Download as pdf or txt
Download as pdf or txt
You are on page 1of 32

SMART HOME SECURITY

SYSTEM

SUBMITTED BY :

MALAY PRAJAPATI VAD2017B.TECH –CSE4F003


PARTH NATH VAD2017B.TECH -CSE4F005
JAGRUTI SINDHA VAD2017B.TECH -CSE4F013
ANPURNA SAHAY VAD2017B.TECH -CSE4F017

SUPERVISED BY :

Mrs.MONIKA MAKWANA & Mrs. SWATI SAXENA


Assistant Professor
Computer Science & Engineering
Department ITM Vocational University,
Vadodara

A Project Report Submitted to


ITM Vocational University in Partial Fulfillment of the Requirements
for the Degree of Bachelor of Technology in
Computer Science & Engineering Department.

MAY 2021

Computer Science & Engineering Department,


ITM Vocational University,
At & PO – Raval –
Waghodia, Ajwa Nimeta
Road,
Dist. Vadodara – 391760
Telephone No. 2668-
292840

1
DECLARATION
Project Title: Smart Home Security System

Degree for which the Project Report is submitted: B.Tech

I give undertaking that this project report contains my own ideas and work in my own
words. I have adequately cited and listed other’s ideas or words in the reference
materials. All the parts of the report are prepared without any plagiarism. I have
adhered to all principles of academic honesty and integrity. No falsified or fabricated
data have been presented in the thesis. I understand that any violation of the above
will cause for disciplinary action by the Institute, including revoking the conferred
degree, if conferred, and can also evoke penal action from the sources which have not
been properly cited or from whom proper permission has not been taken.

Date: --/--/----

MALAY PRAJAPATI
VAD2017B.TECH-CSE4F003

PARTH NATH
VAD2017B.TECH-CSE4F005

JAGRUTI SINDHA
VAD2017B.TECH-CSE4F013

ANPURNA SAHAY
VAD2017B.TECH-CSE4F017

B.TECH-CSE 2
ITMVU
CERTIFICATE

It is certified that the work contained in this project report entitled ‘Smart Home
Security System submitted by Malay Prajapati (VAD2017B.TECH-CSE4F003),
Jagruti Sindha (VAD2017B.TECH-CSE4F013), Anpurna Sahay
(VAD2017B.TECH-CSE4F017), Parth Nath (VAD2017B.TECH-CSE4F005)
studying at ITM Vocational University for the award of B.Tech (Computer Science &
Engineering) is absolutely based on his/her own work carried out under my/our
supervision and that this work has not been submitted elsewhere for any
degree/diploma.

Mrs SWATI SAXENA

Guide

Assistant Professor

Computer Science and Engineering,

ITM Vocational University

Head of Department Head of Institute

Mrs Monika Sandhane Dr. Devang Shah

Computer Science & Engineering Faculty of Engineering & Technology

ITM Vocational University ITM Vocational University

B.TECH-CSE 3
ITMVU
COMPLIANCE CERTIFICATE

This is to certify that research work embodied in this project report entitled “Smart
Home Security System” was carried out by Mr./Ms. Malay Prajapati
(VAD2017B.TECH-CSE4F003), Jagruti Sindha (VAD2017B.TECH-CSE4F013),
Anpurna Sahay (VAD2017B.TECH-CSE4F017), Parth Nath
(VAD2017B.TECH-CSE4F005) at ITM Vocational University for partial fulfillment
of B.Tech degree to be awarded by ITM Vocational University. He/ She has complied
the comments of the PROJECT –I, PROJECT – II, PROJECT – III, PROJECT – IV
and PROJECT – V with my/our satisfaction.

Date: Mrs. Swati Saxena


Place: Assistant Professor,
Computer Science & Engineering
Department
ITM Vocational University,
Vadodara.

