Design of A Security System with Mobile Notifications in Case of Intrusion

  • Yanogo Kiswendsida Jean Hermann Institute of Computer Engineering and Telecommunication Polytechnic, Burkina Faso
  • Gerald Yirga Institute of Computer Engineering and Telecommunication Polytechnic, Burkina Faso
  • Nabolle Rachid Gaetan Institute of Computer Engineering and Telecommunication Polytechnic, Burkina Faso
  • Kabore Baowendnere Tanguy Institute of Computer Engineering and Telecommunication Polytechnic, Burkina Faso
Keywords: Physical Security, Mobile Notification, Alert Security System, Internet of Things (Iot), Real-Time Notifications

Abstract

Physical security is a crucial aspect of cybersecurity, considering the constant risk of unauthorized intrusions and data theft that companies face. While conventional security measures like alarm systems and video surveillance aim to protect physical infrastructure, they often fall short of meeting businesses' actual requirements. It is vital for companies to have immediate awareness of intrusions and the ability to respond promptly. To tackle this challenge, the recommended approach involves implementing an alert security system that offers real-time notifications. This method entails deploying an Internet of Things (IoT) system equipped with sensors throughout the company's premises. These sensors are specifically designed to detect unauthorized entry, triggering instant alerts to the appropriate personnel via a dedicated mobile application. This application enables seamless communication with the IoT system, enabling swift decision-making in response to potential security breaches. In this research, the initial emphasis was on designing the system using Unified Modeling Language (UML) diagrams. Subsequently, the IoT system was implemented, integrating the necessary sensors. Additionally, a user-friendly application was developed to establish a secure connection between the company's system and employees' mobile devices. Through extensive research efforts, an effective and functional system capable of effectively safeguarding businesses has been successfully devised.

Downloads

Download data is not yet available.

References

K.A.M. Zeinab, and S.A.A. Elmustafa, “Internet of things applications, challenges and related future technologies,” World Scientific News, vol. 67, no. 2, pp. 126-148, 2017.

H. Koç, A.M. Erdoğan, Y. Barjakly, and S. Peker, “UML diagrams in software engineering research: a systematic literature review,’ In Proceedings, vol. 74, no. 1, pp. 1-13. 2021.

D. Grimaldi, and V. Fernandez, “Performance of an internet of things project in the public sector: The case of Nice smart city,” The Journal of High Technology Management Research, vol. 30, no. 1, pp. 27-39, 2019.

W.H. Hassan, “Current research on Internet of Things (IoT) security: A survei,” Computer networks, vol. 148, pp. 283-294, 2019.

M. Alsaffar, S. Aljaloud, B.A. Mohammed, Z.G. Al-Mekhlafi, T.S. Almurayziq, G. Alshammari, and A. Alshammari, “Detection of Web Cross-Site Scripting (XSS) Attacks,” Electronics, vol. 11, no. 14, pp. 2212, 2022.

H. Bersini, “Uml for abm,” Journal of Artificial Societies and Social Simulation, vol. 15, no. 1, pp. 9, 2012.

H.Koç, A.M. Erdoğan, Y. Barjakly, and S. Peker, “UML diagrams in software engineering research: a systematic literature review,” In Proceedings, vol. 74, no. 1, pp. 13, 2021.

S.I. Ayon, and A.S.B. Shahadat, “Smart Security Box using Arduino and GSM Module,” In 2019 IEEE International Conference on Robotics, Automation, Artificial-intelligence and Internet-of-Things, pp. 155-159, 2019.

A. Zifarelli, G. Menduni, M. Giglio, A. Elefante, A. Sukhinets, A. Sampaolo, P. Patimisco, S. Fangyuan, W. Chongwu, Q.J. Wang, and V. Spagnolo, “Compact and versatile QEPAS-based sensor box for simultaneous detection of methane and infrared absorber gas molecules in ambient air,” Frontiers in Environmental Chemistry, vol. 3, pp.1-12, 2022.

S. Bourekkache, O. Kazar, and A. Aloui, “Computer and Network Security: Ontological and Multi-agent System for Intrusion Detection,” J. Digit. Inf. Manag., vol. 17, no. 3, pp. 133, 2019.

J. Yoon, and S. Lee, “A method and tool to recover data deleted from a MongoDB,” Digital Investigation, vol. 24, pp. 106-120, 2018.

A.S. Ismailov, and Z.B. Jo‘Rayev, “Study of arduino microcontroller board,” Science and Education, vol. 3, no. 3, pp. 172-179, 2022.

B. Brahara, D. Syamsuar, and Y. Kunang, “Analysis of Malware Dns Attack on the Network Using Domain Name System Indicators”, J. Inf. Syst. Informatics, vol. 2, no. 1, pp. 131-153, Mar. 2020.

T.K. Woodstock, and R.F. Karlicek, “RGB color sensors for occupant detection: An alternative to PIR sensors,” IEEE Sensors Journal, vol. 20, no. 20, pp. 12364-12373, 2020.

W. Wang, A. Sadeqi, H.R. Nejad, and S. Sonkusale, “Cost-effective wireless sensors for detection of package opening and tampering,” IEEE Access, vol. 8, pp. 117122-117132, 2020.

S. Kim, and T.H. Baek, “Examining the antecedents and consequences of mobile app engagement,” Telematics and Informatics, vol. 35, no. 1, pp.148-158, 2018.

A. Balapour, H.R. Nikkhah, and R. Sabherwal, “Mobile application security: Role of perceived privacy as the predictor of security perceptions,” International Journal of Information Management, vol. 52, pp. 102063, 2020.

K. Dhenuvakonda, and A. Sharma, “Mobile apps and internet of things (IoT): A promising future for Indian fisheries and aquaculture sector,” Journal of Entomology and Zoology Studies, vol. 8, no. 1, pp. 1659-1669, 2020.

Y.C. Hsu, and Y.H. Ching, “Mobile app design for teaching and learning: Educators’ experiences in an online graduate course,” International Review of Research in Open and Distributed Learning, vol. 14, no. 4, pp. 117-139, 2013.

Published
2023-06-02
Abstract views: 2401 times
Download PDF: 2652 times
How to Cite
Hermann, Y. K., Yirga, G., Gaetan, N., & Tanguy, K. (2023). Design of A Security System with Mobile Notifications in Case of Intrusion. Journal of Information Systems and Informatics, 5(2), 800-818. https://doi.org/10.51519/journalisi.v5i2.493