Utilizing a Multifunctional Base Station for Energy and Fault Management in Smart Security Systems

  • Abstract
  • Literature Map
  • Similar Papers
Abstract
Translate article icon Translate Article Star icon
Take notes icon Take Notes

Utilizing a Multifunctional Base Station for Energy and Fault Management in Smart Security Systems

Similar Papers
  • Research Article
  • Cite Count Icon 1
  • 10.11591/ijra.v10i1.pp32-40
Internet of Things-based home automation, energy management and smart security system
  • Mar 1, 2021
  • IAES International Journal of Robotics and Automation (IJRA)
  • U I Bature + 3 more

Objects can easily be remotely sensed, monitored and controlled when home is automated using the Internet of Things (IoT); this will give room for direct integration of the real world into computerized systems. Energy consumption is defined as the degree of the amount of power expended by a given load in an electric circuit. Nowadays, inefficient techniques used in monitoring and control of power consuming devices has contributed immensely in the high rate of power consumption in our homes, institutions, business places, and marketplaces. The design and implementation of an IoT-based home automation, energy management and smart security system has been proposed in this paper. The components used in the development of the system unit include an ESP8266 Wi-Fi component and the universal Arduino imbedded controller. The proposed scheme is aimed at assisting and supporting an efficient usage of power, and by doing so, power consumption as well as the risk of fire outbreaks will be greatly reduced to the barest minimal. The capability of remotely monitoring and controlling both electrical and electronic appliances via a web application is the main feature of the proposed scheme. The scheme provides better efficiency and accuracy as well as economic benefits.

  • Research Article
  • Cite Count Icon 1
  • 10.5505/apjes.2015.47955
Designing a Smart Sensor Security System for Human Movements Using Image Processing Techniques
  • Jan 1, 2015
  • Academic Platform Journal of Engineering and Science
  • Emre Erkan + 2 more

Security is one of the basic needs for countries and individuals. Technological improvements constantly contribute to the security systems. Particularly, security cameras fulfill an important task. However, it is not economical and sustainable to permanently monitor security cameras. However, smart security systems are needed. Smart security systems which are created using image processing techniques are of vital importance in terms of preventing unfavorable events in advance. In this study, a smart security system is designed to takes necessary precautions in case of a hazardous image in a group of images obtained from two different security cameras.

  • Book Chapter
  • Cite Count Icon 9
  • 10.1007/978-981-15-0135-7_41
Smart Security System Using IoT and Mobile Assistance
  • Jan 1, 2020
  • J Indumathi + 2 more

The digital era has witnessed giant strides in the utilization of security systems, which perform certain pre-programmed tasks when a secured zone is breached. The prevailing traditional security systems have evolved embracing the cutting-edge technologies from time to time. The avalanche-like explosion of things and their connectivity through Internet have opened several new boulevards of exploration. The unification of security system based on the IoT platform has the potential of interrelating real time with the devices and makes them smart, with issues like privacy. To keep the issues in the bay, a new intrusion detection system is the need of the hour. Hence, a wireless intrusion detection smart security system is designed and developed to overcome the research gaps in the existing systems. The smart security system is built on the Internet of things. The system is a lightweight, low cost, extensible, flexible wireless IoT-based-smart security system which will permit the mobile devices and computers to remotely trail the happenings at the location, record the activities and save them in the prefixed cloud storage account. The system uses the hardware (things) to sense and fetch the data which is processed by the embedded software. On the occurrence of an abnormal activity (like breaching by an intruder), a valid signal is detected, and it sends signal to the board directing it to run the alert module. The alert module activates the GSM API to immediately alert the end-user by mobile. This system thus provides a wireless, incessant service to all the stakeholders by phone regarding the breaches occurring in the environment. This implemented smart security system using IoT with mobile assistance also integrates the various alarms, sends alert as pre-programmed, tracks the movements automatically, uses the state-of-the-art appropriate latest technologies to alert the concerned stakeholders and waits for actions to be taken.