MALAY PRAJAPATI
VAD2017B.TECH-CSE4F003

PARTH NATH
VAD2017B.TECH-CSE4F005

JAGRUTI SINDHA
VAD2017B.TECH-CSE4F013

ANPURNA SAHAY
VAD2017B.TECH-CSE4F017

B.TECH-CSE 4
ITMVU
PROJECT APPROVAL CERTIFICATE

This is to certify that Project work embodied in this project report entitled “Smart
Home Security System“ carried out by Mr./Ms. Malay Prajapati
(VAD2017B.TECH-CSE4F003), Jagruti Sindha ( VAD2017B.TECH-CSE4F013),
Anpurna Sahay (VAD2017B.TECH-CSE4F017), Parth Nath
(VAD2017B.TECH-CSE4F005) at Faculty of Engineering & Technology is
approved for the degree of Bachelor of Technology in Computer Science and
Engineering by ITM Vocational University, Vadodara .

Date:
Place:

Examiners’ Sign and Name:

1)

2)

B.TECH-CSE 5
ITMVU
ACKNOWLEDGEMENT

We Four students(Malay Prajapati, Anpurna Sahay, Jagruti Sindha, Parth Nath) of


B.Tech - Computer Science & Engineering, ITM Vocational University prepared a
project named “Smart Home Security System”. We whole heartedly express our
sincere gratitude to Mrs. Monika sandhane & Mrs. Swati Saxena for guiding us
throughout our project.

Date :

Place :

B.TECH-CSE 6
ITMVU
ABSTRACT

People are facing some sort of problems related to the security system which is used
in their houses, offices or shops. Because sometimes security system including CCTV
fails to do their job. So we are looking for the development of security system which
is smart and helps the owner to keep his house, offices or shop secure. This advance
security system will be using controller like Raspberry pi to control the system along
with IOT device to connect and get response from the user. The rapid technological
growth of IOT raises abundant challenges such as how to provide home users with
safe and secure services keeping privacy in the account and how to manage the smart
home successfully under controlled conditions to avoid any further secrecy or theft of
personal data.

Keyword:

Raspberry pi, Pi-camera, motion sensor (PIR sensor), magnetic sensor, ultrasonic
sensor, alarm or buzzer.

Database: Firebase (Real-time database)

Programming language: Python (OpenCV), Java, XML

B.TECH-CSE 7
ITMVU
TABLE OF CONTENTS
Sr. Page
Content
No. Number

1. Cover Page 1

Declaration, Certificate, Compliance , Project Approval


2. 2
certificates..

