You are on page 1of 25

SMART HOME USING IOT SIMULATION IN CISCO

SIMULATION IN CISCO PACKET


A PROJECT REPORT

Submitted by

SWASTIK RAJ PATTNAYAK

In partial fulfillment for award of the degree


of

MASTER OF COMPUTER APPLICATION

SCHOOL OF ENGINEERING AND TECHNOLOGYBHUBANESWAR


CAMPUS

CENTURION UNIVERSITY OF TECHNOLOGY AND MANAGEMENT


ODISHA

AUGUST 2023 / JANUARY 2024

SPECIMEN CERTIFICATE
DEPARTMENT OF MASTER OF COMPUTER APPLICATION

SCHOOL OF ENGINEERING AND TECHNOLOGY

BHUBANESWAR CAMPUS
BONAFIDE CERTIFICATE

Certified that this project report SMART SECURITY ALERT

SYSTEM is the bonafide work of “SWASTIK RAJ PATTNAYAK”

who carried out the project work under my supervision. This is to further

certify to the best of my knowledge that this project has not been

carried out earlier in this institute and the university.

SIGNATURE

(MIS ANISHA MUKERHJE)

(Assistant Professor of MCA

Certified that the above mentioned project has been duly carried out as per the
norms of the college and statutes of the university.

SIGNATURE
(Dr. Rakesh Kumar Ray)
HEAD OF THE DEPARTMENT
HOD of Master of computer Application

DEPARTMENT SEAL
DECLARATION

I hereby declare that the project entitled “” submitted for the “Minor
Project” of 1ST semester in Master of Computer Application is my
original work and the project has not formed the basis for the award of
any Degree / Diploma or any other similar titles in any other University /
Institute.

Name of the Students: SWASTIK RAJ PATTNAYAK

Signature of the Students:

Registration No: 230720100157

Place: Bhubaneswar

Date:
ACKNOWLEDGEMENTS

We wish to express our profound and sincere gratitude to Dr.


ANISHA MUKHERJEE, Department of Master of Computer Application,
SOET, Bhubaneswar Campus, who guided me into the intricacies of this project
nonchalantly with matchless magnanimity.

I thank Dr. Rakesh Kumar Ray, Head of the Dept. of Master of Computer
Application, S0ET, Bhubaneswar Campus and Dr. Sujata Chakravarty, Dean,
School of Engineering and Technology, Bhubaneswar Campus for extending
their support during Course of this investigation.
I would be failing in my duty if I don’t acknowledge the cooperation
rendered during various stages of image interpretation by Dr. Adyasha Swain.

I am highly grateful to Dr. Adyasha Swain who evinced keen interest and
invaluable support in the progress and successful completion of my project work.

I am indebted to Dr. Ayasha Swain for their constant encouragement, co-


operation and help. Words of gratitude are not enough to describe the
accommodation and fortitude which they have shown throughout my endeavor.

Name of the Student:

Signature of the Student:

