Sei sulla pagina 1di 5

A Multi-Tiered Alert Mechanism for Intrusion and

Disaster Prevention in a Smart Home Scenario


Adwitiya Mukhopadhya Y Vinayaka R
Department of Computer Science Department of Computer Science
Amrita School of Arts and Sciences, Mysuru Amrita School of Arts and Sciences, Mysuru
Amrita Vishwa Vidyapeetham, India Amrita Vishwa Vidyapeetham, India
m_adwitiya@asas.mysore.amrita.edu vinayakaraj007@gmail.com

Akshay Kumar P
Department of Computer Science
Amrita School of Arts and Sciences, Mysuru
Amrita Vishwa Vidyapeetham, India
akshay.aash123@gmail.com

Abstract— Today we are living in a wor ld where smart smart home network, It can integrate various
homes are highly prevalent. Such homes involve many smart heterogeneous communication technologies
devices to form an Internet of Things (IoT) structure and huge
amounts of data are generated. Efficient transmission of these 2) Ubiquitous services: By using ubiquitous access networks,
data is vital since they may contain security related information real-time information of the smart home can be easily
also. The resident of the smart homes should be notified about accessed wherever users are.
any intrusions or emergencies such fire accidents when they are
3) Comprehensive views: Using different kinds of logical and
away from the home. In this paper, we propose a mechanism
physical sensors, time monitoring of home devices can be
based on Wi-Fi 802.11b where various types of data traffic are
considered which detects the intrusions and the emergencies in a
done
smart home based scenario. Here alerts are sent to the resident 4) Convenient control. Controlling the smart home can be
through a cloud server. A multi-tiered detection and data done by various communication devices such as mobile
transmission system is designed to improve the efficiency of the terminals and PCs, and the control results will be displayed
alert mechanism. in real-time through various visualization interfaces.[2]
Keywords—IoT, Wi-Fi, 802.11b, Intrusion prevention, Smart Smart homes are good for the elderly, providing care that
Home, Alerts helps older people stay comfortably and safely at home instead
of moving to old age homes or requiring 24/7 home care.
I. INTRODUCTION Although, smart home automation systems have been
With the ever-increasing application of the Internet of trying hard to become conventional, partly because of their
Things (IoT) in many areas, it has also entered the smart home technical nature. One of the drawbacks is that smart homes
design. Smart homes integrate technology and services feel complicated; some people have difficulties with the new
through the home network to improve the quality of life. It technology. Smart home creators and associations are working
uses various technologies to equip home components for to reduce complexity and improve the user experience, making
smarter monitoring, remote controlling and enables influential them happy and useful for all types and levels of technology
harmonic interactions between them, thereby automating daily users.
housework and activities without user intervention. The
The concept of home automation and its safety has existed
integrated home service enables the devices to communicate
with each other through the home controller so that a single since the late 1970s. But in the process of technological
advancement, home automation and its security systems have
button can control various home systems according to pre-
programmed scenes or modes of operation. Smart homes will changed in different home automation systems over time, they
have been trying to provide home residents with an efficient,
improve home comfort, convenience, safety and energy
management. With the development of the economy and the convenient and safe way to visit their homes[3]
emergence of the information society, people's needs and Security has become a very important aspect everywhere.
living conditions continue to improve[1]. Now, with the increasing possibility of intrusion, home
security becomes more and more necessary. Anti-theft, air
The following are the characteristics of a Smart home
leakage and fire safety are some of the important requirements
system:
of people's home security systems.
1) Compatible with various communication technologies:
Various communication interfaces can be fixed on the

978-1-5386-8158-9/19/$31.00©2019IEEE
Home security will be the main concern for anyone who focal length will be about 90° of coverage is about 8–15
owns or rents a home. In addition, a safe and secure living meters distance range;
space is a necessity for everyone because most family
members are working. On most days, the house is left C. Internet TV or IPTV
unattended, because continuous monitoring of housing is TV with built-in Internet and interactive "Web 2.0"
difficult, so crimes of home invasion are at their peak.
capabilities. Smart TVs should not be confused with Internet
TV, IPTV or Internet TV. This refers to the reception of
II. SYSTEM ARCHITECTURE television content over the Internet rather than the traditional
systems such as ground, cable and satellite. IPTV is one of the
A. Smart Home Design Internet TV technology standards used by TV broadcasters.
A standard home design is illustrated in Figure 1 for the
explanation of a Smart Home. A standard 60 by 40 feet layout
is considered with a living room, kitchen, dining hall, 2 bed D. Smoke Detectors and an Alarm System
rooms and a washroom. Smoke detectors will be of high voltage and connected to
discrete circuit boards. Because they are on a single cable
Loops, they are inter-connected, so if a probe is triggered, they
are all stroke. There are battery-powered smoke detectors that
can be heard interconnected. The device is designed for
listening to conventional ionization or photoelectric smoke
detector sounds. When it listens to the smoke alarm, it will
open the scheduled fire zone of the alarm system. The main
intent of the unit is to only remotely monitor the present
smoke detecting system.

