You are on page 1of 19

Journal of Survey in Fisheries Sciences 10(1) 287-305 2023

An Implementation of Efficient Smart Street


Lights with Crime and Accident Monitoring:
A Review
Chua Tze Yong,1, , Chan Vei Hao1, Basheer Ruskhan2, Selina Kam Yee Lim1, Tan
Gian Boon1, , Then Sze Wei1, Sumathi Balakrishnan1and Imdad Ali Shah1

1
School of Computer Science, Faculty of Innovation & Technology, Taylor’s University, Malaysia
a)
tzeyong922@gmail.com, b) tommychan9881@gmail.com, c)selinalimky@gmail.com,
d)
rfgiant510@gmail.com, e)thenszewei@gmail.com,
f)
sumathi.balakrishnan@taylors.edu.my, g)imdadali.shah@taylors.edu.my
2
School of Computing and Informatics, Albukhary International university Alor Setar Kedah
Malaysia,
Emails: b.riskhan@aiu.edu.my

Abstract:- Smart street lights with crime and accident monitoring are the technology that adds sensors and
cameras to regular street lights to make public roads safer and more secure. These smart streetlights have motion
sensors, cameras, and other detection tools that can pick up on possible crimes or accidents and let the police
know. They can also collect data on traffic patterns, weather conditions, and other factors that can affect public
safety. The data collected from these smart streetlights can be analyzed using artificial intelligence (AI) and
machine learning algorithms to identify patterns and trends that can help authorities make informed decisions
about how to improve public safety. For example, if the data shows that a particular intersection is prone to
accidents, management can improve road infrastructure or increase police presence there. Smart streetlights with
crime and accident monitoring can help improve public safety and reduce crime rates by providing real-time
monitoring and analysis of public spaces. They can also work with other smart city technologies to make cities
more efficient and environmentally friendly. The primary objective of this research article is to find the solution
to the problem above in the form of smart streetlights (SSL), a type of smart device capable of communicating
with each other wirelessly, relaying important sensor data or video data to improve the usability of the city.
Further, this article consists of numerous literature reviews, methodology, and analysis of findings, such as how
the authors abstracted the findings and results from the literature review. The authors have also included an
implementation of the Tinkercad workflow to showcase the complete circuit board.

Keywords: Smart Street Lights (SSL), Traffic Monitoring, Crime Monitoring, Cloud Computing, Edge
Computing, Containers, Tinkercad, Sensors.

1. Introduction systems do not.


Smart streetlights are advanced lighting Energy Efficiency: Smart streetlights use
systems that incorporate technology to LED technology, which is more energy-
benefit urban areas. They are designed to be efficient than traditional lighting sources.
energy-efficient, environmentally friendly, This means that they consume less energy
and cost-effective, and they offer a range of and can significantly reduce energy costs.
features that traditional street lighting Motion Detection: Smart street lights are

287
Chua Tze Yong.et.al.,An Implementation of Efficient Smart Street Lights with Crime and Accident
Monitoring: A Review

equipped with sensors that detect motion, other environmental factors. This data can be
allowing them to turn on and off used to inform city planning and resource
automatically based on the presence or allocation decisions. Safety and Security:
absence of people or vehicles. Remote Smart street lights can improve safety and
Monitoring and Control: Smart street lights security in urban areas by providing brighter
can be remotely monitored [1-3] and and more consistent lighting, deterring
controlled, which makes it easier for crime, and increasing visibility [4-7]. Smart
municipalities to manage their lighting streetlights are a promising technology that
systems and respond quickly to maintenance can help cities become more sustainable,
needs. Data Collection: Smart street lights efficient, and livable. Fig 1 presents the
can be equipped with sensors that collect data lighting intellistreets.
on air quality, temperature, humidity, and

Figure 1 presents the LightingIntelliStreets [8]

During the first phase of the proposal, we could be further refined and enhanced. In
analysed the problem statement to lay out this project, we have added machine
our problems regarding the street lights. We learning and artificial intelligence to work
then proposed an application to come up more efficiently with the proposed cloud
with a possible solution for the street lights. and edge computing. Although the
We have also mentioned the requirement of suggestion and implementation of machine
the proposed smart street light and the learning and AI will be challenging.
design principle [8-11] of the smart street We also have completed the analysis of
light system. We drew out an architecture resources and the potential risks by
for reference and constraints, explaining all indicating the nine sections where possible
the functional entities. improvement could occur [12-14] . We are
In the project's second phase, we are using also trying to add more sensors to
the reflection from the previous section and implement more functions to the smart
the group project to find out the parts that street light. We are moving to an era where

288
Journal of Survey in Fisheries Sciences 10(1) 287-305 2023

electric vehicles will dominate in the future, criminal activity or accidents and to develop
and intelligent street lights will also work strategies for preventing or responding to
together with the vehicles synchronizing these incidents. Crime and accident
information exchange. There is an increase monitoring can be used to help law
in electric charging stations in first-world enforcement agencies identify high-risk areas
countries as well as Malaysia [15,16]. To and allocate resources more effectively. It can
focus on solving the current issues of smart also be used to help communities identify
street lights, we have acquired literature areas where additional safety measures may
reviews from a few research papers and be needed, such as increased lighting or
applied a method of gathering the data. improved pedestrian infrastructure. Crime
Then forming results and findings with the and accident monitoring is important for
collected data and showcase the updated maintaining public safety and reducing crime
Tinkercad with a few new features added to and accidents in communities. With a smart
the SSL system. streetlight system in place, communities may
The following points focused on this research feel more secure. Strategically placed lamps
article: can reduce both the crime rate and energy
• This research article discusses Smart consumption. Traditional street lighting
Street Lights (SSL). systems waste a lot of energy by leaving their
• This research article discusses Traffic lights on all night, from 6 p.m. to 6 a.m.,
Monitoring and Crime Monitoring. regardless of traffic or people in the area.
• This research article discussed Cloud Constant strain is placed on [17-19] lighting
Computing. budgets due to rising energy prices, high
• This research article is Containers, maintenance expenses, and rising public
Tinkercad, and Sensors. expectations. Technology that can help cities
better monitor and regulate their energy
2. Literature Review resources is becoming more viable thanks to
The monitoring process can include the use of semiconductor and wireless technology
various technologies such as surveillance developments. Fig 2 presents the traffic
cameras, sensors, and other monitoring monitoring system.
devices. Data collected from these devices
can then be analyzed to identify patterns of

