0 Bewertungen0% fanden dieses Dokument nützlich (0 Abstimmungen)
16 Ansichten28 Seiten
this presentation is on the topic improving smart home security using logical sensing device,and it includes use of new sensing devices for improving smart home security.
this presentation is on the topic improving smart home security using logical sensing device,and it includes use of new sensing devices for improving smart home security.
this presentation is on the topic improving smart home security using logical sensing device,and it includes use of new sensing devices for improving smart home security.
S7 EEE Roll no:11 CONTENTS Introduction Objective of the work Components used Method Primary access points Secondary access point Hardware setup Sensors used Impementation Advantages Disadvantages Conclusion Reference INTRODUCTION Researchers have been experimenting and improving the concept of smart home since the late 1970s. In the past, an average home had to deal with common slash and grab criminals, while a modern home has to deal with sophisticated and tech savvy attackers . Popular communication technologies like ZigBee and Raspberry Pi are used here. In modern home automation system, the system should be such that one is capable of identifying,alerting and preventing intrusion attemps in a home . Objectives of the work Distinguish between primary and secondary access points.
Understand user behaviour after change in state of an
access point.
Identify and isolate attack behaviour.
COMPONENTS USED The experiment is conducted by using a combination of: Motion sensor Microcontrollers ZigBee communication Proximity sensor Arduino Uno board What is ZIGBEE? ZigBee is an IEEE 802.15.4 based specification used to create personel area networks with small,low power digital radios,such as for home automation,medical device data collection. Applications includes: wireless light switches home energy monitor traffic management systems. METHOD Here various access points are used to identify improbable scenarios within a smart home during its operation. In a typical home these natural access points are front door,back door,balcony doors and windows. Eventhough window is not a normal access point it need to be considered because intruders mostly prefer these areas for entering the home. Based on the purpose of the access points,we classifies access points into primary and secondary. Contd.. Primary access points are categorized as front door,back door etc. Secondary access points are categorized as window balcony etc. PRIMARY ACCESS POINT Front door is the primary access point to any home,inhabitants use this door as the main way in and out of the home. When a user leaves an occupied home,the motion and proximity sensors placed near these access points inside the home are triggered before the door is opened. Once the user stepped out and closes the door the motion and proximity sensors will not be triggered. When someone enters an empty home,they are entering from outside so,the motion and proximity sensors will not be triggered before the door is opened. Contd... Once the user enters the home and door is closed,the motion and proximity sensor will be triggered. Motion and proximity sensors are srategically placed so that,they will be only triggered by someone from inside the home and not simply opening and closing of door. How the algorithm work? Once the door state is changed the algorithm considers number of proximity and sensor values before door state is changed to know the door was opened from inside. After the initial state change the algorithm keeps observing the door for a specific interval of time called door observation time.The algorithm observes the motion and proximity sensor values during door observation time to identify user action at access points. Various actions at access points After opening the door,the user can either: Leave the door opened and come back in the house by triggering the sensors after opening. Leave the door open and step outside the home without triggering the motion and proximity sensors after opening the door. Close the door from inside within the door observation time and come back in,triggering the sensors after door is closed. User closes an open door from inside and comes back into home.The sensors are triggered before and after the door is closed. User closes an open door coming from inside and steps out of the home leaving the home empty. SECONDARY ACCESS POINT The balcony and windows form the secondary access points in a home. In a typical home,the balcony door is not the main access point to and from home.When the home becomes empty an observant and proficient intruder can use this door to access the home. When the home is empty the balcony door should not be opened at any circumstances. So if any opening in the balcony door in an empty home,the system triggers intrusion defence mechanism without waiting for any identity verification. Windows are opened from inside under normal circumstances. So,the sensors are placed near the window inside the home so the sensors are triggered when window is opened from inside. The sensors should be strategically deployed so that the window cannot be opened from inside without triggering them. Similar to balcony,when the home is empty and the window is opened the system triggers the intrusion defence mechanism without waiting for identity confirmation. FLOW CHART HARDWARE SETUP At the access point Arduino Uno microcontroller with Atmega 328P IC is used to gather data. Arduino Uno module has: 14 digital input/output pins 6 analog inputs A USB connector port A 16MHz resonator A power jack Reset button. Contd.. Arduino is flexible and offers veriety of digital analog pins. It can run in standalone mode or as an interface connected to PC. It is cost effective. Each microcontroller is connected to a PC using USB and programmed using Arduino Interactive Development Environment. SENSORS USED A micro contact/limit switch is used at the doors and windows to sense the state of doors and windows. Motion sensor:Adjustable Passive Infrared(PIR)sensors. Proximity sensor:HC-SR04 ultra sonic range sensors. Every living thing with temperature above absolute zero emits heat energy in the form of radiation which are detected by the PIR sensors. The proposed system is implemented using ZigBee technology. It allows large scale network cofigurations and utilizes low power radio with a data rate capability of 250kb/s. These features make ZigBee the ideal communication technology in smart home networks. IMPLEMENTATION Arrangement of sensors,board and microcontroller deployement at Primary Access Point Arrangement of sensors,board and microcontrollers at Secondary Access Point ADVANTAGES The system observes primary and secondary access points to identify and detect intrusion without causing inconvenience to the user. Offers implementation ease and flexibility. The system requires minimum user input to identify whether the home is occupied or not. The access data is stored in database on Raspberry Pi which is more secure. The stored data is never shared & it can be encrypted to further improve security. DISADVANTAGES When the home is occupied by the guest,the system asks for user verification. This affects the aesthetic view of the building. Since it sense motion and temperature,it may vary according to the mind of user. CONCLUSION The paper detects the user actions at primary and secondary access points in a home using different sensors.These detected user actions are compared with normal behaviour of the user at various access points to identify intrusions or intrusion attempts.In addition to identifying intrusions in home,the algorithm also warns the user about security vulnerabilities by identifying the status of various access points,user positions and behaviours. REFERENCES C. Suh and Y.-B. Ko, “Design and implementation of intelligent home control systems based on active sensor networks,” IEEE Transactions on Consumer Electronics, vol. 54, no. 3, pp. 1177–1184, 2008. B. Fouladi, S. Ghanoun, “Security Evaluation of the Z- Wave Wireless Protocol,” Black hat USA, Aug. 2013. Wenye Wang, Zhuo Lu, “Cyber security in the Smart Grid: Survey and challenges,” Computer Networks, Volume 57, Issue 5, Pages 1344-1371, April 2013. THANKYOU