  • Research Article
  • 10.7906/indecs.16.3.6
Probabilistic Approach and Fuzzy System Based Support of the Railway Stations' Smart Security System
  • Jan 1, 2018
  • Interdisciplinary Description of Complex Systems
  • Gábor Liebmann + 2 more

One of the keystones of the smart city is the transportation. The railway is the crucial part in the main public- and also the goods-transportation today, and the significance will be constantly growing. Nowadays the increase in threats and decrease in the sense of security generates a high need for designing smart and multi-level integrated security systems on the railway stations. The security risk of these territories has risen in the last years, because the public transportation plays an important role in the lives of nowadays people and will grow in the future. That means a rise in incidences of robbery, vandalism and even terrorism. The integration of the conventional systems gives more possibility and reliability for the facility management and the end-users to prevent the aforementioned incidences. The power of the complex (human-electrical-mechanical) system can be usable if in the central monitoring station only qualified and well trained operators work. Because of the difficulty of the multi-level integrated security systems, without suitable and well-trained users and operators the efficiency of the security decrease. Furthermore, the efficiency of the complex system can be lower than the unintegrated conventional realizations, so that's why it is needed to integrate special smart functions. Managing the smart complex security systems on the aforementioned railway stations are difficult due the human factor and the large number of connections and internal processes. However, the recently created and improved probabilistic approach- and fuzzy system can be a useful mathematical solution for the aforementioned cases. These methods can be used in the full scaled security system, if first - like the Fuzzy logic - an expert level analysis gives enough information about the crucial parts of the system. With them comes the possibility to give and get data from the determined system, and continuously recalculate the factors and - in some cases - it can also be done online. It helps to generate and send prompt information to the facility management, and with it can maximize the fully functional operational efficiency and reduce the hazards. This article gives a useful guideline for the facility management of the smart cities' railway stations. It declares the main connections with theirs hazards to find the key elements and the in-, and outbound parameters of the smart complex security system. The generated knowledge base will contain also more additional information about the efficiency and the improvement of the system, too.

  • PDF Download Icon
  • Research Article
  • Cite Count Icon 8
  • 10.1007/s12053-024-10202-3
Smart home technology adoption in Denmark: Diffusion, social differences, and energy consumption
  • Feb 28, 2024
  • Energy Efficiency
  • Anders Rhiger Hansen + 2 more

Smart home technology (SHT) is increasingly entering homes to provide services such as energy management, security, comfort, and convenience. However, research shows that adoption varies across social groups and that SHT might affect energy demand. Denmark is considered a frontrunner in the uptake of SHT and offers a unique opportunity to combine administrative household information with energy consumption data and survey responses on SHT uptake. This paper studies a representative sample of 1,468 Danish households to investigate SHT diffusion, social differences in SHT adoption, and correlations between SHT and energy consumption, divided into appliance use and heating. The results indicate that entertainment and home security are the most popular SHT services in Denmark and that SHT is more widespread among younger households, especially for entertainment and robotic help. In contrast, smart heating systems are more widespread among older households. Living in a detached house seems to increase the likelihood of having SHT, while the highest income group appears more likely to have security systems, and technical education seems associated with the adoption of SHT for heating management. Finally, smart security systems were associated with higher electricity consumption, and SHT for electricity management was associated with higher heating consumption and to a lesser extent higher electricity consumption, but there was no significant correlation between having smart heating control and heating consumption.

  • Book Chapter
  • Cite Count Icon 3
  • 10.1007/978-3-319-06160-3_10
Smart Security: Integrated Systems for Security Policies in Urban Environments
  • Jan 1, 2014
  • Enrico Di Bella + 4 more