Figure 2 presents the traffic monitoring and crime monitoring [20]

289
Chua Tze Yong.et.al.,An Implementation of Efficient Smart Street Lights with Crime and Accident
Monitoring: A Review

Here, we suggest a low-cost method for lighting systems have focused on finding
keeping an eye on the money spent on ways to reduce the need for human
streetlights and providing helpful life-cycle involvement, energy usage, and overall
management for the entire streetlight system costs. Until now, the most common
infrastructure. The primary function of method for automating light switching and
modern smart street lighting systems is to intensity has been to employ a controller in
respond to foot traffic by turning on or off conjunction with several sensors. Evaluating
and adjusting brightness. This way, when no the effectiveness of various street light
one is on the street at night, the lights may configurations in terms of energy savings
be turned off to save energy. Moreover, we and illumination is crucial. Energy-efficient
can automatically identify any broken methods and the design of smart street
lighting without human involvement. The lighting in terms of technology, types of
benefits of this system include reduced lights, operating patterns, and
energy use and savings due to the lights communication have all received attention
being dimmed during periods of low from many nations to lower greenhouse gas
activity, such as late at night. Also, the emissions. Simple temporal control circuitry
broken bulb is identified instantly by the for switching on and off the lights is typical
system using web-based software [20-22]. of most traditional street lighting control
When lamps are dimmed rather than turned systems that need human intervention [25,
off entirely, CO2 emissions can be lowered 26]. Yet they haven't accounted for the
while safety is increased. Many streetlight natural light or the swaying of nearby items.
system case studies and models are crucial To reduce the street lighting system's energy
to developing smart cities. LDR, IR, LED, consumption, the lights should turn on and
UART, and a CPU comprise the usual off based on the presence of a moving item
components of a smart streetlight system's and the surrounding illumination. Reduced
architecture. An LDR is a photoelectric power usage in street lighting can be
sensor used to turn on and off LED achieved through the use of motion and
streetlights in response to changes in detection-based control systems. Less
ambient temperature. Movement is tracked energy is used when streetlights are
by infrared sensors that provide data to a activated in response to the presence or
central processing unit. The streetlight is absence of passing people or cars. When
turned on and off with the help of a relay and compared to a control system with a
an LED that responds to its surroundings. specified and fixed behaviour, an adaptive
With the computer's UART interface, the control system for smart street lighting in a
lighting system may be managed. There is a city's infrastructure can reduce energy
pressing need to lessen the burden of consumption by up to 35%. Compared to
streetlights' high energy consumption and traditional systems, street lighting
upkeep costs in urban areas. The research automation and control systems based on the
indicates that 18%–of the streetlight system EN15323 standard may reduce energy usage
uses 38% of city electricity resources by 45 percent [27]. Using a three-phase
[23,24]. It is feasible to reduce power lighting system and developing a control
consumption without jeopardising human unit to regulate the brightness of each
safety by employing optimal systems and luminaire results in greater efficiency than a
processes. Recent studies on intelligent conventional single-phase street lighting

290
Journal of Survey in Fisheries Sciences 10(1) 287-305 2023

setup. Factors that influence active loss based smart street lighting systems require
reduction include pole-to-pole distance, intelligent controls for power optimization
luminaire density, outdoor lighting dimming [29]. This can be accomplished by
ratio, weather, wire conductivity, and street maintaining a greater level of intensity for
sand classification. LED lights, brightness high-speed items, such as vehicles, bicycles,
sensors, motion sensors, and a low-range and pedestrians, and lowering the intensity
communication network are the main for slower-moving things. LED, battery,
components of a smart street lighting infrared sensor, and LDR are all components
system. To save energy, the LED lights will that may be used to create such a system, and
activate and deactivate in response to together they can save as much as 40% on
passing pedestrians and cars. Using traffic monthly energy costs. In addition to
intensity data and a dynamic dimming automating the light settings, solar-powered
profile for LED luminaires, optimal energy autonomous street lighting systems can
savings and increased safety may be include GPS-based safety measures for
attained. To have a low-cost solution that people in dangerous circumstances. Fire,
reduces power consumption, a ambulances, and police stations are all part
microcontroller-based [28] energy-efficient of the emergency infrastructure.
LED street lighting system manages five
distinct brightness levels based on weather 3. Accident Monitoring
and daylight conditions, utilising various Accident monitoring is the process of
sensors including light, rain, lasers, etc. tracking, observing, and analyzing accidents
Wireless communication technologies are or incidents that occur within a particular
increasingly being integrated into street environment, such as a workplace or a
lighting systems because they can improve community. The goal of accident
efficiency, facilitate installation, and allow monitoring is to identify potential hazards
for greater customization. No substantial and risks and to develop strategies to prevent
changes are required to the existing future accidents from occurring. Accident
infrastructure for Wi-Fi-enabled remote monitoring can involve various methods,
on/off control of street lighting. including data collection and analysis,
Implementing a centralised control system observation, and reporting. It may also
for remote monitoring and control of LED involve the use of technology, such as
lights is now feasible through their sensors or cameras, to detect and monitor
integration with a low-power accidents or incidents. Accident monitoring
communication protocol like Zig Bee. To is essential for several reasons. First, it helps
save the most electricity possible, a smart to identify patterns and trends in accidents,
lighting system built on a low-power ZigBee which can be used to develop more effective
network employs electrical control of LED prevention strategies [30]. Second, it helps
lights that can adjust their brightness in to identify areas of risk and potential
response to the amount of light in the area hazards, which can be addressed before
and the traffic volume. Experimental results accidents occur. Finally, accident
reveal that this system may reduce energy monitoring can help to improve safety
consumption by 68% to 82% compared to culture and increase awareness of the
traditional metal halide lighting. The system importance of safety in the workplace or
was placed on a university campus. LED- community.

