scholarly journals A Development of the Internet of Things based Intruder Detection and Security Alarm System

Intruders usually break into houses with the intention of committing burglaries. This research proposed a development of an intrusion detection and security Alarm System using the Internet of Things. The methodology of the proposed system consists of five components. First, the hardware components are Raspberry Pi 3 Model B+, a camera for Raspberry Pi, motion sensors, relays and speakers, while the software system was developed by Python. Second, the architecture of the proposed system. Third, the design and construction of the electronic circuit connected with sensors. Fourth, the intruder image analysis for the alarm system using OpenCV and Deep Learning. The face detected by the camera was compared with homeowner’s pictures. If the detected face was not the homeowner, the system alarms the user or the owner via the smartphone LINE Application. Last, the Anto, which is the free and easy Internet of Things platform, connect the devices and the smartphone application together via the internet. Hence, the users or homeowners can control the devices or take the picture from a distance using a smartphone. The experimental results show that the proposed system can detect the intruder and alarm the homeowner via LINE Application on the smartphone. The experimental results show that the proposed system can efficiently detect the intruder and alarm the homeowner via LINE Application on the smartphone. The performance of the proposed system is excellent with the average score of 97.40%. The developed application on the Android smartphone is user-friendly, simple and efficient as well.

The fourth industrial revolution represents smarter systems, faster and more optimized system of artificial intelligence, which involves control systems and sensors networks. In this paper, the concept of the Internet of Things (IoT) was applied preliminarily to create the connection between machine and the user, using a sensor, a processor such as Raspberry Pi, and IoT platform application such as Blynk in the smartphone. The simple IR 4.0 prototype system and IoT apps were developed in order to create a connection between sensors and user through the internet consisting of a temperature and humidity sensor, which is DHT11 and a Raspberry Pi 3 Model B. The smartphone application would be developed through the Blynk application for this simple prototype system. The graphical user interface GUI was built within the Blynk app and link it to the sensor which is already connected to the Raspberry Pi. The analysis that was done upon the system is by varying the stimuli to the sensors, which is a hairdryer with three levels of heat and observe the relative change of the reading of temperature and percentage of humidity on the apps. Therefore, the preliminary result shows an increase in temperature as the heat level increases. On the other hand, the percentage of humidity becomes lower as the temperature goes higher. Based on the results and the analysis, it had shown that the IR 4.0 prototype system of IoT monitoring can connect between the sensor and the smartphone application with real-time monitoring through the internet.


Author(s):  
Bill Karakostas

To improve the overall impact of the Internet of Things (IoT), intelligent capabilities must be developed at the edge of the IoT ‘Cloud.' ‘Smart' IoT objects must not only communicate with their environment, but also use embedded knowledge to interpret signals, and by making inferences augment their knowledge of their own state and that of their environment. Thus, intelligent IoT objects must improve their capabilities to make autonomous decisions without reliance to external computing infrastructure. In this chapter, we illustrate the concept of smart autonomous logistic objects with a proof of concept prototype built using an embedded version of the Prolog language, running on a Raspberry Pi credit-card-sized single-board computer to which an RFID reader is attached. The intelligent object is combining the RFID readings from its environment with embedded knowledge to infer new knowledge about its status. We test the system performance in a simulated environment consisting of logistics objects.


J ◽  
2019 ◽  
Vol 2 (2) ◽  
pp. 102-115 ◽  
Author(s):  
Christian Montag ◽  
Harald Baumeister ◽  
Christopher Kannen ◽  
Rayna Sariyska ◽  
Eva-Maria Meßner ◽  
...  

With the advent of the World Wide Web, the smartphone and the Internet of Things, not only society but also the sciences are rapidly changing. In particular, the social sciences can profit from these digital developments, because now scientists have the power to study real-life human behavior via smartphones and other devices connected to the Internet of Things on a large-scale level. Although this sounds easy, scientists often face the problem that no practicable solution exists to participate in such a new scientific movement, due to a lack of an interdisciplinary network. If so, the development time of a new product, such as a smartphone application to get insights into human behavior takes an enormous amount of time and resources. Given this problem, the present work presents an easy way to use a smartphone application, which can be applied by social scientists to study a large range of scientific questions. The application provides measurements of variables via tracking smartphone–use patterns, such as call behavior, application use (e.g., social media), GPS and many others. In addition, the presented Android-based smartphone application, called Insights, can also be used to administer self-report questionnaires for conducting experience sampling and to search for co-variations between smartphone usage/smartphone data and self-report data. Of importance, the present work gives a detailed overview on how to conduct a study using an application such as Insights, starting from designing the study, installing the application to analyzing the data. In the present work, server requirements and privacy issues are also discussed. Furthermore, first validation data from personality psychology are presented. Such validation data are important in establishing trust in the applied technology to track behavior. In sum, the aim of the present work is (i) to provide interested scientists a short overview on how to conduct a study with smartphone app tracking technology, (ii) to present the features of the designed smartphone application and (iii) to demonstrate its validity with a proof of concept study, hence correlating smartphone usage with personality measures.


