Distance Recognition and Internet of Things-Based Intelligent Security
Sonali Prasad1, Pankaj Jain2
1M. Tech. scholar, Department of Computer Science & Engineering/Information Technology, Global Institute of Technology Jaipur (Rajasthan), India-302022
2Assistant Professor, Department of Computer Science & Engineering/Information Technology, Global Institute of Technology Jaipur (Rajasthan), India-302022
DOI: https://doi.org/10.51244/IJRSI.2025.12060007
Received: 05 June 2025; Accepted: 09 June 2025; Published: 26 June 2025
Security systems are more ubiquitous in our daily lives. It is well acknowledged that safeguarding assets in a secure place, such as a bank vault or similar facility, is essential. Businesses are increasingly utilizing surveillance cameras to create safe environments. IoT Security pertains to the examination and formulation of strategies to safeguard data and infrastructure employed by IoT devices. IoT security pertains to the safeguarding of networked or Internet-connected devices against unauthorized access. The notion of the “Internet of Things” has gained prominence with technological advancements. Devices ranging from thermostats to video game consoles to wristwatches now possess the capability to connect to the internet and other electronics. The techniques and instruments employed to ensure the security of interconnected devices are collectively termed “Internet of Things” (IoT) security. The interlinked nature of IoT devices renders them more vulnerable to assaults. The extent of IoT security is boundless, akin to the IoT itself. Consequently, several methods exist to impact IoT security. IT administrators may safeguard their businesses from the escalating risks of cybercrime and cyberterrorism by employing strategies such as public key infrastructure (PKI) authentication, network security, and API security. It is scarcely discernible. Currently, individuals are more focused about safeguarding their information, residences, lifestyles, and belongings. As security technology advances, an increasing number of dangers arise. The implementation of security measures using the Internet of Things (IoT) and biometric identification has escalated as a consequence of this. Cyber-attacks persist as a significant concern because to the inconsistent design of IoT devices and the substantial volume of data they handle. Numerous prominent cases using the exploitation of fundamental IoT devices to breach and assault larger networks have underscored the necessity of IoT security. Distance recognition is regarded as a straightforward and easily collected biometric technique. Biometric distance recognition employs the same differentiating traits that individuals utilize for personal identification. This work utilized distance recognition to develop a reliable door locking mechanism. The system performs real-time distance detection and identification when an object or someone enters a specified range of the door detector. A functioning prototype was developed and assessed.
Key Points
Highlights
Any Internet-connected gadget is vulnerable to being hacked and abused. In the Internet of Things era of today, anybody might theoretically exploit one of the billions of linked devices to steal sensitive data, transmit malware, or even inflict actual injury [15]. Everyone involved in manufacturing and utilizing IoT devices will prioritize network security as more organizations and people utilize and depend on them. Certain IoT security measures are the responsibility of manufacturers and end users [16]. It’s a team effort.
Cybersecurity is always changing. Whether you’re making a smart car, a baby monitor, a pacemaker, a monitoring device for agricultural equipment, or something altogether new, you can be confident in the safety of your IoT application with the right technology, design, and maintenance [16]. We need a mechanism to notify you if your home or business property goes missing. A network of computer devices that can connect, analyze, and interact is the Internet of Things. “IoT” definitions usually exclude internet-connected gadgets. IoT devices, especially Bluetooth ones, need good security. IoT data breaches may be rising due to these issues.
Protecting gadgets that are online or linked to a network is what’s meant by “IoT security.” The concept of an “Internet of Things” has become more widespread as technology has advanced [17]. Almost everything manufactured today, from wristwatches to thermostats to gaming consoles, is capable of communicating with the web and other gadgets.
IoT Security refers to a set of measures used to ensure the safety of connected devices. Surprisingly, the increased vulnerability of IoT devices to attack comes from their very connectivity.
A sampling of the industries and fields that make use of IoT devices is as follows:
How to manage Internet of Things devices
To work, IoT devices need internal control (software updates) and external control (interoperability). Each IoT device is connected to a Command and Control (C & C) Center for management. Hub software installs and validates software maintenance and configuration, firmware upgrades to fix bugs and security flaws, and device registration. API allows electrical devices to communicate. When an API is public, other devices and applications can use it to gather and share data. The gadget may also be managed directly via different APIs.