291
Chua Tze Yong.et.al.,An Implementation of Efficient Smart Street Lights with Crime and Accident
Monitoring: A Review

The research paper by (Iwasaki, Misumi, 4. Crime Monitoring


and Nakamiya, 2015) is regarding the Crime monitoring is the process of gathering
automatic surveillance of traffic flow to and analyzing information on criminal
identify traffic accidents without delay, and activities in a particular area or jurisdiction.
uses infrared cameras to capture stills of It involves using various tools and
the road. The paper uses a combination of techniques to collect data on crime trends,
spatiotemporal image processing patterns, and occurrences and identify
techniques, alongside a Viola-Jones potential hotspots. The research paper by
detector for vehicle detection, multistage. (Hussain, Sheng and Zhang, 2019) reviews
Cascade of classifiers for windshield research work between 2010-2018
identification and correction procedures regarding human activity recognition. The
for the misrecognition of vehicles. After research works presented the different
vehicle recognition, the car's speed is approaches used for activity recognition.
obtained by tracking the vehicle's The authors separated them into four main
movement using the cascade classifier and categories: radio frequency-based, sensor-
is classified into three different speed based, wearable device-based, and [32]
categories. Afterwards, conditions for vision-based. Besides, the authors explained
traffic accidents are set by the user for the the process of human recognition. It can be
automatic surveillance of the traffic flow, generally separated into four main phases:
and if these conditions are met, then a selecting and deploying sensors, collecting
traffic accident is estimated. The research data from the sensors, pre-processing and
paper by (Wang, Cai, Chen and Chen, feature selection from the data, and using
2016) uses an automotive infrared sensor machine learning to recognize or infer
to detect vehicles using a 2-step activities. The reviewed research also
framework consisting of vehicle candidate discussed different techniques for device-
generation (VCG) [31] and vehicle free human activity recognition. The authors
candidate verification (VCV). The grouped the method into 3 main categories:
methods for VCG include applying a low action-based, interaction-based, and motion-
threshold to the pixel values of the based. Besides, the 3 main categories were
infrared stills, so that pixels with higher further divided into 10 sub-categories.
points – indicating higher temperature, are Action-based activities include research for
retained. A region-searching algorithm is gesture recognition, posture recognition,
applied to eliminate the hotspots which behaviour recognition, activities of daily
are not vehicles, and contouring living, fall detection and ambient assisted
segmentation is done. The methods for possession. The research of motion-based
VCV include using a deep belief network approaches had been separated into
(DBN) based classifier for the tracking, motion detection and people
classification of cars, which resulted in a counting. For interaction based, the authors
detection rate of 93.9% for vehicles, reviewed works related to human-object
alongside a backpropagation algorithm to interaction. The research paper by (Tripathi,
fine-tune the parameters of the DBN- Jalal and Agrawal, 2018) discussed
based classifier. suspicious human activity recognition. The
authors focus on the following abnormal
activities: abandoned object detection,

292
Journal of Survey in Fisheries Sciences 10(1) 287-305 2023

health monitoring of elder or patient at system could satisfy the requirement of


home, theft detection, accident, or breaking low latency, data throughput, and
traffic rules activities (illegal U-turn, configuration, and hence realize a smart
reckless driving, illegal parking etc.), city. Besides that, it offers a flexible storage
violence detection (shooting, punching, and management service that could handle
hitting, slapping) at public places and fire the massive data processed by the city.
detection. Also, the authors had listed a few The research paper by (Sikder, Acar,
issues and challenges on developing an Aksu, Ulugac, Akkaya and Conti, n.d.)
intelligent video surveillance system provides an overview of an intelligent
including shadow of objects, [33] lighting system (SLS). A SLS usually
illumination changes, noise in the images, consists of 3 components, namely lamp
partial or full objects occlusions, more unit (LU), local control unit (LCU) and
crowds, blurred objects, real-time control center (CC). LU is the lamp which
processing, poor resolution, and static object is equipped with various sensors, LCU is
detection. Then, the authors reviewed some the component that collects data from an
studies on abnormal human activity area of LU,and CC is the central server
recognition from video surveillance. where the sensor data is sent from the LU
Generally, the recognition of suspicious and processed the data. The researchers'
human activity has 4 main steps: foreground SLS architecture will require long-range
object detection, tracking or non-tracking- and short-range communication
based object detection, feature extraction, protocols. The researchers have given
classification, behaviour analysis and examples of communication protocols
recognition. Besides, data sets that help to such as Zigbee, 6LoWPAN, Wifi etc. The
evaluate the performance of a system are researchers also explained some of the
listed by the authors for each field. usage scenarios for IoT-enabled indoor
and outdoor SLS and provided a power
5. Adaptive Lightning & Weather consumption analysis. From the result, the
Sensors SLS can reduce up to 33.33% power
The research paper by (Yang, Lee, Chen, consumption in both indoor and outdoor
Yang, Huang and Hou, 2020) suggested a settings.
smart streetlight system that can The research paper by (Keh, Lau and
efficiently configure, deploy, and manage Mohamad, 2020) aims to develop and
the streetlight. The researchers design a smart street lighting system
implemented Docker, a container-based based on Wireless Sensing Network
virtualization technology to achieve high (WSN) technology while using an
scalability and fast deployment. NoSQL adaptive control mechanism to realize
and in-memory databases are integrated energy-saving street lights. The paper
for database design to provide flexible uses energy-efficient LEDs in the street
data management. An asymmetric key lights, alongside the implementation of
and an SSH encryption tunnel is designed Pulse Width Modulation (PWM)
in this research paper for data technology for the adaptive control
transmission. Also, legitimacy validation mechanism. The illumination of the street
via token is conducted when all services lights is based on environmental sensors
are connected [34] . As a result, this such as motion sensors, rain sensors, light-

