PIR-Enabled Security System for Internet of Things Using Raspberry Pi

Author(s):  
Mamillapally Nagaraju ◽  
Mulukutla Trivikram

Internet of Things (IoT) is an evolution of mobile, home and embedded systems that can be connected to internet increasing greater capabilities of data analytics to extract meaningful information, which can further used for decision making. Billions of devices are connected to internet and soon its number may grow higher than number of human beings on this planet. These connected devices integrated together can become a network of intelligent systems that share data over the cloud to analyze. IoT is an emerging technology where several machines are embedded with low power consuming sensors that allow them to rely data from each other with little or no human intervention. Especially, PIR motion sensor plays a key role in security systems for detecting movements, intrusion and occupancy by interacting with other devices simultaneously like alarms, cameras etc. In this paper, researchers studied IoT applications using PIR motion sensor and proposed architecture and algorithms to be implemented for better development of security systems.

Author(s):  
Kunal.S. Pawar ◽  
Pravin.C. Latane

With the development in the education system, considering the latest current online exam system, a new projection of online exam system based on Raspberry pi IOT is proposed, and the key implementation techniques and methods are also described. The growing ubiquity of wireless, RFID mobile and sensor devices has provide a promising opportunity to build the powerful examination systems and applications by Internet of Things (IoT). A wide range of IoT applications have been developed in recent years. In an effort to understand the development of IoT in online examination, here we propose the current research of IoT, IOT key enabling technologies, major IoT applications in online examination and identifies research trends and challenges. Here we initially all the examine details are stored in the server. Then By applying face recognition (in Open CV based) technique, you can start the online examination. Due to sometime unwanted person also enter to wright the exam, so this is the best way to identified any culprits are found or not.


Author(s):  
Ahmed Waleed Al-Khafaji

Physical security systems are applied to alert in advance a well-known vector of attacks. This paper presents an analysis of the research and assessment of physical security systems applying the PSMECA technique (analysis of modes, efforts, and criticality of physical security). The object of research and analysis is the physical security system of the Ministry of Education and Science of Iraq (as the infrastructure of the region's objects), as well as the area of the compact living of students and co-workers (campus). This paper discusses the organization of physical security systems, which are based on devices with low power consumption and function in the Internet of things environment. The main aim is to describe and develop a physical security system that functions in the Internet of things environment, as well as the development of a scheme for the research and development of models and methods for risk analysis, models of functions and components, models of failures and conducting research and analysis of occurrence failures of PSS. The generalized structural and hierarchical scheme of the physical security system of the infrastructure of the region is presented, as well as the applied application of the scheme is illustrated by the example of the physical security system of a student campus of one of the universities of Baghdad. The functional modeling scheme of the object is provided and is based on the use of the Raspberry Pi microcomputer and the Arduino microcontroller. The set-theoretical models of functions, components, and failures of the system under study, as well as the projection of a hierarchical failure structure in the table of the basic structural elements of the system, are presented. The IDEF0 diagram, showing a power outage scenario (accidental or intentional) in connection with lighting and video subsystems, is presented. The scheme of research and development of models and methods of analysis of risks of PSS is carried out in the paper. A PSMECA table for the CCTV system has been created, which allows you to more precisely determine the cause of the failure in the physical security system and the importance of failure criticality


Author(s):  
Kunal Pawar ◽  
Pravin Latane

In this research we have proposed IOT based advanced Online examination using Raspberry pi for Alarm system and border security. With the event of recent education, considering the defect of current online exam system, a replacement projection of online exam system primarily based on Raspberry pi IOT is projected, and also the key implementation techniques and ways also are represented. Internet of Things (IOT) has provided a promising chance to make powerful Examination systems and applications by leverage the growing omnipresence of wireless, RFID mobile and detector devices. a large vary of IOT applications are developed in recent years. In a shot to grasp the event of IOT in on-line examination, here we tend to propose this analysis of IOT, IOT key facultative technologies, major IOT applications in on-line examination and identifies analysis trends and challenges. Here we tend to introduce all the examiner details square measure holds on within the server. Then if somebody needs to starts on-line examination, 1st they ought to apply face recognition (in Open CV based) technique. as a result of it slow unwanted person conjointly enter to Wright the examination, thus this can be the simplest thanks to known any culprits square measure found or not. Then examination enter to Wright the exam, here conjointly I am apply some security. Currently a day’s already queries square measure hold on within the on-line or any paper written copy.


Author(s):  
Sejal Atit Bhavsar ◽  
Brinda Yeshu Pandit ◽  
Kirit J. Modi

Internet of things has gathered significance within the latest technology domain and trends. As a result, it offers greater ways of accessing data and utilizing intelligent systems. IoT applications are developed for specific scenarios (i.e., smart home, smart transportation, smart agriculture, e-health, etc.). Such IoT applications are inefficient for sharing data and knowledge through services. This results in an inefficient exploitation of different IoT service applications. Social internet of things (SIoT) has efficient and effective ways to support these kinds of services. A concept of social internet of things has been proposed in this chapter in order to support efficient data sharing. This chapter explores related work and literature study on social internet of things, concentrates on mapping IoT with SIoT, and describes a possible architecture for SIoT, components, layers and processes of SIoT. It also illustrates applications, where SIoT can be used, and at the end, the authors provide a few challenges related to SIoT.


Author(s):  
Arul Murugan C. ◽  
Banuselvasaraswathy B.

