This paper is published in Volume-5, Issue-2, 2019
Area
IoT
Author
Kaviya S., Divya Lakshmi R., Jenifa G.
Org/Univ
KPR Institute of Engineering and Technology, Coimbatore, Tamil Nadu, India
Keywords
IoT tecnique, Intrusion detection, DES, RSA
Citations
IEEE
Kaviya S., Divya Lakshmi R., Jenifa G.. Ensure the securities in IoT for smart home monitoring system, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Kaviya S., Divya Lakshmi R., Jenifa G. (2019). Ensure the securities in IoT for smart home monitoring system. International Journal of Advance Research, Ideas and Innovations in Technology, 5(2) www.IJARIIT.com.
MLA
Kaviya S., Divya Lakshmi R., Jenifa G.. "Ensure the securities in IoT for smart home monitoring system." International Journal of Advance Research, Ideas and Innovations in Technology 5.2 (2019). www.IJARIIT.com.
Kaviya S., Divya Lakshmi R., Jenifa G.. Ensure the securities in IoT for smart home monitoring system, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Kaviya S., Divya Lakshmi R., Jenifa G. (2019). Ensure the securities in IoT for smart home monitoring system. International Journal of Advance Research, Ideas and Innovations in Technology, 5(2) www.IJARIIT.com.
MLA
Kaviya S., Divya Lakshmi R., Jenifa G.. "Ensure the securities in IoT for smart home monitoring system." International Journal of Advance Research, Ideas and Innovations in Technology 5.2 (2019). www.IJARIIT.com.
Abstract
Smart building using IOT technique is used to maintain home automation in a smart way. In order to improve security in the home, the various sensor is used. In that PIR and MQ-6 sensors plays a major role. The data from various sensors are sent to the Arduino board and get stored in the cloud. In this paper home monitoring system with intrusion, detection technique is used. For data security, wireless sensor network (WSN) playa a major role. To facilitate data encryption, a method namely DES based on efficient key generation mechanism was proposed.