Reinforcing Smart Home Security System
|International Journal of Engineering Trends and Technology (IJETT)||
|© 2018 by IJETT Journal|
|Year of Publication : 2018|
|Authors : Jennifer D, Loshiga M, Sowndharya Lakshmi R, Vidhyalakshmi.M
|DOI : 10.14445/22315381/IJETT-V57P206|
Jennifer D, Loshiga M, Sowndharya Lakshmi R, Vidhyalakshmi.M "Reinforcing Smart Home Security System", International Journal of Engineering Trends and Technology (IJETT), V57(1),28-30 March 2018. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
With advancement of latest technology, life is getting simpler and easier in all aspects. In today’s world Automatic systems are being preferred over manual system. With the rapid increase in the number of users of internet over the past decade has made Internet a part and parcel of life, and IoT is the latest and emerging internet technology. Internet of things is a growing network of everyday objectfrom industrial machine to consumer goods that can share information and complete tasks while you are busy with other activities. Nowadays the idea of smart home has been so prevalent; it can be viewed as intelligent or automated home where the house can be monitored remotely. This paper describes about the development of home security system based on human motion detection and remotely monitoring the home. In this proposed method fingerprint and face recognition based home security, automation and also monitoring system using arm 11 processor. This project implement to all the home members fingerprint and face images are stored in database, So easily identify the authorized user or not in this system. And also sensors are used to monitor the home status. If any unknown person is detected to receive the unknown person image to the android application.
 C. Suh and Y.-B. Ko, “Design and implementation of intelligent home control systems based on active sensor networks,” IEEE Transactions on Consumer Electronics, vol. 54, no. 3, pp. 1177–1184, 2008.
 B. Fouladi, S. Ghanoun, “Security Evaluation of the ZWave Wireless Protocol,” Black hat USA, Aug. 2013.
 Wenye Wang, Zhuo Lu, “Cyber security in the Smart Grid: Survey and challenges,” Computer Networks, Volume 57, Issue 5, Pages 1344-1371, April 2013.
 N. Komninos, E. Philippou and A. Pitsillides, "Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures," in IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 1933-1954, Fourthquarter 2014.
 C. Karlof, D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures”, Ad Hoc Networks, vol. 1, pp. 293–315, 2003.
 Y. Hu, A. Perrig, D. Johnson, “Wormhole attacks in wireless networks”, IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 370–380, Feb. 2006.
 Y. Mo and B. Sinopoli, "Secure control against replay attacks," 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, pp. 911-918, 2009.
 D. Deadman, “Forecasting residential burglary,” International Journal of Forecasting, vol. 19, no. 4, pp. 567–578, 2003.
 UNODC, “International Burglary, Car Theft and Housebreaking Statistics,” United Nations Office on Drugs and Crime (UNODC), Technical Report, 2015.
Home automation; Smart homes; Wireless sensor networks; Access control; Raspberry Pi.