You are on page 1of 5

Proceedings of the International Conference on Electronics and Renewable Systems (ICEARS 2022)

IEEE Xplore Part Number: CFP22AV8-ART; ISBN: 978-1-6654-8425-1

Internet of Things Assisted Wireless Environment


Monitoring System using Smart Sensors Supportivity
2022 International Conference on Electronics and Renewable Systems (ICEARS) | 978-1-6654-8425-1/22/$31.00 ©2022 IEEE | DOI: 10.1109/ICEARS53579.2022.9751994

K.Sangeethalakshmi1 , S.Jai Ganesh2 , K.Dhivya3 , V.Kannagi4 , M.Rajkumar5


1,2,3,4
Department of ECE, R.M.K. College of Engineering and T echnology, R.S.M. Nagar, Puduvoyal.
5
Department of Computer Science and Engineering, Saveetha School of Engineering, SIMAT S, Chennai, T amilnadu
5
sangeetha.lk@rmkcet.ac.in, 2welcometojaimail@gmail.com, 3dhivyakesavan2006@gmail.com, 4kannagiece@rmkcet.ac.in, 5rajkumarm.sse@saveetha.com,

 built a similar application for our research purposes [2].


Abstract—As with smartphones, the Internet of Things Thermal sensor systems have been widely used for
(IoT) is quickly becoming a hot topic in the IT world. temperature reduction and fire detection. There have been a
Wireless Sensor Networks (WSNs) are now the primary slew of research proposals aimed at securing wireless sensor
technology for the Internet of Things (IoT). WSN security network communication. When TinySec was initially built, it
in an environmental monitoring system was explored in used Skipjack to encrypt packets at the link layer [3]. MiniSec
order to raise overall system security. We conducted our and other similar approaches have decreased the amount of
study in a temperature-controlled environment (STMS). memory and processing overhead. In addition, TinyECC, a
According to our research, the password for the MSP430 WSN version of public key cryptography, has been suggested.
MCU's bootstrap loader (BSL) is insecure. It just took us a The goal of all security methods is to use low-cost
few days to show that the BSL password could be cracked. technologies. Given the limited resources of sensing devices,
The first time an attacker was able to get the WSN such as CPU and memory space, a resemblance between the
cryptographic keys from the system through reversing the articles is reasonable. But a vital component of security, the
firmware was also shown. Reverse engineering MSP430 protection of the sensors themselves, was disregarded [4].
firmware is shown in this example in a detailed manner.
By presenting a solution, we were able to increase the Device security in WSNs is crucial since this type of sensor
security of the firmware in MSP430 processors. A random network relies on machine-to-machine communication.
BSL password may be generated using our Secure-BSL Sensors, on the other hand, do not necessitate user engagement
application. Using our strategy, brute-force times may be and can be left unattended for months or years at a time. When
obtained in a matter of decades. The unrealistic brute a sensor device may be tampered with, WSN security is
force time is essential in order to guarantee the firmware's compromised [5]. Mote capture attacks are assumed in most
security and prevent further attempts at reverse security recommendations. But the repercussions of having
engineering. Our Secure-BSL software adds an extra layer complete physical access to the motes have received little
of security by enabling two-factor authentication. The two- academic attention. Mote tampering attacks are only
factor authentication capabilities of the MSP430 MCU mentioned in two studies by Becher and Good speed.
may be used to set a user-defined password for additional Embedded sensor boards, Mica2 motes, and TelosB motes
MSP430 MCU security. Our results show that any security were all subjected to Becher's testing. According to the
mechanisms inside a WSN are rendered worthless if an findings, it will take 128 years to brute force a password used
attacker gets access to sensor device firmware. to safeguard the firmware in TelosB motes. As a result of
Good speed's voltage glitching, the BSL was deactivated from
Index Terms—MS P430, Wireless S ensor Networks, IoT, 128 to 32 years in time. There are a variety of uses for WSNs,
Encryption, S ecurity however many need a resource-intensive modelling
environment. For our WSN environment, we developed the
I. INTRODUCTION Secure Temperature Monitoring System (STMS). Many of the
In a wireless sensor network (WSN), sensors are deployed features of STMS may be found in each of the three different
and utilized to collect physical or environmental data. Sensor monitoring systems. According to our research, STMS seems
networks have the ability to continually monitor their to be the only temperature tracking system which secures the
surroundings, send out alarms based on changing conditions, communication between sensors. Room temperatures may be
and provide data "on demand [1]." Data acquired by sensors monitored in real time by James Madison University's
include: weather conditions (temperature and humidity), Computer Science department using our STMS system.
vehicular traffic (lightning conditions), soil composition Because of this, a security weakness in the MSP430 series of
(pressure, humidity, and noise), and the presence or absence of processors may be shown using the STMS. As seen in Figure
particular things (mechanical stress levels on connected 1, our STMS network has three end-devices and a Sniffer.
objects). The Sirindhorn International Institute of Technology