Internet of things (IoT) is a recent technology, and it will become the next generation of internet that connects several physical objects to interact amongst themselves without the assistance of human beings. It plays a significant role in our day-to-day lives and is used in several applications. IoT is a boon to this modern world, but it lacks in security. It cannot protect the user data from assailants, hackers, and vulnerabilities. Field programmable gate arrays (FPGA) helps to achieve all these objectives by incorporating secured end-to-end layer into its architecture. In this chapter, ultralow power and reduced area AES architecture with energy efficient DSE-S box techniques and clock gating for IoT applications are introduced. The proposed AES architecture is implemented over different FPGA families such as Cyclone I, Cyclone II, Virtex 5, and Kintex 7, respectively. From the experimental results, it is observed that the Kintex 7 FPGA kit consumes less power than other FPGA families.


Author(s):  
Ree Chan Ho

Online business, just like other industries, has adopted advanced technology for business performance. Hence, the technology of internet of things (IoT) has been implemented in recent years. IoT acts as a business ecosystem by interconnecting all physical objects and systems to execute tasks efficiently. However, the extent to which customers understand and appreciated this emerging technology is understudied. The purpose of this chapter is therefore to understand the customer acceptance as well as the gratification gained and sought by them via the use of IoT technology. Based on the uses and gratification theory, this study focused on the antecedents in shaping the attitude of online consumers towards IoT applications. Furthermore, it also addresses the willingness of consumers in becoming more knowledgeable of product with the support of IoT technology.


2021 ◽  
Vol 21 (3) ◽  
pp. 50-72
Author(s):  
K. Swapna Sudha ◽  
N. Jeyanthi

Abstract Internet of Things (IoT) is the predominant emerging technology that targets on facilitating interconnection of internet-enabled resources. IoT applications concentrate on automating different tasks that facilitate physical objects to act autonomously without any human interventions. The emerging and current IoT applications are determined to be highly significant for improving the degree of efficiency, comfort and automation for its users. Any kind of security breach on the system will directly influences the life of the humans In this paper, a comprehensive review on Privacy requirements and application layer Security in Internet of Things (IoT) is presented for exploring the possible security issues in IoT that could be launched over the individual layers of IoT architecture. This review explores different challenges of classical security solutions that are related to authentication, key management and cryptographic solutions.It also presents the details of existing access control and device authentication schemes with their pros and cons.


2020 ◽  
Vol 10 (1) ◽  
pp. 17-29
Author(s):  
Ahmed A. Elngar ◽  
Mohammed Kayed

AbstractNowadays, the automobile sector is one of the hottest applications, where vehicles can be intelligent by using IoT technology. But unfortunately, these vehicles suffer from many crimes. Hence it has become a big challenge for the IoT to avoid such these crimes from professional thieves. This paper presents a proposal for the development of a vehicle guard and alarm system using biometric authentication based on IoT technology. Whereas, for vehicle security issues; the proposed system VSS − IoT gives only full access for authorized vehicle’s driver based on the interface of a Raspberry Pi 3 Model B+ development board, Pi camera, PIR sensor, and smart-phone. Therefore, if the proposed system detects an unauthorized person inside the vehicle, then the system will notify and send his image to vehicle’s owner and/or to a police workstation through the Internet, as well as, its location in case the vehicle is stolen or damaged. The proposed system is tested on two datasets that are ORL dataset and our dataset. The experimental results of the VSS − IoT showed that the accuracy is 98.2% on ORL dataset, whereas 99.6% when applied on our dataset. Besides, the VSS − IoT enhances the sensitivity to 97.7% which is important for real-time. As well as the result demonstrated that the proposed system took shorter time 0.152 sec under different illumination conditions, when the value of the threshold is 3 * 103 and 3.50 * 103. Therefore, the VSS − IoT is very robust and reliable for face recognition when deployed on the low-power processor.


2018 ◽  
Vol 1 (3) ◽  
pp. 26 ◽  
Author(s):  
Zebenzui Lima ◽  
Hugo García-Vázquez ◽  
Raúl Rodríguez ◽  
Sunil Khemchandani ◽  
Fortunato Dualibe ◽  
...  

In this work, the design and implementation of an open source software and hardware system for Internet of Things (IoT) applications is presented. This system permits the remote monitoring of supplied data from sensors and webcams and the control of different devices such as actuators, servomotors and LEDs. The parameters which have been monitored are brightness, temperature and relative humidity all of which constitute possible environmental factors. The control and monitoring of the installation is realised through a server which is managed by an administrator. The device which rules the installation is a Raspberry Pi, a small and powerful micro-computer in a single board with low consumption, low cost and reconfigurability.


2021 ◽  
Vol 23 (06) ◽  
pp. 912-918
Author(s):  
Rajesh Pandey ◽  
◽  
Avinav Pathak ◽  
Rohit Vats ◽  
Nidheesh Sharma ◽  
...  

Human life is of the utmost importance. Every year, many people lose their lives in road accidents. Reasons for an accident are many like over-speeding, poor traffic system, drink and drive, rough driving, etc. this paper aims to develop a model that can be used in vehicles to identify accidents due to Zero visibility in fog in winters and alarming for the same to avoid it. IoT is an emerging technology and can be intensively used for intelligent transport systems. This paper aims to develop an automated IoT-enabled system to be used in cars for the detection and avoidance of accidents due to zero visibility in fog. To build this system, the Ultrasonic sensor will be integrated with Raspberry Pi along with other supportive components (power-bank, Jumper wires, breadboard, etc.).


Sign in / Sign up

Export Citation Format

Share Document