scholarly journals Smart Home Monitoring System Using ESP32 Microcontrollers

2020 ◽  
Author(s):  
Marek Babiuch ◽  
Jiri Postulka

This chapter deals with the implementation of our own monitoring system with home security. The system is designed using IoT modules and uses ESP32 microcontrollers. The chapter describes the design of the system, its hardware components, software implementation, security solutions, communication, the collecting and monitoring of processed data, as well as the quantification of costs for the production and deployment of this system. The proposed system secures a house by detecting an intruder in the building, triggering an alarm and capturing it all with camera images, and then sending data to the owner’s smart mobile phone. The secondary task of the system is to collect data from sensors for monitoring the temperature of an object and presenting it via a web server.

Author(s):  
Галина Влах-Вигриновська ◽  
◽  
Олег Іванюк ◽  
Мішель Вигриновський ◽  
Назар Малиновський ◽  
...  

This article proposes a cost effective IoT smart home security platform that delivers data in the cloud for applications. The smart security system includes a network for sensing home monitoring devices via wireless ISM communication, a home security system control controller with an Internet connection using a Wifi connection, and a backup method of notifying the user is implemented by SMS message via GSM cellular network, cloud server and applications for mobile phones on the Android operating system. The developed application combines the application of a cloud server, client sensors and a database. It also clarified the hardware and software implementation of the IoT-based home security system and their relative functions.


Author(s):  
S. Loyola Samraj ◽  
Nisha V. Bhalke ◽  
A. Aarthi ◽  
R. Srinath ◽  
E. Prabhu

Author(s):  
MOHAMMED S. KHALIL ◽  
FAJRI KURNIAWAN ◽  
KASHIF SALEEM

Over the past decade, there have been dramatic increases in the usage of mobile phones in the world. Currently available smart mobile phones are capable of storing enormous amounts of personal information/data. The smart mobile phone is also capable of connecting to other devices, with the help of different applications. Consequently, with these connections comes the requirement of security to protect personal information. Nowadays, in many applications, a biometric fingerprint recognition system has been embedded as a primary security measure. To enable a biometric fingerprint recognition system in smart mobile phones, without any additional costs, a built-in high performance camera can be utilized. The camera can capture the fingerprint image and generate biometric traits that qualify the biometric fingerprint authentication approach. However, the images acquired by a mobile phone are entirely different from the images obtained by dedicated fingerprint sensors. In this paper, we present the current trend in biometric fingerprint authentication techniques using mobile phones and explore some of the future possibilities in this field.


2011 ◽  
Vol 130-134 ◽  
pp. 4270-4273
Author(s):  
Jian Guo Yuan ◽  
Sheng Gu

When dealing with such complex systems such as the software package of a smart mobile phone, it is necessary to apply powerful methods to detect and report errors when they occur. This paper probes and analyzes a powerful debug method called trap and exception handling, which is supported by the ARM platforms. The method can easily capture some valuable debug information. When a fatal error occurs during runtime or system detects an abnormal, a trap or an exception shall be logged and stored in the non-volatile random access memory (NVRAM). The information must be enough and easy for engineer to analyze the software error.


2019 ◽  
Vol 15 (9) ◽  
pp. 155014771987935
Author(s):  
Guo-Ming Sung ◽  
Yen-Shin Shen ◽  
Jia-Hong Hsieh ◽  
Yu-Kai Chiu

This article proposes an Internet of Things–based smart home system composed of a virtualized cloud server and a mobile phone app. The smart Internet of Things–based system includes a sensing network, which is developed with the ZigBee wireless communication protocol, a message queuing telemetry transport, a virtualized cloud server and a mobile phone app. A Raspberry Pi development board is used to receive packet information from the terminal sensors using ZigBee wireless communication. Then, the message queuing telemetry transport broker not only completes transmission of the message but also publishes it to the virtualized cloud server. The transmission can then be viewed through the website using a mobile phone. The designed app combines the application of the virtualized cloud server, client sensors and the database. Verification experiments revealed the measured average response time and throughput of approximately 4.0 s and 6069 requests per second, respectively, for the virtualized web server and approximately 0.144 s and 8866 packets per second, respectively, for the message queuing telemetry transport broker. The designed functions of the mobile phone app are a global positioning system home monitoring, family memo, medical care and near-field communication key. Both interlinkage and handler methods are proposed to facilitate a powerful function without delay in displaying information. The proposed system integrates with software and hardware to complete the data analysis and information management quickly and correctly. It can cater to user needs with superior ease and convenience.


2016 ◽  
Vol 19 (1) ◽  
pp. 22
Author(s):  
Muhammad Khoiru Syabibi ◽  
Arkhan Subari