 Smoke detectors are usually installed in plastic


housings. Shaped like a disc about 150 mm (6 inches)
in diameter and is 25 mm (1 inch) thick but varies in
shape and size.
 Optical smoke detectors contain a light source
basically infrared, visible, ultraviolet, incandescent
light bulbs or light emitting diodes, one lens and one
Photo-electric receiver (usually a photodiode).
 Photoelectric Smoke Detector responds more quickly
to fire early, smoldering stage (before the outbreak).
 A large number of combustion particles - between 0.3
and 10.0 μm. Ionized smoke detectors respond faster
(usually 30-60 Second) in the combustion phase of
the flame.

Fig.1. Construction of a Smart Home


E. Access Points
B. CCTV Camera In WLANs or Wireless Local Area Networks, access
points are the stations or also knows as transceivers that send
Closed-circuit television (CCTV) or video surveillance,
uses cameras to transmit signals to specific locations on a and receive data. An access point connects users to other users
limited monitor. It varies from broadcasting television in that in the network and can also act as an interconnection point
the signal is not transmitted publicly, although it may use between a WLAN and a fixed wired network. Each access
point-to-point (P2P), point-to-multipoint (P2MP) or wireless point can provide services to multiple users within a defined
links or wired. The given Figure 2 demonstrates the network area.
connecting of CCTV Cameras to a Smart TV.
With smart security cameras, residents can watch homes F. Cloud Storage
while on the move or on vacation. Intelligent motion sensors Cloud Storage enables the user to access the data that is
can also detect differences between residents, thieves, and pets generated from the devices that are in the smart home
and can notify administrations or users if unusual behavior is network.
detected.
The image sensor size of CCTV cameras will be of 1/3", or III. RELATED WORKS
1/2.5" and the focal length of lens used are 2.8mm, 3.6mm, In the future, it is predicted that about 90 million people
4mm, 6mm, 8mm, 12mm.With 1/3" of image sensor, 2.8mm will reside in smart homes, using smart home technologies to
improve home security and efficient energy management.[4] The above Figure 2: depicts the alert texts being sent to the
With the rapid growth of IoT applications, it is tough to handle User and the Emergency Departments. In Tier-1, the Detection
all applications in the IoT environment If these increased of the Intrusion and the Disaster is done with the Wi-Fi
applications cannot be controlled effectively and conveniently, technology and in Tier-2 the Alert messages is sent using a
the entire system will not be convenient and safer. DSL connection to the user through the cloud server.
Some of the main problems that arise in the smart home
environment are:
3.1 Standards: It is very important for the IoT
environment since it is growing worldwide. The
challenges such as which standards to be used, which
will give a safe medium, and which will make the
system more efficient and reliable should be
addressed.
3.2 Privacy: The user related data must be kept private.
Privacy must be provided with connections.
3.3 Authentication: The authentication should be given by
the server for only the authenticated users and it
should be a must for all the smart homes.
3.4 Data Storage: As data is collected abundantly in the
cloud storage, Meaningful data should be extracted
using Artificial Intelligence (AI) based Algorithms.
3.5 Network Organization: All the devices in the network
should be connected in a proper way that the Home
Network is self-organized.[5]

There is very low security provided from the server side for
the Smart home System and IoT environment. AI based
algorithms can be used to extract meaningful data from the
abundant data in the cloud.
Fig.3. System Architecture of Smart Home Scenario.
IV. METHODOLOGY
A. Data Flows
In the Multi-Tiered Smart Home System, the first tier
includes the detection system that is the CCTV cameras and There are mainly four data flows in the Smart Home
the smoke detectors. These devices detect the anomalies and System.
inform the next tier devices by sending data. The second tier
4.1 CCTV Cameras to the Internet TV (Flow 1).
of devices consist the Internet TV and the smoke alarm
system. These send the alert messages to the user and to the 4.2 Smoke Detecting Sensors to Smoke Alarm (Flow 2).
nearest emergency department such as the Fire department or 4.3 Internet TV, Smoke Alarm, Laptop and Phone to Local
the Police department in-case of a fire disaster or an intrusion Cloud Server (Flow 3).
that is detected respectively in the Smart home.

B. Smart Home Design Approach


Real world parameters for the data flow between the
devices are considered for the experiment. In a Smart Home
Scenario, the intrusions and fire disasters can happen at any
time, so the alert messages are sent to the user regularly. Our
work focuses mainly on the security aspect of home
automation.

