IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
Scopus/Elsevier
(Re-evaluation in-progress)
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 9 - Issue 4, April 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Cyber-Defensive Industrial Control System With Redundancy And Intrusion Detection Based On Iot Technology

[Full Text]

 

AUTHOR(S)

D.Manimegalai, S.Ezhilmathi, G. Amirthapriya, S. Arunthathi

 

KEYWORDS

Communication, Security, Information, Raspberry Pi, Data Analysis, Security Network,

 

ABSTRACT

Today in the present situation, worldwide information correspondence, economical Internet association and quick reachable programming improvement, security has turned out to be increasingly more of an issue. Security is one of the fundamental prerequisites in this day and age as an interchange and capacity of information on the web is getting to be powerful. Ensuring the data access and information uprightness are the essential security qualities of PC security. In this system, we have proposed a system which is capable of detecting fire, any gas leakages or if any unofficial entries have been made and provide the location of the affected region. Raspberry Pi 3 has been used to reign this process by integrated with a couple of sensors and cameras. When the fire or smoke sensors captures something they signal the camera and activates the alarm and the sprinkler motor. The cameras provide a confirmation of the fire and take photographs in order to avoid any false alarm complaint or for insurance purposes. The system will immediately send the message along with the image of the affected spot and device location to the registered email ids which may includes the nearby fire brigade. In the case of an intruder or unofficial entry, the PIR sensor detects it and the camera captures the image and then activate the alarm. An admin can confirm or reject the impeachment by detecting the photographs the system send to the registered email ids.

 

REFERENCES

[1] Distributed storage system for electric power data based on Hbase", Big Data Mining and Analytics, vol. 1, no. 4, pp. 324-334, 2018. Available: 10.26599/bdma.2018.9020026.
[2] S. Vijayalakshmi and S. Muruganand, "Real Time Monitoring of Wireless Fire Detection Node", Procedia Technology, vol. 24, pp. 1113-1119, 2016. Available: 10.1016/j.protcy.2016.05.244.
[3] R. Daoud and Y. Al-Khashab, "Design and Simulation of Smart Control System for Internet Traffic Distribution on Servers by Using Fuzzy Logic System", Al-Kitab Journal for Pure Sciences, vol. 2, no. 1, 2018. Available: 10.32441/kjps.v2i1.138.
[4] M. Karthikeyan, M. S and M. S, "Enhancing the Cash Point using Multimode Biometric System", International Journal of Trend in Scientific Research and Development, vol. -3, no. -3, pp. 353-358, 2019. Available: 10.31142/ijtsrd21768.
[5] A. A. N, C. C.I, A. D. C and N. C. S., "Real-Time Wildfire Monitoring and Alert System Using GSM Technology", IOSR Journal of Mobile Computing & Application, vol. 03, no. 04, pp. 01-10, 2016. Available: 10.9790/0050-03040110.
[6] S. ., "JEEVAN RAKSHAK PATIENT MONITORING SYSTEM USING MATUINO", International Journal of Research in Engineering and Technology, vol. 05, no. 03, pp. 231-235, 2016. Available: 10.15623/ijret.2016.0503046.
[7] R. Sowah, K. Ampadu, A. Ofoli, K. Koumadi, G. Mills and J. Nortey, "A Fire-Detection and Control System in Automobiles: Implementing a Design That Uses Fuzzy Logic to Anticipate and Respond", IEEE Industry Applications Magazine, vol. 25, no. 2, pp. 57-67, 2019. Available: 10.1109/mias.2018.2875189.
[8] Cyber-attack group analysis method based on association of cyber-attack information", KSII Transactions on Internet and Information Systems, vol. 14, no. 1, 2020. Available: 10.3837/tiis.2020.01.015.
[9] L. Maccari, H. Pinheiro, R. Oliveira and e. Montagner, "Robust pole location with experimental validation for three-phase grid-connected converters", Control Engineering Practice, vol. 59, pp. 16-26, 2017. Available: 10.1016/j.conengprac.2016.10.013.
[10] S. Poudel, Z. Ni and N. Malla, "Real-time cyber physical system testbed for power system security and control", International Journal of Electrical Power & Energy Systems, vol. 90, pp. 124-133, 2017. Available: 10.1016/j.ijepes.2017.01.016.