3. Acknowledgement 6

4. Abstract 7

5. Table of Contents 8

6. List of Abbreviations 9

7. List of Figures 10

8. Chapter 1: Introduction 11

9. Chapter 2: Aim and Objectives of the study 13

10. Chapter 3: Review of Literature 16

11. Chapter 4: Methodology: Materials and Methods 19

12. Chapter 5: Observations, results and Discussion 25


13. Chapter 6: Conclusions & Summary 27
14. References 28
15. Project Review Card 29

B.TECH-CSE 8
ITMVU
List of Abbreviations

1. CCTV Closed-Circuit Television

2. IoT Internet of Things

3 PIR Passive Infrared Sensor

4 OpenCV Open Source Computer Vision Library

5 API Application Programming Interface

6 MIPI Mobile Industry Processor Interface

7 LED Light Emitting Diode

8 CPU Central Processing Unit

9 GPU Graphics Processing Unit

10 USB Universal Serial Bus

11 I/O Input/Output

12 WiFi Wireless Fidelity

13 IR Infrared

14 OLED Organic Light-Emitting Diode

15 iOS iPhone Operating System

B.TECH-CSE 9
ITMVU
List of Figures

1 Smart Home Security System

2 Evolution of Smart Home

3
Smart homes installed a base of connected devices within smart cities
from 2015 to 2018 (in millions)

4 Raspberry Pi 3b+

5 PIR Sensor

6 Ultrasonic Sensor

7 Door Sensor

8 Buzzer

9 Pi Camera

10 LED

11 Firebase

12 Python

13 OpenCV

14 Android Studio

15 Smart Home Security System Model

16 God’s Eye Application

B.TECH-CSE 10
ITMVU
CHAPTER-1 INTRODUCTION

Homes of the 21st century are more self-controlled and automated and will also become
more automated. A home security system means securing the home in all possible
conditions and monitoring the home whenever it is required. Many existing, well
established home surveillance systems are based on wired communications. This doesn’t
cause any problem or trouble unless and until the system is planned well advance and
installed during the physical construction of the building. But for already existing
buildings the implementation goes very high and it creates a very great havoc.
In contrast, wireless systems will be a great help for automation and security systems. So
using the concept of the internet of things and more smart way of communications this
smart home security system is to be developed and maintained. It could make the work of
the user simpler and easier and even the cost of this whole implementation would not be
much expensive. Also, user will be able to monitor all the installed devices wirelessly and
communicate with it in a smarter way. It also reduces the installation and maintenance cost
and this system is more user friendly with the user and secure their home in more secure
way. The basic principles on which a smart home security system stands fruitful
mentioned in Fig. 1. With the advent of Internet of Things (IOT) it hopes to connect all
things those have their certain unique identities with self configuring capabilities to
communicate data associated with users and their environment and to take actions based
on their operating conditions. It is not just connecting things, devices, appliances &
machines to internet but to allow these things to execute while achieving common user
and machine goal for communicating and exchanging data with surroundings and from
machine to corresponding environment, machine to machine, machine to human & human
to machine. In recent years, the home environment has seen majority of digital
technologies with rapid introduction of need of safety and preventive measures for
guarding the critical situations which may otherwise leads to destruction of property,
human lives, assets etc.

Fig:1 Smart home security system

B.TECH-CSE 11
ITMVU
1.1 Benefits of Home Security System with IOT:

In recent years providing security to home is getting more and more common. Also in
home and building automation systems, the use of internet of things gives several
advantages that could not be achieved in wired form of security. These are the few
advantages of home security system over internet of things.

• Reduced cost in installation: This the first major advantage cost of the installation is
completely reduced because no cabling is necessary. Wired type of security systems
requires cabling, where material as well as the professional laying of cables (e.g.: into the
walls) are expensive.

• Easy coverage, deployment and installation: [1]Wireless nodes can be mounted


anywhere and it makes the work easier to mount at remote places, but cabling may not be
feasible at all e.g.: Connection inside the home network is accomplished instantly by
simply mounting nodes in the areas wherever it is necessary. Hence, wireless technology
makes user to install and monitor easily.

• System scalability and easy extension: [1]Deploying a wireless network is more


advantageous because it could be easily replaced by latest upgrades or software changes in
case if required. In contrast the wired installations, makes cabling extension more tedious.
This makes use of IoT in home surveillance system makes seminal investment.

• Integration of mobile devices: [1]Usage of internet of things makes use of the product
in a much smarter way than compared to wired form of implementation. For all the above
reasons, use of IoT in security systems is not only an attractive choice in renovation and
refurbishment but also for new installations.

B.TECH-CSE 12
ITMVU
CHAPTER-2 AIM & OBJECTIVE OF THE STUDY

As per the projections made by CISCO / ERICSSON / ITU, there may be around 50
billion connected devices globally by 2020 . As per another study by CISCO in 2015,
share of computers (including PCs, tablets, and smartphones) will be around 17
percent of all Internet connections; the other 83 percent will result from devices to be
used in various verticals of the IoT domain [3]. India is expected to have around 2.6
billion connected devices by 2020. The home automation market in India is expected
to reach INR 8800 Crores(US $ 1.3 B) by 2017 and is growing at a rate of 30%
CAGR (Source: RedSeer consulting). By 2022, a typical family home will contain
500 smart devices (Source: Gartner) [Technical report on IoT enablement in smart
homes].

The idea of Smart Home originated long back before the advent of IoT. The world has
seen a tremendous change due to the invention of various devices to automate
household activities during 1901-1920. Among the few inventions of the early
twentieth century were the first engine powered vacuum cleaner in 1901 followed by
the first generation of refrigerators, washing machines etc. In 1966, ECHO IV
(Westinghouse) was the first smart device invented but was not sold in the
commercial market. The device helped in automation of home appliances, controlling
the room temperature and also assisted in preparing shopping lists. This was followed
by the invention of the H316 Kitchen computer by Honeywell Corporation that could
store recipes but was not commercially available. X10, the first commercial home
automation technology was developed in the year 1975 and it used electrical power
transmission wire lines for signaling and communication. Bill Gates smart home
which was built in 1995 attracted many people because of its features like temperature
control, heated floors, customized preference for room lighting and climate control,
monitoring his favorite Maple tree with sensors and computer to provide watering and
better gardening. The major trend has started from 1990 where home automation was
the basic functionality. With the growth of smart-phones and other smart devices, the
smart home penetration has increased in the world. The remote control is now
embedded in smart phones in form of application to control [Technical report on IoT
enablement in smart homes] .

