A Review of IOT-based Home Security Systems

DOI : 10.17577/ICCIDT2K23-235

Download Full-Text PDF Cite this Publication

Text Only Version

A Review of IOT-based Home Security Systems

Sanitha P S

M.Tech. student,

Department of Computer Science and Engineering, Mangalam College of Engineering,

Kottayam, Kerala, India

AbstractThe internet has contributed to a change in how people work and live during the past ten years. By contributing significantly to current trends and utilizing cutting-edge technologies that make use of a variety of connection devices, IoT is currently drastically changing the scenario. Due to the advancement of technology, there is now a much greater need forsmart products in everyday life. The Internet of Things (IoT) is one of the essential components that makes it possible to communicate with IoT-enabled devices. Home security systems and smart homes are being employed more and more due to their many advantages in daily living. By switching from wired towireless systems, may achieve this, allowing us to control the entire system with Bluetooth connections on our Android devices. In order to achieve remarkable performance in recognition, traditional face recognition applications, particularly those used for access control, authentication, and surveillance, typically require the maximum amount of face information. This document presents a summary of various IOT-based home security systems.

KeywordsIOT,Home security

  1. INTRODUCTION

    Modern homes will become smarter and more automated as a result of the advantages of automation. The automation system in a smart house allows its occupants to control a variety of electrical and technical devices. The safety and security of the residence is one of the key concerns. The advancement of technology has made it possible for people to secure themselves and their belongings. One of the factors driving the expansion of the smart home is the need to lower the increasing risk of accidents, robberies, and break-ins, among other things. Modern research has been done recently to boost security, reduce power consumption, and achieve cheap cost, which may be done with the help of power management systems. IOT plays a very important role in implementing security features in smart home.

    To handle everything wirelessly as it gets safer and simpler to use, experts have been working on smart solutions. As a result, examined various methods in this paper for enhancing home security and have made it very simple for the elderly, physically incapacitated, and even young children to utilise.

  2. LITERATURE REVIEW

The term home automation system was first used by the Japanese companies like Hitachi and Matsushita who showed

the interest in home automation systems. The Smart House Project was established in 1984 as project of the National Research Center of the National Association of Home Builders (NAHB), USA, with the cooperation of a number of major industrial partners.

Pranav Kumar Madupu and Karthikeyan B [1] implemented Automated service request system with Internet of Things (IoT) and Advanced RISC Machine (ARM) controller. These Raspberry Pi-based systems are simple to implement practically, and the majority of them work well in real-world settings. In [2] implemented security system that allows physically challenged or elderly persons to use their mobile device as a remote control for their home system or voice recognition to control all of their appliances and further employ the ideas of voice and gesture recognition that make the system more secure. In [3] implement configured module at KU campus for 30 rooms to evaluate the performance of the proposed system and found effective in terms safeness as well as power cost. It uses an Android application which provides switching functionalities, where the electrical or electronic devices are monitored and controlled remotely. This system adds advantage by eliminating the use of traditional personal computers (PC) and its peripheral devices during execution.

Sl. No

Methodology

Research Contribution

Research Gap

[1]

The foundation of the suggested approach will be cloud storage. Using a variety of sensors, this system was utilised to monitor the state of the house. After

processing the sensor data, the Raspberry Pi immediately notifies the appropriate

parties if any anomalies are found.

The system has been successfully installed, and the data gathered by the Raspberry Pi microcontroller is processed and successfully communicated to the Thingspeak IoT platform using the Wi-Fi

protocol.

Don't talk about system maintenance or how to spot sensor malfunctions in this.

[2]

Using only a Bluetooth device on our smartphones, can quickly connect to our home systems without using voice

A Bluetooth- enabled home

security system

has been

conceptualized. To enable wireless

The system lacks the necessary malware control features that prevent others from accessing the system or attacking it.

Table 1: Literature review Comparison

control, body/hand motions, or eye/face scanners on our systems. As a result, all elderly users will find our system to be safer and more user-friendly.

control of home appliances, it comprises of a remote handler/controller that is even connected to or interfaced with a microcontroller that is almost interfaced with the device (Bluetooth). When the key is pressed on the remote handler or

controller, the

command is

relayed via Bluetooth to the receiver.

[3]

This system employs a motion detector to identify moving objects in its deployment area. The proposed system is tested using a real-time deployment at the KU campus, taking into account 30 rooms for 60 days, and it is discovered to be highly helpful in terms of safety from any theft and power savings

compared to existing systems.

The SURE-H

system, which has a number of users, motion sensors, a cloud server, a moving object detection module, and an alarm module, is offered to assure the security of smart home automation systems. Using user authentication, it is remotely controlled.

Don't discuss system upkeep or how to identify sensor

issues in this.

Additionally, the system lacks the essential malware control measures that keep outsiders from accessing or attacking it.

The Raspberry Pi will join to the pre-existing Wi-Fi network when the system is first started. All of the sensors are connected to the raspberry pi, which then processes the data and sends it to the Thingspeak server. The data will be received by the Thingspeak server, which will then display it as a graph. When the PIR sensor output is high, the system will use the camera that is connected to the Raspberry Pi to take a picture. The user and any other relevant parties, such as security personnel, are then notified. Similar to this, when a smoke sensor detects gas or smoke, it notifies both the user and the fire service. A vibration sensor is installed close to doors and windows to detect when someone tries to open them violently, and the system will send the concerned individual a notification. A temperature sensor is used to track the temperature and report any unusual readings. The Raspberry Pi microcontroller stores the captured photos in order to track the intruders. For continuous monitoring of the current state of the home, the data collectedby the sensors is continuously updated on the Thingspeak server. The block diagram of data flow in the working model is shown in the following figure.