IOT Vulnerabilities and Security Issues
User Threats
Users’ sensitive information, such as financial and medical records, might be jeopardized when IoT devices are hacked. Theft of this information occurs when devices are not properly secured. Insecure endpoints may also act as entry points to the rest of the network, allowing hackers to get access to otherwise inaccessible resources [20].
Physical Harm
Pacemakers, cardiac monitors, defibrillators, and other IoT devices are examples of IoT gadgets that are becoming prominent in the medical market. These devices have their uses (doctors may adjust a patient’s pacemaker from a distance), but they are also open to cyber threats [21].
The medical treatment of the patient may be jeopardized if the device is put in improperly. Although it happens seldom, it must be considered when creating regulations to protect Internet of Things devices.
Remote Exposure
IoT devices provide a far bigger attack surface than traditional technologies since they are connected to the internet. Despite the apparent advantages, this makes the device vulnerable to remote hacking. This explains why hacking techniques like phishing are so effective. IoT security must cover several access points, much as cloud security, to protect important information and resources.
Chapter 1 summarizes the device-development project. For our experiment, the HC-SR04 ultrasonic sensor detected our distance from an item. We achieved our goal with Arduino. After distance detection at many places, we suggested notifying multiple authorities via SMS.
Its low cost and easy installation assist society, businesses, and farmers. Its decreased pricing save farmers and businesses time and money. Its theft prevention purpose will create any severe security failure. This paper discusses IoT security, its relevance, and its primary dangers and attack pathways. Internet of Things device, data, and network security is another challenge. This research will assist developers create cost-effective and efficient IoT project safety solutions.
Chapter 2 examines a literature study on Internet of Things (IoT) security and the attendant problems involved.
Chapter 3 integrates the ESP8266 Node MCU hardware, the Arduino IDE (Integrated Development Environment), Firebase, and the API (Application Programming Interface) of an SMS gateway.
Chapter 4 provides detailed information on the suggested strategy or techniques for this job.
Chapter 5 gives information regarding current technologies and scope related to this work.
Chapters 6 and 7 are Discussion and Conclusions of Proposal Results.
Introduction About Software
About Arduino IDE
Components
Fig. 1 Workflow Component
Node MCU: NodeMCU is a popular development board based on the ESP8266 Wi-Fi module, which is widely used for Internet of Things (IoT) projects. It integrates a microcontroller with Wi-Fi capabilities, making it easy to connect devices to the internet. The board is often programmed using the Lua script or the Arduino IDE, thanks to its user-friendly interface and extensive community support. NodeMCU is known for its affordability, versatility, and ease of use, making it a favorite among hobbyists and professionals for creating smart gadgets and automation systems [14].
Distance Sensor (HC-SR04): The HC-SR04 is a widely used ultrasonic distance sensor. It measures the distance to an object by emitting an ultrasonic pulse and then calculating the time it takes for the echo to return. This sensor is commonly used in robotics and automation projects to measure distances accurately. It’s known for its simplicity, affordability, and ease of integration with microcontrollers like Arduino and Raspberry Pi. With a range typically between 2 cm and 4 meters, it’s useful for obstacle detection, level measurement, and other distance-related applications [22].
Arduino IDE: The Arduino IDE (Integrated Development Environment) is a software application used for writing, compiling, and uploading code to Arduino boards. It provides a user-friendly interface for programming these microcontrollers [23]. Key features of the Arduino IDE include:
The Arduino IDE is praised for its simplicity and accessibility, making it a popular choice for beginners and experienced developers alike in the world of electronics and microcontroller programming.
Firebase: Firebase is a google based container which is widely used for hosting applications (android, iOS, web based among many others) with robust framework of database (Firestore) and Restful APIs. In our project we will use Firestore to store the data and will create Restful API which will be called from the program flashed in ESP8266 when object distance is less than a limit (i.e. 10 cms for example) [24].
