基于物联网的多层无线安防系统

K. Venkatesan
{"title":"基于物联网的多层无线安防系统","authors":"K. Venkatesan","doi":"10.58599/ijsmem.2023.1703","DOIUrl":null,"url":null,"abstract":"In today’s contemporary culture, the need of taking precautions to protect one’s own belongings and privacy cannot be stressed. Because of this, an adaptive multilayer wireless security system, also known as ML-WSS, has been developed in order to monitor also safeguard a location with the assistance of the internet of things (IoT). In the hardware and software design of the ML- WSS, the sensors, the Wi-Fi module, also the process and monitoring mobile application all play key roles. The proposed method enables remote monitoring and management to take place finished the Internet also the ThingSpeak cloud, which is where the OMM application keeps the data that it has collected. The idea suggests slicing the crucial area into three distinct sectors, with sector 1 being the least dangerous, sector 2 being intermediate, and sector 3 being the most dangerous of the three. The criteria for the level of security should serve as a reference for both the placement of sensors and the classification of sensors according to the level of protection they give. Both of these processes should be carried out in accordance with the criteria. In the event that there is a breach in security, actions are carried out in accordance with these principles. A exact model also pseudocode were used in order to demonstrate the functionality of the planned system. It is reasonable to assert that the strategy used up to this point has been successful, given that level-3 locations now suffer from around half as many security breaches as level-1 areas.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Internet of Things based Multi-Tiered Wireless Security System\",\"authors\":\"K. Venkatesan\",\"doi\":\"10.58599/ijsmem.2023.1703\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In today’s contemporary culture, the need of taking precautions to protect one’s own belongings and privacy cannot be stressed. Because of this, an adaptive multilayer wireless security system, also known as ML-WSS, has been developed in order to monitor also safeguard a location with the assistance of the internet of things (IoT). In the hardware and software design of the ML- WSS, the sensors, the Wi-Fi module, also the process and monitoring mobile application all play key roles. The proposed method enables remote monitoring and management to take place finished the Internet also the ThingSpeak cloud, which is where the OMM application keeps the data that it has collected. The idea suggests slicing the crucial area into three distinct sectors, with sector 1 being the least dangerous, sector 2 being intermediate, and sector 3 being the most dangerous of the three. The criteria for the level of security should serve as a reference for both the placement of sensors and the classification of sensors according to the level of protection they give. Both of these processes should be carried out in accordance with the criteria. In the event that there is a breach in security, actions are carried out in accordance with these principles. A exact model also pseudocode were used in order to demonstrate the functionality of the planned system. It is reasonable to assert that the strategy used up to this point has been successful, given that level-3 locations now suffer from around half as many security breaches as level-1 areas.\",\"PeriodicalId\":103282,\"journal\":{\"name\":\"International Journal of Scientific Methods in Engineering and Management\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Scientific Methods in Engineering and Management\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.58599/ijsmem.2023.1703\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Scientific Methods in Engineering and Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58599/ijsmem.2023.1703","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在当今的当代文化中,采取预防措施保护自己的财产和隐私的必要性再怎么强调也不为过。因此,一种自适应多层无线安全系统,也称为ML-WSS,已经开发出来,以便在物联网(IoT)的帮助下监控和保护一个位置。在ML- WSS的硬件和软件设计中,传感器、Wi-Fi模块以及过程和监控移动应用程序都发挥了关键作用。所提出的方法使远程监控和管理能够通过互联网和ThingSpeak云进行,这是OMM应用程序保存其收集的数据的地方。这个想法建议将关键区域分成三个不同的区域,区域1是最不危险的,区域2是中间的,区域3是三个区域中最危险的。安全级别的标准应作为传感器放置和根据其提供的保护级别对传感器进行分类的参考。这两个过程都应按照标准进行。在发生安全漏洞的情况下,将按照这些原则采取行动。为了演示计划系统的功能,使用了一个精确的模型和伪代码。我们有理由断言,到目前为止使用的策略是成功的,因为3级地点现在遭受的安全漏洞大约是1级地区的一半。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An Internet of Things based Multi-Tiered Wireless Security System
In today’s contemporary culture, the need of taking precautions to protect one’s own belongings and privacy cannot be stressed. Because of this, an adaptive multilayer wireless security system, also known as ML-WSS, has been developed in order to monitor also safeguard a location with the assistance of the internet of things (IoT). In the hardware and software design of the ML- WSS, the sensors, the Wi-Fi module, also the process and monitoring mobile application all play key roles. The proposed method enables remote monitoring and management to take place finished the Internet also the ThingSpeak cloud, which is where the OMM application keeps the data that it has collected. The idea suggests slicing the crucial area into three distinct sectors, with sector 1 being the least dangerous, sector 2 being intermediate, and sector 3 being the most dangerous of the three. The criteria for the level of security should serve as a reference for both the placement of sensors and the classification of sensors according to the level of protection they give. Both of these processes should be carried out in accordance with the criteria. In the event that there is a breach in security, actions are carried out in accordance with these principles. A exact model also pseudocode were used in order to demonstrate the functionality of the planned system. It is reasonable to assert that the strategy used up to this point has been successful, given that level-3 locations now suffer from around half as many security breaches as level-1 areas.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信