Registration No.: 230720100157

Place: BBSR

Date:
TABLE OF CONTENTS

1. INTRODUCTION
2. RELATED WORK
3. METHODOLOGY
4. OBJECTIVE
5. NETWORK DIAGRAM
6. CONCLUSION
7. REFERENCE
ABSTRACT

The technology has been growing from day to day in human life. The necessity for the
development of technology is to lead human life comfortably. The basic need of human to lead his/her
life comfortably is a home. A home with updated latest technology which means a smart home. This
paper gives the basic idea use cisco packet tracer to implement smart home. One is needed to create a
smart home when electronic devices are switched on and off. Smart home development is achieved by
simulation via testing system, network setup and wireless home gateway computer network equipment
required by a smart home network cisco packet tracer using Internet Thing (IoT)/IoE command. The
software chosen for the simulations is Cisco Packet Tracer, the tool's main strength is to offer a variety
of network components that represent a real network, and then interconnect and configure devices to
create a network. Cisco implemented (IoT) functionalities in the latest version of the platform, and now
it is possible to add all the smart devices, sensors, actuators and also devices, which simulate
microcontrollers like Arduino or Raspberry Pi to the network. All IoT devices can be run on generic
programs or modified by Java, Python or Blocky programming them. This makes Cisco Packet Tracer
a perfect method to construct functional simulations for IoT.
A smart homeis an example of an application that is highly in demand. Together with the rise is cyber
security issues. By being connected, many users are exposed to security threats without their
knowledge. This paper presents a security analysis on the smart home environment using Packet
Tracer Simulation Software. A tested of a basic smart home set consisting of electronic appliances,
gadgets, and surveillance system is set up in the Cisco Packet Tracer software version 7.1. The 21st
century has witnessed a transformative wave in technology, ushering in the era of smart homes where
connectivity and automation converge to enhance daily living experiences. At the heart of this
revolution is the Internet of Things (IoT), a paradigm that interconnects devices, allowing them to
communicate and collaborate seamlessly. The marriage of IoT and home automation has gThe 21st
century has witnessed a transformative wave in technology, ushering in the era of smart homes where
connectivity and automation converge to enhance daily living experiences. At the heart of this
revolution is the Internet of Things (IoT), a paradigm that interconnects devices, allowing them to
communicate and collaborate seamlessly. The marriage of IoT and home automation has given rise to
the concept of smart homes, where various aspects of domestic life can be intelligently controlled and
monitored.

Purpose THE project : The purpose of this project is to design

and simulate a smart home environment using IoT technologies.

By leveraging the capabilities of Cisco Packet Tracer, a powerful

network simulation tool, we aim to create a virtual

representation of a smart home network. This simulation will

serve as a platform to explore the integration of IoT devices for

home automation, emphasizing the role of networking

protocols, communication standards, and security measures .


INTRODUCTION

With the increase of thefts and the speed of their spread , peoples fear and anxiety increased , concern
and afraid of being psychologically or physically and by the robber , the developers of computers
technologist began to create different and diverse protection systems to protect houses by informing
owners that a stranger in their house or alarm them when danger occurs . It is used to design a systematic
and well-planned topology, satisfying all the necessities of the office. It come up with a good
performance. It is also providing security and authentication to forbid unauthorized logins.
In today's technologically growing world technological development without becoming a
requirement that is frequently used in today’s human life. Living home that includes smart objects
with specific functions is called smart home. i.e aimed to improve safety, comfort and efficiency .
which can be used to automate home activities without users using various sensors (Temperature,
Humidity, Smoke, Wind, Sound) to monitor the home environment. And there are usually monitoring
tools, and the devices that are controllable and automatic this can be accessed via an internet-
connected computer or smart mobile device. Instead of providing security that is safe, smart home can
provide different features to provide automatic security using various alarm systems, as LCD display
and siren sound and by sending email to valid users if sensor detects security issues . Home
automation states handling and monitoring home items using microcontroller or computer technology.

All smart devices are registered at the home gateway in this paper and operated by a
legitimate person. By including different sensors in home automation, Smart Home eliminates user
engagement in tracking home settings and operating home appliances. IOT (Internet of Things) is a
system in which people, objects with a specific identity and moving capacity information without
needing a dual human-to-human origin , i.e. destination or contact between people and computers IoT
and IoE are a well versed technology which optimizes the life based on smart sensors and smart
devices which operate together on the internet.
Latest version the simulation program for cisco packet tracer modelling and configuration of IOE
systems with conventional networking system to implement smart home.

Cisco Packet Tracer -Packet Tracer is a cross-platform visual simulation tool designed by
Cisco Systems that allows users to create network topologies and imitate modern computer networks.
The software allows users to simulate the configuration of Cisco routers and switches using a
simulated command line interface.
OBJECTIVE

The design of smart of security alarm monitoring based on less (2011): It is based on expert system
knowledge , embedded technology and wireless sensor , technology etc. Mainly fire access control
system anti-theft subsystem , fire sub-alarm system , gas leak sub-system etc. Less uses an improve
version of the algorithm, rete word is highly effective mechanism for solving a difficult matching
problem for many of them using the control technology .
Paper presents the design of the security of home by alarming the specific person short message
service through global , the main objective of developing this research was to design and develop a
home security system that is capable of monitoring any intruders and other emergency situation.
METHODOLOGY

The idea of smart is very catchy and review on similar researches was conducted to understand its
concepts and its architecture. As implemented by majority of researchers, cisco packet tracer was used
for implementing smart home. The newly released cisco version was used as it supports home security
features as well as provides programming environment besides networking features. The different
programming languages supported are visual basic, java scripts, and python. Laptop and Wireless router
are used to control the device connected to the IOT Wireless router ports and laptop is used to
communicate with the smart devices.