293
Chua Tze Yong.et.al.,An Implementation of Efficient Smart Street Lights with Crime and Accident
Monitoring: A Review

dependent resistors (LDR), and so on [35]. implement it into our system. We took
The default control is the adaptive cost into consideration and finalized an
mechanism, but when heavy traffic or idea where it would be the most cost-
severe environmental conditions – heavy effective as well as functional, effective
rain, flash floods, etc.- the lighting will be product to the market. First, we would
reverted back to a normal, non-adaptive need to find the features in-depth and get to
level. The research paper by (Satrya et al., know more. Once we know more features,
2017) proposes a weather-aware remote we would compare them to similar ideas,
monitoring system for street lights but they mostly do not have street lights
through color-changing LEDs and integrated into them and the features are
weather sensors. Different weather, like set up separately [38]. The research paper
fog, rain, snow, and so on will affect the by (Iwasaki, Misumi, and Nakamiya,
visibility of the street lights. Therefore the 2015), having features of crime
paper has implemented LEDs that vary in monitoring and the smart street light
color depending on the current weather system would be better if crime
situation then, so as to be able to increase monitoring could be implemented as it
visibility [36]. The paper uses WSN would bring better security to the people in
technology and connects wireless ZigBee the area. We bring forth the good features
sensors to existing streetlights for the where it could only bring benefits to the
provision of sensor data. Public weather people. We could also implement
reports back up the sensor data. The integrated crime monitoring, but it would
research paper by (Kucicky, Kolarik, cost us more than what we could afford,
Soustek, Kuncicky, and Martinek, 2020) and it would only serve the same purpose
proposed a modern smart lighting control of monitoring crime. We have also put in
system that integrated Message Queuing other features like speed monitoring to
Telemetry Transport (MQTT) protocol merge the speed camera to the traffic light,
and Ethernet network. The advantage of and this would be more efficient and cost-
the proposed system by the researchers is effective to do.
that system fits the requirements of smart Additionally, we have also come up with
cities [37]. The proposed connection and the features like weather monitoring and
controlling of public streetlights allow fast adaptive lighting to the street lights to
expansion of Smart technologies and make it more collective to data like
related services. The researchers also everyday weather data, as another bonus
discussed the requirements and influence add-on information to the weather station
of technologies to network bandwidth. and contributing by sending out
effectively collected data. It is seemingly
6. Methodology much simpler to transfer such data via
We collected the information by first smart streetlights. The features like crime
searching for relevant journals and articles monitoring, accident monitoring, weather
that are in relation to our smart street light monitoring, speed cam, and adaptive
system and we read it through thoroughly. lighting, we have thoroughly seen through
Once the reading material was eligible for several articles of different ways in terms
our criteria, we adopted a few of implementation. The selected ones in
characteristics and tried to propose and this report are the most efficient and more

294
Journal of Survey in Fisheries Sciences 10(1) 287-305 2023

environmentally friendly option by saving communication protocol that links the


more cost and saving more natural local control unit with all the SSL
resources to implement such ideas [39]. If controllers and long-range
this system was implemented, we would communication protocol that connects the
have a detection rate of 93.9 percent of local control unit to the SSL platform.
vehicles on the road for the accident After discussion with the team, we have
monitoring system as well as the detection decided to use 6LoWPAN protocol for
of criminal activities. We also have short-range communication. 6LoWPAN
adaptive lighting that can save 33.3% of is a low-power wireless mesh network
indoor and outdoor lighting through the with its own IPv6 address in each node.
implementation of adaptive lighting, which The node may connect through open
really saves electricity.We also have a standards straight to the internet.
weather sensor that could send the data to 6LoWPAN originated from the concept of
the public weather reports using 6lowpan the Internet Protocol being able. It should
technology. Through the research paper be applied to even the tiniest devices and
by (Sikder, Acar, Aksu, Ulugac, Akkaya allow devices that are low-power with
and Conti, n.d.), we have altered the limiting capabilities of processing to be
protocols we used in smart street lights. able to participate in the IoT. 6LoWPAN
We have compared them with other is able to provide a higher data rate to
literature reviews and found out that this ensure fast and smooth communication
suits us the best. In order to satisfy the between the components. It also allows
requirement of low latency, we chose to different applications to have access to the
implement Docker, a container-based system by providing a common
virtualization technology for the application platform for the purpose of
deployment to achieve high scalability sensor networks or IoT device integration.
and fast deployment. This means NoSQL Besides, 6LoWPAN is a very good choice
and in-memory databases are integrated because it consumes less power. This
for database design to provide flexible helps us to achieve our goal of lowering
data management [40]. We also have the energy consumption of a street light
chosen to implement encryption to secure system. It can support up to 1000 nodes
the data by using an asymmetric key and and has a wider range compared to other
an SSH encryption tunnel is designed in available protocols. Whereas, LoRaWan
this research paper for data transmission. is being used as the long-range
We picked these technologies, to help communication protocol because it offers
with the enhancement of the data a large coverage area of up to 5km in
transmission and the no need of setting up urban areas and 15km in suburban areas.
plenty of databases. Though we have Also, the main reason why we choose this
other encryption that’s available, the team protocol is because of its low power
has chosen the one as it was the optimal consumption and its ability to handle up to
one for our street light system. 1000 nodes for a single LoRa gateway.
Moreover, the security is guaranteed
7. Results and Findings because LoRaWan uses two layers of
The protocols that we are implementing in security that are network security and
our proposed SSL system is a short-range application security, both using 128-bit