SMS Gateway: SMS gateway is an external party APIs which are used to send SMS. In our case we will use an API provided by BhashSMS company [29].
About Node MCU
Fig. 2 Node MCU
Pins Description [25]
The major pins used are listed as under –
Vin: This is the 5V power input pin.
GND: Ground pins, usually two or more, used to complete the circuit.
D0 – D8: These are digital input/output pins. Each pin has specific functions and can be used for general-purpose I/O.
A0: This is the analog input pin, which can read analog signals from 0 to 3.3V.
RST: Reset pin, used to reset the microcontroller.
EN: Enable pin, used to enable or disable the chip.
TXD: Transmit pin for serial communication.
RXD: Receive pin for serial communication.
About Node MCU
NodeMCU is a popular open-source development platform that integrates a microcontroller with Wi-Fi capabilities, making it a favored choice for Internet of Things (IoT) projects. Its name is a blend of “Node” (referring to its roots in Node.js) and “MCU” (Microcontroller Unit).
At its core, NodeMCU features the ESP8266 microcontroller, a low-cost Wi-Fi system on a chip (SoC) developed by Espressif Systems. The ESP8266 is known for its ability to handle complex tasks while maintaining a low power consumption profile, which is ideal for battery-operated IoT devices.
Hardware Overview:
The NodeMCU board combines the ESP8266 chip with a USB-to-serial adapter, which simplifies programming and communication with a computer. The board is equipped with several GPIO (General Purpose Input/Output) pins, which can be used for various digital and analog functions. It also includes other peripherals such as PWM (Pulse Width Modulation), I2C (Inter-Integrated Circuit), and SPI (Serial Peripheral Interface) interfaces, allowing for flexibility in connecting sensors, actuators, and other modules.
Software Development:
One of NodeMCU’s strengths is its support for multiple programming environments. The most common programming language for NodeMCU is Lua, thanks to the NodeMCU firmware. Lua is a lightweight scripting language known for its simplicity and efficiency. However, many developers prefer using the Arduino IDE, which supports NodeMCU via additional libraries and tools. The Arduino IDE allows programmers to use C/C++ for coding, which might be more familiar to those with a background in traditional microcontroller programming.
The NodeMCU board also supports MicroPython, a version of the Python programming language optimized for microcontrollers. MicroPython offers a more straightforward and high-level approach to programming, which can be appealing for rapid development and prototyping.
Networking and Connectivity:
NodeMCU’s built-in Wi-Fi capability is a key feature that enables it to connect to wireless networks and communicate with other devices over the internet. This connectivity is crucial for IoT applications where devices need to send or receive data from cloud services, other devices, or user interfaces. The ESP8266’s Wi-Fi capabilities support both client and server modes, allowing NodeMCU to function as a Wi-Fi access point or to connect to existing Wi-Fi networks.
Applications:
NodeMCU is versatile and used in a wide range of applications. Common projects include home automation systems, where it can control lights, temperature, and other household devices remotely. It is also used in environmental monitoring, such as tracking temperature and humidity levels and sending data to cloud-based services. Other applications include creating smart gadgets, prototyping electronic projects, and educational purposes, where its low cost and ease of use make it a valuable tool for learning about microcontrollers and IoT.
Community and Resources:
The NodeMCU community is vibrant and active, with numerous online forums, tutorials, and example projects available. This support ecosystem is beneficial for both beginners and experienced developers, providing resources for troubleshooting, learning, and inspiration.
In summary, NodeMCU is a powerful and accessible development platform that combines the ESP8266 microcontroller’s capabilities with easy programming options. Its integration of Wi-Fi and versatility in programming environments make it an excellent choice for a wide array of IoT and electronics projects.
Distance Sensor (HC-SR04) :
Fig. 3 Ultrasonic Sensor
The HC-SR04 ultrasonic sensor calculates distance using the time-of-flight principle [26]. Here’s a step-by-step explanation of how it works:
The division by 2 is because the time measured is for the round trip (to the object and back).
