Indonesi
an
Journa
l
of El
ect
ri
cal Engineer
ing
an
d
Comp
ut
er
Scie
nce
Vo
l.
13
,
No.
1
,
Jan
uar
y
201
9
,
pp.
2
7
~
3
4
IS
S
N: 25
02
-
4752, DO
I: 10
.11
591/ijeecs
.v1
3
.i
1
.pp
2
7
-
3
4
27
Journ
al h
om
e
page
:
http:
//
ia
es
core.c
om/j
ourn
als/i
ndex.
ph
p/ij
eecs
An enha
nced se
cu
rity
al
ert sys
tem
for smart h
om
e using I
OT
Af
s
hana
Kh
anum
1
, Rek
ha
V
2
1
Depa
rtment of
Com
pute
r
Scie
n
ce
&E
ngin
ee
r
ing
,
SJ
B
Instit
u
te of
Technol
og
y
,
In
dia
2
Depa
rtment of
Com
pute
r
Scie
n
ce
& Engi
ne
eri
n
g,
Facu
lty
of En
gine
er
ing,
Christ
unive
rsit
y
,
Indi
a
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
J
ul
1
1
, 2
01
8
Re
vised
Sep
1
2
, 2
01
8
Accepte
d
Se
p 26
, 201
8
Today
due
to
ad
vanc
ement
in
t
echnolog
y
and
In
ternet
of
Thi
ngs,
t
o
dea
l
with
step
-
by
-
st
ep
job
s
li
ke
m
ai
li
ng
,
ac
c
essing
bank
ent
ri
es,
wa
tc
hin
g
degr
e
e
of
hotne
ss
and
oth
er
jobs
PC
s
were
uti
l
ized.
Be
caus
e
of
fast
improvem
ent
in
IOT
nowada
y
s
ta
blets,
adva
n
ce
d
m
obil
e
ph
ones
are
uti
l
ized
for
such
assignm
ent
s
[1
]
.
Hom
e
sec
urity
ca
n
be
cha
r
acte
r
iz
ed
as
observin
g
the
hom
e
remotely
lo
ca
t
ed
or
ce
ntrall
y
lo
c
at
ed
.
Today
,
ho
m
e
sec
urity
is
g
et
ti
ng
to
be
vit
al
as
th
e
concei
vab
le
ou
tc
om
e
s
of
int
err
up
ti
on
is
expa
nd
ing
st
ep
b
y
step
,
y
e
t
they
h
ave
is
sues
li
ke
postponement,
non
-
we
b
empow
ere
d
and
har
d
to
dea
l
.
Intrud
er
r
e
cogni
ti
on
is
basi
c
par
ts
of
hom
e
computer
i
za
t
io
n
and
hom
e
sec
urity
fra
m
ew
orks.
Mos
t
general
l
y
,
ut
il
i
ze
d
spec
i
al
i
ze
d
d
evice
s
are
m
obile
phones
and
sending
m
ai
ls
ar
e
conside
red
for
cont
rolling
hom
e
appl
iance
s
remotely
b
y
pro
posing
produc
tive
struct
ur
es.
A
n
Enha
nc
ed
Sec
urity
Aler
t
S
y
stem
for
Smart
Hom
e
using
IOT
is
compo
sed
in
our
proposed
work.
It
ide
n
ti
fi
es
th
e
i
ntrude
r
when
no
one
is
in
hom
e
b
y
send
ing
a
le
r
t
m
essa
ge
or
ca
ught
picture
t
o
the
proprietor
(or)
owner
.
Pr
oposed
fra
m
ework
is
e
ase
hom
e
sec
urity
f
ramework
uti
liz
es
an
IP
W
eb
-
c
amera
and
R
aspbe
rr
y
pi
fo
r
li
m
it
ing
dela
y
d
uring
the
ti
m
e
of
sending
al
ert
m
essage
.
Fog
C
om
puti
ng
is
inc
orpora
te
d
to
proposed
fra
m
ewor
k
to
expa
nd
the
le
ve
l
of
sec
urity
and
li
m
i
t
the
enge
nder
ing
dela
y
.
Propos
ed
fra
m
ework
is
to
giv
e
m
in
imal
eff
or
t
arr
ange
m
ent
an
d
ada
p
e
association
instrument
for
coor
dina
t
ing
Inte
rne
t
of
Thi
ngs wit
h
ho
m
e
sec
urity
fra
m
eworks.
Ke
yw
or
d
s
:
IOT
Mob
il
e I
P
webcam
s
Ra
sp
be
rr
y
pi
Sm
art h
om
e se
cur
it
y
So
c
ket
Wi
-
Fi
Copyright
©
201
9
Instit
ut
e
o
f Ad
vanc
ed
Engi
n
ee
r
ing
and
S
cienc
e
.
Al
l
rights re
serv
ed
.
Corres
pond
in
g
Aut
h
or
:
Af
s
ha
na Kh
a
num
,
Dep
a
rtm
ent o
f C
om
pu
te
r
Scie
nce &E
nginee
r
ing
,
SJB I
ns
ti
tute o
f
Tec
hnology,
i
nd
ia
.
Em
a
il
:
kh
an
uma
fsh
a
@
gm
ail.co
m
1.
INTROD
U
CTION
To
day,
each
de
vice
is
conne
ct
ed
with
the
help
of
inter
ne
t.
The
interc
onnecti
on
of
dev
ic
es
li
ke
sens
or
s
instal
le
d
with
hard
w
are
em
po
we
rs
the
thin
gs
to
ga
ther
i
nfor
m
at
i
on
ove
r
inter
ne
t.