295
Chua Tze Yong.et.al.,An Implementation of Efficient Smart Street Lights with Crime and Accident
Monitoring: A Review

session keys. We have decided to use more responsive service. The


cloud computing and Edge computing as a advancement in the technology of
platform to power the SSL system. We processing and storage makes it easier for
will first explain why we choose Cloud internet-based devices to increase
computing. When any critical data is lost, processing capacity and enable them to
cloud computing provides excellent analyse most of the data collected locally
protection. Because the data is kept in the instead of transmitting it to a Cloud
system, it may be readily retrieved even if Computing server. The protocols we used
your computer is destroyed. You may for secure communication between Edge
even delete data from lost computers and Cloud are RTMP AND WebSocket
remotely to prevent it from falling into the implemented in the edge node. The RTMP
wrong hands. Cloud computing also protocol maintains a continuous
offers high availability. Downtime may be connection between the player client and
catastrophic for companies that rely on server, enabling it to function as a conduit
apps to operate their essential activities. and provide
Companies may come to a halt as a video data to the viewer quickly. When
consequence of server failure, and getting transferring data, RTMP requires a three-
back online can be a difficult and time- way handshake since it is built on top of
consuming procedure. Losses may be the Transmission Control Protocol (TCP).
substantial. However, cloud hosting The initiator (client) requests that the
eliminates server failure that may cause accepter (server) establish a connection;
downtime. the accepter replies; and the initiator
A cloud environment is developed with a accepts the response and establishes a
guaranteed 99.9 percent uptime to provide connection between the two ends. As a
predictable and coherent performance. result, RTMP is very reliable. RTMP has
This is because customers on virtual different variations. The one we are
machines may move from the clustered focusing on here is RTMPS which is a
server in case of a problem. Cloud secure version of RTMP. With the
computing is also cost-saving. The RTMPS streaming protocol, the stream
necessity for in-house storage and between encoder and CDN may be
application needs, as well as overhead securely streamed, but not only by
expenses such as software upgrades, encrypting it. RTMPS also safeguards
administration, and data storage, may be against the impersonation of the domain.
eliminated by the usage of remote servers. Among the sender (you) and the recipient
Whereas Edge computing increases data (a CDN), a handshake is utilized to verify
security. Since data is decentralised and that your material is really being sent to
dispersed across the devices in which it is the correct destination. But both the video
generated, the whole network is encoder that streams the material and the
impossible to dismantle or compromise all CDN site that you broadcast must support
the data in one attack. Furthermore, Edge it in order to utilise secure live RTMPS
computing architecture provides an streaming. On the other hand, WebSocket
innovative solution to the reduction of Secure (WSS) protocol utilises
latency. It brings the critical processing conventional SSL and TLS encryption.
tasks closer to end users for a faster and The client and server may exchange

296
Journal of Survey in Fisheries Sciences 10(1) 287-305 2023

encrypted WebSocket communications its website and ensure that user data and
via a mutually agreed permission and information are protected during
authentication mechanism. This is transmission. SSL is a protocol used for
important when dealing with messages securing internet communications by
that involve the government, military as providing encryption of data in transit
well as corporate. Another two protocols between the user's browser and the
are used for communication between the Tinkercad website. When a user connects to
Web browser and the cloud: "HTTP/2" the Tinkercad website, their browser
and "WebSocket." The HTTPS protocol is initiates a secure SSL connection to the
used to encrypt data sent between the Tinkercad server. The SSL connection
browser and the cloud. To further improve encrypts the data transmitted between the
the performance and features of our SSL user's browser and the server, preventing
system. We have decided to apply unauthorized access to the data [41]. This
Machine Learning to the system. Machine helps to protect sensitive information such
learning can improve the overall IoT as login credentials, personal information,
scalability by analysing and summarizing and design data. Tinkercad uses a trusted
the data before it is transferred from one SSL certificate issued by a reputable
device to another. That being said, it Certificate Authority (CA) to ensure the
shrinks large amounts of data to easily authenticity and integrity of the SSL
manageable size and allows large connection. This means that users can be
quantities of IoT devices to be linked. confident that they are communicating with
Also, Machine learning is able to analyse the genuine Tinkercad website and that their
and address inefficiencies to notify a data is protected from interception and
business where they spend unnecessary tampering by third parties. Tinkercad's SSL
time and suggest a new workflow for system helps to ensure that user data is kept
better time management. secure and private during transmission over
the internet, which is essential for
8. Tinkercad Workflow maintaining trust and confidence in the
Tinkercad, a web-based 3D design platform, platform.
uses Secure Sockets Layer (SSL) to secure