V. IMPLEMENTATION AND RESULTS


The Implementation is done in NS-3.26. As mentioned
earlier, the first tier uses Wi-Fi 802.11b wireless technology
and the second tier uses DSL connection.
Fig.2. Alerts that are sent to the user.
The parameter values for the simulation of the first data alert mechanism works efficiently with zero or lower data
flow is given in the below table. The standard data rate of loss. The intrusions and the disasters are detected by the
CCTV camera is considered and the values are calculated devices and alerts are forwarded to the user.
accordingly.

TABLE IV: AVERAGE VALUES OF PDR, THROUGHPUT AND


TABLE I: PARAMETERS FOR CCTV CAMERAS TO INTERNET TV DELAY
DATA FLOW SIMULATION VALUES
Flow 1 Flow 2 Flow 3
Avg PDR 98.57 99.71 99.53
Parameters Values
Data Rate 900 Kbps Avg Throughput 18.15 18.16 19.06
Number of Bytes 115,200 Bytes/Second Avg Delay 162.43 173.46 214.48
Packet Size 2304 Bytes
Inter Packet Interval 0.02 seconds Individual Graphs for the Parameters: PDR, Throughput
Number of packets 50 Packets/Second and Delay is shown with the Average Values calculated from
the data flows
The second data flow simulation is done with values given
below, which are used by the smoke detectors. The standard
data rate for the smoke detectors are used and simulated.

TABLE II: PARAMETERS FOR SMOKE DETECTING SENSORS TO


SMOKE ALARM DATA FLOW SIMULATION VALUES
Parameters Values
Data Rate 2 Kbps
Number of Bytes 256 Bytes/Second
Packet Size 2.5 Bytes
Inter Packet Interval 0.01 seconds
Number of packets 100 ckets/Second

The third and final data flow is where the alerts are sent
from the Internet TV and the Smoke Alarm to cloud. The
alerts are sent at regular intervals of 50 seconds. So that the Graph 1: Showing the Average PDR values for each Data Flow
time gap for the disaster or the intrusion to occur is very
minimal. From Graph 1, it can be conclude that PDR is consistent in all
the data flows and Packets are delivered with an efficiency of
Table III: Parameters for the simulation of the third data flow greater than 98%.
Parameters Values
Data Rate 2 Kbps
Number of Bytes 256 Bytes/Second
Packet Size 2.5 Bytes
Inter Packet Interval 50 seconds
Number of packets 1 Packet/50 Seconds