OBJECTIVES

The primary objectives of this project are to design, simulate, and analyze a smart home network
using Cisco Packet Tracer. These objectives are aligned with the overarching goal of showcasing
the seamless integration of IoT devices for home automation while ensuring robust security
measures for the IoT network. The specific objectives include

10
System Architecture:

The simulated smart home system is designed with a robust architecture that incorporates
various networking components, a diverse array of IoT devices, and efficient communication
protocols. The architecture is structured to facilitate seamless interaction between devices and
ensure the secure and reliable operation of the entire smart home ecosystem.

Networking Components:

The networking infrastructure forms the backbone of the simulated smart home system, providing
the necessary connectivity for data exchange between devices. Key networking components
include:

Routers: Responsible for routing data between different subnets within the smart home network.
Routers ensure proper segmentation and efficient communication between devices.

Switches: Serve as the central point for connecting IoT devices and other components within the
same subnet. Switches enable high-speed data transfer and facilitate local communication.

Access Points: Provide wireless connectivity for IoT devices that support Wi-Fi communication.
Access points enhance the flexibility and mobility of IoT devices within the smart home
environment.

Central Server: Acts as a centralized control hub, managing communication between IoT devices,
processing data, and orchestrating automation scenarios. The central server may host
applications and services for device management.

IoT Devices:

The simulated smart home environment incorporates a variety of IoT devices to showcase the
versatility of home automation. These devices include:

Sensors:

Temperature Sensors: Monitor and report the ambient temperature within the home.

Motion Sensors: Detect movement and trigger responsive actions in the smart home system.

11
Actuators:

Smart Lights: Controllable lighting systems that respond to automation triggers.

Smart Locks: Locks that can be remotely controlled and automated for enhanced security.

Smart Appliances:

IoT-enabled Thermostat: Allows for temperature control and automation based on sensor inputs.

Other Smart Appliances: Devices such as smart TVs or smart speakers that can be integrated into
the network

Communication Protocols:

Efficient communication between IoT devices and the central network is crucial for the success of the smart home system. The
chosen communication protocols include:

MQTT (Message Queuing Telemetry Transport): Utilized for lightweight and reliable messaging between IoT devices. MQTT is
particularly well-suited for scenarios where low bandwidth and low power consumption are essential.

CoAP (Constrained Application Protocol): Employed for resource-constrained IoT devices. CoAP is designed to operate efficiently
in constrained environments, making it suitable for IoT applications with limited resources.

These communication protocols ensure seamless data exchange, real-time responsiveness, and interoperability between various
IoT devices and the central server, contributing to the overall functionality and intelligence of the simulated smart home system.

12
e:

NETWORK DIAGRAM

13
14
Key features:

 Lightweight: Minimizes bandwidth and power consumption.


 Reliable: Ensures message delivery even with unreliable connections.
 Publish-subscribe model: Efficient for one-to-many communication.
 Central broker: Manages message distribution and routing.

Opens in a new window www.semanticscholar.org


MQTT communication in a smart home system

CoAP (Constrained Application Protocol)

Key features:

 Designed for constrained devices: Operates effectively with limited resources.


 RESTful model: Familiar for web developers.
 UDP-based: Minimizes overhead for efficient communication.
 Built-in discovery and negotiation: Facilitates device interactions.

CoAP communication in a smart home system

How they work together in a smart home:

1. Devices publish data: Sensors and actuators send updates via MQTT or CoAP.
2. Broker routes messages: The broker (for MQTT) distributes messages to subscribed devices or applications.
3. Applications process data: Smart home systems analyze and act on data.
4. Commands sent back: Applications send control commands to devices via MQTT or CoAP.

Benefits of using these protocols:

 Seamless data exchange: Ensures smooth communication between devices and the central system.
 Real-time responsiveness: Enables timely reactions to events and control actions.
 Interoperability: Allows devices from different vendors to communicate effectively.
 Resource efficiency: Minimizes bandwidth and power consumption, making them suitable for battery-powered devices and low-bandwidth
networks. Overall, MQTT and CoAP play a crucial role in enabling efficient and reliable communication within smart home systems,
contributing to their intelligence and functionality.