III.METHODOLOGY

Automatic service request system [1] is implemented by using Advanced RISC machine (ARM) controller using Internet of things (IoT). These Raspberry pi-based systems. Arm architecture is based on Reduced Instruction Set Computer (RISC) rather than conventional complex instructional set computer (CISC) so that it can be used for real time application as it has high code density and good response to interrupts. This works on pipelining mechanism, and so performance of controller is high.

Fig.1: Block Diagram of Automatic service request System [1]

Fig. 2: Block diagram of data flow in working model [1]

The system is implemented successfully and the data collected by the raspberry pi microcontroller is processed and transmitted to Thingspeak IoT platform via Wi-Fi protocol successfully.

In [2] utilise a Bluetooth device for the implementation process since it is simple to use, supports numerous android applications and devices, uses less power/energy, connects to our smartphones, and improves our home security systems. The Bluetooth device is then linked to an application that enables speech systems, body/hand gestures, eye/face scanning, and other features that make it easier for elderly, physically challenged persons, and children to navigate around home systems. Once a link has been made between the user and the system, the user is recognised and the system is then controlled by the sensors. The sensors manage user activity and check to see if the user who was interrupted at the other end has been identified or not. If the user is successfully identified at the conclusion, they are then given permission to gradually access the home security systems. As soon as you pass through the home security systems, the relay drivers convert the low voltage energy to high voltage and intelligently control the devices with complete security, such as gate entry, lights, bed elevations, and so on.

In this [3] proposed automated smart home system consists of three main modules such as (i) the cloud server, (ii) the hardware interface module, and (iii) the software package or smartphone application.

Fig.3: SURE-H: a prototype model of autonomous smart home system [3]

  1. Motion detector PIR sensor

  2. Motion detector PIR sensor

  3. Motion detector PIR sensor

  4. Blynk cloud server

  5. WiFi Internet gateway

  6. Thief

  7. User 1 getting notification

  8. User 2 getting notification

  9. Lights automatically turns on detection of the thief

  10. An alarm is also raise on detection of the thief

volt AC connection. The Solid-State Relay (SSR) switches are wired to the various household appliances. To provide current to the board, the AC is converted to DC using an AC to DC converter.

Step 2: Operating ESP8266-12E with smartphone

The ESP8266-12E is connected to the Internet via Wi-Fi or another kind of connectivity so that a cloud server can access it. The ESP8266-12E is programmed and operated in stand- alone mode using the Arduino IDE. The user installs an Android or iOS app on their phone that can connect to the same cloud server via either the IP address or domain name of the server. In addition, the user must enter a password and fingerprint to log in to the server. Last but not least, the user can remotely monitor their house or office at little cost and with minimal power consumption.

The system implemented successfully and obtain good result.

IV. CONCLUSION

IoT has a significant impact on the lives of millions of people worldwide. It is utilised in a number of societal contexts, which eventually reduces human interaction and commands and offer the most automation possible. An Android phone can be used by the user to fully control this internet-based home security system. The android-based home security system programme talks with the server through the internet, and a Bluetooth device is used to connect the entire home system to the android device. Any Android device can be used to keep an eye on the environment of a smart home to detect any robberies. It has a number of advantages, such as being low cost, quick, highly scalable, resistant to man-in-the- middle and online dictionary attacks, and requiring the least amount of infrastructure.

REFERENCES

Fig.3: Data Flow Diagram [3]

Step1: Setting up the ESP8266-12E relay board in step one. After obtaining an ESP8266-12E board, build code that communicates with Arduino. The necessary relay board was then attached to the GPIO pins and powered via a 220240-

[1] Pranav Kumar Madupu, Karthikeyan B Automatic Service Request System for Security in Smart Home Using IoT in Proceedings of the 2nd International conference on Electronics, Communication and Aerospace Technology (ICECA 2018) IEEE Conference Record # 42487; IEEE Xplore ISBN:978-1-5386-0965-1

[2] Akansha Singh ,Deepa Gupta ,Neetu Mittal Enhancing Home security systems Using IOT Proceedings of the Third International Conference on Electronics Communication and Aerospace Technology [ICECA 2019] IEEE Conference Record # 45616; IEEE Xplore ISBN: 978-1- 7281-0167-5

[3] Roshmi Sarmah, Manasjyoti Bhuyan, Monowar H. Bhuyan SURE-H: A Secure IoT Enabled Smart Home System in 2019 IEEE 5th World Forum on Internet of Things (WF-IoT)

[4] Sachin A. Goswami Bhargav P. Padhya Dr. Ketan D. Patel INTERNET OF THINGS: APPLICATIONS,CHALLENGES AND RESEARCH

ISSUES in Proceedings of the Third International Conference on I- SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC 2019)

IEEE Xplore Part Number:CFP19OSV-ART; ISBN:978-1-7281-4365-1.