297
Chua Tze Yong.et.al.,An Implementation of Efficient Smart Street Lights with Crime and Accident
Monitoring: A Review

Figure 3 presents the Tinkercad SSL system

As shown above, Fig 3, presents the consumption, The LED will not light up
tinkercad SSL system, this is the first part even though the PIR sensor detects
of the SSL system that demonstrates how motion, but the brightness around the
dynamic lighting control, crime/accident streetlight is sufficient, and the fog level is
monitoring, and humidity monitoring low. This explains the situation where
work. The brightness around the area of there is a car or people detected by the
streetlight, motion, and fog detected helps sensor in the daytime but definitely, the
in lighting control. The photoresistor is vision is clear enough, so there is no need
used to detect the amount of light around for a streetlight to be lit up. The whole
the street light. If the surrounding light is process will loop again after one second to
bright, for example, during day time, the decide the value set to the
LED representing the streetlight will not LED.Potentiometer as an input will act as
light up. The LED will not light up when the sensor for monitoring humidity. Neo
the smoke detector detects minimal fog. Pixel from "Adafruit" will be used as the
The photoresistor works along with the output here, which consists of Red, Blue
smoke detector that detects fog around the and Green LEDs. The value gathered by
streetlight. In the situation where there is the sensor will determine the amount of
no motion detected by the PIR sensor light presented on the LEDs. The Red
(indicating no car or objects nearby), but LED will be the brightest when the
the brightness of the light is under a certain surrounding is dry. The Blue LED will
level, and the amount of fog reaches a appear brightest when the surrounding is
certain point, the LED will light up but not wet. And the Green LED is the middle
with the full brightness. However, when output when the humidity is at a moderate
there is motion detected, the LED will level [42]. A crime/accident monitoring
brighten up for a few seconds, manifesting feature is also included here. Because the
the streetlight to be brighter for better infrared camera is not available in
vision. To achieve the minimum power Tinkercad, we decided to replace it with a

298
Journal of Survey in Fisheries Sciences 10(1) 287-305 2023

PIR sensor. When there is motion detected activated. Fig 4, presents the temperature
(indicating there is illegal human activity feature part 1.
or accident), the buzzer piezo will be

Figure 4 Temperature Feature Part 1

Figure 5 Temperature Feature Part 2

Pictured above in Figure 4 and 5 shows


the second part linked to Arduino 2. The
feature that is focusing here is
temperature detection. A potentiometer
and a temperature sensor and a LCD are
being used. The LCD will display the
actual temperature detected by the
temperature sensor. And the
potentiometer will allow turning on and
off of the LCD by the users.

299
Chua Tze Yong.et.al.,An Implementation of Efficient Smart Street Lights with Crime and Accident
Monitoring: A Review

Figure 6 Speed Detection Feature Part 1

Figure 7 Speed Detection Feature Part 2


There are many benefits that can be
Figure 6 and 7 above displays the part brought by the SSL, however, there are
that connects to Arduino 3 which focuses still limitations for the system where one
on the speed detection feature. There are of them is the higher complexity of SSL
potentiometers, ultrasonic sensors and an than the traditional streetlight system due to
LCD. The ultrasonic sensor detects the the connections between more sensors in
distance of an object. And the speed of the the SSL to achieve the required functions.
object will be obtained through Another challenge would be the lack of
calculation and the delayed time plays an proven business cases since the idea of
important role in speed calculation. The implementing IoT on streetlight systems
speed of the object is then displayed on was only introduced in recent years. And
the LCD. regarding the lifespan of lighting
infrastructure, the embedded system needs
9. Discussion to be highly adaptable over a long period

300
Journal of Survey in Fisheries Sciences 10(1) 287-305 2023

of time which is normally around 20 years currently which is set to switch on for a
[43]. Privacy would also be one of the fixed period without analysing the actual
issues for the SSLwith the large amount of situation. To achieve a better traffic and
private or confidential information crime monitoring system, we have
collected from the sensors. implemented infrared sensor cameras
The future improvement needed to that can identify objects in dim areas and
overcome the challenges mentioned above an ultrasonic sensor for speed detection to
includes a scalable platform to integrate lower the chance of a vehiclefrom
the components in the system to reduce speeding up. Also, Piezo sensor is used,
the complexity of the system. The SSL which will buzz a tone to notify the
should offer ease of maintenance; hence nearby police if there are suspicious
the maintenance cost can be reduced and illegal activities or accidents happening
hence increasing cost efficiency [44]. The within the coverage areas. The second
software system used to support our SSL objective of the paper is to lower the
has to be upgradable in order to adapt for maintenance cost for the streetlight. The
a long period of time. Cyber security and problem that arises with the traditional
data encryption are crucial to protect the streetlight is the need for a routine check-
private and confidential information up by a technician or through citizen
collected from the sensors. complaints in order to identify a faulty
streetlight. The SSL system that we
10. Conclusion and Future Work proposed implemented fault detection
In conclusion, our proposed SSL system and alarm FE. Electric parameter values
can achieve the two main objectives of are used to monitor the functioning
this paper. The objective of our proposed condition of SSLs. The FE may detect
application is to introduce adaptive errors or disconnects in SSLs, and, if any
lighting whilst lowering energy faults or disconnections occur, it will
consumption rates and also to allow real- produce a fault report. It then activates an
time monitoring of the surroundings of alert and automatically provides notice.
the street lights, be it for traffic For example, if a light or circuit is not
monitoring or crime monitoring. The new functioning correctly, the SSL platform
SSL system has implemented various will create an alert message and transmit
sensors ranging from a photoresistor it promptly to the maintenance personnel.
sensor that detects the brightness of light
around the streetlight to further decide if REFERENCES
it is required to switch on a streetlight, a 1.Iwasaki, Y., Misumi, M. and Nakamiya,
smoke detector that detect the fog level T., 2015. Robust Vehicle Detection
around the streetlight, PIR sensor that under Various Environments to Realize
detects motion and potentiometer that Road Traffic Flow Surveillance Using
detects the humidity around the an Infrared Thermal Camera. The
streetlight. All data collected from these Scientific World Journal, 2015.
different sensors are essential to decide if 2.Wang, H., Cai, Y., Chen, X. and Chen, L.,
any situation requires a streetlight to be 2016. Night-Time Vehicle Sensing in
switched on or off. This stands out from Far Infrared Image with Deep Learning.
the traditional streetlight in Malaysia Journal of Sensors, 2016.