Smart Homes are the integral part of Smart Cities. Connected things relevant to Smart
Homes are forecasted to grow from 294 million to more than 1 billion; more than
tripling in just three years, as shown in Table 1.

B.TECH-CSE 13
ITMVU
Smart things inside the Smart Home are representing the biggest portion of the
connected devices as per this report.

Fig:2 Evolution of Smart Homes

Smart homes and smart commercial buildings represented 45 percent of total


connected things in use in 2015. Due to investment and service opportunity, Gartner
estimates that this will rise to 81 percent by 2020. Homes will move from being
interconnected to becoming information- and smart-enabled, with an integrated
services environment that not only provides value to the home, but also creates
individual driven ambience. The home will become the personal space that provides
assistance or personal concierge experiences to the individual as per Gartner report .

B.TECH-CSE 14
ITMVU
The growth of installed connected devices in smart homes within smart cities from
2015 to 2018 is shown in Figure 7. As per the Technical report on IoT enablement in
smart homes.

Fig:3 Smart homes installed a base of connected devices within smart cities from
2015 to 2018 (in millions).

Hence the Aim & Objective is to build up a Justified & Modified Smart Home
Security System.

B.TECH-CSE 15
ITMVU
CHAPTER-3 REVIEW OF LITERATURE

● Review paper: A Novel Approach for Home surveillance System using IOT
adaptive security[1] & Author: G Thippa Reddy et al concludes that In rural and
urban areas of all over the world, providing security and safety is primary need for the
urban population. There exist many Home security system have some defects such as
delay of receiving messages, wiring problems, etc. To solve this issue, IoT based
scheme is proposed to improve security of home. To prevent the Burglary of home, it
is done using IoT by connecting sensors which are successfully controlled remotely
through internet. This solution includes an efficient feature that is trimming the video
for every one minute and uploading it into Dropbox. So, it is used to detect the burglar
and it will help the user to analyse the condition of home and secure the home at
anytime and anywhere.

● Review paper : A review on smart home present state & challenges[2] & Author:
NOOR ZAMAN et al concludes that The smart home is one of the main research areas
in IoT. It widens its benefits and services to the community as well as an environment
that is why it is grabbing the great attention of the users and researchers. The context-
aware approach is the key to develop an effective IoT-based smart home. It allows
storing and using context information linked to the sensory data, which helps by
providing relevant and smarter services\data depending on the users’ requested tasks.
This review paper presents (1) a set of frameworks and research projects proposed for
the abundant challenges that are raised in the smart home environment, (2) provides the
readers with great understanding of current research challenges linked with privacy,
context-aware and security of IoT, (3) suggested appropriate solutions for them, (4)
focused on possible set of open issues need to be addressed. This research review will
help researchers to understand and develop effective smart homes solutions by
providing most related information at one place.

● Review paper : Home security system using internet of things[3] & The Author:
ANITHA A concludes that IOT is used to connect no. of physical devices together.
One of the main application for IOT can be home security, we can create a security
system for home or office place. It will be easy to set up, low costing and with low
maintenance. This system uses no. of hardware equipments such as microcontroller
arduino uno, ESP8266 wifi module, reed sensor. This system also consist of mobile
application support like Blynk server app. This app provides interface between the
hardware and the user. By the help of this app we can get notification on mobile phones
whenever there is unwanted trespassing in our area. As a result this system can be used
in home or industrial uses.

B.TECH-CSE 16
ITMVU
● Review paper: Security System using Arduino Microcontroller[4] & The Author:
Priya H Pandey et al concludes that now a days, security is been considered as the
main issue everywhere. Each and every body wants a better or we can say full proof
security system for home and commercial purposes. This paper give us some sort of
solution for this type of issue. In this paper, they have use arduino as controller for the
system, magnetic sensor for detecting unwanted entry through windows, PIR sensor for
detecting heat emitted by human body and LM35(temperature sensor) for preventing
fire accident in absence of the owner. This paper advices that more the sensor more the
security.

