PiBase: An IoT-based Security System using Raspberry Pi and Google
Firebase
- URL: http://arxiv.org/abs/2107.14325v1
- Date: Thu, 29 Jul 2021 20:45:42 GMT
- Title: PiBase: An IoT-based Security System using Raspberry Pi and Google
Firebase
- Authors: Venkat Margapuri, Niketa Penumajji, Mitchell Neilsen
- Abstract summary: This paper addresses aspects of authorized access and intruder detection for smart environments.
Proposed is PiBase, an Internet of Things (IoT)-based app that aids in detecting intruders.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Smart environments are environments where digital devices are connected to
each other over the Internet and operate in sync. Security is of paramount
importance in such environments. This paper addresses aspects of authorized
access and intruder detection for smart environments. Proposed is PiBase, an
Internet of Things (IoT)-based app that aids in detecting intruders and
providing security. The hardware for the application consists of a Raspberry
Pi, a PIR motion sensor to detect motion from infrared radiation in the
environment, an Android mobile phone and a camera. The software for the
application is written in Java, Python and NodeJS. The PIR sensor and Pi camera
module connected to the Raspberry Pi aid in detecting human intrusion. Machine
learning algorithms, namely Haar-feature based cascade classifiers and Linear
Binary Pattern Histograms (LBPH), are used for face detection and face
recognition, respectively. The app lets the user create a list of non-intruders
and anyone that is not on the list is identified as an intruder. The app alerts
the user only in the event of an intrusion by using the Google Firebase Cloud
Messaging service to trigger a notification to the app. The user may choose to
add the detected intruder to the list of non-intruders through the app to avoid
further detections as intruder. Face detection by the Haar Cascade algorithm
yields a recall of 94.6%. Thus, the system is both highly effective and
relatively low cost.
Related papers
- Turn-by-Turn Indoor Navigation for the Visually Impaired [0.0]
Navigating indoor environments presents significant challenges for visually impaired individuals.
This paper introduces a novel system that provides turn-by-turn navigation inside buildings using only a smartphone equipped with a camera.
Preliminary evaluations demonstrate the system's effectiveness in accurately guiding users through complex indoor spaces.
arXiv Detail & Related papers (2024-10-25T20:16:38Z) - What If We Had Used a Different App? Reliable Counterfactual KPI Analysis in Wireless Systems [52.499838151272016]
This paper addresses the "what-if" problem of estimating the values of key performance indicators (KPIs) that would have been obtained if a different app had been implemented by the radio access network (RAN)
We propose a conformal-prediction-based counterfactual analysis method for wireless systems that provides reliable "error bars" for the estimated, containing the true with a user-defined probability.
arXiv Detail & Related papers (2024-09-30T18:47:26Z) - CamLoPA: A Hidden Wireless Camera Localization Framework via Signal Propagation Path Analysis [59.86280992504629]
CamLoPA is a training-free wireless camera detection and localization framework.
It operates with minimal activity space constraints using low-cost commercial-off-the-shelf (COTS) devices.
It achieves 95.37% snooping camera detection accuracy and an average localization error of 17.23, under the significantly reduced activity space requirements.
arXiv Detail & Related papers (2024-09-23T16:23:50Z) - DensePose From WiFi [86.61881052177228]
We develop a deep neural network that maps the phase and amplitude of WiFi signals to UV coordinates within 24 human regions.
Our model can estimate the dense pose of multiple subjects, with comparable performance to image-based approaches.
arXiv Detail & Related papers (2022-12-31T16:48:43Z) - Drone Detection and Tracking in Real-Time by Fusion of Different Sensing
Modalities [66.4525391417921]
We design and evaluate a multi-sensor drone detection system.
Our solution integrates a fish-eye camera as well to monitor a wider part of the sky and steer the other cameras towards objects of interest.
The thermal camera is shown to be a feasible solution as good as the video camera, even if the camera employed here has a lower resolution.
arXiv Detail & Related papers (2022-07-05T10:00:58Z) - PRNU Based Source Camera Identification for Webcam and Smartphone Videos [137.6408511310322]
This communication is about an application of image forensics where we use camera sensor fingerprints to identify source camera (SCI: Source Camera Identification) in webcam/smartphone videos.
arXiv Detail & Related papers (2022-01-27T18:57:14Z) - Improving the Authentication with Built-in Camera Protocol Using
Built-in Motion Sensors: A Deep Learning Solution [16.72680081620203]
We propose an enhanced version of the Authentication with Built-in Camera protocol by employing a deep learning solution based on built-in motion sensors.
The protocol is vulnerable to forgery attacks when the attacker can compute the camera fingerprint from external photos.
In this context, we propose an enhancement for the ABC protocol based on motion sensor data, as an additional and passive authentication layer.
arXiv Detail & Related papers (2021-07-22T09:26:53Z) - Smartphone Impostor Detection with Behavioral Data Privacy and
Minimalist Hardware Support [7.374079197112307]
Impostors are attackers who take over a smartphone and gain access to the legitimate user's confidential and private information.
This paper proposes a defense-in-depth mechanism to detect impostors quickly with simple Deep Learning algorithms.
We also show how a minimalist hardware module, dubbed SID for Smartphone Impostor Detector, can be designed and integrated into smartphones for self-contained impostor detection.
arXiv Detail & Related papers (2021-03-11T04:39:53Z) - IoT Based Smart Home using Blynk Framework [0.0]
The project is targeted at solving sundry problems faced by Nepalese people in their daily life.
It is designed to control and monitor appliances via smartphone using Wi-Fi as communication protocol and raspberry pi as private server.
arXiv Detail & Related papers (2020-07-27T17:46:39Z) - Mind the GAP: Security & Privacy Risks of Contact Tracing Apps [75.7995398006171]
Google and Apple have jointly provided an API for exposure notification in order to implement decentralized contract tracing apps using Bluetooth Low Energy.
We demonstrate that in real-world scenarios the GAP design is vulnerable to (i) profiling and possibly de-anonymizing persons, and (ii) relay-based wormhole attacks that basically can generate fake contacts.
arXiv Detail & Related papers (2020-06-10T16:05:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.