In most cases, the speed of sound is approximately 343 meters per second (or 0.0343 cm/µs), but it can vary based on temperature and humidity. For practical purposes in many applications, this constant is used to convert the time to distance in centimetres or inches.
In programming terms, you typically send a trigger pulse, measure the time it takes for the echo pulse to return, and then compute the distance based on this time.
Project Description
This work aims to detect any suspicious activities happening at the entry door of user. For example, if in absence of user, someone tries to break open the door, this unit (which is attached to the wall and is less than 10 cm away), the distance sensor monitors the opening of door which becomes less than 10cms when door is opened, NodeMCU unit calls the Firebase API which calls the SMS API which in turn sends the SMS to the users as defined in database.
Number of users who are supposed to receive the SMS are saved in firebase database who all receive SMS when door is opened and they get alerted of possible intrusion.
Fig. 4 Process Flow of Work Using Firebase
Workflow of the project
Circuit Diagram and Explanation
Fig. 5 Circuit Dig. Of HC-SR04 ultrasonic sensor and the ESP8266
Arduino Program for distance calculation in Arduino UNO IDE
Program Code 1
The program described above activates the LED when an object is detected within 10 centimetres of the distance sensor. This prototype ensures the distance sensor functions correctly with the NodeMCU, and future developments will involve using the API to send SMS messages. Below is an explanation of the program:
Firebase
Firebase is a comprehensive platform developed by Google that provides a suite of tools and services designed to help developers build and manage high-quality applications. Launched in 2011 and acquired by Google in 2014, Firebase has become a popular choice for developers looking to create web and mobile applications with robust backend functionality [27]. Its offerings span various aspects of app development, including real-time databases, authentication, cloud storage, and analytics, making it a versatile solution for both small projects and large-scale applications.
One of the core features of Firebase is its Real-time Database. This NoSQL cloud database allows developers to store and sync data between users in real-time. The real-time capabilities are particularly useful for applications that require instant updates, such as chat applications or collaborative tools. Data is stored as JSON and synchronized across all clients in real-time, ensuring that all users see the same information simultaneously. Firebase’s Realtime Database also supports offline capabilities, allowing apps to continue functioning even when the device loses connectivity.
Another key feature is Firebase Firestore, a more advanced and flexible database offering compared to the Real-time Database. Firestore supports more complex data structures and querying capabilities. It also provides automatic scaling and strong consistency guarantees [28]. Like the Real-time Database, Firestore allows for real-time synchronization, but it also offers enhanced querying and indexing features, making it suitable for applications with more sophisticated data requirements.
Firebase Authentication simplifies the process of managing user identities. It supports various authentication methods, including email and password, social media logins (such as Google, Facebook, and Twitter), and even anonymous authentication. This integration reduces the need for developers to create their own authentication systems and ensures a secure and seamless user experience.
For file storage needs, Firebase offers Cloud Storage. This service allows developers to upload, download, and manage user-generated content such as images, videos, and other files. Cloud Storage is built on Google Cloud Storage, providing high scalability and security. It integrates seamlessly with other Firebase services, enabling developers to manage file uploads and downloads efficiently.
Firebase Hosting is another valuable feature, providing fast and secure hosting for web applications. It offers a global content delivery network (CDN) to ensure that your application loads quickly from anywhere in the world [30]. Firebase Hosting supports single-page applications (SPAs), dynamic content, and custom domains, making it an ideal choice for deploying web apps with minimal configuration.
Analytics and performance monitoring are critical for understanding and optimizing app usage. Firebase Analytics offers detailed insights into user behaviour, allowing developers to track user interactions, app usage patterns, and other key metrics. This data helps developers make informed decisions about app improvements and marketing strategies. Firebase Performance Monitoring provides real-time insights into app performance, identifying bottlenecks and issues that can affect user experience.
Firebase also integrates with various Google Cloud services, enabling developers to leverage additional tools and capabilities. For example, Firebase can be used in conjunction with Google Cloud Functions to run server-side code in response to events triggered by Firebase features. This integration allows for complex workflows and automation without needing to manage servers manually.