● Review paper: The effectiveness of burglary security devices[5] & The Author:
Louise Grove et al concludes that the study measures the effectiveness of anti-
burglary security devices, both individually and in combination. Data for 2008–2012
from the Crime Survey of England andWales are analysed via the Security Impact
Assessment Tool to estimate Security Protection Factors (SPFs). SPFs indicate the level
of security conferred relative to the absence of security devices. It finds that, for
individual devices, external lights and door double locks or deadlocks, are most
effective but, counter-intuitively, burglar alarms and dummy alarms confer less
protection than no security. Combinations of devices generate positive interaction
effects that increase protection more than additively. In particular, combinations with
door and window locks plus external lights or security chains confer at least 20 times
greater protection against burglary with entry than no security. Although further
research is needed, the findings are consistent with improved security playing an
important role in long-term declines in burglary rates.

● Review paper: An investigative study for smart home security issues, challenges &
counter measures[6] & Author: SUDHIR CHITNIS et al concludes that, now a days,
Home security is must for everyone because burglary of home crimes are at its peak
and for us it is difficult to constantly monitor the home. servant. For resident’s safety
and convenience, Home security system i.e. HomeOS is used and easily implemented
by turning your home into a smart home by intelligent remote monitoring. We suggest
home automation system as the most important parts of home security and develop
advanced sensing technology to identify and protect the homes from burglary.

● Review paper:IOT privacy & security challenges for smart home environment[7]
& The Author: HUICHEN LIN et al concludes that Often the Internet of Things is
considered as a single problem domain, with proposed solutions intended to be applied
across a wide range of applications. In domestic environments, human issues may be as

B.TECH-CSE 17
ITMVU
important as technical issues. A gateway architecture is selected as the most appropriate
for resource-constrained devices, and for high system availability. Two key
technologies to assist system auto-management are identified. Firstly, support for
system auto-configuration will enhance system security. Secondly, the automatic update
of system software and firmware is needed to maintain ongoing secure system
operation. Internet of Things is not a single application domain, and the security
approaches used in a domestic Smart Home application are quite different to those that
can be afforded by mission-critical applications in industry or utilities. This makes
effective-security policies and mechanisms much more difficult to develop, implement,
enforce and maintain, unless this can be done automatically. A Smart Home gateway
architecture supported by web-services for automatic device and network configuration
and automatic system updates is our preferred approach for solving these problems.

B.TECH-CSE 18
ITMVU
CHAPTER-4 METHODOLOGY : MATERIALS &
METHODS

MATERIALS / TECHNOLOGY:

● Raspberry Pi 3b+
● Sensors
1. PIR
2. Ultrasonic
3. Magnetic sensor/ door sensor
● Buzzer
● Pi camera V1.0
● LED
● Twilio API
● FireBase
● Python
● Android Studio
● OpenCV

❖ Raspberry Pi 3b+ :

fig.4 : Raspberry Pi 3b+

It is an advanced version of Raspberry Pi 3 B model that was introduced in


2016. It is a tiny computer board that comes with CPU, GPU, USB ports, I/O
functions like a regular computer.

B.TECH-CSE 19
ITMVU
❖ PIR:

fig.5 : PIR Sensor

PIR sensors allow you to sense motion, almost always used to detect whether a human
has moved in or out of the sensors range. They are small, inexpensive, low-power,
easy to use and don't wear out. For that reason they are commonly found in appliances
and gadgets used in homes or businesses. They are often referred to as PIR, "Passive
Infrared", "Pyroelectric", or "IR motion" sensors.

❖ Ultrasonic Sensor:

fig.6: Ultrasonic Sensor

Ultrasonic transducers and ultrasonic sensors are devices that generate or sense
ultrasound energy. They can be divided into three broad categories: transmitters,
receivers and transceivers. Transmitters convert electrical signals into ultrasound,
receivers convert ultrasound into electrical signals, and transceivers can both transmit
and receive ultrasound.

❖ Door Sensor:

fig.7 Door Sensor


Door sensors are an essential component of your home security system: they let you
know when someone is entering your home. ... When someone opens the door, the

B.TECH-CSE 20
ITMVU
two parts separate and break the circuit, which triggers the control panel to sound an
alarm.

