Security Enabled Smart Home Using Internet of Things

  • Y. SwathiEmail author
  • M. B. Shanthi
  • Swati Kumari
  • Priya Batni
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 98)


Internet of Things (IoT) is an emerging technology which connects the world with digital communication by making the devices connected to the internet to communicate with each other. It conceptualizes connecting the real-world objects remotely and monitoring them through the internet. The implication of smart technology starts from enabling us to monitor the happenings at home and take the precautious actions based on the activities remotely. Plenty of researchers have shown interest in building smart cities which we dream as our future digital world. There is ample space in developing smart solutions for automating the home . The existing solutions have a focus on monitoring and alerting the house owners in the case of suspension about any unauthorized entries in the house premises. In this paper, we have proposed a smart solution with enforces security to detect the person who enters home premises is authorized or not. It alerts the owner of the home in case of any trespass by capturing the image and providing required details. Based on the verification by the house owner, the person is either allowed to enter the house or required action to be taken by the house owner.


IoT Emerging Communication Conceptualize Monitoring Trespass Suspension Unauthorized Automated Verification 


  1. 1.
    Suh, C., Ko, Y.-B.: Design and implementation of intelligent home control systems based on active sensor networks. IEEE Trans. Consum. Electron. 54(3), 1177–1184 (2008)CrossRefGoogle Scholar
  2. 2.
    Machado, K., Rosario, D., et al.: A routing protocol based on energy and link quality for the internet of things applications. Sensors (Basel) 13(2), 1942–1964 (2013). Scholar
  3. 3.
    Kodali, R.K., Jain, V., et al.: IoT based smart security and home automation system. In: 2016 International Conference on Computing, Communication and Automation (ICCCA), 16 January 2017. IEEE Xplore (2016).
  4. 4.
    Pandav, R.P., Dahatonde, S.P., et al.: Security system and home appliances control using IoT. Int. J. Adv. Res. Innov. Ideas Educ. 4(2) (2018). ISSN(O) 2395-4396Google Scholar
  5. 5.
    Ashok, R., Yuen, C., Otto, K., Withanage, C.: A comparison of the popular home automation technologies, pp. 1–11, May 2014Google Scholar
  6. 6.
    Halder, R., Sengupta, S., Ghosh, S., Kundu, D.: Artificially intelligent home automation system based on Arduino as the master controller. Int. J. Eng. Sci. (IJES) 5(2), 41–45. ISSN(e) 2319-1813 ISSN(p) 2319-1805Google Scholar
  7. 7.
    Sravanthi, G., Madhuri, G., et al.: Voice recognition application based home automation system with people counter. In: International Conference on Advances in Computing, Communication Control and Networking (ICACCCN) (2018)Google Scholar
  8. 8.
    Soundari, T., Sangeetha, S.B.: Intelligent interface based speech recognition for home automation using the android application. In: Conference: 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).
  9. 9.
    Ambalkar, R.R., Pagrut, H.P.: A review paper on smart home using voice recognition. In: 2nd National Conference Recent Innovations in Science and Engineering (NC-RISE 17), vol. 5, no. 9, pp. 79–82. ISSN 2321-8169Google Scholar
  10. 10.
    ElShafee, A., Elkamchouchi, H.: Design and prototype implementation of SMS based home automation system, pp. 162–167, November 2012Google Scholar
  11. 11.
    Sahani, M.O.N.C.S.A.P.B.: 2015 International Conference on Circuit, Power and Computing Technologies (ICCPCT), pp. 1–6, March 2015Google Scholar
  12. 12.
    Ming Zhao, T., Chua: 8th IEEE International Conference on Automatic Face and Gesture Recognition, FG 2008, pp. 1–6, September 2008 (2008)Google Scholar
  13. 13.
    Kodali, R.K., Jain, V., Bose, S., Boppana, L.: IoT Based Smart Security and Home Automation (2016)Google Scholar
  14. 14.
    Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zao, W.: A Survey on Internet of Things. IEEE Internet Things J. 4 (2017).
  15. 15.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Advances in Cryptology. Lecture Notes in Computer Science, vol. 196, pp. 47–53. Springer (1984)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Y. Swathi
    • 1
    Email author
  • M. B. Shanthi
    • 2
  • Swati Kumari
    • 1
    • 2
  • Priya Batni
    • 1
    • 2
  1. 1.Department of ISECMR Institute of TechnologyBengaluruIndia
  2. 2.Department of CSECMR Institute of TechnologyBengaluruIndia

Personalised recommendations