Advertisement

SecureDorm: Sensor-Based Girls Hostel Surveillance System

  • Shreyansh Sharad Jain
  • Gaurav SingalEmail author
  • Deepak Garg
  • Suneet Kumar Gupta
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 141)

Abstract

The intent is of developing a technology-driven security system for hostels to provide higher security to hostel inmates, which ultimately will help to generate the trust in the parents and guardians so that they will be motivated and encouraged to send their wards to hostels for education. The system is based on Wireless Sensor Network (WSN), which helps to keep the track of system components and their status. And these components are majorly sensors which keep track of breach made. We have proposed a communication system between various sensors to the server for identifying any breaches in the hostel. We have used ultrasonic sensor and GSM module for the implementation. Since the application requires us to install the components on the parameters of the hostel, it should be available.

Keywords

Sukanya Rakshak Girls hostel Security surveillance WSN Intrusion detection NodeMCU Raspberry Pi HC-SR04 

Notes

Acknowledgements

This work is supported by the Council of Science and Technology, Lucknow under the contract number CST/D-4070.

References

  1. 1.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)CrossRefGoogle Scholar
  2. 2.
    Akkaya, K., Younis, M.: A survey on routing protocols for wireless sensor networks. Ad hoc Netw. 3(3), 325–349 (2005)CrossRefGoogle Scholar
  3. 3.
    Baronti, P., Pillai, P., Chook, V.W.C., Chessa, S., Gotta, A., Fun Hu, Y.: Wireless sensor networks: a survey on the state of the art and the 802.15. 4 and ZigBee standards. Comput. Commun. 30(7), 1655–1695 (2007)CrossRefGoogle Scholar
  4. 4.
    Gupta, S.K., Kuila, P., Jana, P.K.: Delay constraint energy efficient routing using multi-objective genetic algorithm in wireless sensor networks. In: International Conference on Eco-friendly Computing and Communication Systems, TMH, pp. 50–59 (2013)Google Scholar
  5. 5.
    Gupta, S.K., Kuila, P., Jana, P.K.: GAR: an energy efficient GA-based routing for wireless sensor networks. In: ICDCIT, pp. 267–277. Springer (2013)Google Scholar
  6. 6.
    Gupta, S.K., Kuila, P., Jana, P.K.: GA based energy efficient and balanced routing in k-connected wireless sensor networks. In: Proceedings of the First International Conference on Intelligent Computing and Communication, pp. 679–686. Springer (2017)Google Scholar
  7. 7.
    Gupta, S.K., Kuila, P., Jana, P.K.: E 3 BFT: energy efficient and energy balanced fault tolerance clustering in wireless sensor networks. In: 2014 International Conference on Contemporary Computing and Informatics (IC3I), pp. 714–719. IEEE (2014)Google Scholar
  8. 8.
    ADT. www.adt.com. Accessed 30 Sept 2017
  9. 9.
    VIVINT. www.vivint.com. Accessed 25 July 2017
  10. 10.
    Saleem, M., Di Caro, G.A., Farooq, M.: Swarm intelligence based routing protocol for wireless sensor networks: survey and future directions. Inf. Sci. 181(20), 4597–4624 (2011)CrossRefGoogle Scholar
  11. 11.
    Boselin Prabhu, S.R., Sophia, S.: A survey of adaptive distributed clustering algorithms for wireless sensor networks. Int. J. Comput. Sci. Eng. Surv. 2(4), 165–176 (2011)CrossRefGoogle Scholar
  12. 12.
    Kuila, P., Gupta, S.K., Jana, P.K.: A novel evolutionary approach for load balanced clustering problem for wireless sensor networks. Swarm Evol. Comput. 12, 48–56 (2013)CrossRefGoogle Scholar
  13. 13.
    Tyagi, S., Kumar, N.: A systematic review on clustering and routing techniques based upon leach protocol for wireless sensor networks. J. Netw. Comput. Appl. 36(2), 623–645 (2013)CrossRefGoogle Scholar
  14. 14.
    Closed Circuit Television. www.en.wikipedia.org/wiki/Closed-circuit_television. Accessed 30 Sept 2018
  15. 15.
    Radio Frequency Identification. www.en.wikipedia.org/wiki/Radio-frequency_identification. Accessed 30 Sept 2018
  16. 16.
    Biometric Theory. www.bio-metrica.com/biometric-theory. Accessed 30 Sept 2018
  17. 17.
    Front Point Security. www.frontpointsecurity.com. Accessed 30 Sept 2018
  18. 18.
    HC-SR04. www.circuito.io/component/hc-sr04. Accessed 30 Sept 2017
  19. 19.
    Node MCU. www.nodemcu.com/index_en.html. Accessed 30 Sept 2017
  20. 20.
    Rasberry PI. www.raspberrypi.org. Accessed 30 Sept 2017
  21. 21.
    Zaffar, M., Ehsan, S., Stolkin, R., McDonald Maier, K.: Sensors, slam and long-term autonomy: a review. arXiv:1807.01605 (2018)

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Shreyansh Sharad Jain
    • 1
  • Gaurav Singal
    • 1
    Email author
  • Deepak Garg
    • 1
  • Suneet Kumar Gupta
    • 1
  1. 1.Department of Computer Science EngineeringBennett UniversityGreater NoidaIndia

Personalised recommendations