He
nce,
I
ntern
et
of
things
(
Io
T
)
is
basical
ly
t
he
syst
em
of
interco
nnect
ed
de
vices
whic
h
are
im
pla
nted
with
se
ns
or
s
,
pro
gr
am
m
ing
,
netw
ork
c
onne
ct
ivit
y
and
im
portant
hard
wa
re
that
em
po
w
er
to
gathe
r
an
d
tra
de
in
form
at
ion
m
aking
t
hem
respo
ns
ive
without
ex
pecti
ng
that
hu
m
an
-
sh
oul
d
hum
an
or
hum
an
-
to
PC
co
op
e
rati
on
[
2].
In
t
od
ay
'
s
com
m
un
ic
at
ion
te
chnolo
gy,
c
omm
un
ic
at
ion
is
no
t
only
done
betwee
n
c
om
pu
te
rs,
but
it
co
m
ple
te
l
y
done
ove
r
a
network
an
d
is
cal
le
d
networ
k.
W
it
h
ad
van
c
e
inter
net
te
chnolog
y
not
only
,
we
can
acce
ss
data
at
an
y
place,
a
ny
per
s
on,
a
ny
ti
m
e
bu
t
al
so
ca
n
be
c
ontr
ol
and
m
on
it
or
at
any
place,
a
ny
tim
e
and
this
sp
eci
al
te
chnolo
gy
is
cal
le
d
as
In
te
r
net
of
T
hings
(
Io
T
)
[
3].
An
in
cred
i
ble
increa
sing
po
rtion
of
the
extensio
n
in
Io
T
com
m
un
ic
at
ion
beg
i
ns
from
enroll
ing
de
v
ic
es
an
d
em
bedd
ed
se
nsor
str
uc
tures
us
e
d
as
a
pa
rt
of
m
echan
ic
a
l
m
achine
-
to
-
m
a
chine
(M2M
)
com
m
un
ic
ation
,
hom
e
and
buil
ding
rob
otiza
ti
on
,
ve
hicle
-
to
-
ve
hicle
com
m
un
ic
at
ion
a
nd w
ea
ra
ble pro
ces
sin
g de
vices.
Secu
rity
m
eans
safety
,
as
w
el
l
as
the
m
easur
es
ta
ken
t
o
be
s
afe
or
pr
otect
ed.
T
o
im
pr
ove secur
it
y,
a
n
Io
T
de
vice
t
hat
sho
uld
nee
d
t
o
be
s
pecifica
ll
y
op
e
n
over
th
e
I
nternet
,
ought
to
be
di
vid
e
d
int
o
it
s
own
syst
e
m
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
13
, N
o.
1
,
Ja
nu
a
ry 20
19
:
2
7
–
3
4
28
and
ha
ve
netw
ork
acce
ss
li
m
it
ed.
Secu
rity
i
n
I
OT
is
the
z
on
e
of
e
ffor
t
worr
ie
d
ab
out
safegua
rd
i
n
g
r
el
at
ed
gadgets/
de
vice
s and
fr
am
ework
s
in
t
he Inter
net of t
hings
(IoT)
[
4].
Io
T
sec
ur
it
y
r
uptu
res
a
re
asce
nd
i
ng
in
pri
vat
e
ap
plica
ti
on
s.
The
way
t
hat
few
en
d
c
us
t
om
ers
fin
d
a
way
to
guara
nt
ee
secur
it
y,
f
or
exam
ple,
ref
re
sh
in
g
firm
war
e
,
pro
poses
that nu
m
e
rous
do
n'
t
or
ga
nize p
rio
riti
ze
issues.
These
com
po
ne
nts
m
ay
cl
arify
w
hy
end
c
us
t
ome
r
are
extrem
el
y
reluctant
t
o
pay
f
or
e
nh
anced
secur
it
y.
Nu
m
erous
c
om
pan
ie
s
ha
ve
e
nd
ea
voure
d
to
set
up
secu
rity
sta
ndard
f
or
kee
n
hom
e
Io
T
a
pp
li
cat
ion
s,
includi
ng
OE
Ms,
I
nter
net
pl
ay
ers,
an
d
te
c
h
com
pan
ie
s
[
5].
The
com
pan
ie
s
that
wi
nd
up
pred
om
inant
that
beco
m
e
do
m
inant
withi
n
the
nasce
nt
sect
or
sh
oul
d
pre
vail
in
set
ti
ng
sta
ndar
ds
,
but
it
is
not
ye
t
cl
ear
wh
ic
h
these
will
be
.
Sm
art
ho
m
e
se
cur
it
y
co
uld
pi
ck
up
f
oo
ti
ng
i
f
en
gin
e
e
rs
i
nterf
ace
it
with
ano
t
her
el
em
ent
that
custom
er
valu
e,
f
or
e
xam
ple,
ease
of
us
e
.
For
in
sta
nce
,
in
novatio
ns
or
a
rr
a
ngem
ents
that
sign
i
ficantl
y
stream
li
ne
set
up
en
dea
vours
an
d
inc
rem
ent
secur
it
y
co
ul
d
be
s
ought
a
fter.
Since
nu
m
ero
us
sm
art
ho
m
e
dev
ic
es
ha
ve
sh
ort
s
ub
sti
tuti
on
cy
cl
es,
an
d
since
they
re
qu
i
re
a
re
stric
te
d
sp
ec
ulati
on
f
or
eve
ry
fa
m
ily,
the
m
ark
et
co
uld
e
nc
ounter
so
li
d
de
velo
pm
ent
if
stim
ulate
s
by
m
ajo
r
eve
nt.
