Skip to main content

Smart Security System Using IoT and Mobile Assistance

  • Conference paper
  • First Online:
Book cover Emerging Research in Data Engineering Systems and Computer Communications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1054))

Abstract

The digital era has witnessed giant strides in the utilization of security systems, which perform certain pre-programmed tasks when a secured zone is breached. The prevailing traditional security systems have evolved embracing the cutting-edge technologies from time to time. The avalanche-like explosion of things and their connectivity through Internet have opened several new boulevards of exploration. The unification of security system based on the IoT platform has the potential of interrelating real time with the devices and makes them smart, with issues like privacy. To keep the issues in the bay, a new intrusion detection system is the need of the hour. Hence, a wireless intrusion detection smart security system is designed and developed to overcome the research gaps in the existing systems. The smart security system is built on the Internet of things. The system is a lightweight, low cost, extensible, flexible wireless IoT-based-smart security system which will permit the mobile devices and computers to remotely trail the happenings at the location, record the activities and save them in the prefixed cloud storage account. The system uses the hardware (things) to sense and fetch the data which is processed by the embedded software. On the occurrence of an abnormal activity (like breaching by an intruder), a valid signal is detected, and it sends signal to the board directing it to run the alert module. The alert module activates the GSM API to immediately alert the end-user by mobile. This system thus provides a wireless, incessant service to all the stakeholders by phone regarding the breaches occurring in the environment. This implemented smart security system using IoT with mobile assistance also integrates the various alarms, sends alert as pre-programmed, tracks the movements automatically, uses the state-of-the-art appropriate latest technologies to alert the concerned stakeholders and waits for actions to be taken.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 1645–1660 (2013)

    Google Scholar 

  2. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  Google Scholar 

  3. Gitanjali, J., Banu, S.N., Indumathi, J., Uma, G.V.: A panglossian solitary-skim sanitization for privacy preserving data archaeology. Int. J. Electr. Power Eng. 2(3), 154–165 (2008)

    Google Scholar 

  4. Gitanjali, J., Banu, S.N., Geetha, M.A., Indumathi, J., Uma, G.V.: An agent based burgeoning framework for privacy preserving information harvesting systems. Int. J. Comput. Sci. Netw. Secur. 7(11), 268–276 (2007)

    Google Scholar 

  5. Indumathi, J.: A generic scaffold housing the innovative modus operandi for selection of the superlative anonymisation technique for optimized privacy preserving data mining (Chap. 6). In: Karahoca, A. (ed.) Data Mining Applications in Engineering and Medicine, pp. 133–156, 335p. InTech (2012). ISBN: 9535107200 9789535107200

    Google Scholar 

  6. Indumathi, J.: Amelioration of anonymity modus operandi for privacy preserving data publishing (Chap. 7). In: Amine, A., Mohamed, O.A., Benatallah, B. (eds.) Network Security Technologies: Design and Applications, pp. 96–107, 330p. Tahar Moulay University/Concordia University/University of New South Wales, Algeria/USA/Australia. Release Date: Nov 2013. Copyright © 2014 (2013a)

    Google Scholar 

  7. Indumathi, J.: An enhanced secure agent-oriented burgeoning integrated home tele health care framework for the silver generation. Int. J. Adv. Netw. Appl. 04(4), 16–21 (2013b). Special Issue on “Computational Intelligence—A Research Perspective” held on “21st–22nd February, 2013

    Google Scholar 

  8. Indumathi J.: State-of-the-Art in reconstruction-based modus operandi for privacy preserving data dredging. Int. J. Adv. Netw. Appl. 4(4), 9–15 (2013c). Special Issue on “Computational Intelligence—A Research Perspective” held on “21st–22nd February, 2013”

    Google Scholar 

  9. Indumathi, J., Uma, G.V.: Customized privacy preservation using unknowns to stymie unearthing of association rules. J. Comput. Sci. 3(12), 874–881 (2007)

    Google Scholar 

  10. Indumathi, J., Uma, G.V.: Using privacy preserving techniques to accomplish a secure accord. Int. J. Comput. Sci. Netw. Secur. 7(8), 258–266 (2007)

    Google Scholar 

  11. Indumathi, J., Uma, G.V.: A bespoked secure framework for an ontology-based data-extraction system. J. Softw. Eng. 2(2), 1–13 (2008a)

    Google Scholar 

  12. Indumathi, J., Uma, G.V.: A new flustering approach for privacy preserving data fishing in tele-health care systems. Int. J. Healthc. Technol. Manag. 9(5–6), 495–516(22) (2008b) Special Issue on: “Tele-Healthcare System Implementation, Challenges and Issues.”

    Google Scholar 

  13. Indumathi, J., Uma, G.V.: A novel framework for optimized privacy preserving data mining using the innovative desultory technique. Int. J. Comput. Appl. Technol. 35(2/3/4), 194–203 (2008c). Special Issue on: “Computer Applications in Knowledge-Based Systems” (2008, in press)

    Google Scholar 

  14. Indumathi, J., Uma, G.V.: An aggrandized framework for genetic privacy preserving pattern analysis using cryptography and contravening—conscious knowledge management systems. Int. J. Mol. Med. Adv. Sci. 4(1), 33–40 (2008d)

    Google Scholar 

  15. Murugesan, K., Gitanjali, J., Indumathi, J., Manjula, D.: Sprouting modus operandi for selection of the best PPDM technique for health care domain. Int. J. Conf. Recent. Trends Comput. Sci. 1(1), 627–629 (2009)

    Google Scholar 

  16. Murugesan, K., Indumathi, J., Manjula, D.: An optimized intellectual agent based secure decision system for health care. Int. J. Eng. Sci. Technol. 2(5), 3662–3675 (2010)

