Remote Security Surveillance by IoT Based Robot

نویسنده

  • N Sravya Sruthi
چکیده

This paper presents the control of terrorist attack throughout the world by monitoring and controlling of mobile robot via internet through Raspberry pi board. The monitoring and controlling of robotic movements through wireless network by using a web browser and accessing a webpage through an IP address. A camera is mounted on the robot to get better visibility of the objects. The programming language of the robot is based on the LINUX platform which will be interfaced with Raspberry Pi board. The PIR sensor detects a person or an object enters into a surveillance area and the smoke sensor detects the fire accidents by sensing the smoke level increase in the atmosphere. Proximity sensor is used to detect the metal. The output of the sensors can be indicated via alarm and message through GSM to the user. This mobile robot can be operated from everywhere in the world by using internet of things (IOT). Index Terms – Raspberry pi 3, Sensors, Python, HTML, PHP.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Service-Oriented Security Framework for Remote Medical Services in the Internet of Things Environment

OBJECTIVES Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech informa...

متن کامل

Security Threats on National Defense ICT based on IoT

In this paper, we drew new security threats on IoT (Internet of Thing) based modern battlefield (Network centric battlefield). DoD is focusing its attention on the development of unmanned combat systems to prepare for future war. The IoT technology provides networking service to connect each other unmanned combat system. IoT has the security vulnerabilities of each element of the technology its...

متن کامل

Home appliances energy management based on the IoT system

The idea of the Internet of Things (IoT) has turned out to be increasingly prominent in the cuttingedge period of innovation than at any other time. From little family unit gadgets to extensive modernmachines, the vision of IoT has made it conceivable to interface the gadgets with the physical worldaround them. This expanding prominence has likewise made the IoT gadgets and ap...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017