Advertisement

Home Automation Using Internet of Things (IoT) for Smart Cities

  • Vipra ChudasamEmail author
  • Nikit Somaiya
  • Dipali Badgujar
  • Era Johri
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 34)

Abstract

Growing applications of ubiquitous computing have helped life getting better in every way. Pervasive computing has led its way in the advancement of IoT as well as rapid increase in applications. Everyday objects are embedded with microcontrollers to make computer-to-human (C2H) interaction environment to collect information to make it customised for tasks for users (Biradar et al. in Ubiquit Comput Secur Syst (UbiCC J) 4, 2010 [15]). In this paper, we propose smart environment for interaction to automate home security system with the help of ubiquitous computing. System is deployed in modules and as per requirements and can be adjusted. Currently deployed modules include fire detection system, RFID, alarm system, router, emergency contact system, database, motion detection system with the central control unit of android app and storing data at root location and away from direct access over network. The system acts dynamically according to sensors input. System is designed especially for commoners in terms of security issues and affordability making their life comfortable (Jain et al. in Raspberry Pi-based interactive home automation system through e-mail: optimization, reliability and information technology (ICROIT), 2014 [1]).

Keywords

Internet of things Home automation Smart automation Smart cities Motion sensors Control unit-android app Fire detection system Ubiquitous computing Home security system Alarm system Raspberry Pi 

References

  1. 1.
    Jain, S., Vaibhav, A., Goyal, L.: Raspberry Pi based interactive home automation system through E-mail: optimization, reliability, and information technology (ICROIT). In: International Conference, IEEE (2014)Google Scholar
  2. 2.
    Yadav, C., Raksha, K., Hegde, S., Anjana, C, Sandeep Kumar, E.: Security techniques in wireless sensor networks: a survey. Int. J. Adv. Res. Comput. Commun. Eng. 4(4) (2015)Google Scholar
  3. 3.
    Yadav, S.G.S.P., Dr. Chitra, A.: Wireless Sensor networks—architectures, protocols, simulators and applications: a survey. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(5) (2012)Google Scholar
  4. 4.
    Naeem, T., Loo, K.: Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks. Int. J. Digital Content Technol. Appl. 3(1) (2009)Google Scholar
  5. 5.
    Roslin, S.E.: Comparative study of proposed topology control algorithms for energy efficient wireless sensor network. Indian J. Comput. Sci. Eng. (IJCSE) 2(4) (2011)Google Scholar
  6. 6.
    Jian-min, B., Bao-chuan, F., Yin, Z.: Real time data collecting based on embedded database. Control Autom 21(12), 5–8 (2005)Google Scholar
  7. 7.
    Yue, K., Jiang, L., Yang, L., Pang, H.: Research of embedded database SQLite application in intelligent remote monitoring system. In: International Forum on Information Technology and Applications, IEEE, vol. 3 (2010)Google Scholar
  8. 8.
    Patil, P., Bhutkar, S., Ashtaputre, N.: Amanda back-up of SQLite. In: International Conference on Communication, Information & Computing Technology. IEEE Xplore (2012)Google Scholar
  9. 9.
    Advanced encryption standard (AES). Federal Information Processing Standards Publication 197 (2001)Google Scholar
  10. 10.
    Jing-qian, W., Li-xin, W.: Comparison of open-source embedded databases berkeley DB and SQLite. Microcontrollers Embed. Syst. 2, 5–8 (2005)Google Scholar
  11. 11.
    Soparia, J., Bhatt, N.: A survey on comparative study of wireless sensor network topologies. Int. J. Comput. Appl. 87(1) (2014)CrossRefGoogle Scholar
  12. 12.
    Akyildiz, F.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)CrossRefGoogle Scholar
  13. 13.
    Zhou, Y., Fang, Y.: Securing wireless sensor networks: a survey. IEEE Commun. Surv. Tutor. 10(3) (2008)CrossRefGoogle Scholar
  14. 14.
    Habaebi, M.H., Khamis, R.O., Zyoud, A., Islam, M.R.: RSS based localization techniques for ZigBee wireless sensor network. In: Computer and Communication Engineering (ICCCE) International Conference on, pp. 72–75 (2014Google Scholar
  15. 15.
    Biradar, R.V., Patil, V.C., Dr. Sawant, S.R., Dr. Mudholkar, R.R: Classification and comparison of routing protocols in wireless sensor networks. Special Issue on Ubiquit. Comput. Secur. Syst. (UbiCC Journal) 4 (2010)Google Scholar
  16. 16.
    Wan, J., Yuan, D., Xu, X.: A review of routing protocols in wireless sensor networks. In: IEEE Xplore 4th International Conference on Wireless Communications, Networking and Mobile Computing (2008)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Vipra Chudasam
    • 1
    Email author
  • Nikit Somaiya
    • 1
  • Dipali Badgujar
    • 1
  • Era Johri
    • 1
  1. 1.IT DepartmentK.J Somaiya Collage of EngineeringMumbaiIndia

Personalised recommendations