T
o
prof
it
by
t
his
pa
tt
ern
,
sem
ic
on
duct
or
orga
nizat
ion
s
sh
oul
d
put down
their w
a
gers
now
on
th
e
bri
ll
ia
nt
ho
m
e
bi
olo
gical
c
omm
un
it
ie
s
that
will
wind
up
pr
e
dom
inant.
Io
T
ne
tw
ork
secur
it
y
is
m
o
re
dem
and
in
g
than
tra
diti
on
a
l
syst
e
m
secur
it
y
in
li
gh
t
of
the
fac
t
that
there
is
a
m
or
e
extensiv
e
scop
e
of
co
m
m
un
ic
at
ion
prot
oco
ls,
a
nd
ga
dg
et
abili
ti
es,
al
l
of
wh
ic
h
po
st
ur
e
sign
ifica
nt
iss
ues
a
nd
i
ncr
ea
sed
c
om
plexity
.
Key
capa
bili
ti
es
incorpora
te
netw
ork
e
ndpoint
secur
it
y
featu
r
es,
for
exam
ple,
antivir
us
,
a
nti
m
al
war
e,
an
d
ad
diti
on
al
ly
diff
e
ren
t
high
li
gh
ts,
f
or
e
xa
m
ple,
firew
al
ls
a
nd
i
ntr
ud
e
r
detect
ion
an
d
preve
nt
ion
syst
em
[1
]
.
Als
o,
ob
viou
sly
,
not
al
l
I
oT
f
ram
ewo
r
ks
hav
e
a
si
m
il
ar
secur
it
y
necessit
y,
howev
e
r
f
or
a
la
r
ge
num
ber
of
them
secur
it
y
i
m
pl
ie
s
safety
and
s
uc
h
f
ram
e
works
sh
oul
d be foc
us [
1].
2.
RELATE
D
W
ORK
So
m
e
existi
ng
work
s
on
En
han
ce
IOT
ba
se
d
Sec
ur
it
y
Alert
Syst
em
for
Sm
art
Ho
m
e
Farru
kh
Sh
a
hzad
et
al
.
[2
]
ha
ve
pro
posed
a
m
ini
m
al
effor
t
a
ns
we
r
f
or
i
nterru
ption
insurance
w
hi
ch
ha
s
a
s
hort
al
arm
tim
e
and
is
near
ly
fall
flat
eviden
ce
is displa
ye
d.
A
n
ap
plica
ti
on
util
iz
ing
t
he
vicinit
y
sen
so
r
of
a
cel
l
ph
on
e
is
create
d
t
o
s
how
that
our
ho
m
es
al
so
,
different
pro
per
ti
e
s
can
be
se
cu
red
a
gai
ns
t
in
te
rr
upti
ons
without
sp
e
nd
i
ng
a
gr
e
at
m
any
do
ll
ar
s
in
s
urveil
la
nc
e
cam
eras
and
sec
ur
it
y
m
on
it
or
s.
Test
com
es
ab
out
dem
on
strat
e
that
ad
vanced
m
ob
il
e
phone
s
are
not
just
eq
uipped
f
or
identify
in
g
a
gatecras
he
r
a
ll
al
on
e
howe
ver
ca
n
li
kew
ise
ad
vis
e
the
prop
e
rty
pro
pr
ie
to
r
of
the
inter
ruptio
n
cl
os
e
to
interr
up
ti
on
wit
h
the
go
al
that
unex
pected
m
ov
e can be m
ade a
nd, in t
his
m
ann
er,
as
set
s can be
sp
a
red
from
b
ei
ng
stol
en.
K.
Ba
la
subram
anian
et
al
.
[3
]
propose
d
ho
m
e
autom
a
ti
on
secur
it
y
al
ert
syst
e
m
,
wh
ic
h
can
co
ntro
l
the
ho
m
e
app
li
ances
rem
otely
and
al
ert
the
owne
r
w
he
nev
e
r
intrude
r
occ
urs
in
the
hom
e.
It
includes
int
rude
r
detect
ion usi
ng LD
R a
nd Se
nsor
circuits.
Ak
s
hat
Jai
n,
S
hr
a
ddha
Ba
sa
nt
wan
,
Ow
ai
s
K
az,
Yogita
Ba
ng
et
al
.
[6
]
have
pr
op
os
e
d,
th
ought
of
an
answer
of
bri
ll
ia
nt
su
r
veill
ance
syst
em
for
pa
rtic
ular
spots
li
ke
ba
nk
va
ults,
hom
es
w
her
e
the
hum
an
cl
os
enes
s
is
n'
t
avail
able.
At
su
c
h
places,
it
isn'
t
worth
t
o
r
el
ia
b
ly
screen
the
are
a
with
the
ca
m
eras
.
This
s
qu
a
nders
the
po
wer
us
e
and
t
he
li
m
it
req
ui
red
for
the
r
ecordin
gs
.
O
ur
fr
am
ewo
r
k
will
reco
gnise
hum
an
nearness
us
in
g
P
IR
sen
sor
.
Ra
spber
ry
Pi
wor
ks
a
nd
con
t
ro
ls
de
ve
lop
m
ent
recogn
isi
ng
se
nso
rs
an
d
ca
m
cor
de
rs
for
r
em
ote
ident
ify
ing
a
nd
pe
r
cepti
on,
strea
m
s
li
ve
vid
e
o
and
rec
ords
i
t
fo
r
f
uture
pl
ay
back
.
On
disti
nguis
hing
pro
of
of
any
i
m
pr
ov
e
m
ent
the
ca
m
eras
will
trigg
er
the
ob
s
er
vation.
The
pro
pose
d
fr
am
ewo
r
k
gets
inf
or
m
at
ion
and
tran
sm
i
ts
it
by
m
et
ho
ds
for
In
te
r
net
t
o
m
ob
il
e
phon
es
an
d
workst
at
ion
s.