Author(s):  
Ahmed Waleed Al-Khafaji

Physical security systems are applied to alert in advance a well-known vector of attacks. This paper presents an analysis of the research and assessment of physical security systems applying the PSMECA technique (analysis of modes, efforts, and criticality of physical security). The object of research and analysis is the physical security system of the Ministry of Education and Science of Iraq (as the infrastructure of the region's objects), as well as the area of the compact living of students and co-workers (campus). This paper discusses the organization of physical security systems, which are based on devices with low power consumption and function in the Internet of things environment. The main aim is to describe and develop a physical security system that functions in the Internet of things environment, as well as the development of a scheme for the research and development of models and methods for risk analysis, models of functions and components, models of failures and conducting research and analysis of occurrence failures of PSS. The generalized structural and hierarchical scheme of the physical security system of the infrastructure of the region is presented, as well as the applied application of the scheme is illustrated by the example of the physical security system of a student campus of one of the universities of Baghdad. The functional modeling scheme of the object is provided and is based on the use of the Raspberry Pi microcomputer and the Arduino microcontroller. The set-theoretical models of functions, components, and failures of the system under study, as well as the projection of a hierarchical failure structure in the table of the basic structural elements of the system, are presented. The IDEF0 diagram, showing a power outage scenario (accidental or intentional) in connection with lighting and video subsystems, is presented. The scheme of research and development of models and methods of analysis of risks of PSS is carried out in the paper. A PSMECA table for the CCTV system has been created, which allows you to more precisely determine the cause of the failure in the physical security system and the importance of failure criticality


Author(s):  
Fernando Oliveira ◽  
Júlio Mattos

JavaScript language (JS) has been widely used in recent years applied to browsers-context. Yet JS is being applied to other backgrounds such as server-side programming, mobile applications, games, robotics, and the Internet of Things (IoT). JavaScript is suitable for programming IoT devices due to eventdriven oriented architecture. However, it is an interpreted language, so it has a lower performance than a compiled language. This paper assesses the use of WebAssembly as a strategy to improve the performance of JavaScript applications in the IoT environment. The experiments were performed on a Raspberry Pi using the Ostrich Benchmark Suite. We run the algorithms in JavaScript, WebAssembly, and C language while collecting data about device resource consumption. Our results showed that JavaScript performance could be improved by 39.81% in terms of execution time, a tiny gain in memory usage, and reduced battery consumption by 39.86% when using WebAssembly.


Sensors ◽  
2020 ◽  
Vol 20 (7) ◽  
pp. 1821 ◽  
Author(s):  
Zhenyu Wu ◽  
Kai Qiu ◽  
Jianguo Zhang

The interoperations of endpoint devices are generally achieved by gateways in Internet of Things (IoT) systems. However, the gateways mainly focus on networking communication, which is lack of data logic control capabilities. The microcontrollers with embedded intelligence could work as an intermediate device to help the interconnections of the endpoint devices. Moreover, they could help control the endpoint devices. In this paper, a microcontroller architecture with intelligent and scalable characteristics is proposed. The intelligence means that the microcontroller could control the target endpoint devices by its logical circuits, and the scalability means that the microcontroller architecture could be easily extended to deal with more complex problems. Two real world industrial implementations of the proposed architecture are introduced. The implementations show that the microcontroller is important to provide the intelligent services to users in IoT systems. Furthermore, a simulation experiment based on the cloud model is designed to evaluate the proposed method. The experimental results demonstrate the effectiveness of the proposed architecture.


Sensors ◽  
2019 ◽  
Vol 19 (7) ◽  
pp. 1492 ◽  
Author(s):  
Pantaleone Nespoli ◽  
David Useche Pelaez ◽  
Daniel Díaz López ◽  
Félix Gómez Mármol

The Internet of Things (IoT) became established during the last decade as an emerging technology with considerable potentialities and applicability. Its paradigm of everything connected together penetrated the real world, with smart devices located in several daily appliances. Such intelligent objects are able to communicate autonomously through already existing network infrastructures, thus generating a more concrete integration between real world and computer-based systems. On the downside, the great benefit carried by the IoT paradigm in our life brings simultaneously severe security issues, since the information exchanged among the objects frequently remains unprotected from malicious attackers. The paper at hand proposes COSMOS (Collaborative, Seamless and Adaptive Sentinel for the Internet of Things), a novel sentinel to protect smart environments from cyber threats. Our sentinel shields the IoT devices using multiple defensive rings, resulting in a more accurate and robust protection. Additionally, we discuss the current deployment of the sentinel on a commodity device (i.e., Raspberry Pi). Exhaustive experiments are conducted on the sentinel, demonstrating that it performs meticulously even in heavily stressing conditions. Each defensive layer is tested, reaching a remarkable performance, thus proving the applicability of COSMOS in a distributed and dynamic scenario such as IoT. With the aim of easing the enjoyment of the proposed sentinel, we further developed a friendly and ease-to-use COSMOS App, so that end-users can manage sentinel(s) directly using their own devices (e.g., smartphone).


Sign in / Sign up

Export Citation Format

Share Document