The Test Cases Include 9 Simulation Times, ranging from 50s-


3500s.These simulations are carried out under the Parameters
mentioned in the table 1, table 2 and table 3 in the previous
section.
The average values of Packet Delivery Ratio (PDR),
Throughput and Delay are calculated for each simulation Time
and Tabulated. The Simulation Time Starts from 50s and goes
up-to 3500s. As the simulation time increases, the number of
packets sent are also increased. The Inter Packet Interval is Graph 2: Showing the Average Throughput values for each Data
varied according to the Flow of Data which is mentioned in Flow
the table 1, table 2 and table 3. The Experimental results show
that the data loss found is very minimal or negligible. Thus the
From Graph 2, it can be can conclude that the sum of the [6] N. Shaheen, A. Khan, M. Sikander, H. Khiyal, and Q. Javed, “System
data rates that are delivered to all terminals in the Smart Home via SMS and GSM,” vol. 3, no. 7, pp. 132–136, 2011.
Network is Consistent. [7] G. Chong, L. Zhihao, and Y. Yifeng, “The research and implement of
smart home system based on Internet of Things,” in 2011 International
Conference on Electronics, Communications and Control (ICECC),
2011, pp. 2944–2947.
[8] N. K. Suryadevara and S. C. Mukhopadhyay, “Wireless sensor network
based home monitoring system for wellness determination of elderly,”
IEEE Sens. J., vol. 12, no. 6, pp. 1965–1972, 2012.
[9] J. Bangali and A. Shaligram, “Design and implementation of security
systems for smart home based on GSM technology,” Int. J. Smart Home,
vol. 7, no. 6, pp. 201–208, 2013.
[10] D. Javale, “Home Automation and Security System Using Android
ADK,” vol. 3, no. 2, pp. 382–385, 2013.
[11] M. A. E.-L. Mowad, A. Fathy, and A. Hafez, “Smart Home Automated
Control System Using Android Application and Microcontroller,” Int. J.
Sci. Eng. Res., vol. 5, no. 5, pp. 935–939, 2014.
[12] N. Komninos, E. Philippou, and A. Pitsillides, “Survey in smart grid and
smart home security: Issues, challenges and countermeasures,” IEEE
Graph 3: Showing the Average Delay values for each Data Flow Commun. Surv. Tutorials, vol. 16, no. 4, pp. 1933–1954, 2014.
[13] S. Kumar, “Ubiquitous Smart Home System Using Android
From Graph 3, it can be conclude that the Delay measured is Application,” Int. J. Comput. Networks Commun., vol. 6, no. 1, pp. 33–
minimal and won’t affect the data transfer in a crucial way. 43, 2014.
[14] N. K. Suryadevara, S. C. Mukhopadhyay, S. D. T. Kelly, and S. P. S.
Gill, “WSN-Based Smart Sensors and Actuator for Power Management
in Intelligent Buildings,” IEEE/ASME Trans. Mechatronics, vol. 20, no.
2, pp. 564–571, Apr. 2015.
VI. CONCLUSION
[15] P. P. Gaikwad, J. P. Gabhane, and S. S. Golait, “A survey based on
Smart Homes system using Internet-of-Things,” in 2015 International
A Smart Home with Automated alert sending mechanism Conference on Computation of Power, Energy, Information and
that detects intrusions and disasters is designed and simulated Communication (ICCPEIC), 2015, pp. 0330–0335.
in a Network Simulator and the results are shown. Good [16] R. S. Ransing and M. Rajput, “Smart home for elderly care, based on
Wireless Sensor Network,” 2015 Int. Conf. Nascent Technol. Eng. F.,
results are obtained from the experiment and it shows the data pp. 1–5, 2015.
is sent effectively in the network and user is alerted. Thus, the [17] A. Jacobsson, M. Boldt, and B. Carlsson, “A risk analysis of a smart
security of the Smart Home is improved and owner or resident home automation system,” Futur. Gener. Comput. Syst., vol. 56, pp.
of the home can be safe from these intrusions and disasters. 719–733, Mar. 2016.
The future scope of the research can be done integrating [18] S. Chitnis, N. Deshpande, and A. Shaligram, “An Investigative Study for
more sensors and devices which can detect other disasters or Smart Home Security: Issues, Challenges and Countermeasures,” Wirel.
intrusions or warnings such as Proximity sensors for unusual Sens. Netw., vol. 8, no. 4, pp. 61–68, 2016.
movement, an Authentication mechanism for the entrance [19] T. Kubitza, A. Voit, D. Weber, and A. Schmidt, “An IoT infrastructure
for ubiquitous notifications in intelligent living environments,” in
door, gas leakage detection etc. and these can alert the user
Proceedings of the 2016 ACM International Joint Conference on
regarding them. Pervasive and Ubiquitous Computing Adjunct - UbiComp ’16, 2016, pp.
1536–1541.
[20] S. Manishankar, P. R. Ranjitha, and T. M. Kumar, “Energy efficient data
aggregation in sensor network using multiple sink data node,” in 2017
VII. REFERENCES International Conference on Communication and Signal Processing
(ICCSP), 2017, pp. 0448–0452.
[21] S. Bhat, A. Mukhopadhyay, and B. K. Sandhya Rani, “Dynamic media
selection between WiFi and LTE in telemedicine scenarios,” in 2017
[1] Seung-Ho Baeg, Jae-Han Park, Jaehan Koh, Kyung-Wook Park, and International Conference on Advances in Computing, Communications
Moon-Hong Baeg, “Building a smart home environment for service and Informatics (ICACCI), 2017, pp. 601–606.
robots based on RFID and sensor networks,” in 2007 International [22] M. S. George, K. C. N. Das, and B. R. Pushpa, “Enhanced honeybee
Conference on Control, Automation and Systems, 2007, pp. 1078–1082. inspired load balancing algorithm for cloud environment,” in 2017
[2] G. Demiris and B. K. Hensel, “Technologies for an aging society: a International Conference on Communication and Signal Processing
systematic review of ‘smart home’ applications,” Yearb Med Inf., pp. (ICCSP), 2017, pp. 1649–1653.
33–40, 2008. [23] A. Mukhopadhyay, “A novel approach for providing cost-effective
[3] D. Han and J. Lim, “Smart home energy management system using wireless internet access in small-sized university campuses of
IEEE 802.15.4 and zigbee,” IEEE Trans. Consum. Electron., vol. 56, no. developing countries,” in 2017 International Conference on
3, pp. 1403–1410, Aug. 2010. Communication and Signal Processing (ICCSP), 2017, pp. 0514–0518.
[4] J. R. Rosslin and K. Tai-hoon, “Applications, Systems and Methods in [24] J. C. A, R. Nagarajan, K. Satheeshkumar, N. Ajithkumar, P. A.
Smart Home Technology : A Review,” Int. J. Adv. Sci. Technol., vol. Gopinath, and S. Ranjithkumar, “Intelligent Smart Home Automation
15, pp. 37–48, 2010. and Security System Using Arduino and Wi-fi,” Int. J. Eng. Comput.
[5] S. I. Azid and S. Kumar, “Analysis and Performance of a Low Cost Sci.,Mar.2017.
SMS Based Home Security System,” vol. 5, no. 3, pp. 15–24, 2011.

Potrebbero piacerti anche