Design of A Security System with Mobile Notifications in Case of Intrusion
DOI:
https://doi.org/10.51519/journalisi.v5i2.493Keywords:
Physical Security, Mobile Notification, Alert Security System, Internet of Things (Iot), Real-Time NotificationsAbstract
Physical security is a crucial aspect of cybersecurity, considering the constant risk of unauthorized intrusions and data theft that companies face. While conventional security measures like alarm systems and video surveillance aim to protect physical infrastructure, they often fall short of meeting businesses' actual requirements. It is vital for companies to have immediate awareness of intrusions and the ability to respond promptly. To tackle this challenge, the recommended approach involves implementing an alert security system that offers real-time notifications. This method entails deploying an Internet of Things (IoT) system equipped with sensors throughout the company's premises. These sensors are specifically designed to detect unauthorized entry, triggering instant alerts to the appropriate personnel via a dedicated mobile application. This application enables seamless communication with the IoT system, enabling swift decision-making in response to potential security breaches. In this research, the initial emphasis was on designing the system using Unified Modeling Language (UML) diagrams. Subsequently, the IoT system was implemented, integrating the necessary sensors. Additionally, a user-friendly application was developed to establish a secure connection between the company's system and employees' mobile devices. Through extensive research efforts, an effective and functional system capable of effectively safeguarding businesses has been successfully devised.
Downloads
References
K.A.M. Zeinab, and S.A.A. Elmustafa, “Internet of things applications, challenges and related future technologies,” World Scientific News, vol. 67, no. 2, pp. 126-148, 2017.
H. Koç, A.M. Erdoğan, Y. Barjakly, and S. Peker, “UML diagrams in software engineering research: a systematic literature review,’ In Proceedings, vol. 74, no. 1, pp. 1-13. 2021.
D. Grimaldi, and V. Fernandez, “Performance of an internet of things project in the public sector: The case of Nice smart city,” The Journal of High Technology Management Research, vol. 30, no. 1, pp. 27-39, 2019.
W.H. Hassan, “Current research on Internet of Things (IoT) security: A survei,” Computer networks, vol. 148, pp. 283-294, 2019.
M. Alsaffar, S. Aljaloud, B.A. Mohammed, Z.G. Al-Mekhlafi, T.S. Almurayziq, G. Alshammari, and A. Alshammari, “Detection of Web Cross-Site Scripting (XSS) Attacks,” Electronics, vol. 11, no. 14, pp. 2212, 2022.
H. Bersini, “Uml for abm,” Journal of Artificial Societies and Social Simulation, vol. 15, no. 1, pp. 9, 2012.
H.Koç, A.M. Erdoğan, Y. Barjakly, and S. Peker, “UML diagrams in software engineering research: a systematic literature review,” In Proceedings, vol. 74, no. 1, pp. 13, 2021.
S.I. Ayon, and A.S.B. Shahadat, “Smart Security Box using Arduino and GSM Module,” In 2019 IEEE International Conference on Robotics, Automation, Artificial-intelligence and Internet-of-Things, pp. 155-159, 2019.
A. Zifarelli, G. Menduni, M. Giglio, A. Elefante, A. Sukhinets, A. Sampaolo, P. Patimisco, S. Fangyuan, W. Chongwu, Q.J. Wang, and V. Spagnolo, “Compact and versatile QEPAS-based sensor box for simultaneous detection of methane and infrared absorber gas molecules in ambient air,” Frontiers in Environmental Chemistry, vol. 3, pp.1-12, 2022.
S. Bourekkache, O. Kazar, and A. Aloui, “Computer and Network Security: Ontological and Multi-agent System for Intrusion Detection,” J. Digit. Inf. Manag., vol. 17, no. 3, pp. 133, 2019.
J. Yoon, and S. Lee, “A method and tool to recover data deleted from a MongoDB,” Digital Investigation, vol. 24, pp. 106-120, 2018.
A.S. Ismailov, and Z.B. Jo‘Rayev, “Study of arduino microcontroller board,” Science and Education, vol. 3, no. 3, pp. 172-179, 2022.
B. Brahara, D. Syamsuar, and Y. Kunang, “Analysis of Malware Dns Attack on the Network Using Domain Name System Indicators”, J. Inf. Syst. Informatics, vol. 2, no. 1, pp. 131-153, Mar. 2020.
T.K. Woodstock, and R.F. Karlicek, “RGB color sensors for occupant detection: An alternative to PIR sensors,” IEEE Sensors Journal, vol. 20, no. 20, pp. 12364-12373, 2020.
W. Wang, A. Sadeqi, H.R. Nejad, and S. Sonkusale, “Cost-effective wireless sensors for detection of package opening and tampering,” IEEE Access, vol. 8, pp. 117122-117132, 2020.
S. Kim, and T.H. Baek, “Examining the antecedents and consequences of mobile app engagement,” Telematics and Informatics, vol. 35, no. 1, pp.148-158, 2018.
A. Balapour, H.R. Nikkhah, and R. Sabherwal, “Mobile application security: Role of perceived privacy as the predictor of security perceptions,” International Journal of Information Management, vol. 52, pp. 102063, 2020.
K. Dhenuvakonda, and A. Sharma, “Mobile apps and internet of things (IoT): A promising future for Indian fisheries and aquaculture sector,” Journal of Entomology and Zoology Studies, vol. 8, no. 1, pp. 1659-1669, 2020.
Y.C. Hsu, and Y.H. Ching, “Mobile app design for teaching and learning: Educators’ experiences in an online graduate course,” International Review of Research in Open and Distributed Learning, vol. 14, no. 4, pp. 117-139, 2013.
Downloads
Published
Issue
Section
License
Authors Declaration
- The Authors certify that they have read, understood, and agreed to the Journal of Information Systems and Informatics (JournalISI) submission guidelines, policies, and submission declaration. The submission has been prepared using the provided template.
- The Authors certify that all authors have approved the publication of this manuscript and that there is no conflict of interest.
- The Authors confirm that the manuscript is their original work, has not received prior publication, is not under consideration for publication elsewhere, and has not been previously published.
- The Authors confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- The Authors confirm that the manuscript is not copied from or plagiarized from any other published work.
- The Authors declare that the manuscript will not be submitted for publication in any other journal or magazine until a decision is made by the journal editors.
- If the manuscript is finally accepted for publication, the Authors confirm that they will either proceed with publication immediately or withdraw the manuscript in accordance with the journal’s withdrawal policies.
- The Authors agree that, upon publication of the manuscript in this journal, they transfer copyright or assign exclusive rights to the publisher, including commercial rights