978-1-6654-8425-1/22/$31.00 ©2022 IEEE 628

Authorized licensed use limited to: VIT University. Downloaded on November 03,2022 at 06:55:26 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Electronics and Renewable Systems (ICEARS 2022)
IEEE Xplore Part Number: CFP22AV8-ART; ISBN: 978-1-6654-8425-1

II. RELATED STUDY

Tyler Cultice et al., 2020 [6] proposed a paper suggesting


that to detect anomalies in smart grid systems, we suggest
using an auto-encoder. Many types of data corruption can
occur when sensors in smart homes collect data, including
malicious assaults and physical faults. Sensor abnormalities
may be recognized automatically using machine learning in a
smart house or grid, ensuring secure data gathering and
sensor-based system operation. Real smart home sensor data
accumulated over several years was also used to assess the
effectiveness of this strategy. Such data corruption concerns
must be detected as soon as possible to ensure the security and
operation of smart home sensors and devices.
Fig.1 A Secure Temperature Watching System's Network
Topology Lin Pang et al., 2020 [7] proposed a paper suggesting that
Compressed sensing (CS) routing is integrated with a target
i. Computer: The computer's primary function is to show real- source locating approach in this work. When network nodes
time temperature data. are clustered together, information about each node is
ii. Coordinator: When packets arrive from the end devices, concentrated on a single node, which is known as the cluster
they are first decrypted by the coordinator before being head. Passive wireless thermometry of high-voltage switch
delivered to the computer. gear is collected using temperature sensor technology due to
iii. End-Device: There are three major tasks for the three end- the inadequacies of traditional high-voltage switch gear
devices: collecting temperatures and encrypting them, and temperature collection methods. Remote real-time online
transmitting them to a coordinator. monitoring of temperature is provided by the system's
iv. Sniffer: Two of the primary functions of the Sniffer are to functionalities including temperature measurement and
capture STMS network traffic and deliver it to your PC. alarms.

Every 5 seconds, the End-Devices take temperature Mustafa Bilgin et al., 2020 [8] proposed a paper suggesting
readings and communicate them to the Coordinator. The that the goal of this study is to create printable sensors that can
payload is sent to the computer by the Coordinator when it has continuously monitor environmental affects including
been decoded [11]. Network traffic is picked up by a sniffer temperature, water/humidity, light, pH, bacterial
and sent to the computer in the STMS through this device. The contamination, and other influencing elements, such as a
user may access data from both the Coordinator and the design for print ability and detection of smart materials in a
Sniffer through the PC. An embedded processor is a common smart code. Chemical structure and absorption behavio r of the
component of an embedded system. Microwaves, DVD smart materials are permanently altered by these external
players, and even automobiles all use embedded systems. In impacts. Several sensors can be linked together into a self-
some cases, an operating system is built within the embedded contained network using optical measurement of the printed
system. In other cases, the logic is so narrowly focused that it sensors and transfer of the corresponding color values to a
can only be implemented as a single programme. Other than server (Internet of Things).
providing general-purpose computing, these systems are
designed to perform a specific function when integrated into a YongTak Yoon et al., 2020 [9] proposed a paper suggesting
device [12]. Figure 2 depicts an example of an embedded that there has recently been a surge in the development of
system. smart homes based on the Internet of Things (IoT), which
includes smart gadgets with a wide range of sensors. With the
use of artificial intelligence, many sensors in a smart home
may offer information to its occupants, or they can be used to
operate the homes themselves. As a result of this, the amount
of energy used by each sensor is reduced, which has an impact
on energy efficiency. An adaptive sensor data transmission
scheduling scheme is presented in this study, which
determines the transmission interval based on the data
variance from each sensor. Classifying the class based on the
quantity of data measured in a sensor and eliminating
superfluous data transmission is the goal of this suggested
technique. It is therefore possible to lower the amount of
energy needed to transfer information from one device to
another.
Fig.2 A Typical Embedded System Block Diagram