Live
s
poutin
g
is
done
al
l
thr
ough
the
WAN
i.e.
al
so
ope
n
in
side
dif
fere
nt
L
AN
s
.
Wi
de
hu
m
an
ob
se
rv
i
ng
of
the
ap
proac
h
vi
deo
c
hannels
is
irrati
on
al
,
e
xp
e
ns
i
ve
an
d
i
nad
e
quat
e.
U
sing
a
ge
ner
al
t
est
based
f
oundat
io
n
su
bt
racti
on
co
m
pu
ta
ti
on
cal
le
d
ViBe
(
Visua
l
Ba
ckgrou
nd
Extract
or),
we
identifie
d
devel
op
m
ent
in
re
d
al
er
t
zon
e
i.e.
a
plac
e
in
the
room
wh
e
re
the
asse
ts
are
set
,
for
a
ny
su
s
picio
us
dev
el
op
m
ent
and
we
se
nd
a
n
al
ar
m
to
the
cust
om
e
r.
T
he
vid
e
o
re
corde
d
an
d
set
away
ca
n
be
use
d
to
per
cei
ve
the
gatecras
he
r
an
d
hel
p
in
ge
tt
ing
him
.
To
sh
ie
ld
assur
a
nce
an
d
secur
el
y
trans
m
it
the
vid
eo
fil
m
ov
er
the
f
ram
ewo
rk,
we
are
us
in
g
blowfis
h
encr
y
ption an
d u
ns
cram
bling
fig
ur
in
g
t
o giv
e extra
secu
rity
f
r
om
d
evelo
pe
rs.
Ayus
h
Pa
nwar
an
d
A
na
nd
it
a
Singh
et
al
.
[
7]
pro
posed
open
sour
ce
an
d
c
os
t
ef
fecti
ve
an
d
sec
ur
e
ho
m
e
po
rtrayi
ng
the
util
iz
at
i
on
of
ope
n
sou
rce
equ
i
pm
ent
li
ke
Ar
duin
o,
Ra
sp
be
rr
y
pi,
Ar
m
pr
ocess
or
and
so
forth. It cl
ari
fies how a c
om
pute
rized
ho
m
e can be
obser
ved (
or)
c
on
tr
oll
ed
u
ti
li
zi
ng
G
oogl
e v
oice
cha
rg
e
s.
Me
hd
i
N
obak
ht
et
al
.
[8
]
pro
posed
i
ntr
uder
detect
io
n
s
yst
e
m
to
pr
ov
ide
netw
ork
le
vel
secu
rity
dep
l
oyed
f
or
hom
e
app
li
ance
s
de
plo
ye
d
i
n
s
m
art
ho
m
e
en
vi
ronm
ents.
Sm
art
de
vices
a
re
gai
ning
fam
e
in
ou
r
ho
m
es
with
th
e
guara
nte
e
to
m
ake
our
li
ves
le
ss
dem
and
in
g
a
nd
m
or
e
ag
r
eeable
.
T
his
sy
stem
is
al
so
capab
l
e
of b
l
ock
i
ng the
intr
ud
e
r
in
acc
essing vict
im
d
evice.
Supr
eet
a
venka
te
san
et
al
.
[
9]
fo
c
us
es
on
des
ign
in
g
a
nd
de
ve
lop
in
g
a
m
odel
of
sec
uri
ty
al
ert
syst
e
m
for,
ba
nks.
Sec
ur
it
y
has
bec
om
e
m
ajo
r
these
days
especial
ly
in
the
rate
of
crim
es.
Re
sear
ch
show
s
that
ho
m
es
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
An
e
nhance
d
s
ecurit
y a
le
rt sy
ste
m
for
smart
home usi
ng IO
T
(
Afsh
ana
K
hanu
m
)
29
without
sec
ur
it
y
are
ta
r
geted
with
int
ruder
than
pr
of
essi
onal
ly
m
on
it
or
ed
hom
es.
This
s
yst
e
m
is
fo
r
de
te
ct
in
g
intruder
an
d
se
nd
s
al
ert
to
t
he
us
e
r
th
rou
gh
te
xt
m
essage.
A
nd
al
so
,
it
is
le
ss
po
wer
c
onsum
pt
ion
c
om
par
ed
t
o
existi
ng
syst
e
m
as
the
ca
m
e
ra
is
act
ivate
d
and
ta
kes
sn
a
psho
ts
on
ly
w
he
n
an
intr
uder
i
s
detect
ed.
A
nd
it
no
t
on
ly
no
ti
fies t
o t
he owne
r
al
so t
o neig
hbour
s
o
that i
m
m
edia
te
acti
on
c
ould
be
ta
ke
n.
Um
esh
Chan
dra
Pati
et
al
.
[1
0]
ta
lk
abo
ut
the
us
e
of
PI
R
se
ns
ors
in
s
uc
h
f
ram
ewo
rks
an
d
util
iz
at
ion
of
Zi
g
Be
e
to
m
ake
the
safe
ho
m
e.
These
days
the
nee
d
of
buil
ding
com
pelli
ng
interr
up
ti
on
rec
ogniti
on
fr
am
ewo
r
k
is
f
undam
ental
as
plausi
bili
ty
of
gatecras
her
a
ss
a
ult
expan
ds
st
ep
by
ste
p.
G
S
M
m
od
ule
is util
iz
ed
to
cat
ch
t
he
picture
a
nd
se
nd
read
y
m
essag
e
to
the
pro
pr
i
et
or
at
wh
at
e
ve
r
point
i
nterlo
per
go
int
o
the
hom
e.
