Design of A Security System with Mobile Notifications in Case of Intrusion
Abstract
Physical security is a crucial aspect of cybersecurity, considering the constant risk of unauthorized intrusions and data theft that companies face. While conventional security measures like alarm systems and video surveillance aim to protect physical infrastructure, they often fall short of meeting businesses' actual requirements. It is vital for companies to have immediate awareness of intrusions and the ability to respond promptly. To tackle this challenge, the recommended approach involves implementing an alert security system that offers real-time notifications. This method entails deploying an Internet of Things (IoT) system equipped with sensors throughout the company's premises. These sensors are specifically designed to detect unauthorized entry, triggering instant alerts to the appropriate personnel via a dedicated mobile application. This application enables seamless communication with the IoT system, enabling swift decision-making in response to potential security breaches. In this research, the initial emphasis was on designing the system using Unified Modeling Language (UML) diagrams. Subsequently, the IoT system was implemented, integrating the necessary sensors. Additionally, a user-friendly application was developed to establish a secure connection between the company's system and employees' mobile devices. Through extensive research efforts, an effective and functional system capable of effectively safeguarding businesses has been successfully devised.
Downloads
References
K.A.M. Zeinab, and S.A.A. Elmustafa, “Internet of things applications, challenges and related future technologies,” World Scientific News, vol. 67, no. 2, pp. 126-148, 2017.
H. Koç, A.M. Erdoğan, Y. Barjakly, and S. Peker, “UML diagrams in software engineering research: a systematic literature review,’ In Proceedings, vol. 74, no. 1, pp. 1-13. 2021.
D. Grimaldi, and V. Fernandez, “Performance of an internet of things project in the public sector: The case of Nice smart city,” The Journal of High Technology Management Research, vol. 30, no. 1, pp. 27-39, 2019.
W.H. Hassan, “Current research on Internet of Things (IoT) security: A survei,” Computer networks, vol. 148, pp. 283-294, 2019.
M. Alsaffar, S. Aljaloud, B.A. Mohammed, Z.G. Al-Mekhlafi, T.S. Almurayziq, G. Alshammari, and A. Alshammari, “Detection of Web Cross-Site Scripting (XSS) Attacks,” Electronics, vol. 11, no. 14, pp. 2212, 2022.
H. Bersini, “Uml for abm,” Journal of Artificial Societies and Social Simulation, vol. 15, no. 1, pp. 9, 2012.
H.Koç, A.M. Erdoğan, Y. Barjakly, and S. Peker, “UML diagrams in software engineering research: a systematic literature review,” In Proceedings, vol. 74, no. 1, pp. 13, 2021.
S.I. Ayon, and A.S.B. Shahadat, “Smart Security Box using Arduino and GSM Module,” In 2019 IEEE International Conference on Robotics, Automation, Artificial-intelligence and Internet-of-Things, pp. 155-159, 2019.
A. Zifarelli, G. Menduni, M. Giglio, A. Elefante, A. Sukhinets, A. Sampaolo, P. Patimisco, S. Fangyuan, W. Chongwu, Q.J. Wang, and V. Spagnolo, “Compact and versatile QEPAS-based sensor box for simultaneous detection of methane and infrared absorber gas molecules in ambient air,” Frontiers in Environmental Chemistry, vol. 3, pp.1-12, 2022.
S. Bourekkache, O. Kazar, and A. Aloui, “Computer and Network Security: Ontological and Multi-agent System for Intrusion Detection,” J. Digit. Inf. Manag., vol. 17, no. 3, pp. 133, 2019.
J. Yoon, and S. Lee, “A method and tool to recover data deleted from a MongoDB,” Digital Investigation, vol. 24, pp. 106-120, 2018.
A.S. Ismailov, and Z.B. Jo‘Rayev, “Study of arduino microcontroller board,” Science and Education, vol. 3, no. 3, pp. 172-179, 2022.
B. Brahara, D. Syamsuar, and Y. Kunang, “Analysis of Malware Dns Attack on the Network Using Domain Name System Indicators”, J. Inf. Syst. Informatics, vol. 2, no. 1, pp. 131-153, Mar. 2020.
T.K. Woodstock, and R.F. Karlicek, “RGB color sensors for occupant detection: An alternative to PIR sensors,” IEEE Sensors Journal, vol. 20, no. 20, pp. 12364-12373, 2020.
W. Wang, A. Sadeqi, H.R. Nejad, and S. Sonkusale, “Cost-effective wireless sensors for detection of package opening and tampering,” IEEE Access, vol. 8, pp. 117122-117132, 2020.
S. Kim, and T.H. Baek, “Examining the antecedents and consequences of mobile app engagement,” Telematics and Informatics, vol. 35, no. 1, pp.148-158, 2018.
A. Balapour, H.R. Nikkhah, and R. Sabherwal, “Mobile application security: Role of perceived privacy as the predictor of security perceptions,” International Journal of Information Management, vol. 52, pp. 102063, 2020.
K. Dhenuvakonda, and A. Sharma, “Mobile apps and internet of things (IoT): A promising future for Indian fisheries and aquaculture sector,” Journal of Entomology and Zoology Studies, vol. 8, no. 1, pp. 1659-1669, 2020.
Y.C. Hsu, and Y.H. Ching, “Mobile app design for teaching and learning: Educators’ experiences in an online graduate course,” International Review of Research in Open and Distributed Learning, vol. 14, no. 4, pp. 117-139, 2013.


Copyright (c) 2023 Journal of Information Systems and Informatics

This work is licensed under a Creative Commons Attribution 4.0 International License.
- I certify that I have read, understand and agreed to the Journal of Information Systems and Informatics (Journal-ISI) submission guidelines, policies and submission declaration. Submission already using the provided template.
- I certify that all authors have approved the publication of this and there is no conflict of interest.
- I confirm that the manuscript is the authors' original work and the manuscript has not received prior publication and is not under consideration for publication elsewhere and has not been previously published.
- I confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- I confirm that the paper now submitted is not copied or plagiarized version of some other published work.
- I declare that I shall not submit the paper for publication in any other Journal or Magazine till the decision is made by journal editors.
- If the paper is finally accepted by the journal for publication, I confirm that I will either publish the paper immediately or withdraw it according to withdrawal policies
- I Agree that the paper published by this journal, I transfer copyright or assign exclusive rights to the publisher (including commercial rights)