An Intelligent Security System for Commercial Establishments Based on the Internet of Things (IoT)
Keywords:Intelligent security systems, intelligent companies, automation, the internet of things, radio frequency identification; RFID, the global positioning system, the global system for mobile communication; GSM, short message service; SMS, cloud networking, fuzzy algorithm
The use of many different sorts of security systems in our day-to-day lives has suddenly skyrocketed at a rate that is exponentially higher than before. Everyone living in this day and age is aware of the critical need of implementing sufficient safety precautions in settings such as workplaces, organizations, and bank vaults. In the recent years, companies have become increasingly interested in installing surveillance cameras in an effort to create workplaces that are less prone to danger. However, in order for this technology to function well, a person has to continually watch it in order to discover any problems that may appear in the image that is being caught by the camera. The fundamental objective of this research is to develop methods that are capable of improving the performance of traditional security systems. The platform-based security system that is based on the internet of things (IoT) has the potential to communicate in real time with the device. Components of the system include the speech sensor/microphone, motion/activity sensor, LTE/Wi-Fi module, and camera. Each of these sensors is interfaced with the central processing unit (CPU), which is the most important part of the system. This entire financial system will employ the Internet of Things (IoT) in real time, which will make it possible for mobile devices and computers to remotely monitor the activities that are taking place at the location where the IoT device is situated. This will make it possible for the system to be more efficient. Additionally, it will record all of these activities and save them to the cloud storage account associated with the user. The property of the user or the customer is afforded an additional level of protection thanks to the Internet of Things-based security system's contribution. Security systems are designed to carry out particular tasks in response to a breach in a protected area when the breach occurs. In this paper, a notification will be issued to the concerned individual as a warning. At that time, the user will be able to take the right actions because they will have received the warning. The most significant advantage of applying this approach is that it enables one to exercise round-the-clock remote control over their home. One is able to monitor, get notifications, and notify in the case of an emergency from anywhere in the world using a mobile application that is connected to the cloud round-the-clock when utilizing a smart locker that is based on the Internet of Things (IoT). To be more specific, our goal is to develop an Internet of Things–based wireless smart security system that is not only lightweight and inexpensive but also extendable and adaptive. This system will make use of the integration of various advanced technologies in order to function properly. It is conceivable to use a combination of various technologies in a way that is synergistic to construct a smart security system, which would allow for the remote operation of a system in a house or company (for instance, to lock or unlock a system with the help of an SMS or app). This would be achievable from a remote location. The entire system was designed with consideration given to the many different types of door locks and lockers that are used in homes and businesses so as to provide these establishments with the maximum possible level of safety. Installation may thus be made in a way that is uncomplicated and efficient thanks to this. In addition to this, our technology will function as a technique for preventing theft or burglary, recognizing it when it occurs, and countering its effects.
M. N. Jivani, “Gsm based home automation system using app- inventor for android mobile phone,” International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, vol. 3, no. 9, 2014.
M. Yan and H. Shi, “Smart living using bluetooth-based android smartphone,” International Journal of Wireless & Mobile Networks, vol. 5, no. 1, p. 65, 2013.
V. Govindraj, M. Sathiyanarayanan, and B. Abubakar, “Customary homes to smart homes using internet of things (iot) and mobile application,” in Smart Technologies For Smart Nation (SmartTechCon), 2017 International Conference On. IEEE, 2017, pp. 1059–1063.
B. M. Krishna, V. N. Nayak, K. REDDY, B. Rakesh, P. KUMAR, and N. Sandhya, “Bluetooth based wireless home automation system using fpga.” Journal of Theoretical & Applied Information Technology, vol. 77, no. 3, 2015.
N. David, A. Chima, A. Ugochukwu, and E. Obinna, “Design of a home automation system using arduino,” International Journal of Scientific & Engineering Research, vol. 6, no. 6, pp. 795–801, 2015.
S. Manohar and D. M. Kumar, “E-mail interactive home automation system,” International Journal of Computer Science and Mobile Com- puting, vol. 4, no. 7, pp. 78–87, 2015.
R. Suryavanshi, K. Khivensara, G. Hussain, N. Bansal, and V. Kumar, “Home automation system using android and wifi,” International Journal Of Engineering And Computer Science, vol. 3, no. 10, 2014.
S. Anusha, M. Madhavi, and R. Hemalatha, “Home automation using atmega328 microcontroller and android application,” International Re- search Journal of Engineering and Technology, vol. 2, 2015.
P. Priyanka and D. K. S. Reddy, “Pir based security home automation system with exclusive video transmission,” International Journal Of Scientific Engeneering and Technology Research, ISSN, pp. 2319– 8885, 2015.
S. Haque, S. Kamruzzaman, M. Islam et al., “A system for smart home control of appliances based on timer and speech interaction,” arXiv preprint arXiv:1009.4992, 2010.
S. Amrutha, S. Aravind, S. S. Ansu Mathew, R. Rajasree, and S. Priyalakshmi, “Speech recognition based wireless automation of home loads-e home,” International Journal of Engineering Science and Innovative Technology (IJESIT), vol. 4, no. 1, 2015.
M. Saifuzzaman, A. H. Khan, N. N. Moon, and F. N. Nur, “Smart security for an organization based on iot,” International Journal of Computer Applications, vol. 165, no. 10, pp. 33–38, 2017.
M. Sathiyanarayanan and K. S. Kim, “Multi-channel deficit round- robin scheduling for hybrid tdm/wdm optical networks,” in Proc. of the 4th International Congress on Ultra Modern Telecommunications and Control Systems (ICUMT 2012), St. Petersburg, Russia, Oct. 2012, pp. 552–557.
M. Sathiyanarayanan and B. Abubhakar, “Dual mcdrr scheduler for hybrid tdm/wdm optical networks,” in Proc. of the 1st International Conference on Networks and Soft Computing (ICNSC 2014), Andra Pradesh, India, Aug 2014, pp. 466–470.
M. Sathiyanarayanan and B. Abubakar, “Mcdrr packet scheduling algorithm for multi-channel wireless networks,” in Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics. Springer, 2015, pp. 125–131.
M. Sathiyanarayanan, S. Azharuddin, and S. Kumar, “Four different modes to control unmanned ground vehicle for military purpose,” vol. 2, no. 3, pp. 3156–3166, 2014.
M. Sathiyanarayanan, V. Govindraj, and N. Jahagirdar, “Challenges and opportunities of integrating internet of things (iot) and light fidelity (lifi),” in 2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT). IEEE, 2017, pp. 137–142.
M. Sathiyanarayanan and C. Turkay, “Challenges and opportunities in using analytics combined with visualisation techniques for finding anomalies in digital communications,” in ICAIL DESI VII Workshop, 2017.
Abdul Rahman, Artificial Intelligence in Drug Discovery and Personalized Medicine , Machine Learning Applications Conference Proceedings, Vol 1 2021.
Nair, K. S. S. . (2023). Rapidly Convergent Series from Positive Term Series. International Journal on Recent and Innovation Trends in Computing and Communication, 11(3), 79–86. https://doi.org/10.17762/ijritcc.v11i3.6204
Timande, S., & Dhabliya, D. (2019). Designing multi-cloud server for scalable and secure sharing over web. International Journal of Psychosocial Rehabilitation, 23(5), 835-841. doi:10.37200/IJPR/V23I5/PR190698
How to Cite
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.