❖ BUZZER:

fig.8 Buzzer

A buzzer or beeper is an audio signalling device,which may be mechanical,


electromechanical, or piezoelectric (piezo for short). Typical uses of buzzers and
beepers include alarm devices, timers, and confirmation of user input such as a mouse
click or keystroke.

❖ Pi Camera V1.0 :

fig.9 Pi camera V1.0

The Pi camera module is a portable light weight camera that supports Raspberry Pi. It
communicates with Pi using the MIPI camera serial interface protocol. It is normally
used in image processing, machine learning or in surveillance projects

❖ LED :

fig.10 LED

A light-emitting diode (LED) is a semiconductor device that emits light when an


electric current is passed through it. Light is produced when the particles that carry
the current (known as electrons and holes) combine together within the semiconductor
material.
Since light is generated within the solid semiconductor material, LEDs are described
as solid-state devices. The term solid-state lighting, which also encompasses organic

B.TECH-CSE 21
ITMVU
LEDs (OLEDs), distinguishes this lighting technology from other sources that use
heated filaments (incandescent and tungsten halogen lamps) or gas discharge
(fluorescent lamps).

❖ Twilio API:

Twilio’s APIs (Application Programming Interfaces) power its platform for


communications. Behind these APIs is a software layer connecting and optimizing
communications networks around the world to allow your users to call and message
anyone, globally.

❖ Firebase:

fig.11 Firebase

Firebase's first product was the Firebase Realtime Database, an API that synchronizes
application data across iOS, Android, and Web devices, and stores it on Firebase's
cloud. The product assists software developers in building real-time, collaborative
applications.

❖ Python:

fig.12 Python

Python is an interpreted high-level general-purpose programming language. Python's


design philosophy emphasizes code readability with its notable use of significant
indentation

B.TECH-CSE 22
ITMVU
❖ OpenCV:

fig.13 OpenCV

OpenCV is a library of programming functions mainly aimed at real-time computer


vision. Originally developed by Intel, it was later supported by Willow Garage then
Itseez. The library is cross-platform and free for use under the open-source Apache 2
License.

❖ Android Studio:

fig.14 Android Studio 4.1

Android Studio is the official integrated development environment for Google's


Android operating system, built on JetBrains' IntelliJ IDEA software and designed
specifically for Android development.

Methodology:

We have Security system with user friendly app, specially designed and developed for
the home security system.
Firstly , when home security system starts , by default the state is deactivated .
The state can be altered using the power button present in application.
As soon as the power button is altered the security system gets activated .

B.TECH-CSE 23
ITMVU
If someone tries to enter into the house then motion & ultrasonic sensor detects it and
pi camera starts capturing the video.
However it’s not just an ordinary video recording ,as the system also includes face
recognition as one of its major feature.
Also a text messaging feature has been included where we have used Twilio API to
send message on user registered mobile number whenever an intruder enters to the
house.
The recordings are further stored and can be accessed via the mobile application in
order to cross check.
If in case user thinks that there’s a requirement of buzzer just because the person
trying to enter the house is an intruder then the user can access the buzzer manually
using application.

What if the user miss the message in any way and the intruder tries to enter into
the house ???

Then, a special and new feature comes into play i.e as soon as the intruder tries
to enter the house then, the door sensor gets activated and the user get an alert
call regarding the same and buzzer gets activated automatically without user’s
permission and it remains activated till the user deactivates it manually using the
application...

B.TECH-CSE 24
ITMVU
CHAPTER-5 RESULT AND DISCUSSION

In most of previous systems those are developed earlier are affected by breach of
security and power failure as earlier traditional locks were used to guard the home.
Somewhere there are chances for key loss. Due to this short come full system break
down. The main objective of this system is to make our home security more efficient
and more reliable. It is low cost, low power consumption, with battery backup. This
system works in those conditions also when in case security breached, so in response
alert notification send and alarm raised.[2]

There’s a need to develop a HOME SECURITY SYSTEM including the concept of


IOT. In order to provide an advance version of home security system to society

fig.15 Smart Home Security System Model

B.TECH-CSE 25
ITMVU
fig.16 God’s Eye Application

B.TECH-CSE 26
ITMVU
CHAPTER-6 CONCLUSION

There is an enormous necessity of execution of inviolable permanent security system to


safeguard lives and properties from intruder. In the proposed work intruder detection
system using different sensor and camera has explained. The proposed system cares most
of the primary initiative to detect the intruder and make sure of all essential activities. This
kind of system is essential from the viewpoint of home welfare, shops, offices.
Government should impose rule that inviolable permanent security system must be
implemented.