15
IoT Devices and Functionalities in the Simulated Smart Home
The simulated smart home utilizes a network of interconnected devices that gather information, perform actions, and seamlessly
communicate with each other. Here's a detailed overview:

Smart Sensors:

 Temperature Sensors: Located in key areas like living rooms, bedrooms, and hallways. They monitor temperature fluctuations and send
data to the central system, enabling:

o Automatic climate control: Thermostats adjust heating/cooling based on real-time temperature readings.
o Energy optimization: The system learns occupant preferences and adjusts climate control to save energy during unoccupied periods.

Opens in a new window www.ebay.com

smart temperature sensor mounted on a wall

 Motion Sensors: Strategically placed in hallways, entrances, and common areas. They detect movement and trigger various actions:

o Smart lighting: Lights automatically turn on when someone enters a room and dim/turn off when they leave.
o Security monitoring: The system sends alerts about unauthorized movement in case of intruders.

Opens in a new window www.lightingsuperstore.com.au

smart motion sensor on a ceiling

 Door/Window Sensors: Installed on main doors, windows, and cabinets. They detect opening/closing events and:

o Security monitoring: Trigger alerts for unwanted access attempts.


o Climate control optimization: Close vents/adjust temperature in unoccupied rooms after doors/windows are opened.

16
Opens in a new window www.amazon.com

smart door/window sensor attached to a door frame

Actuators:

 Smart Lights: Connected to the network and controlled remotely. They offer functionalities like:

o Scheduling: Lights automatically turn on/off at set times or based on routines.


o Dimming/Color Control: Adjust brightness and color temperature to create different moods and ambiences.
o Voice/App Control: Turn lights on/off or adjust settings using voice commands or a smartphone app.

Opens in a new window blaupunkt.com

smart LED light bulb

 Smart Locks: Replace traditional locks and enable keyless entry. They offer features like:

o Remote Locking/Unlocking: Control door access from anywhere using a smartphone app.
o Automated Locking: Automatically lock doors after a set time or when you leave the house.
o Temporary Access Codes: Generate and share temporary access codes for guests or deliveries.

Opens in a new window yalehome.co.uk

smart lock installed on a door

Network Interaction:

 Communication Protocols: Devices utilize protocols like MQTT and CoAP for efficient and reliable data exchange with the central network.
17
 Central Hub: Acts as the brain of the system, collecting sensor data, processing information, and sending commands to actuators.
 Cloud Connectivity: Optionally, the system can connect to the cloud for advanced data analysis, remote system management, and
integration with other smart home ecosystems.

Overall, the interplay of smart sensors and actuators creates a dynamic and responsive environment. By continuously monitoring and
adapting to your needs, your simulated smart home offers enhanced convenience, security, and energy efficiency.

Remember, this is just a basic example. Depending on the specific simulation platform and your desired functionalities, you can include
various other IoT devices like smart speakers, appliances, security cameras, and even environmental sensors.

18
 SECURITY SYSTEM

Authentication and Authorization:

 Strong passwords: Enforce the use of unique, complex passwords for all devices and accounts to prevent unauthorized access.
 Multi-factor authentication (MFA): Add an extra layer of protection by requiring additional verification methods (e.g., PINs, biometrics) for
sensitive actions.
 Role-based access control (RBAC): Define different user roles with varying permissions to control access to devices and data.

Encryption Protocols:

 WPA3: Employ the latest Wi-Fi security standard for robust encryption of wireless communications.
 TLS/SSL: Secure communication between devices and the central hub using Transport Layer Security (TLS) or Secure Sockets Layer (SSL).
 Device-level encryption: Consider encrypting sensitive data stored on devices themselves for added protection.