978-1-6654-8425-1/22/$31.00 ©2022 IEEE 629

Authorized licensed use limited to: VIT University. Downloaded on November 03,2022 at 06:55:26 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Electronics and Renewable Systems (ICEARS 2022)
IEEE Xplore Part Number: CFP22AV8-ART; ISBN: 978-1-6654-8425-1

Mostafa et al., 2020 [10] proposed a paper suggesting that The Internet of Things (IOT) server will hold all of this
the need for dependable image as well as video transmission information for remote access. There are two ways for the user
in a wireless hostile environment has grown due to the rapid to access the saved records: an Android mobile application or
growth of Smart Grids through wireless sensor networks. a browser on a PC. Fig. 3 shows how the suggested
Noise, interference, and route loss all have the potential to transmitter-and-receiver block diagram is seen, complete with
degrade image quality during image transmission. Using two appropriate specifications. Fig. 3: Raspberry PI-based circuit
error-correction methods (Static as well as Adaptive RS) to connection schematic with explicit port requirements is shown
improve the quality of transmitted photos is demonstrated in in the accompanying picture, Fig-4. The following figure, Fig-
this study. Additional bits are added to the information 5 shows how the suggested Raspberry PI GPIO PIN diagram
broadcast via Static-Reed Solomon (RS) coding in order to is seen in a basic way.
repair faults at the receiver side. Adaptive RS, in contrast to
Static RS, is a Reed-Solomon variant in which the error
correction codes of algorithm are adaptively adjusted in
accordance with the distance between the nodes. Based on
several simulations, it appears that the Static RS is
outperformed by the Adaptive RS in terms of PSNR, BER,
and overall throughput. Application-layer perceptual quality
criteria for Smart Grid applications can be met using this
technology.

III. M ETHODOLOGY

GSM-based automation systems are unable to access the


network and operate at high speeds because of 2G-powered
connectivity. Additionally, there is no alternative way to
remotely monitor sensor data. As a result, people who are at a
distant location are unable to manage or learn about crisis (a)
situations in real time, and they also lack the ability to
remotely control equipment due to the lack of an Internet of
Things (IoT). The following are some of the drawbacks of the
previous system: (a) Inadequate in Quality, (b) Cost-wise, it's
a lot, (c) a sluggish pace of operation and (d) Cannot
Remotely Control Devices.

The suggested design, on the other hand, is a way to turn


the past into the future. There is no need for a GSM module
since the whole system is run on a little laptop computer called
the Raspberry PI. We've swapped out the old, inefficient (b)
processes with faster ones based on the Raspberry PI, which
can connect to any phone and run automations much faster. Fig.3 Block Diagram (a) Transmitter and (b) Receiver
Android is open source, so users may us e an app to remotely
control components like motors in the event of a crisis at any
time or location. According to this suggested method, there are
several advantages, including: (a) More Efficient Operation of
a Portable Device, (b) The most cost-effective method and (c)
Because this gadget can connect to both 3G and 4G networks,
it is more intelligent, compact, and quicker to use.

The smart house is monitored and controlled by a super-


advanced and mobile system called Raspberry PI in crisis
situations. In the event of a gas leak, the sensor is linked to the
Raspberry PI, which alerts the user through SMS. If there is
any issue, such as a fire or an overheated environment, the
temperature probe DS18B20 will send an SMS notification to
the appropriate pers on promptly. It can also monitor the
location for fire situations. So, if this is possible, the Android
app can be used to turn on and off the home's motor, which
can be done remotely. For earthquake monitoring, a Vibration Fig.4 Circuit Connection of Raspberry-PI
sensor is attached and SMS notifications are sent to the user.

