Home Security Service and Condition Control

2013 ◽  
Vol 479-480 ◽  
pp. 661-664 ◽  
Author(s):  
Shu Chu Tung ◽  
Wu Jeng Li ◽  
Shih Miao Huang

This research creates home security service with social interaction based on a web-based multiple stations supervisory control framework. An Arduino controller is used as a thin-controller to control a home security system. Most control laws are computed in server-side, driving commands are transferred to local controllers for execution. A supervisory control server kept in a company can serve numerous Arduino controllers to provide home security service. The Arduino controller can sense door switch, motion detection, smoke detection, gas detection, CO detection, and an emergency button, and can drive door lock, two relays. Besides, RFID is used to help personnel in/out management and alert enable/disable. The controller reads inputs, uploads input/output data to the supervisory server, executes commands from the server, and drives output continuously. Once a controller is connected to the supervisory server, it can be monitored and controlled remotely. Condition control is proposed for the framework to help program control laws for Arduino controllers. In condition control, conditions are set. When some condition is met, certain actions are taken. There are three types of conditions; time condition, input/output condition, and location condition. And there are three kinds of actions; SMS notification, email notification, and output drive. Conditions, actions and their connections are set by system users in a browser with the help of the supervisory control information management system. The control laws set in the condition control are executed in server-side. User of the home security system can open the read/write rights of his input/output points to other users. With appropriate control law, a motion detection signal of one user can activate the alarm of another user. Therefore, the home security service is not just a security for users home, but a security for a social group.

2015 ◽  
Vol 764-765 ◽  
pp. 915-918 ◽  
Author(s):  
Wu Jeng Li ◽  
Shu Chu Tung ◽  
Shih Miao Huang

This research enhances a home security service with information stations. The service is based on a web-based multiple stations supervisory control framework. A service server (or cloud) kept in a company to serve numerous homes for security monitoring. Arduino controllers are used as home security controllers. An Arduino controller senses door switch, motion detection, smoke detection, gas detection, CO detection, an emergency button, RFID tag, and a spare sensing contact. The controller also drives door lock, two relays to perform security task. RFID is used to help personnel in/out management and alert enable/disable. The controller reads inputs, uploads input/output data to the service server, executes commands from the server, and drives output continuously. Camera servers are added to a house to provide video surveillance. Camera alert events are sent to the service server. Information stations, like earthquake alert station and weather station, are established in the server to provide environmental information. Users can subscribe certain information data and put them in the control laws of the Arduino controllers with condition control. With input/output authorization, the home security of one user is associated with others. Therefore, the whole security service forms a social security group.


2013 ◽  
Vol 284-287 ◽  
pp. 3211-3215 ◽  
Author(s):  
Shu Chu Tung ◽  
Wu Jeng Li ◽  
Shih Miao Huang

This paper designs a web-based Android supervisory control system. Android controller is used as a local controller to fit into a supervisory control framework. The framework includes a central server, a SMS device attached to the server, multiple local controllers, a remote control program and a ladder logic computer-aided design program. The Android controller contains an Android mobile phone, a Wi-Fi wireless access point, a switch hut (or NAT) and multiple data acquisition modules. The Android mobile phone enters TCP/IP LAN through the Wi-Fi access point. The data acquisition modules with TCP/IP interface are plugged into the LAN, and read/written by the Android mobile phone with Modbus TCP. The Android controller communicates with supervisory server with a specific m2m protocol which is based on http protocol. Once an Android controller is connected to the supervisory control framework, it can be monitored and controlled remotely with any browser. A web-based home security system is constructed to demonstrate the usage of the web-based Android supervisory control system. The control laws for the home security system are partially implemented with ladder logics designed with a computer-aided program in the framework. With a supervisory server serving multiple Android controllers, Cloud home security service is formed.


2017 ◽  
Vol 33 (4) ◽  
pp. 39-46
Author(s):  
T. D. Malyutina

The article substantiates the importance of the company's economic security service in the modern conditions of business operations. The level of security of the enterprise is ensured by high economic potential, financial independence, sustainable development, personnel responsibility. The loss of at least one of the listed elements of a universal system of economic security is characterized by unforeseen consequences for the enterprise. The untimely modernization of the economic security system, its obsolete form, will not ensure the proper level of the company's confident working.


2018 ◽  
Vol 7 (4.15) ◽  
pp. 130
Author(s):  
Emil Semastin ◽  
Sami Azam ◽  
Bharanidharan Shanmugam ◽  
Krishnan Kannoorpatti ◽  
Mirjam Jonokman ◽  
...  

Today’s contemporary business world has incorporated Web Services and Web Applications in its core of operating cycle nowadays and security plays a major role in the amalgamation of such services and applications with the business needs worldwide. OWASP (Open Web Application Security Project) states that the effectiveness of security mechanisms in a Web Application can be estimated by evaluating the degree of vulnerability against any of the nominated top ten vulnerabilities, nominated by the OWASP. This paper sheds light on a number of existing tools that can be used to test for the CSRF vulnerability. The main objective of the research is to identify the available solutions to prevent CSRF attacks. By analyzing the techniques employed in each of the solutions, the optimal tool can be identified. Tests against the exploitation of the vulnerabilities were conducted after implementing the solutions into the web application to check the efficacy of each of the solutions. The research also proposes a combined solution that integrates the passing of an unpredictable token through a hidden field and validating it on the server side with the passing of token through URL.  


2014 ◽  
Vol 68 ◽  
pp. 00025 ◽  
Author(s):  
Santoso Budijono ◽  
Jeffri Andrianto ◽  
Muhammad Axis Novradin Noor

Sign in / Sign up

Export Citation Format

Share Document