Smart Security systems are applications of the Smart City paradigm for local crime prevention. Like most Smart City tools, they consist of informational and technological components that support decision-making processes. A pre-requisite for such tools is that they are supposed to be means of ongoing management and policy innovations: we therefore review some of the crucial components of a Smart Security system from the viewpoint of a local government Local government or a local branch of the public administration, in order to analyze the high-level requisites, characteristics and potentials of such a system. The objective is to help Public officials in identifying both what defines a useful technical tool but also what is required on the part of the public administration to actually make it useful. We therefore discuss the following problems. First, we address the issue of indicators, data and the use of statistical analysis to infer the likely determinants of crime and to define risk parameters for urban spaces. In doing that, we suggest innovative tools to introduce spatial information in crime count models. Second, we discuss sensors and sensor output analysis, trying to define the circumstances that make it useful and the new possibilities offered by current technology. Then we discuss about integration of different information both from a conceptual and a technical point of view, stressing the importance of closing the gap between cold and hot data in order to realize an integrated early warning system. Finally, we discuss the problem of creating a scalable Smart Security system in a local government Local government , indicating a list of significant international experiences.

  • Conference Article
  • Cite Count Icon 21
  • 10.1109/esci50559.2021.9396843
IoT based Smart Security and Surveillance System
  • Mar 5, 2021
  • Gurusha Lulla + 3 more

Internet of Things (IoT) is an escalating trend in today’s world, and has proved to be a game changer in the field of technology. More and more sensors and devices are being connected together to develop new systems to solve real world problems. With the increase in technology and automation, security has become a major concern. The first line of defense for any property is always a security system, which alerts the owners regarding intrusion in real time. Currently, there exist multiple security systems, which make use of various motion sensors to detect any motion and notify the owner about the intrusion. However, most of these systems do not provide the features of zone barriers, facial recognition, remote camera surveillance and power failure detection, combined with ease of use, economic viability and power efficiency. The main objective of the proposed architecture is to overcome all these problems by developing a smart security and surveillance system which makes use of multiple ultrasonic sensors to detect intrusion attempts on the property of the owner, in order to notify them of the presence of an unauthorized person. Also, the system provides a warning to the person who has intentionally or unintentionally entered the property, so that they can step back in time, without triggering any alarm. With the help of a remote camera surveillance feature, the owner can monitor the surroundings of their property remotely. This system will issue an alert to the owner in case of a power failure as well. This system provides face recognition as an authentication procedure, in order to allow the valid entrants to enter into their property. All these features combined, create a flexible and reliable security system, which can be used in various properties, such as homes, offices, museums and so on.

  • Book Chapter
  • Cite Count Icon 3
  • 10.1007/978-3-030-38516-3_4
A Systematic Literature Survey: Development of Smart City Based on Various Internet of Things Architectures
  • Jan 1, 2020
  • Kirti + 2 more

The Internet of Things is emerging out as the revolution in research world. IoT has the capability to make the human life smart. Since IoT is in its dawn stage, there is plethora of things that is required to be scrutinized in this high-tech field. Sensors being omnipresent in mobiles to smart homes, smart agricultural fields to smart retail stores, and smart cars to smart cities all are getting connected to each other and acquaint using the Internet. Even the security systems are moving toward smart security systems. In addition to CCTVs, sensors and the Internet can be used to achieve inclined level of sharp security structure of the warehouse. Physical intrusion detection system (IDS), which is a smart security system, can be used to detect the encroachers in zone where humans are prohibited. In this paper, the authors have implemented the physical intrusion detector as the security guard for cold storages. The authors reviewed the IoT-based architectures that are employed to move from urban cities to smart cities. In this paper, the authors thoroughly reviewed the work implemented in the last 7 years to convert urban cities into smart cities.

  • Research Article
  • Cite Count Icon 2
  • 10.1088/1757-899x/981/4/042009
Bluetooth and GSM based Smart Security System using Raspberry Pi
  • Dec 1, 2020
  • IOP Conference Series: Materials Science and Engineering
  • Kashaboina Radhika + 1 more

Latest wireless technologies enhanced the smart security system is more advanced. Android based secure smart door accessing system is designed for high secure and robust application. This type of applications implemented for Banking, home, business applications. In the proposed system we implement this smart security system with Bluetooth and GSM module for higher security. Hardware implementation is designed through Raspberry pi module for high processing data. This wireless data access system very fast and secure in real time applications.