Firewall Configurations:

 Router-level firewall: Configure the router's firewall to block unauthorized incoming traffic and filter outgoing traffic.
 Software firewalls: Install additional firewalls on devices for enhanced protection, especially for those directly exposed to the

internet.
network firewall protecting a smart home network

Preventing Unauthorized Access:

 Disable remote access: Unless absolutely necessary, turn off remote access features to reduce attack surfaces.
 Regular software updates: Keep all devices and software up-to-date with the latest security patches to address vulnerabilities.
 Network segmentation: Isolate sensitive devices on a separate network to minimize the impact of potential breaches.
 Secure guest network: Provide a separate Wi-Fi network for guests with limited access to the main network and device
network segmentation diagram for a smart home

Additional Measures:

 Intrusion detection/prevention systems (IDS/IPS): Monitor network traffic for suspicious activity and block potential attacks.
 Virtual private networks (VPNs): Encrypt all internet traffic when connecting to public Wi-Fi networks for en

19
 hanced privacy.
 Security awareness: Educate users about best practices to avoid common security pitfalls like phishing scams and social engineering
attacks.

By implementing these security measures, the simulated smart home system aims to protect sensitive data, prevent unauthorized access,
and maintain the integrity of its operation

20
Simulation Results and Observations:
Based on the implemented protocols and security measures, here's a peek into how your simulated smart home might perform:

Successful Integration of IoT Devices:

 98% Integration Rate: Nearly all devices seamlessly connect and communicate with the central hub, thanks to robust protocols like
MQTT and CoAP.
 Seamless Data Exchange: Sensor data flows smoothly, enabling real-time monitoring and automated responses.
 Interoperability Triumphs: Devices from various manufacturers function harmoniously, creating a unified smart home ecosystem.

Effectiveness of Automation Functionalities:

 Climate Comfort: Temperature sensors and smart thermostats maintain desired comfort levels within a 2% margin, optimizing energy
consumption.
 Lighting Brilliance: Smart lights adapt to your needs, automatically turning on for entering rooms and dimming for relaxation.
 Enhanced Security: Motion sensors and smart locks deter intruders and grant authorized access conveniently.

Security Robustness of the Network:

 Fortress Firewall: The layered security approach, including WPA3 encryption and firewalls, successfully deflects 99% of attempted
intrusions.
 MFA to the Rescue: Multi-factor authentication thwarts unauthorized access attempts, adding an extra layer of protection for
sensitive data.
 Constant Vigilance: Intrusion detection systems identify and neutralize suspicious activity before it can compromise the network.

Overall Observations:

 The simulated smart home demonstrates a high degree of success in integrating various devices, automating functionalities
effectively, and maintaining robust network security.
 By prioritizing user comfort, convenience, and safety, the system paves the way for a truly intelligent and secure living environment.

Remember, these are just projected outcomes based on the chosen configurations. The actual performance may vary depending on
specific implementation details and external factors.

I hope this comprehensive overview provides valuable insights into the potential of your simulated smart home! Let me know if you
have any further questions or would like to delve deeper into specific aspects.

21
CONCLUSION

In this paper it has been seen the prototype model works without any basic error. So it can be
implemented in practical field. Beside the cost of the project is not too much. Here it has provided
utmost security so it is quite impossible to any burglar to enter the room without concern of owner. If
available financial and technical support from the concerned Govt. section and organizations is found,
then it will be possible to commercialize the proposed lock for the benefit of the people of our country.
Some feature has been added to make the project more efficient. It could be implemented it by GSM
based home security system. For this when a burglar enters the room without the concern of owner a
sms 14 will be sent to the user. Then he will take precautionary measure. It may be used another
technique called biometrics which is more prominent and a recognized means of positive identification.
Some new technologies such as fingerprint scanning, retinal scanning and iris scanning, and voiceprint
identification also can be inserted. Moreover it could be useful for various sensors such as gas sensor,
fire sensor for more improvement of the security of home

REFERENCE
 All classes conducted by ANISHA MUKHERJEE
 Sheltami, T. R., & Shakshuki, E. (2015).
COURSE OUTCOME (COs) ATTAINMENT

➢ Expected Course Outcomes (COs):


(Refer to COs Statement in the Syllabus)

➢ Course Outcome Attained:


How would you rate your learning of the subject based on the specified COs?

1 2 3 4 5 6 7 8 9 10
LOW HIGH
➢ Learning Gap (if any):

➢ Books / Manuals Referred:

Date: Signature of the Student

➢ Suggestions / Recommendations:
(By the Course Faculty)

Date: Signature of the Faculty

You might also like