In summary, Firebase is a powerful and comprehensive platform for app development that addresses many common backend needs. Its real-time databases, authentication, cloud storage, hosting, and analytics tools offer a wide range of functionalities, helping developers build scalable, high-performance applications with ease. Whether you’re developing a simple app or a complex enterprise solution, Firebase provides the tools and infrastructure needed to create a robust and reliable product.
About Firestore
Firestore, formally known as Firebase Firestore, is a cloud-hosted NoSQL database service offered by Google as part of the Firebase suite. It provides a flexible, scalable solution for storing and synchronizing data in real-time, making it particularly well-suited for modern web and mobile applications [31].
Data Model:
Firestore organizes data into documents and collections. A document is a JSON-like object that contains fields (key-value pairs) and can hold various data types such as strings, numbers, booleans, arrays, and nested objects. Documents are grouped into collections, which are essentially containers for documents. This hierarchical structure allows for a flexible and scalable data organization, accommodating a wide range of application needs [32].
Real-Time Synchronization:
One of Firestore’s standout features is its real-time synchronization capabilities. It allows clients to listen to changes in the database and automatically update the user interface when data changes. This is particularly useful for applications requiring real-time collaboration, such as chat apps or collaborative editing tools, where users need to see changes from other users instantly.
Scalability and Performance:
Firestore is designed to handle large-scale applications with high data throughput. It supports automatic scaling, meaning it can grow with your application’s needs without requiring manual intervention. Firestore’s underlying infrastructure ensures high performance, even with large datasets and complex queries. It achieves this through its distributed architecture, which allows for horizontal scaling and efficient data handling [32].
Offline Support:
Firestore provides offline support for both web and mobile applications. This means that users can continue interacting with the application even when they are not connected to the internet. Changes made offline are automatically synchronized with the server when connectivity is restored. This feature enhances user experience by ensuring that applications remain functional and responsive regardless of network status.
Security:
Firestore includes robust security features through Firebase Security Rules, which control access to data based on user authentication and authorization. Rules can be configured to enforce complex access controls, ensuring that only authorized users can read or write specific data. This helps protect sensitive information and maintain data integrity.
Integration and APIs:
Firestore integrates seamlessly with other Firebase services, such as Firebase Authentication, Firebase Cloud Functions, and Firebase Analytics. This integration provides a comprehensive ecosystem for developing, deploying, and monitoring applications. Firestore offers client libraries for various platforms, including Android, iOS, and web, as well as a REST API for server-side interactions. These libraries and APIs facilitate easy integration into diverse application architectures.
Querying and Indexing:
Firestore supports powerful querying capabilities, allowing developers to filter and sort data based on various criteria. Queries can be performed on individual documents or across collections, and Firestore supports compound queries with multiple filter conditions. To optimize query performance, Firestore automatically indexes fields used in queries, though developers can also define custom indexes for more complex query scenarios.
Pricing:
Firestore follows a pay-as-you-go pricing model, where costs are based on the amount of data stored, the number of read and write operations, and network bandwidth usage. This model can be cost-effective for smaller applications but may require careful management as usage scales.
Community and Ecosystem:
Firestore benefits from a strong community and a rich ecosystem of tools and resources. Its extensive documentation, tutorials, and community support help developers quickly get started and resolve issues. The service is continually updated with new features and improvements, driven by user feedback and technological advancements.
In summary, Firestore is a powerful and versatile NoSQL database service that offers real-time synchronization, offline support, and scalability. Its integration with Firebase and its robust security and querying features make it a popular choice for building modern, data-driven applications across various platforms.
Creating a Dataset at Firestore
Firestore is a NoSQL database provided by Firebase. We first need to create a project at Firebase, and then we can use Firestore to create our dataset. First, we will see in the below steps on how to create a project in firebase [33].
Firestore database
We created our firebase project in above steps. Now Firestore database is ready for us to use. In our project we are manually creating the records but as an enhancement, this can be done by a web page or android app [34].
Fig. 6 Firestore Database
Upon clicking on the project we are directed to above screen. Firestore Database is highlighted in above screen shot. Once we click Firestore Database we get to see below screen-
Above screenshot is the data we are going to use for our project. Firebase is a NoSQL database which works on Collection -> Document -> Collection ….. model and is an established framework.