978-1-6654-8425-1/22/$31.00 ©2022 IEEE 630

Authorized licensed use limited to: VIT University. Downloaded on November 03,2022 at 06:55:26 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Electronics and Renewable Systems (ICEARS 2022)
IEEE Xplore Part Number: CFP22AV8-ART; ISBN: 978-1-6654-8425-1

before they happen. Raspberry PI is chosen in this project to


simplify the process of linking and upgrading sensor data on a
remote server, since it already has a built-in Internet
connection. This means that the device can be readily paired
with any internet media. Any anomalous gas leakage in the
designated area is detected by the MQ2 gas sensor, which
promptly alerts the user to the problem. Temperature is being
monitored by this DS18B20 sensor, which will send an alert to
the appropriate person if there is any change in temperature.
Vibration sensors are employed here to identify earthquake
scenarios, and the user will be warned as soon as possible. The
user may operate the DC motor attached to it to exhaust
undesired gas and heat from the corresponding spot to protect
the residence in a safe way once catastrophe situations such as
gas leakage or otherwise the temperature incensement are
discovered.

The following figure, Fig-7 illustrates the perception of gas


sensor associated with this proposed scheme, in which the
perfect sensor for detecting harmful LPG leaks in your
automobile or petrol stations, water storage surroundings.
With this device, an alert may sound or a visual indicator of
LPG concentration can be provided. The gas sensor has the
Fig.5 Raspberry PI GPIO PIN Diagram following features, such as:
 High Sensitivity.
 Detection-Ratio: 100 to 10000ppm iso butane propane.
IV. RESULTS AND DISCUSSIONS  Fast-Response Time: <10s.
 Heater-Voltage: 5.0V.
This paper introduced an IoT based smart living scenario by  Dimension: 18mm Diameter, 17mm High excluding pins,
using Raspberry Pi and the associated sensor unit. Popular
Pins - 6mm High.
programming languages for Raspberry Pi are Python and
Scratch. Raspberry Pi may be taught to comprehend various
languages, including PHP, with a little effort. There are
various reasons why you would wish to run PHP on your
Raspberry Pi. To connect your PHP-based software with the
Raspberry Pi, for example, you should remain with PHP. It's
possible that you're more comfortable writing code in PHP
than Python, or that you just wish to experiment with a new
programming language.

Fig.7 Gas Sensor

The following figure, Fig-8 illustrates the perception of


vibration sensor, in which it has the following features such
as:
 Maximum working voltage (V-max) : 5vDC.
 Maximum current (I-max) : less than 5mA.
 Digital-Output.
 Response time: 5ms.
 Direct interface to Microcontrollers.

Fig.6 Hardware Setup

As seen in the diagram mentioned above, Fig-6, a variety of


cutting-edge sensors and equipment are interconnected in this
system to let users learn more about potential calamities Fig.8 Vibration Sensor

978-1-6654-8425-1/22/$31.00 ©2022 IEEE 631

Authorized licensed use limited to: VIT University. Downloaded on November 03,2022 at 06:55:26 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Electronics and Renewable Systems (ICEARS 2022)
IEEE Xplore Part Number: CFP22AV8-ART; ISBN: 978-1-6654-8425-1