PI
R
se
nsor
,
be
ing
la
te
nt
in
na
ture
is
im
per
cepti
ble
a
nd
f
un
ct
io
n
adm
irably
obli
vious
conditi
on.
Di
sti
nctive
sens
or
hubs,
wh
ic
h
util
iz
e
Zig
Be
e
f
or
r
e
m
ote
transm
is
sion,
are
al
to
ge
ther
ass
ociat
ed
with
a
m
iddl
e
hub.
Eff
ect
ively
m
on
it
or
the
m
ov
e
m
ent
inf
or
m
at
i
on
an
d
i
nterfa
ce
with
get
t
o
orga
nize
adm
i
nistrato
r
f
or
ge
tt
ing
cl
ie
nt'
s
SLA
a
nd
m
ast
er
m
ind
ahea
d
o
f
tim
e
asset
s
acco
rd
i
ng
to
.
Wh
at
'
s
m
or
e
cha
nge
in
SI
P
welc
om
es
and
re
-
welcom
e
m
ess
age
to
i
ncor
porate
aske
d
for
data
was
util
iz
ed.
T
hese
pro
gr
essi
ons
will
be
us
ef
ul
in
e
ns
ur
e
acce
ssibil
it
y of cl
ie
nt'
s h
an
ds
e
t capaci
ty
to
I
MS centre
syst
e
m
.
Vish
al
Jai
n
et
al
.
[11]
f
ocu
s
on
buil
ding
sm
art
secu
rity
syst
e
m
wh
ic
h
al
er
ts
the
owne
r
by
raisi
ng
a
n
al
arm
so
un
d.
Along
with
t
his
it
can
m
a
ke
us
e
of
m
a
king
hom
e
autom
a
te
d
by
usi
ng
sam
e
sensors.
The
el
ect
rical
dev
ic
es
insid
e
the
hous
e
ca
n
be
c
on
t
ro
ll
e
d
a
nd
m
anag
e
by
us
in
g
m
icr
oc
ontrolle
r
a
current
prototype
-
TI
-
CC
3200.
Break
in
li
te
ratur
e
s
urvey
stim
ula
te
us
to
increase
the
le
ve
l
of
secur
it
y
for
so
ci
et
y,
so
th
at
peo
ple
in
the
so
ci
et
y
can
li
ve
with
out
te
ns
io
n.
The
w
ork
in
this
paper
is
car
ried
out
to
reduce
t
he
so
ci
et
y
r
obbe
ry
as
well
as
in
f
uture
it
can
be
im
plem
ented
for
banks
,
et
c.
An
en
han
ce
d
s
ec
ur
it
y
al
ert
syst
e
m
s
desig
ne
d
so
tha
t
wh
e
n
no
body
is
in
ho
m
e
the
syst
e
m
wil
l
reco
gnise
hom
e
relat
ive
or
intr
uder
a
nd
se
nds
an
em
ail
al
ert
so
that
owne
r
ca
n
f
eel
relax
w
he
n
he
(
or)
s
he
will
out
of
t
he
ho
m
e.
A
nd
this
will
be
help
fu
l
f
or
t
he
s
ociet
y.
T
he
rest
of the
pa
per
s
have the
foll
owing sec
ti
on
a)
Sect
ion
4
-
Ar
c
hitec
ture
m
od
e
l
b)
Sect
ion
5
-
Pro
blem
stat
e
m
ent
&
Re
s
ults
c)
Sect
ion
6
-
C
oncl
us
i
on
Re
search
of thi
s p
a
per incl
ude
s the
a)
Re
vie
w o
n
inte
rn
et
of thin
gs.
b)
Var
i
ou
s
r
es
ults
are
i
den
ti
fie
d
f
or d
et
ect
in
g
int
ruder.
c)
Pr
op
os
e
d
a
rch
i
te
ct
ur
e is l
ow c
os
t f
or
detect
ing
int
ruder u
sin
g
Ra
s
pb
e
rr
y
pi.
3.
AN ENH
A
NCE
D
SE
CURIT
Y ALE
RT S
Y
STE
M
F
OR S
MART
HO
M
E USI
NG IO
T
3
.1
.
O
ut
li
ne
In
this
w
ork,
a
n
en
han
ce
d
I
oT
based
Sec
uri
ty
Alert
Syst
e
m
fo
r
Sm
art
Ho
m
e
is
Pr
opose
d
in
orde
r
to
detect
an i
ntr
uder
or a
ny un
usual
e
ven
t
occ
ur in t
he ho
m
e, in
the
abse
nce
of
ho
m
e o
w
ne
r
(
or) pe
rson.
Figure
1
de
pic
ts
the
blo
ck
di
agr
am
of
the
Io
T
base
d
Sec
uri
ty
Alert
Syste
m
.
It
con
sist
s
of
3
ste
ps.
In
ste
p
1,
li
ve
vid
e
o
will
be
colle
ct
ed
thr
ou
gh
m
ob
il
e
we
bc
a
m
has
fr
am
es
an
d
em
i
tt
ed.
In
ste
p
2,
c
ollec
te
d
sam
ple
fr
a
m
es
are
com
par
ed
to
m
a
tc
h
reg
i
strat
ion
sam
ples
[2
]
.
Her
e
,
the
sta
ndar
d
of
colle
ct
ed
sam
ples
is
i
m
pr
oved
with
the
r
e
gistered
sam
ple.
In
ste
p
3,
finall
y,
it
no
ti
fies
if
the
sa
m
ples
m
is
m
a
tch
with
t
he
re
gi
ste
re
d
m
od
ule
then
a
n
em
ai
l
a
le
rt
will
be
sen
d
to
t
he
ow
ner
a
nd
act
ion
will
be
ta
ken.