B.TECH-CSE 27
ITMVU
REFERENCES
Research paper names:

● A Novel Approach for Home surveillance System using IOT adaptive


security.(International conference on sustainable computing in science, technology
& management (suscom-2019))
● A review on smart home present state & challenges: linked to context-awareness
IoT,2018.
● Home security system using Internet of things.(IOP publishing, 14th ICSET-2017)
● Security System using Arduino Microcontroller.(IARJSET Jawaharlal Darda
Institute of Engineering & Technology,jan-2017)
● The effectiveness of burglary security devices.
● An investigative study for smart home security issues, challenges & counter
measures.(25-april-2016)
● IOT privacy & security challenges for smart home environment.(1-july-2016)

B.TECH-CSE 28
ITMVU
Bachelor of Technology

(Project Review Card)

Name of Student: ANPURNA SAHAY

Roll No. : VAD2017B.TECH-CSE4F017

Student’s Mail ID:- [email protected]

Student’s Contact No. : 8228084826

College Name: ITMVU


College Code: Branch Code:

Branch Name: COMPUTER SCIENCE & ENGINEERING

Broad area of Title: IOT BASED SECURITY SYSTEM

Title of Project: SMART HOME SECURITY SYSTEM

Supervisor’s Details Co-Supervisor’s Details OR External


Supervisor’s Details
Name: Name:

Institute: Institute/Organization:

Institute Code: Institute Code (in case of co-supervisor):

Mail ID: Mail ID:

Mobile No. Mobile No.

B.TECH-CSE 29
ITMVU
Bachelor of Technology

(Project Review Card)

Name of Student: JAGRUTI SINDHA

Roll No. : VAD2017B.TECH-CSE4F013

Student’s Mail ID:- [email protected]

Student’s Contact No. :

College Name: ITMVU


College Code: Branch Code:

Branch Name: COMPUTER SCIENCE & ENGINEERING

Broad area of Title: IOT BASED SECURITY SYSTEM

Title of Project: SMART HOME SECURITY SYSTEM

Supervisor’s Details Co-Supervisor’s Details OR External


Supervisor’s Details
Name: Name:

Institute: Institute/Organization:

Institute Code: Institute Code (in case of co-supervisor):

Mail ID: Mail ID:

Mobile No. Mobile No.

B.TECH-CSE 30
ITMVU
Bachelor of Technology

(Project Review Card)

Name of Student: MALAY PRAJAPATI

Roll No. : VAD2017B.TECH-CSE4F003

Student’s Mail ID:[email protected]

Student’s Contact No. :

College Name: ITMVU


College Code: Branch Code:

Branch Name: COMPUTER SCIENCE & ENGINEERING

Broad area of Title: IOT BASED SECURITY SYSTEM

Title of Project: SMART HOME SECURITY SYSTEM

Supervisor’s Details Co-Supervisor’s Details OR External


Supervisor’s Details
Name: Name:

Institute: Institute/Organization:

Institute Code: Institute Code (in case of co-supervisor):

Mail ID: Mail ID:

Mobile No. Mobile No.

B.TECH-CSE 31
ITMVU
Bachelor of Technology

(Project Review Card)

Name of Student: PARTH NATH

Roll No. : VAD2017B.TECH-CSE4F005


Student’s Mail ID:- [email protected]
Student’s Contact No. :

College Name: ITMVU


College Code: Branch Code:

Branch Name: COMPUTER SCIENCE & ENGINEERING

Broad area of Title: IOT BASED SECURITY SYSTEM

Title of Project: SMART HOME SECURITY SYSTEM

Supervisor’s Details Co-Supervisor’s Details OR External


Supervisor’s Details
Name: Name:

Institute: Institute/Organization:

Institute Code: Institute Code (in case of co-supervisor):

Mail ID: Mail ID:

Mobile No. Mobile No.

B.TECH-CSE 32
ITMVU

You might also like