V. CONCLUSION AND FUTURE SCOPE for Smart Grid Applications", 28th Signal Processing and
Communications Applications Conference, 2020.
This paper shows the efficiency of the proposed scheme by [11] M. Tamilselvi, G. RamkumarAn effectual contrast
means of resulting units and the associative sensors presented enhancement for remote sensing images Int. J. Appl. Eng.
into the system. There are two key benefits to using this Res., 10 (20) (2015).
system, such as: [12]Ramkumar, G. et al. (2021). “Energetic Glaucoma
 Convenience of access and nature's cost-effectiveness. Segmentation and Classification StrategiesUsing Depth
 Faster and more efficient than previous methods. Optimized Machine Learning Strategies”, Contrast Media &
As a result of these benefits, they are the easiest and safest Molecular Imaging, Volume 2021, Article ID 5709257, 11
method of accessing the automation system with Raspberry PI. pages, https://doi.org/10.1155/2021/5709257.
This smart house is more than just smart and safe; it's also [13] S. Balakrishnan, M. S. S. Hameed, K. Venkatesan and G.
completely disaster-proof. Other popular microcontroller units Aswin, "Interaction of Spatial Computing In Augmented
including ATmega, AVR, ARM and PIC will be evaluated in Reality," 2021 7th International Conference on Advanced
the future. Computing and Communication Systems (ICACCS), 2021,
pp. 1900-1904, doi: 10.1109/ICA CCS51430.2021.9442010.
[14] V. Arulkumar A Survey on Multimedia Analytics in
REFERENCES Security Systems of Cyber Physical Systems and IoT, 2021
2nd International Conference on Smart Electronics and
[1] Ismail Terkesli, Canberk Demircan, Ismail Demirci, Communication (ICOSEC) pp 1556-1561, Nov 2021.
Selcuk Yavuz and Mehmet Taygun, "Industrial 10.1109/ICOSEC51865.2021.9591754
Spectrophotometric Smart Sensor Towards Real-Time [15] S. Balakrishnan, V. K. and M. S. S. Hameed, "An
Optimization of Textile Dyeing Process", IEEE Sensors Embarking User Friendly Palmprint Biometric Recognition
Applications Symposium, 2019. System with Topnotch Security," 2021 5th International
[2] G B Arjun Kumar, Shivashankar, N Sujay, P Tejas, P Conference on Intelligent Computing and Control Systems
Srikanth and Yashavanth T R, "Design and Implementation of (ICICCS), 2021, pp. 1028-1032, doi:
Wireless Sensor Network based Smart DC Grid for Smart 10.1109/ICICCS51141.2021.9432230.
Cities", 4th International Conference on Recent Trends on [16] V. Arulkumar An Intelligent Face Detection by Corner
Electronics, Information, Communication & Technology, Detection using Special Morphological Masking System and
2019. Fast Algorithm, 2021 2nd International Conference on Smart
[3] Kalin Dimitrov and Tsvetan Valkovski, "Using Optical Electronics and Communication (ICOSEC) pp 1556-1561,
Acoustic Sensors for Smart City Applications", International Nov 2021.
Conference on Creative Business for Smart and Sustainable [17] Arulkumar, V., Dr Selvan, C. "Big Data Analytics in the
Growth, 2019. Healthcare Industry: An Analysis of Healthcare Applications
[4] Senthilkumar, C., Ramkumar, G., & Ayyadurai, M. (2021, in Machine Learning With Big Data Analytics" IGI Global
June). Experimental Analysis of Secured Routing Protocol Big Data Analytics in the Healthcare Industry 2019/9
Establishments over Wireless Sensor Network. In 2021 5th [18] M. Syed Shahul Hameed , Ravi Kumar Poluru, Chandra
International Conference on Trends in Electronics and Prakash Lora, S. Balakrishnan, A Non-Invasive Check Alarm
Informatics (ICOEI) (pp. 691-698). IEEE. Towards Food Safety Against Scruples Using Iot For The
[5] Ayyadurai, M., Senthilkumar, C., Ramkumar, G., & Produce, Nat. Volatiles & Essent. Oils, 2021; 8(4): 10734-
Anitha, G. (2021, June). Distributed Crash Free Media Access 10743 10734
Control Protocol for Underwater Sensor Network. In 2021 5th
International Conference on Trends in Electronics and
Informatics (ICOEI) (pp. 699-703). IEEE.
[6] Tyler Cultice, Dan Ionel and Himanshu Thapliyal, "Smart
Home Sensor Anomaly Detection Using Convolutional
Autoencoder Neural Network", IEEE International
Symposium on Smart Electronic Systems, 2020.
[7] Lin Pang, Zhidan Lan, Xingpei Wu and Pei Wang,
"Research on Key Technologies of Smart Grid Signal
Processing Sensors", IEEE 3rd International Conference on
Automation, Electronics and Electrical Engineering, 2020.
[8] Mustafa Bilgin and Johannes Backhaus, "Printable smart
materials used as sensors for continuous monitoring in a smart
code", IEEE Green Technologies Conference, 2020.
[9] YongTak Yoon, JangSoo Lee, JinHo Lee, Beomjoon Kim
and Yalew Zelalem Jembre, "Adaptive Sensor Data
Transmission Scheduling Scheme for Smart Home Networks",
IEEE 92nd Vehicular Technology Conference, 2020.
[10] Mostafa Shamil Jassim and Pinar Sarisaray Boluk,
"Reliable Image Transmission in Wireless Sensor Networks

978-1-6654-8425-1/22/$31.00 ©2022 IEEE 632

Authorized licensed use limited to: VIT University. Downloaded on November 03,2022 at 06:55:26 UTC from IEEE Xplore. Restrictions apply.

You might also like