Volume 20 No 20 (2022)
 Download PDF
IoT Based Modular and Offline Security System Designed for Offender Detainment
Amaan Shaikh, Aman Pal, Mallika Ambhore, Amar Chavan, Amay Chivate, Prajyot Ambekar
Abstract
Since the beginning of time, people have been concerned about security, both for their own personal safety and the preservation of everything they hold. A variety of approaches have been used to achieve this goal. Modern security systems rely on a variety of sophisticated electrical technologies. Both the people who design security systems and those who attempt to breach them evolve over time. The security system concept proposed and described in this paper makes use of a number of already-available technologies, including face recognition, fingerprint authentication, personal identification number verification, and automated turrets. It seeks to make a target safer by combining the aspects of these that are more realistic and accurate in order to exponentially reduce the chances of a breach occurring, and if a breach does occur, it seeks to detain the perpetrator in the security room in lockdown mode using the autonomous turret in any of the available ways until the situation is taken under control. Here the modularity of the autonomous turret comes into play. It can be configured in multiple ways, from spewing fire suppressant to combat a fire in the security room to being equipped with tasers to temporarily disable perpetrators. The finest options for each circumstance have been suggested for the security system after several versions of these security measures were taken into account. Three different face recognition methods and three different retinal scan techniques were compared. Furthermore, a few variations of the personal identification number system and three variations of fingerprint scanning were also contrasted. The aim of these comparisons is to create the mathematically lowest probability of someone bypassing the entire security system. Keywords: Internet of Things (IoT), Person
Keywords
nternet of Things (IoT), Personal Identification Number (PIN), Face Recognition, Fingerprint Recognition, Automated Turrets, Detention
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.