301
Chua Tze Yong.et.al.,An Implementation of Efficient Smart Street Lights with Crime and Accident
Monitoring: A Review

3.Keh, K., Lau, S. and Mohamad, H., 2020. 232/


An Energy-efficient Smart Street
Lighting System with Adaptive Control 9.Kuncicky, R., Kolarik, J., Soustek, L.,
based onEnvironment. Borneo Journal Kuncicky, L., Martinek, R. 2020. IoT
of Sciences and Technology. approach to Street Lighting Control
4.Satrya, G., Reda, H., Woo, K., Daely, P., Using MQTT Protocol. [online]
Shin, S. and Chae, S., 2017. IoT and researchgate.com<https://www.research
Public Weather Data Based Monitoring gate.net/publication/332402464_IoT_Ap
& Control Software Development for proach_to_Street_Lig
Variable Color Temperature LED Street hting_Control_Using_MQTT_Protocol
Lights. International Journal on > [Accessed 13 June 2021].
Advanced Science, Engineering and 10. Amx.com. 2020. [online] Available
Information Technology, 7(2). at:<https://www.amx.com/en/site_eleme
5.Yang, Y., Lee, S., Chen, G., Yang, C., nts/benefits-and-applications-of-
Huang,Y, and Hou,T., 2020. An websockets> [Accessed 26 June 2021].
Implementation of High Efficient Smart 11. Marr, B., 2020. 3 Advantages (And
Street Light Management System for 1 Disadvantage) Of Edge Computing.
Smart City. [Online] Research Gate. [online] Forbes. Available at:
Available at: <https://www.forbes.com/sites/bernard
<https://www.researchgate.net/publication/ marr/2020/09/16/3- advantages-and-1-
339417714_An_Implementation_of_Hi disadvantage-of-edge-
gh computing/?sh=7975d0eefc71>
_Efficient_Smart_Street_Light_Managem [Accessed 26 June 2021].
ent_System_for_Smart_City> 12. Gyarmathy, G., 2019. Reducing
[Accessed 7 May 2021]. Latency With Edge Computing and
6.Tripathi , K.T., Jalal, A.S., Agrawal, S.C., Network Optimization. [online]
2018. Suspicious Human Activity Vxchnge.com. Available
Recognition: A Review. [online] at:<https://www.vxchnge.com/blog/how
ResearchGate.com. Available at: -data-center-reduces-latency>
<https://www.researchgate.net/publication/ [Accessed 26 June 2021].
314126434_Suspicious_human_activity 13. Victories, V., 2018. 10 Benefits of
_re cognition_a_review>[Accessed 10 Cloud Computing for Businesses.
June 2021]. [online] Web Hosting Blog from
7.Hussain, Z., Sheng, M., Zhang, W.E., eUKhost. Available at:
2019. Different Approaches for Human <https://www.eukhost.com/blog/webhos
Activity Recognition: A Survey. [PDF] ting/10-benefits-of-cloud-computing-
Available at: for- businesses/> [Accessed 26 June
<https://arxiv.org/pdf/1906.05074.pdf?fbcli 2021].
d=IwAR2PezfOR1juCZjGKKeP- 14. Livestorm.co. 2021. What is RTMP
_qIaf4CTJf1E1wcX7bkppUf1wXkcR- | Livestorm. [online] Available at:
RWitvt1k> [Accessed 10 June 2021]. <https://livestorm.co/webinar-
glossary/rtmp> [Accessed 26 June
8.Manufacturer: 2021].
https://www.manufacturer.lighting/info/ 15. Gaur, L., Afaq, A., Solanki, A.,

302
Journal of Survey in Fisheries Sciences 10(1) 287-305 2023

Singh, G., Sharma, S., Jhanjhi, N. Z., ... 21. Adeyemo, V. E., Abdullah, A.,
& Le, D. N. (2021). Capitalizing on big JhanJhi, N. Z., Supramaniam, M., &
data and revolutionary 5G technology: Balogun, A. O. (2019). Ensemble and
Extracting and visualizing ratings and deep-learning methods for two-class and
reviews of global chain multi-attack anomaly intrusion
hotels. Computers and Electrical detection: An empirical
Engineering, 95, 107374. study. International Journal of
16. Diwaker, C., Tomar, P., Solanki, Advanced Computer Science and
A., Nayyar, A., Jhanjhi, N. Z., Abdullah, Applications, 10(9)
A., & Supramaniam, M. (2019). A new doi:https://doi.org/10.14569/IJACSA.2
model for predicting component-based 019.0100969
software reliability using soft 22. Gaur, L., Singh, G., Solanki, A.,
computing. IEEE Access, 7, 147191- Jhanjhi, N. Z., Bhatia, U., Sharma, S., ...
147203. & Kim, W. (2021). Disposition of youth
17. Sennan, S., Somula, R., Luhach, A. in predicting sustainable development
K., Deverajan, G. G., Alnumay, W., goals using the neuro-fuzzy and random
Jhanjhi, N. Z., ... & Sharma, P. (2021). forest algorithms. Human-Centric
Energy efficient optimal parent Computing and Information
selection based routing protocol for Sciences, 11, NA.
Internet of Things using firefly 23. Lim, M., Abdullah, A., & Jhanjhi,
optimization algorithm. Transactions on N. Z. (2021). Performance optimization
Emerging Telecommunications of criminal network hidden link
Technologies, 32(8), e4171. prediction model with deep
18. Hussain, S. J., Ahmed, U., Liaquat, reinforcement learning. Journal of King
H., Mir, S., Jhanjhi, N. Z., & Humayun, Saud University-Computer and
M. (2019, April). IMIAD: intelligent Information Sciences, 33(10), 1202-
malware identification for android 1210.
platform. In 2019 International 24. Hussain, K., Hussain, S. J., Jhanjhi,
Conference on Computer and N. Z., & Humayun, M. (2019, April).
Information Sciences (ICCIS) (pp. 1-6). SYN flood attack detection based on
IEEE. bayes estimator (SFADBE) for
19. Shafiq, M., Ashraf, H., Ullah, A., MANET. In 2019 International
Masud, M., Azeem, M., Jhanjhi, N., & Conference on Computer and
Humayun, M. (2021). Robust cluster- Information Sciences (ICCIS) (pp. 1-4).
based routing protocol for IoT-assisted IEEE.
smart devices in WSN. Computers, 25. Srinivasan, K., Garg, L., Datta, D.,
Materials & Continua, 67(3), 3505- Alaboudi, A. A., Jhanjhi, N. Z.,
3521. Agarwal, R., & Thomas, A. G. (2021).
20. https://www.researchgate.net/publi Performance comparison of deep cnn
cation/233823923_Traffic_Monitoring_ models for detecting driver’s
Using_M2M_CommunicationM2M_to distraction. CMC-Computers, Materials
ngsin- & Continua, 68(3), 4109-4124.
eul_sayonghan_teulaepig_moniteoling/ 26. Muhammad Ibrahim Khalil, N.Z.
figures?lo=1 Jhanjhi, Mamoona Humayun,