    Google Scholar 

  17. Murugesan, K., Indumathi, J., Manjula, D.: A framework for an ontology-based data-gleaning and agent based intelligent decision support PPDM system employing generalization technique for health care. Int. J. Comput. Sci. Eng. 2(5), 1588–1596 (2010)

    Google Scholar 

  18. Vasudevan, V., Sivaraman, N., SenthilKumar, S., Muthuraj, R., Indumathi, J., Uma, G.V.: A comparative study of SPKI/SDSI and K-SPKI/SDSI systems. Inf. Technol. J. 6(8), 1208–1216 (2007)

    Article  Google Scholar 

  19. Lin, N., Shi, W.: The research on internet of things application architecture based on web. In: Proceedings of Advanced Research and Technology in Industry Applications (WARTIA), pp. 184–187. IEEE Workshop (2014)

    Google Scholar 

  20. Babovic, Z.B., Protic, J., Milutinovic, V.: Web performance evaluation for internet of things applications. IEEE Access 4, 6974–6992 (2016)

    Article  Google Scholar 

  21. Qi, J., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)

    Article  Google Scholar 

  22. Babar, S., Mahalle, P., Stango, A., Prasad, N., Prasad, R.: Proposed security model and threat taxonomy for the Internet of things (IoT). In: Proceedings of Communications in Computer and Information Science, vol. 89, pp. 420–429 (2010)

    Google Scholar 

  23. Kalra, S., Sood, S.K.: Secure authentication scheme for IoT and cloud servers. Pervasive Mob. Comput. 24, 210–223 (2015)

    Article  Google Scholar 

  24. OWASP: Internet of things top 10 projects. www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project (2015). Accessed Aug 2015

  25. Weber, R.H.: Internet of things: privacy issues revisited. Comput. Law Secur. Rev. 31(5), 618–627 (2015)

    Article  Google Scholar 

  26. Hodgson, K.: The internet of [security] things. SDM magazine (2015). Available: http://www.sdmmag.com/articles/91564-the-internet-of-security-things

  27. Jivani, M.N.: GSM based home automation system using appinventor for android mobile phone. Int. J. Adv. Res. Electr. Electron. Instrum. Eng. 3(9) (2014)

    Google Scholar 

  28. Yan, M., Shi, H.: Smart living using bluetooth-based android smartphone. Int. J. Wirel. Mob. Netw. 5(1), 65 (2013)

    Article  Google Scholar 

  29. Govindraj, V., Sathiyanarayanan, M., Abubakar, B.: Customary homes to smart homes using internet of things (IoT) and mobile application. In: 2017 International Conference on Smart Technologies for Smart Nation (SmartTechCon), pp. 1059–1063. IEEE (2017)

    Google Scholar 

  30. Krishna, B.M., Nayak, V.N., Reddy, K., Rakesh, B., Kumar, P., Sandhya, N.: Bluetooth based wireless home automation system using FPGA. J. Theor. Appl. Inf. Technol. 77(3), (2015)

    Google Scholar 

  31. David, N., Chima, A., Ugochukwu, A., Obinna, E.: Design of a home automation system using arduino. Int. J. Sci. Eng. Res. 6(6), 795–801 (2015)

    Google Scholar 

  32. Manohar, S., Kumar, D.M.: E-mail interactive home automation system. Int. J. Comput. Sci. Mob. Comput. 4(7), 78–87 (2015)

    Google Scholar 

  33. Suryavanshi, R., Khivensara, K., Hussain, G., Bansal, N., Kumar, V.: Home automation system using android and wifi. Int. J. Eng. Comput. Sci. 3(10) (2014)

    Google Scholar 

  34. Anusha, S., Madhavi, M., Hemalatha, R.: Home automation using atmega328 microcontroller and android application. Int. Res. J. Eng. Technol. 2, (2015)

    Google Scholar 

  35. Priyanka, P., Reddy, D.K.S.: Pir based security home automation system with exclusive video transmission. Int. J. Sci. Eng. Technol. Res. 2319–8885 (2015). ISSN

    Google Scholar 

  36. Haque, S., Kamruzzaman, S., Islam M. et al.: A system for smart home control of appliances based on timer and speech interaction. arXiv preprint arXiv:1009.4992 (2010)

  37. Amrutha, S., Aravind, S., Ansu Mathew, S.S., Rajasree, R., Priyalakshmi, S.: Speech recognition based wireless automation of home loads-e home. Int. J. Eng. Sci. Innov. Technol. (IJESIT). 4(1) (2015)

    Google Scholar 

  38. Saifuzzaman, M., Khan, A.H., Moon, N.N., Nur, F.N.: Smart security for an organization based on iot. Int. J. Comput. Appl. 165(10), 33–38 (2017)

    Google Scholar 

  39. Zarpelão, B.B., Miani, R.S., Kawakani, C.T., de Alvarenga, S.C.: A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. 84, 25–37 (2017)

    Article  Google Scholar 

  40. Benkhelifa, E., Welsh, T., Hamouda, W.: A critical review of practices and challenges in intrusion detection systems for IoT: towards universal and resilient systems. IEEE Commun. Surv. Tutor. 20(4), 3496–3509 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. Indumathi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Indumathi, J., Asha, N., Gitanjali, J. (2020). Smart Security System Using IoT and Mobile Assistance. In: Venkata Krishna, P., Obaidat, M. (eds) Emerging Research in Data Engineering Systems and Computer Communications. Advances in Intelligent Systems and Computing, vol 1054. Springer, Singapore. https://doi.org/10.1007/978-981-15-0135-7_41

Download citation

Publish with us

Policies and ethics