Sect
io
n
4.2
prese
nts
al
gorithm
of Sec
ur
it
y Ale
rt Syst
em
w
it
h
resp
ect
t
o
Sm
art H
om
e.
Figure
1. A
rch
i
te
ct
ur
e
of
secu
rity
alert
syst
em
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
13
, N
o.
1
,
Ja
nu
a
ry 20
19
:
2
7
–
3
4
30
3
.2
.
E
xp
eri
m
ent
al Setup
In this
pro
po
se
d
Syst
em
w
e ha
ve
c
onsidere
d t
wo phases:
a)
First p
hase
exp
la
ins abo
ut the har
dware c
ompone
nts
us
ed
.
b)
Seco
nd phase
s
ay
s abou
t al
gor
it
h
m
an
d
em
ai
l
alert
pro
c
ed
ure sen
ding t
o hom
eow
ne
r.
Fo
ll
owin
g
is t
he
d
esc
riptio
n
pro
vid
e
d for
hardw
a
re c
om
po
ne
nts
ass
soo
n
i
n
Fi
gure
2.
Figure
2. Ha
rdwar
e
set
up
3
.
3.
IP
Web
Ca
m
era
An
In
te
rn
et
P
r
oto
c
ol
W
e
b
ca
m
era,
or
IP
Web
cam
era,
is
a
so
rt
of
ad
va
nced
dig
it
al
vi
deo
cam
era
gen
e
rall
y
us
ed
fo
r
ob
se
r
vatio
n,
an
d
w
hich
,
no
t
un
der
a
ny
conditi
on
li
ke
basic
cl
os
ed
ci
rcu
it
TV
(C
CTV)
ca
m
eras,
can
s
end
a
nd
get
in
form
ation
by
m
et
ho
ds
for
a
com
pu
te
r
net
w
ork
an
d
the
In
t
ern
et
.
Althou
gh
m
os
t
ca
m
eras
that
do
this
are
we
bc
a
m
s,
the
te
r
m
I
P
ca
m
era
or
ne
t
ca
m
is
reg
ula
rly
connecte
d
just
to
tho
se
use
d
f
or
ob
s
er
vation t
ha
t can
be direct
ly
o
ve
r
t
o ov
e
r a
syst
e
m
co
nne
ct
ion
.
An
IP
cam
era
is
com
m
on
ly
broug
ht
to
gether
ei
ther
cent
rali
zed
(
re
qu
iri
ng
a
central
f
ram
e
work
vi
deo
recorde
r
(NV
R)
to
m
anag
e
the
r
ec
ord,
vi
deo
a
nd
al
ert
orga
nizat
ion
or
dece
ntrali
zed
(
no
N
VR
re
qu
i
red,
as
ca
m
era
can
record
to
a
ny
area
or
rem
ote
accum
ulati
n
g
m
edia).
The
pr
im
ary
bo
un
d
IP
cam
era
was
Ax
is
Net
ey
e
20
0,
r
el
eased
in
1996
by
Ax
is
Co
m
m
un
ic
at
ion
s.
IP
ca
m
eras
are
no
rm
al
ly
acc
es
sible
at
reso
luti
on
s
from
0.
3
(VG
A
determ
inati
on
)
to
29
m
egap
ixels.
F
ollow
i
ng
is
the
desc
r
ipti
on
pro
vi
de
d
for
IP
we
b
c
a
m
er
a
ass soo
n
i
n
Fi
gure
3.
Figure
3. IP
w
eb
cam
era
3.
4.
Ra
s
pber
ry
Pi
Ra
sp
be
rr
y
pi
boar
d
is
util
iz
ing
the
ARM
(Adv
a
nce
d
Re
du
ced
Instructi
on
Set
Co
m
pu
ti
ng
Ma
chine
)
Tech
no
l
og
y. A
RM
te
chn
ol
ogy
util
iz
ed
on
t
he
bo
a
r
d
re
duce
s
the
cost,
heat
and
pow
e
r
util
iz
at
ion
.
F
ollo
w
ing
is
the d
e
scripti
on provide
d for
R
asp
berry pi B
oa
rd
ass s
oon i
n
Fig
ur
e
4.
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
An
e
nhance
d
s
ecurit
y a
le
rt sy
ste
m
for
smart
home usi
ng IO
T
(
Afsh
ana
K
hanu
m
)
31
Figure
4. Ra
spber
ry p
i
boar
d
Ra
sp
be
r
ry
pi
bo
a
r
d
is
m
ulti
center
CP
U
e
xecu
te
d
as
Sy
stem
-
on
-
chi
p
(
So
C)
weig
hing
50
gm
and
works
on
5V,
700m
A
powe
r
rati
ng.
Ra
s
pb
err
y
pi
acce
ssi
ble
in
3
m
od
el
s
li
ke
A,
B
,
B
+.
the
B+
pi
boar
d
is
adv
a
nce
d
m
os
t
recent
editi
on
a
m
on
g
them
,
and
it
kee
ps
r
unning
on
ARM11
process
or
with
512MB
RAM
work
i
ng
at
700MHz
f
reque
nc
y.
It
has
SD
card
f
or
booting
op
e
rati
ng
syst
e
m
li
ke
Rasp
bia
n,
N
oobs.
It
has
GP
I
O
pi
ns
for
acce
ssing
W
i
-
Fi connecto
r,
m
ou
se, laptop
and
s
o
forth
R
asp
berry pi can
be
util
iz
ed
as
a p
art o
f
nu
m
erous
a
pp
l
ic
at
i
on
s.
