Intrusion Detection and Monitoring using IOT

International Journal of Electronics and Communication Engineering
© 2018 by SSRG - IJECE Journal
Volume 5 Issue 9
Year of Publication : 2018
Authors : Vulavabeti Raghunath Reddy, Thupakulavenugopal Reddy, K Ravindra Reddy and K Siva Chandra
How to Cite?

Vulavabeti Raghunath Reddy, Thupakulavenugopal Reddy, K Ravindra Reddy and K Siva Chandra, "Intrusion Detection and Monitoring using IOT," SSRG International Journal of Electronics and Communication Engineering, vol. 5,  no. 9, pp. 13-15, 2018. Crossref,


Intrusion by unauthorized person is main concern in large area such as industries. There are lot of traditional methods developed such as fencing and monitoring through manually. They eventually failed due to detaching fencing around industrial area and in case of manual monitoring surveillance continuous is major concern as larger areas are monitored. To overcome the above problem, an introduces a system .The proposed system consists of Infra-Red, Passive IR, Ultra sonic sensors for detection of intrusion. In case of authenticated entry system is enclosed with Radio Frequency Identification and Detection reader reads RFID tags from authenticated persons. If trespassing is done then sensors are activated and send intrusion information to central monitoring station which is remotely located from area of intrusion through Internet of Things (IOT). Central monitoring station monitors servers through it if intrusion is detected in server then IP camera is activated which takes images of surrounding area and it is confirmed by central monitoring system. Then message is send to higher authorities reporting intrusion over SMS through GSM module .The major advantage of the proposed system is real-time intrusion detection at various locations at same time. The communication of the proposed system is carried from server to client through Internet of Things that reduces power consumption and access to many servers.


IOT, IR sensor, RFID sensor, IP camera.


[1] Shanzhi Chen, Hui Xu, Dake Liu, Bo Hu, Hucheng Wang,” A Vision of IOT: Applications, Challenges, and Opportunities with China Perspective”, IEEE Internet of Things Journal, Vol. 1, No. 4, August 2014. 
[2] Sandhya G, Anitha Julian,”Intrusion Detection in Wireless Sensor Network Using Genetic K-Means Algorithm”IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), , 2014. 
[3] Shyam Nandan Kumar, 2015,”Review network Security and Cryptography”, International Transaction of Electrical and Computer Engineers System, vol. 3, no. 1, pp. 1-11. 
[4] Raja Benabdessalem1, Mohamed Hamdi1, Tai- Hoon Kim2,”A Survey on Security Models, Techniques, and Tools for the Internet of Things”, 7th International Conference on Advanced Software Engineering & Its Applications, 2014 
[5] Shancang Li, Li Da Xu, Shanshan Zhao, ”The internet of things: a survey”, Springer Information systems Frontiers, Volume 17, Issue 2, pp 243-259, April 2015.