Muhammad Khoiru Syabibi, Arkhan Subari  in this paper explain that Along with the progress of era, the development of advanced technology also impacts on the development of security systems. Sophisticated security systems that digitally integrated has been growing, one of them is a web-based security system. This web-based home security monitoring system uses a raspberry pi b + that serves as a server and media controller, then for the web programming, it uses HTML, CSS and Javascript. This web-based home security monitoring system home uses a webcam (web camera) that functions like CCTV which can be monitored via a web browser, magnetic switch as security detector, keypad as access control to turn off security monitoring system for 10 seconds, and the buzzer and LED as security indicators. When someone enter the house, he/she must press the keypad. If keypad input is correct according to the passcode then the LED will turn off, indicate that home security monitoring system off for 10 seconds. If he/she enter the house without pressing the keypad according to the passcode then when the door opens, a switch magnetic will active, then buzzer will sound and the indicator on the web will change, indicate that he/she is a person who will do the crime.Keyword : raspberry pi b+, webcam, magnetic switch, keypad, buzzer and LED. ReferencesAndre. 2014. Sejarah PHP dan Perkembangan Versi PHP. http://www.duniailkom.com/sejarah-php-dan-perkembangan-versi-php.Apache Software Foundation. About the Apache HTTP Server Project. http://httpd.apache.org/ABOUT_APACHE.html.Arfa. 2014. Akses Kontrol Kendaraan Bermotor Roda Empat Menggunakan Password dan Sensor. Skripsi. Jakarta: STMIK Raharja.Aziz, Abdul. 2012. Pengertian, Fungsi, Serta Cara Kerja Web Server. http://www.dedeerik.com/pengertian-fungsi-serta-cara-kerja-web-server.Baharudin, M. 2011. Pengertian Website. http://www.naevaweb.com/pengertian-website/arsip.html.Cox, Tim. 2014. Raspberry Pi Cookbook. Birmingham: Packt Publishing.Embedded Linux Wiki. Raspberry Pi, Low-level Peripherals. http://elinux.org/RPi_Low- level_peripherals.Embededdlinux. Raspberry Mode B-Block diagram. Diunduh http://embeddelinux01.com.Faizal. 2011. Prinsip Kerja Piezoelectric. http://www.insinyoer.com/prinsip-kerja-piezoelectric.Friedl, Stave. 2015. Secure Linux/Unix Access With Putty and Open SSH. http://unixwiz.net/techtips/putty-openssh.html/2015.Gudang Linux. 2011. Python. http://gudanglinux.com/glossary/python.Gurevich, Vladimir. 2011. Electric Relays: Principles and Applications. London: CRC Press.Harian Android. 2014. Pengertian dan Fungsi SD Card. http://www.harianandroid.com/2014/04/pengertian-dan-fungsi-sd-card.html.Heranudin. 2011. Rancang Bangun Sistem Keamanan Ruangan Menggunakan Radio Frequency. Skripsi. Depok: FT UI.Iswan, Agusta. 2012. Sistem Proteksi Brankas Berpassword Menggunakan Magnetic Doorlock sebagai Penggerak Doorstrike Berbasis Mikrokontroller. Tugas Akhir D3 Teknik Elektro. Semarang: FT UNNES.Kho, Dickson. 2012. Dioda dan Fungsi Dioda. http://teknikelektronika.com/-dioda-fungsi-dioda.Kho, Dickson. 2012. Pengertian LED (Light Emitting Diode) dan Cara Kerjanya. http://teknikelektronika.com/pengertian-led-light-emitting-diode-cara-kerja.Kho, Dickson. Pengertian Resistor dan Jenis Resistor. http://teknikelektronika.com/pengertian-resistor-jenis-jenis-resistor.Komponen Elektronika. 2011. Rangkaian Buzzer. http://komponenelektronika.com/rangkaian- buzzer.html.MS-1 Magnetic Door Switch datasheet. http://www.braude.ac.il/files/departments/electrical_electronic_engineering/labs/data_pages/p3.pdfNasih, Muhammad Usman. 2013. Alat Pengaman Kendaraan Bermotor Menggunakan Password dan SMS. Tugas Akhir. Yogyakarta: STMIK El Rahma.Özcan, Yakut. 2014. Piezoelektrik.Paul Malvino, Albert. 2010. Prinsip-Prinsip Elektronika. Jakarta: Erlangga.Pemrograman Komputer. 2012. Petunjuk Praktikum Pemrograman Komputer. Semarang: D3 Teknik Elektro UNDIP.Prayitno, Indra. 2010. Kupas Tuntas Malwar. Jakarta: Elex Media Komputindo.Raspberry Pi Fondation. GPIO Raspberry Pi Model A dan B. https://www.raspberrypi.org/documentation/usage/gpio/2009Raspberry Pi Fondation. Setting Up And Apache Web Server On A Raspberry Pi. https://www.raspberrypi.org/documentation/remote-access/web-server/apache.md.Raspberrry Pi Fondation. SSH Using Windows. http://raspberrypi.org/documentation/remote-access/ssh/windows.md/2014Richardson, Matt dan Shawn Wallace. 2015. Make: Getting Started with Raspberry Pi. Sebastopol: Maker Media.Robinson, Andrew dan Mike Cook. 2014. Raspberry Pi Projects. Chichester: John Wiley & Sons Ltd.Rohiman, Ao. 2011. Pengertian dan cara kerja router.http://www.catatanteknisi.com/2011/05/pengertian-cara-kerja-router.html.Sidik, Betha. 2011. Javascript. Jakarta: Informatika.Wahyu. Pengertian Webcam dan Fungsinya. http://wahyu.blog.fisip.uns.ac.id/2011/12/06/pengertian-web-cam-dan-fungsinya.Wikipedia. Secure Digital. https://en.wikipedia.org/wiki/Secure_Digital#Micro. 


3D Research ◽  
2014 ◽  
Vol 5 (1) ◽  
Author(s):  
Jonathan Bar-Magen Numhauser ◽  
Zeev Zalevsky

Sign in / Sign up

Export Citation Format

Share Document