(s):  
FAZIL P. MOHAMMED ◽  
B. S. N. PRASAD ◽  
B. RANJITHA ◽  
S. NAIR SNEHA ◽  
D. K. MANU ◽  
...  
Keyword(s):  
2018 ◽  
Vol 7 (2) ◽  
pp. 61-67
Author(s):  
Iga Revva Princiss Jeinever

Computer networks are basically not safe to access freely. Security gaps in the network can be seen by irresponsible people with various techniques. Opening a port for access carries a high risk of being attacked by an attacker. In this connection, network administrators are required to work more to be able to secure the computer network they manage. One form of network security that is often used by network administrators in server management is through remote login such as ports on telnet, SSH, etc. A port that is always open is a network security hole that can be used by people who are not responsible for logging into the server. Focusing on these problems, in this study, Random Port Knocking is the right way and can be used to increase network security. With Random Port Knocking, the port will be opened as needed, the port will automatically change when it fails to log in more than three times and IP will automatically be blocked and access will not continue so that attacks on the network can be avoided and network security stability can be further improved. The final result of this research shows that the method applied in this research makes server safe. Because port randomization and IP block make irresponsible parties try harder to penetrate firewall walls.


2021 ◽  
Vol 7 (1) ◽  
pp. 10-18
Author(s):  
Arief Saptono ◽  
Abdul Malik ◽  
Muhamad Satim

Computer and information technology from time to time are always experiencing developments, both in terms of hardware, software and the internet being one of the most important things atthis time. The increasing number of applications of computer technology will make the role of computers increasingly important to be more advanced (modernization). The security system isstill not effective and efficient enough, so that a control using a website is needed to help the security control process at the gate. This system is not only used in offices, but can be used inhome security, etc. So we need a security system, where the security control system uses a tool to monitor realtime security via a web browser, namely a webcam (Web Camera). A web-basedgate control system can be designed using the Raspberry Pi B +. From the explanation mentioned above, the researcher made a gate control device that was given to the Microcontroller using a Web Browser in order to open and close the gate. So it is hoped that this security system application can provide a sense of comfort, in addition, of course, with this system application it can reduce the number of crimes that occur both crimes and other crimes.


Author(s):  
Wahyuni Kurniasih ◽  
Abdul Rakhman ◽  
Irma Salamah

The house is the most valuable asset, therefore security at home is also very important. Therefore a home security system is created that combines a microcontroller with an Android smartphone application. The microcontroller used is the Raspberry Pi which is equipped with a camera as a home security monitoring system and various sensors as detectors such as magnetic, PIR sensors and solenoids as automatic door locks. So if the sensors that are installed detect something at home, then the homeowner will immediately get a notification sent by the database to the smartphone application, and the homeowner can monitor the state of the house right then through photos and videos recorded by cameras that have been installed at home.


Author(s):  
Ahmed Waleed Al-Khafaji

Physical security systems are applied to alert in advance a well-known vector of attacks. This paper presents an analysis of the research and assessment of physical security systems applying the PSMECA technique (analysis of modes, efforts, and criticality of physical security). The object of research and analysis is the physical security system of the Ministry of Education and Science of Iraq (as the infrastructure of the region's objects), as well as the area of the compact living of students and co-workers (campus). This paper discusses the organization of physical security systems, which are based on devices with low power consumption and function in the Internet of things environment. The main aim is to describe and develop a physical security system that functions in the Internet of things environment, as well as the development of a scheme for the research and development of models and methods for risk analysis, models of functions and components, models of failures and conducting research and analysis of occurrence failures of PSS. The generalized structural and hierarchical scheme of the physical security system of the infrastructure of the region is presented, as well as the applied application of the scheme is illustrated by the example of the physical security system of a student campus of one of the universities of Baghdad. The functional modeling scheme of the object is provided and is based on the use of the Raspberry Pi microcomputer and the Arduino microcontroller. The set-theoretical models of functions, components, and failures of the system under study, as well as the projection of a hierarchical failure structure in the table of the basic structural elements of the system, are presented. The IDEF0 diagram, showing a power outage scenario (accidental or intentional) in connection with lighting and video subsystems, is presented. The scheme of research and development of models and methods of analysis of risks of PSS is carried out in the paper. A PSMECA table for the CCTV system has been created, which allows you to more precisely determine the cause of the failure in the physical security system and the importance of failure criticality


The main objective is to create a security system for wallet based on RFID technology and also keep an account of how much money is coming inside and going out of the wallet which is done using tcs3200 colour sensor by which we can have an account of the amount of money spent and update the same on the mobile app. So, this project basically alerts the person if the wallet is missing from his/her pocket and also shares the location of the same and also gives the information of how much he/she has spent. The major components used in this paper include Raspberry PI, RFID Reader, RFID Tag, GPS Module, and TCS3200 Colour Sensor. Whenever the RFID card is placed near to the reader, the RFID reader obtains the UID (unique key) information about the card. The location of the wallet is obtained using the GPS Module. This detail is notified to user when the wallet is not connected. The status obtained by the RFID reader and the GPS module is collected by Raspberry PI. Using the PI’s WIFI, the details are posted onto the cloud. All the details posted onto the cloud are accessed via the APP and also through a website portal in case of any emergency


2020 ◽  
Vol 176 (13) ◽  
pp. 45-47
Author(s):  
Manoj R. ◽  
Rekha Y. ◽  
Raju R. ◽  
Sharad A.

Author(s):  
Swagat Ahire

In the todays world a strong door locking system is that the first and most important thing to assure security of a home. Due to the increasing workload and daily travelling tasks most of the days people stays out of their houses. In such situations, identifying a visitor and getting remote access to their home is necessary. A smart door lock mechanism which may be completely monitored and controlled from a foreign location using smartphone is proposed during this paper. When a visitor presses bell/push button at the door, a Raspberry Pi with attached camera gets triggered and captures the image to check in database for identification. If found then door will simply open otherwise a notification will sent to the owner with OTP and visitor's image. Now depending upon owners will he/she can give access to visitor by giving system generated OTP.


Sign in / Sign up

Export Citation Format

Share Document