  • Book Chapter
  • 10.4018/979-8-3373-1032-9.ch016
Smart Security System Using Hybrid System With IoT and Machine Learning
  • Dec 13, 2024
  • Kandan M + 5 more

Smart security systems (SSS) in houses are growing increasingly prevalent as technological advances become more prevalent in everyday life. Lighting, temperature, security cameras, and gadgets are all controlled by a SSS in houses. The widespread adoption of Internet of Things (IoT) technologies in smart houses has altered the environment of connected devices, online activity, and data transfers in household broadband connections and the web overall. Current cyber assaults and hazards against IoT-based SSS in houses, on the other hand, have shown widespread hazards and dangers in IoT devices that encompass the layer of data connection protocols to service providers.

  • Research Article
  • 10.37934/araset.58.1.2032
Human-Centric Design Model to Enhance the Passenger Experience of Airport Smart Security System
  • Oct 9, 2024
  • Journal of Advanced Research in Applied Sciences and Engineering Technology
  • Massila Kamalrudin + 3 more

Many studies have overlooked the aspect of humans when it comes to the security system integration in an airport. Hence, this study aims to develop a human-centric smart security system at the Dubai International Airport (DXB) to enhance the passenger experience. This paper proposed a human-centric design model to assess passenger experience at the smart security gate in the DXB and uses the model to analyze the proposed model based on the feedback of passengers. The model is represented by the human-centric dimension of emotional/feeling, behavior, needs and requirements, usability, trust, cognitive, and ergonomics that has a relation with passenger experience. A survey was administered to 400 respondents who had experience using the airport security system at the DXB. Regression analysis was used to test the relationship within the model and establish a human-centric model. Usability tests were used to gain deeper insight and gauge a more in-depth opinion of the respondents. It was found that cognitive had a low influence on passenger experience, while most respondents viewed the model as very useful. The findings of the study will assist the airport industry and authorities in UAE airports to better position their security system and enhance the passenger experience.

  • Research Article
  • 10.63786/jipower.v1i2.14
SMART SECURITY DEVELOPMENT TO REALIZE SECURITY AND PUBLIC ORDER IN THE CAPITAL CITY OF NUSANTARA
  • Aug 28, 2024
  • JIPOWER : Journal of Intellectual Power
  • Satria Rizkiano + 1 more

The relocation of the National Capital City (IKN) from Jakarta to the archipelago in East Kalimantan province is carried out by the Government of the Republic of Indonesia based on Law Number 3 of 2022 concerning the National Capital City. Physical construction is currently underway and the first footprint of the Joko Widodo Administration was marked by the 79th Commemoration Ceremony of the Seconds of the Proclamation of Independence of the Republic of Indonesia. The opportunities and challenges are very dynamic so that a strong commitment from the next government is needed so that the development and relocation of the National Capital City takes place successfully in line with its goals and vision as: a) a sustainable city in the world; b) a future economic driver for Indonesia; and c) a symbol of national identity that represents the diversity of the Indonesian nation, based on Pancasila and the 1945 Constitution of the Republic of Indonesia. For this reason, safe and conducive conditions supported by all elements of nationality are needed; among others through the implementation of a smart security system. The research method used is a descriptive method to find and describe variables related to the development of smart security to realize public order in IKN Nusantara (Suharsimi, 2011). The tools used to analyze data are SWOT Analysis (Albert S. Humphrey). The approach used is a qualitative approach to describe the conceptual or discussion of variables in a narrative (non-numerical) manner. With these methods and approaches, this research is expected to have novelty, namely finding a smart security system to realize public order in IKN Nusantara. From the discussion, it is concluded that: a) The concept of Smart Security to be built at IKN Nusantara is policing that utilizes advances in information and communication technology; b) the factors analyzed are internal factors, namely Strengths and Weaknesses, while the external factors are opportunities and threats; c) the efforts made to build smart security use an aggressive strategy where strengths must be optimized to seize profitable opportunities. And the recommendations are addressed to : a) The IKN Nusantara Authority together with the Indonesian National Police to plan and build smart security that is integrated with smart cities in IKN Nusantara; and b) The IKN Nusantara Authority together with the Indonesian National Police establish a pentha-based collaboration in building smart security that is integrated with smart cities in the KN Nusantara.

