Abstract
The internet of Things (IoT)-based total security is the most broadly used protection framework introduced by the technological developments. Sensors and cameras play a vital role in detecting movement and alerting the humans in lots of security applications. As these security gadgets are always accompanied with alarm systems, it is more popularly used for preventing the theft in public places like shopping malls and shops. In such areas, conventional CCTV cameras are usually used as it helps in non-stop human tracking, and detections of crimes. The proposed system is also on such intelligent security system capable of identifying mis-happenings in the public places. With real-time image feedback, the proposed device provides the owner with assurance even when they are not around. These studies examine the possibility of implementing automation technologies in the near future to provide complete protective control. The research suggests a fully automated security system that uses alarm messages and the internet of things (IoT) to predict and prevent unwanted activities in the jewellery shop.
References
- G.Schirner,D.Erdogmus,K.ChowdhuryandT.Padir,TheFutureofHuman-in-the-LoopCyber-PhysicalSystems, inIEEE Computer, vol.46, no.1, pp. 36-45,2013.
- J. Fraga, and D. Powell, A Fault- And Intrusion-Tolerant File System, in proceedings ofIFIP3rdInternationalConferenceonComputerSecurity,Dublin,Ireland,pp.203-218,1985.
- S. Hossain, S. Etigowni, K. Davis, and S. Zonouz, Towards cyberphysical intrusiontolerance, in proceedings of the IEEE International Conference on Smart Grid Communications(SmartGridComm), Miami, FL, USA, pp. 139-144, 2015.
- S. Sowe, E. Simmon, K. Zettsu, F. de Vaulx and I. Bojanova. Cyber-Physical-HumanSystems: Putting People in the Loop, in IT Professional, vol. 18, no. 1, pp. 10-13, Jan.-Feb.2016.
- L. Lamport, R. Shostak, and M. Pease. The Byzantine Generals Problem, in ACMTransactionsonProgrammingLanguagesandSystems.vol.4,no.3,pp.382-401,Jan.-Feb.2016
- M.Castroand B.Liskov, Practical Byzantine fault-tolerance and proactive recovery, in ACM Transactions on Computer Systems (TOCS),vol.20, no.4, November2002.
- A. Sá, A.Freitas, and R.Macêdo, Adaptive request batching for byzantine replication, inOperatingSystems Review, vol.47, no. 1., pp.35-42, 2013
- J.KephartandD.Chess, The visionofautonomiccomputing,inIEEEComputer,vol.36,no. 1,pp. 41-50, 2003.
- A. Santos Sá, R, José, and A. Macêdo. QoS Self-configuring Failure Detectors forDistributed Systems. Frank Eliassen;;Rüdiger Kapitza. Distributed Applications and Interoperable Systems, 6115, Springer Lecture Notes in Computer Science, pp.126-140, 2010.
- R. Macêdo, A. Freitas, and A. Sá. Enhancing group communication with self-manageable behavior. Journal of Parallel and Distributed Computing.vol.73, no.4.pp.420-433,April2013.
- IOT Based Theft Detection using Raspberry Pi Umera Anjum, B. Babu Published 11 July 2017 Computer Science International Journal of Advance Research, Ideas and Innovations in Technology.
- IoT based Power Theft Detection R Giridhar Balakrishna, P Yogananda Reddy, M L N Vital International Journal of Innovations in Engineering and Technology (IJIET), Volume 8 Issue 3 June 2017
- IoT Based Energy Meter and Theft Detection 1Mamata N. Bonde, 2Roshni K.Patil, 3Utkarsh T. Mahajan, Shafiq Ansari4 , Hemraj V. Dhande5, International Journal of Innovations in Engineering and Science, Vol 4, No.10 ,2019.
- IoT Based Energy Metering And Theft Detection Srujana Uddanti1 , Christeena Joseph2,P.C.Kishoreraja3, International Journal of Pure and Applied Mathematics Volume 117 No. 9 2017, 47-51.
- Power Theft Detection and Alert System using IOT K.Kumaran, et. al. Vol. 12 No. 10 (2021).