We
ha
ve
us
e
d
Ra
sp
be
rr
y
PI
i
n
pro
posed
ap
proac
h
as
key
com
pu
ta
ti
on
al
dev
ic
e.
It
pe
rfor
m
s
e
m
a
il
-
sen
ding
proces
s.
It
br
i
ngs
the
sign
al
f
ro
m
web
cam
s
and
Ra
spber
ry
pi
send
ca
pture
pict
ur
es
t
o
H
om
e
owne
r
thr
ough em
ai
l
process
.
3
.
5.
Pro
po
se
d A
l
go
ri
th
m
f
or
Sec
urit
y Aler
t
S
ystem
In
Fig
ure
5
Propose
d
al
gorithm
exp
la
ins
t
hat
cam
era
sta
tus
a
nd
m
ai
l
su
bject
is
passe
d
to
pi
a
nd
checks, if the prev
i
ou
s
reg
ist
e
red
m
e
m
ber
an
d
cu
rr
e
nt li
ve
vi
deo
m
e
m
ber
m
at
ch
then
by g
ivin
g
al
ert of access
it
exits.
I
f
in
ca
se
the
pr
e
vious
an
d
c
urren
t
vi
deo
does
n’
t
m
a
tc
hes
the
n
a
n
al
ert
of
acce
ss
den
ie
d
em
ai
l
is
sen
d
to the o
wn
e
r
s
o t
hat ow
ner can
take a
ppr
opria
te
acti
on
.
Fig
ure
5. Al
gorithm
fo
r
sec
ur
it
y al
ert syst
e
m
Fo
ll
owin
g
is t
he
d
esc
riptio
n f
or alg
or
it
hm
sym
b
ols
,
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
13
, N
o.
1
,
Ja
nu
a
ry 20
19
:
2
7
–
3
4
32
4.
RESU
LT
S
A
ND AN
ALYSIS
In
this
sect
io
n
resu
lt
of
this
work
is
been
exp
la
ine
d.
Fig
ur
e
6
scena
rio
prov
i
des
the
webpa
ge
t
o
reg
ist
er
m
e
m
b
er,
w
hich
will
be
sto
re
i
n
t
he
database
f
or
f
uture
m
at
c
h.
Fig
ur
e
7
s
cenari
o
pro
vide
s
th
e
webpa
ge
to
re
gister
m
e
m
ber
,
wh
ic
h
will
be
store
in
the
database
f
or
f
ut
ure
m
at
ch.
Fig
ure
8
scenari
o
pr
ov
i
des
fill
ing
detai
ls o
f
fam
il
y
m
e
m
b
er a
nd start the
cam
era to
sav
e the im
age in
the d
at
a
base.
Figure
6. Sym
bo
l
desc
riptio
n
Figure
7. Me
m
ber
detai
ls
Figure
8. Re
gis
trat
ion
I
ND
-
I
ntrud
e
r de
t
e
c
ti
on
C
-
C
a
mer
a
S
tatus
Sm
-
Me
ssa
g
e
S
ubjec
t
MR
-
Me
mber
R
e
g
ist
ra
ti
on
Ema
il
-
Ema
il
of live
video
SN
-
No. O
f Socke
t pi
ns
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
An
e
nhance
d
s
ecurit
y a
le
rt sy
ste
m
for
smart
home usi
ng IO
T
(
Afsh
ana
K
hanu
m
)
33
Fig
ure
9
ex
pla
ins
a
bout
ca
pt
ur
i
ng
im
age
once
t
he
detai
ls
are
fill
ed.
Fig
ur
e
10
scena
ri
o
say
s
ab
out
Em
a
il
al
ert
send
to
the
owne
r,
in
the
case
w
he
n
pr
e
vious
a
nd
c
urren
t
re
gistered
detai
ls
does
not
m
at
ch
so
tha
t
owne
r
ca
n
ta
ke
appr
opriat
e ac
ti
on
.
Figure
9. Im
age Captu
re
Figure
10. Em
a
il
al
ert
5.
CONCL
US
I
O
N
In
this
pa
per,
an
en
han
ce
d
I
oT
based
Sec
ur
i
ty
Alert
Syst
e
m
fo
r
Sm
art
Ho
m
e
is
design
e
d
kee
ping
in
m
ind
the
e
nd
go
al
to
ad
dr
e
s
s
the
issues
of
m
ini
m
al
eff
ort
ho
m
e
secur
it
y
and
c
hec
king
f
ram
ewo
r
k
ut
il
iz
ing
Ra
sp
be
rr
y pi. Th
ese fr
am
ewo
r
ks
i
den
ti
fy
a
n
intr
uder or
a
ny
un
us
ual o
cc
asi
on
h
a
pp
e
n
i
n
ho
m
e
wh
e
n
no
one
is
acce
ssible
in
hom
e
by
sen
ding
em
ai
l
cauti
on
to
ow
ner.
P
r
opos
e
d
fr
am
ework
pr
ese
nts
fun
dam
ental
lev
el
of
ho
m
e
secu
rity
and
rem
ote
ob
serv
i
ng
li
ke
wise
af
firm
s
the
upside
of
Pi
an
d
ada
pt
abili
ty
re
gardin
g
e
xpen
s
e
an
d
it
s u
se.
This ea
se secu
rity
f
ra
m
ewo
r
k has le
ss d
el
ay
durin
g p
ro
ce
dure
of s
end
i
ng em
ai
l.
6.
FUTU
RE W
O
RK
We
ha
ve
a
pla
n
of
desig
ning
a
syst
e
m
wh
er
e
wh
e
n
t
he
pi
e
ncou
nter
a
n
int
ruder
or
any
unusual
e
ven
t
in the h
om
e in the
ab
senc
e
of
owne
r
the
do
or shou
l
d
a
uto
m
at
ic
al
ly
lock
and alert m
us
t be
r
ecei
ve
d
t
o owner
.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
13
, N
o.