  • Book Chapter
  • Cite Count Icon 8
  • 10.1007/978-3-030-34080-3_14
Bank Vault Security System Based on Infrared Radiation and GSM Technology
  • Nov 11, 2019
  • Mithun Dutta + 4 more

Banking security systems are emerging as a matter of great importance nowadays. We are presenting here a smart security system, which has been designed to protect the bank vault from being theft or unauthorized access. This highly secured system is based on Infrared ray, GSM technology, different types of sensors (Motion sensor, Laser sensor, Sound sensor and Gas sensor), IP camera, microcontroller, keyboard, and LCD. GSM technology will be used here to send any type of warning message to the concerned phone number. According to our concept a biometric function, i.e., hand geometry, an iris scanner, a fingerprint scanner or heartbeat rate with a password/PIN can be used here which will be responsible for the fine security of the principle gate of the vault. It may also include Infrared radiation between the walls of bank vault room to provide increased security of the vault. The walls of the vault room is specially designed in two sections maintaining collateral gap where the Infrared radiation will pass from the Infrared radiation sources to prevent any accident like wall break robbery. The proposed security system of the bank vault has been implemented as well as tested several times and found more effective than the other existing security systems.

  • Research Article
  • 10.37591/ctsp.v10i2.4247
Home Security using Facial Recognition
  • Sep 25, 2020
  • Amit Yadav + 4 more

Face detection entails the technology that identifies the human face in digital images. Face detection can be used in various applications. One of the major areas of application of face recognition is in security systems. We know that a smart security system is the need of the hour and has become a necessity in today’s time. It is the basic need of humans to be able to protect one’s home and belongings. The security system needs to be smart and efficient. Hence, it avoids intruders and protects your possessions by minimizing break-ins. Installing a home security system helps in protecting your home and valuables from burglars. The security system developed has a camera module that will give access to only authenticated persons to unlock the main door of the house using facial recognition technology. This discrete system is developed using an electronic board called as Raspberry Pi can detect intruders as well as send off an alarm to nearby police stations using SMS or Email. Keywords: Home security; Face Recognition; Internet of Things (IoT); RaspberryPi Microcontroller; Control; Smartphones Cite this Article Ayush Yadav, Shaam Garg, Shivam Jamloki, Aanchal Sadana, Kusum Tharani. Home Security using Facial Recognition. Current Trends in Signal Processing. 2020; 10(2): 5–11p.

  • Book Chapter
  • 10.1007/978-981-15-0372-6_14
Distributed Authentication Security for IOT Using DASS and LOKI91
  • Dec 3, 2019
  • Santosh Kumar Sharma + 1 more

With the massive expansion of computing technology, the distributed architecture has received wide acceptance for their services. Moreover, IOT technology is used to develop smart applications such as smart security system, health care, smart medicals and smart houses. Due to the vibrant character of access and connectivity in IOT environment, there is mounting of risks and genesis of enormous threat to IOT environment. In proposed system, we have study the fundamental concept behind DASS approach and how to ensure strong authentication services in a distributed environment which will create snag for malicious user. Authentication is particularly a challenging issue in distributed environment due to its multi-sharing concept. DASS works on mutual authentication mechanism when two parties made conversation neither obtain any facts that it could employ to masquerade as the others to an arbiter. Finally, our work is to design the two-level security mechanisms for generating complex security system. In our propose system, work is implemented in two phases, whereas in first phase, we have used authentication process including password and signature for both ends using third party and in second phase data confidentiality using LOKI91 cryptography which is defensive from any differential cryptanalysis and enforcing the secure communication.

Save Icon
Up Arrow
Open/Close
  • Ask R Discovery Star icon
  • Chat PDF Star icon

AI summaries and top papers from 250M+ research sources.