INFORMATION CHANGE THE WORLD

International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.9, No.6, Jun. 2017

Implementation of GSM Based Security System with IOT Applications

Full Text (PDF, 993KB), PP.13-20


Views:109   Downloads:2

Author(s)

Seelam Vasavi Sai Viswanada Prabhu Deva Kumar, Shyam Akashe

Index Terms

Atmega16;GSM Module;Passive infrared Sensor;Embedded C;Internet Protocol (IP)

Abstract

An effective security system is designed and implemented through the application of embedded systems and the Internet of Things (IoT). The main goal of this work is to present the IoT system and modern technology systems / embedded intelligent networks. IoT is the technology of the future in contact machine / machine device / machine is possible thanks to the electronics, sensor technology, software and connectivity system to enable these items to collect and exchange data. Embedded system is a real-time mainframe structure on a particular task, an automatic or electrical system including, often within the limits of real-time raking as sensors, modules with microcontrollers, etc...This is integrated with sensor main server and GSM global system For mobile), it is able to send data and IP addresses through SMS message. This will facilitate the identification of the unknown person embedded in real-time in these devices. The video data are transferred to another back-end server via TCP (Transmission Control Protocol) of the device. This server collects data and provides HTTP Web. A browser is used to view data and can be remotely controlled. This type is giving an idea about the probability and effectiveness of the system, this thesis presents the results of the investigation into the security system and some realistic implementations.

Cite This Paper

Seelam Vasavi Sai Viswanada Prabhu Deva Kumar, Shyam Akashe,"Implementation of GSM Based Security System with IOT Applications", International Journal of Computer Network and Information Security(IJCNIS), Vol.9, No.6, pp.13-20, 2017.DOI: 10.5815/ijcnis.2017.06.02

Reference

[1]The Study of Access Control for Service-Oriented Computing in Internet of Things Guoping Zhanga, Jing Liub Published Online June 2012 in MECS (http://www.mecs-press.net) DOI:10.5815//ijwmt.2012.03.10.

[2]Myklebust, Gaute. "The AVR Microcontroller and C Compiler Co-Design" Atmel Norway. CiteSeerX 10.1.1.63.1447. Retrieved 2012-09-19.

[3]Real-Time Embedded Systems by Xiaocong Fan.

[4]"Wireless Modules > GSM/GPRS Module > SIM900". SIMCom Wireless Solutions Co.. Retrieved 30. November 2015.

[5]"Wireless Modules > GSM/GPRS > SIM900A". M2Mcom Kft.. Retrieved 04. December 2015.

[6]"How Infrared motion detector components work". Non commercial research page. Glolab Corporation. Retrieved 2013-05-31.

[7]Embedded C, What is Embedded C, Difference between C and Embedded C Programming, By Akshay Daga, EngineersGarage.

[8]Analysis towards Mobile IPV4 and Mobile IPV6 in Computer Networks Seyedeh Masoumeh Ahmadi Published Online April 2012 in MECS (http://www.mecs-press.org/) DOI:10.5815/ijisa.2012.04.05.

[9]Performance Evaluation of IPv4/IPv6 Transition Mechanisms Adira Quintero, Francisco Sans, and Eric Gamess Published Online February 2016 in MECS (http://www.mecs-press.org/) 

DOI: 10.5815/ijcnis.2016.02.01.

[10]PCB Designers' by Chris Robertson.

[11]"What is portable WiFi router and how to use one". www.worldsim.com. WorldSIM. Retrieved 9 May 2016.

[12]Dempsey, John S. (2008). Introduction to private security. Belmont, CA: Thomson Wadsworth. p. 78. ISBN 9780534558734.

[13]"Internet based CCTV on cloud services" (in Finnish). fennoturvapalvelut. March 27, 2015.

[14]"Basic Home Security and Safety". Secure Home. Retrieved 2016-06-25.

[15]"How To Increase Home Security - Wireless Spy Gadgets". Wireless Spy Gadgets. Retrieved 2016-04-25.