1
,
Ja
nu
a
ry 20
19
:
2
7
–
3
4
34
REFERE
NCE
S
[1]
Poonam
Gupta,
D
D
Shah,
K
V
V
Saty
anaray
ana,
“
An
IoT
F
ramework
for
A
ddre
ss
ing
Pare
nt
s
Conce
rns
about
Safe
t
y
of
Scho
ol
Going
Chil
dr
en
”,
In
te
rnationa
l
Journal
of
El
e
ctical
and
Comput
er
E
ngin
ee
ring
(
IJE
CE
)
,
Vol
.
6,
No.
6
,
3052
-
305
9,
2016
.
[2]
S.
Ta
nwar
,
P.
Patel,
K.
Pa
te
l
,
S.
T
y
agi
.
“
An
Advanc
ed
In
te
rn
et
of
Thi
ng
base
d
Secur
ity
Al
ert
S
y
stem
for
Sm
art
Hom
e
”
,
Fordha
m
Univer
sit
y
,
US
A,
978
-
1
-
5090
-
5957
-
7/17/
$31.
0
0
2017
IE
EE.
[3]
Farrukh
Shahzad
“
Low
-
Cost
Intrude
r
Det
ec
t
i
on
and
Aler
t
S
y
stem
Us
ing
M
obil
e
Phone
Pr
oximit
y
Sensor
”,
Depa
rtment
of
Com
pute
r
Scie
n
ce
Nati
on
al
Uni
ver
sit
y
of
Com
pute
r
and
Emergi
ng
Scie
nce
s
Isla
m
aba
d,
Pakista
n
978
-
1
-
5090
-
3310
-
2/
17/$3
\
.
00
©
2017
IEEE”.
[4]
Vishal
J
ai
n
“
Io
T
Based
Sm
art
Secu
rity
and
Hom
e
Autom
at
ion
S
y
st
em”
,
Depa
rtment
of
El
e
ct
roni
cs
an
d
Com
m
unic
at
ions
Engi
nee
r
ing
Nati
ona
l
Insti
tut
e
of
Te
chn
olog
y
,
W
ara
ng
al
,
In
te
rnationa
l
Confe
ren
ce
on
Computing,
Co
mm
unic
ati
on
an
d
Aut
omat
ion
(
ICCCA2016)
”.
[5]
Raspber
r
y
Pi F
o
undat
ion
,
ht
tp:
/
/
ww
w.ra
spberr
y
.
org
[6]
K.
Bal
asubra
m
a
nia
n
“
Anal
y
sis
of
Remote
Control
Techni
ques
Emplo
y
ed
in
Hom
e
Auto
m
at
ion
and
Secur
ity
S
y
stems
”
,
0098
3063/09/
$20.
00
©
2009
IE
EE
.
[7]
Aks
hat
Jain,
Shraddha
B
asa
ntw
an,
Ow
ai
sK
a
z,
Yogita
Ba
ng
“
Sm
art
Surveillance
Monitori
ng
S
y
stem”,
Com
puter
Engi
ne
eri
ng
De
par
tment
Pune
I
nstit
ute
of
Com
pute
r
Te
chno
log
y
Pune
,
Ind
ia,
2
017
Inte
rnat
ion
al
Confe
r
enc
e
o
n
Data
Manage
me
nt,
Anal
y
tics and
Innov
at
ion
(
ICDMAI)
Zeal
Edu
cat
ion
Societ
y
,
Pune,
Ind
ia,
Feb
2
4
-
26,
2017”
.
[8]
A
y
ush
Panwar,
Anandit
a
Singh,
“
E
y
ri
e
Sm
art
Ho
m
e
Autom
at
ion
using
Inte
rne
t
of
Thi
ngs”,
Dept.
of
El
ec
t
ronic
s
&
Com
m
.
Engg.
M
ani
pa
l
Univer
si
t
y
J
ai
pur, Indi
a
C
omputing
Conf
ere
nce 2017
18
-
20
Jul
y
2017
.
Lond
on,
UK
.
[9]
Roble
s,
Ross
li
n
John,
et
a
l.
"A
r
evi
ew
on
sec
ur
ity
in
sm
art
hom
e
developm
ent
.
"
I
nte
rnational
Jou
rnal
of
Adv
anc
e
d
Sci
en
ce and
Tec
hnology
15
(201
0).
[10]
Supree
ta
Venk
a
te
san
“
Design
and
Im
ple
m
ent
at
i
on
of
an
aut
om
at
ed
Secur
ity
Sy
stem
using
T
wili
o
Mess
agi
ng
Servic
e
”
,
2017
Inte
rna
ti
ona
l
Confe
renc
e
on
Smar
t
Cit
ie
s
,
Aut
omation
a
nd
Inte
l
li
gen
t
Computing
Syst
ems
yogy
akarta
,
Ind
onesia
,
Nov
ember
08
-
10
,
2017”
.
[11]
Shaik
Anw
ar
an
d
D.
Kishore,
”
I
OT
base
d
Sm
art
Hom
e
Secur
ity
S
y
stem
with
Ale
rt
and
Door
Acc
ess
Control
usin
g
Sm
art
Phone”,
I
nte
rnat
ional J
ou
rnal
of Engi
ne
ering
R
ese
arch
&
Technol
ogy
(
IJERT)
,
5(12),
2016
,
pp
.
1
-
5.
Evaluation Warning : The document was created with Spire.PDF for Python.