303
Chua Tze Yong.et.al.,An Implementation of Efficient Smart Street Lights with Crime and Accident
Monitoring: A Review

SivaKumar Sivanesan, Mehedi Masud, routing protocol for wireless sensor


M. Shamim Hossain, Hybrid smart grid network. In 16th international
with sustainable energy efficient conference on advanced communication
resources for smart cities, Sustainable technology (pp. 808-814). IEEE.
Energy Technologies and Assessments, 33. Khan, N. A., Brohi, S. N., &
Volume 46, 2021, 101211, ISSN 2213- Jhanjhi, N. Z. (2020). UAV’s
1388, applications, architecture, security
https://doi.org/10.1016/j.seta.2021.1012 issues and attack scenarios: A survey.
11 In Intelligent Computing and Innovation
27. A. Almusaylim, Z., Jhanjhi, N. Z., on Data Science: Proceedings of
& Alhumam, A. (2020). Detection and ICTIDS 2019 (pp. 753-760). Springer
mitigation of RPL rank and version Singapore.
number attacks in the internet of things: 34. Ali, S., Hafeez, Y., Jhanjhi, N. Z.,
SRPL-RP. Sensors, 20(21), 5997. Humayun, M., Imran, M., Nayyar, A., ...
28. Lim, M., Abdullah, A., Jhanjhi, N. & Ra, I. H. (2020). Towards pattern-
Z., & Supramaniam, M. (2019). Hidden based change verification framework for
link prediction in criminal networks cloud-enabled healthcare component-
using the deep reinforcement learning based. Ieee Access, 8, 148007-148020.
technique. Computers, 8(1), 8. 35. Shah, I. A., Jhanjhi, N. Z.,
29. Fatima-tuz-Zahra, N. Jhanjhi, S. N. Humayun, M., & Ghosh, U. (2022).
Brohi and N. A. Malik, "Proposing a Impact of COVID-19 on Higher and
Rank and Wormhole Attack Detection Post-secondary Education Systems.
Framework using Machine Learning," In How COVID-19 is Accelerating the
2019 13th International Conference on Digital Revolution (pp. 71-83).
Mathematics, Actuarial Science, Springer, Cham.
Computer Science and Statistics 36. Shah, I. A., Jhanjhi, N. Z., Amsaad,
(MACS), Karachi, Pakistan, 2019, pp. F., & Razaque, A. (2022). The Role of
1-9, doi: Cutting-Edge Technologies in Industry
10.1109/MACS48846.2019.9024821. 4.0. In Cyber Security Applications for
30. Humayun, M., Jhanjhi, N. Z., Industry 4.0 (pp. 97-109). Chapman and
Alruwaili, M., Amalathas, S. S., Hall/CRC.
Balasubramanian, V., & Selvaraj, B. 37. Shah, I. A. (2022). Cybersecurity
(2020). Privacy protection and energy Issues and Challenges for E-
optimization for 5G-aided industrial Government During COVID-19: A
Internet of Things. IEEE Access, 8, Review. Cybersecurity Measures for E-
183665-183677. Government Frameworks, 187-222.
31. Lee, S., Abdullah, A., Jhanjhi, N., 38. -Government Security and Privacy
& Kok, S. (2021). Classification of Issues: Challenges and Preventive
botnet attacks in IoT smart factory using Approaches. In Cybersecurity Measures
honeypot combined with machine for E-Government Frameworks (pp. 61-
learning. PeerJ Computer Science, 7, 76). IGI Global.
e350. 39. Shah, I. A. (2022). Cybersecurity
32. Zaman, N., Low, T. J., & Alghamdi, Issues and Challenges for E-
T. (2014, February). Energy efficient Government During COVID-19: A

304
Journal of Survey in Fisheries Sciences 10(1) 287-305 2023

Review. Cybersecurity Measures for E-


Government Frameworks, 187-222.
40. Shah, I. A., Sial, Q., Jhanjhi, N. Z.,
& Gaur, L. (2023). Use Cases for Digital
Twin. In Digital Twins and Healthcare:
Trends, Techniques, and
Challenges (pp. 102-118). IGI Global.
41. Cybersecurity and Blockchain
Usage in Contemporary Business.
In Handbook of Research on
Cybersecurity Issues and Challenges for
Business and FinTech Applications (pp.
49-64). IGI Global.
42. S Umrani, S Rajper, SH Talpur, IA
Shah, A Shujrah - Indian Journal of
Science and Technology, 2020
43. The Role of the IoT and Digital
Twin in the Healthcare Digitalization
Process: IoT and Digital Twin in the
Healthcare Digitalization Process.
In Digital Twins and Healthcare:
Trends, Techniques, and
Challenges (pp. 20-34). IGI Global.
44. Kiran, S. R. A., Rajper, S., Shaikh,
R. A., Shah, I. A., & Danwar, S. H.
(2021). Categorization of CVE Based on
Vulnerability Software By Using
Machine Learning
Techniques. International
Journal, 10(3).

305

You might also like