An IoT Based Smart Home Security and Home Automation System
An IoT Based Smart Home Security and Home Automation System
Volume 4 Issue 2, February 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD29990 | Volume – 4 | Issue – 2 | January-February 2020 Page 294
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
The minimum requirements takes care of both home 6.2. DIY home security system:
security as well as home automation at low cost system. Do-it-yourself security system setups are ideal for budget
Accessing information is easy, we can control a device shoppers ,this can save bundle on installation charges.
that is miles apart in real time.
Automation is the need of the hour; IoT reduces human 6.3. Smart lock:
intervention and increases efficiency of services. Models to choose from, including keyless no-touch locks,
Easy of installation and the system is designed in user- touch-screen locks, touchpad locks and locks that you can
friendly interface. open using a biometric fingerprint reader. There are plenty
of It can be opened and closed using a mobile app and will
Better scalability and flexibility.
send notification when someone unlocks and locks a doors.
It can also improve safety and remove risk of human Features to looks for include geofencing, which uses your
error. phone’s location services to lock and unlock the doors , voice
The main advantages is to help for physically challenged activation using Google assistant, Amazon Alexa voice
and disabled people. commands ,supports for IFTTT, and also integration with
Easy management of large data. some smart home devices such as outdoors cameras, smoke
alarms video doorbells, connected lighting etc.,
4. DISADVANTAGES:
Lack of implementation. 6.4. Home automation systems can be split into two
System crashes due to any damage in the inter main categories:
connection. Locally controlled or remotely controlled system. Locally
Automated systems can show lack of empathy with controlled systems utilize an in-premises controller to carry
events. out an automation process. Remotely controlled automation
systems use an Internet connection to offer users a full
Hindering from governments.
control from their personal computer or mobile device (from
Equipment and installation cost. MCC/MCR/PCR).
There is a huge risk of leakage of confidential data, when
sent over a network.
5. APPLICATION OF IOT:
Environmental monitoring
Wearables
Medical and healthcare system
Connected car
Smart farming
Smart shopping
Media
Connected homes and buildings
Remote controlling automation system
Transportation
Camera 7. RISK AND MITIGATION APPROACHES IN ACTION:
A typical IoT-based smart home environment includes a
The Internet of Things (IoT) is an emerging paradigm due to wide variety of devices, services, and vendors. IoT based
extensive developments in information and communication smart home architecture is divided into three layers; device
technology (ICT). or perception layer, network layer, and applications layer
Smart home devices and their suppliers can be divided into
six categories, namely, electrical power distributions, smart
home controllers, building applications, home appliances,
communication devices, and IT and telecom providers. This
section maps some of the identified risks and mitigation
approaches to a typical smart home environment.
8. FUTURE SCOPE:
This project can be further developed by integrating it with
the internet to monitor your home while siting in a remote
area. By doing this, one can keep an eye on her or his home
through an internet connected to user’s PC or mobile phone
or laptop. It receive the system status and information via
SMS. .Further the system may be made more synchronised
by integrating the voice call feature within the same smart
phone application through which the user can even control
6. TECHNOLOGIES: his home appliances without any voice call being triggered to
6.1. Home robots and security: his phone. The developed system can also be used to in
Due to technology development, robotic vacuum cleaners industrial and commercial applications such as offices,
and floor washing robots that clean floors with sweeping and warehouses and other areas where some areas are reserved
wet mopping functions. for authorized personnel only or other places where safety
@ IJTSRD | Unique Paper ID – IJTSRD29990 | Volume – 4 | Issue – 2 | January-February 2020 Page 295
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
and precautions are of primary concerns such as internet 10. RREFERENCE LINKS:
server room of a big MNC from where corporate data can be [1] https://www.researchgate.net/publication/31255942
stolen. The system can also be easily upgraded to add extra 1_IoT_based_smart_security_and_home_automation_sy
safety. stem
[2] https://smartify.in/knowledgebase/iot-based-home-
9. CONCLUSION:
automation-system/
The home automation system has been experimentally
proved to work satisfactorily by connecting sample [3] https://www.slideshare.net/shohin/iot-home-
appliances to it and the appliances were successfully automation-using-arduino-cayenne
controlled from a wireless mobile device .Home security is
[4] https://www.scribd.com/document/383625534/IoT-
rapidly growing field and there are news and improved
Based-Smart-Security-and-Home-Automation-System
burglar alarms popping up every day. People can control
their electrical devices through set up controlling actions [5] https://www.semanticscholar.org/paper/IoT-based-
through mobile. Finally we come to a conclusion that before smart-security-and-home-automation-system-Kodali-
making the decision of installing home security system we Jain/381344084f632fd0006bbd0b560a65e674f18f34
must gather complete knowledge about the security system.
[6] https://en.wikipedia.org/wiki/Electronic_component
@ IJTSRD | Unique Paper ID – IJTSRD29990 | Volume – 4 | Issue – 2 | January-February 2020 Page 296