In our example NodeMCU is the main collection which can have the collection of controllers (In our case NMCU_01)
Each controller is a separate document which can have it’s own collection. (Apartment name, Contact (to whom send SMS), Secondary Contact (To send SMS) Flat Number, Name of owner of Flat, Security Contact number (Who will receive the SMS mentioning flat number) and a flag whether to send SMS at all or not. If true, SMS will be sent or else any activity on the device will be ignored.
In our example, we have just one document in NodeMCU collection, but if we have more devices deployed in different flats those documents (with their device id) will be added to the collection.
Creating the REST API to send SMS
Firebase is a full fledged container which offers set of services to create easy to go APIs. We can make use of Firebase functions to create RESTful API.
Firebase Functions
Firebase Functions, also known as Cloud Functions for Firebase, is a serverless computing service offered by Google as part of the Firebase platform. It allows developers to run backend code in response to various events without having to manage server infrastructure. This serverless model simplifies application development by handling scaling, provisioning, and maintenance automatically.
Core Concepts:
Firebase Functions are written in JavaScript (Node.js), TypeScript, or Python. Developers write their code using the Firebase CLI or integrate it into their development workflow with tools like Visual Studio Code. Once the code is ready, it is deployed to Google Cloud, where it runs in a managed environment. The deployment process involves using the Firebase CLI to push your functions to the cloud, where they are automatically scaled and managed.
Firebase Functions automatically handle scaling based on demand. Whether your function receives a few requests per day or thousands per minute, Firebase Functions will scale up and down as needed, ensuring that performance remains consistent without manual intervention. This scalability is particularly useful for handling variable workloads and ensuring that applications remain responsive.
Security is a key consideration for Firebase Functions. Functions can be secured using Firebase Authentication and Firebase Security Rules. For HTTP functions, access can be controlled through authentication tokens and API keys. For background functions, permissions are managed through Google Cloud IAM (Identity and Access Management), ensuring that only authorized entities can invoke the functions.
Firebase Functions follow a pay-as-you-go pricing model. Costs are based on the number of function invocations, execution time, and memory usage. There is also a free tier that allows for a certain number of invocations and compute time per month, making it cost-effective for small-scale applications or testing purposes.
Firebase Functions integrate seamlessly with other Firebase products like Firestore, Realtime Database, Cloud Storage, and Firebase Authentication. This tight integration allows for the creation of powerful workflows and automations, such as processing data changes, managing user authentication, or handling file uploads.
Community and Ecosystem:
Firebase Functions benefit from a broad community and a rich ecosystem of tools and resources. The Firebase documentation, tutorials, and community forums provide extensive support for developers at all skill levels.
In summary, Firebase Functions offer a flexible and scalable serverless computing solution that simplifies backend development by automating infrastructure management. Its event-driven model, seamless integration with Firebase services, and automatic scaling make it a powerful tool for building dynamic and responsive applications.
Creating the API
Below is the code snippet-
Program Code 2
Hosting the API on local server
At the terminal of visual studio code run command “npm run serve” it will allocate a web URL where the service will be hosted.
Fig. 7 Run Command
After executing above command, we get the following URL where service is hosted-
Fig. 8 Service Hosted URL
Testing our API on POSTMAN
About POSTMAN
Postman is a popular API development and testing tool designed to simplify the process of interacting with and managing APIs. It provides a user-friendly interface for sending HTTP requests, examining responses, and automating testing workflows [35].
Key Features:
Overall, Postman is a versatile tool that enhances API development, testing, and collaboration through its comprehensive features and intuitive interface.
Testing our API
As in above screenshot we saw our service is hosted at URL – http://127.0.0.1:5001/fir-crud-restapi-488fa/us-central1/app
Our Get ROUTE is defined as /api/getmcuid, with mcuid as a parameter henceforth our URL becomes- http://127.0.0.1:5001/fir-crud-restapi-488fa/us-central1/app/api/getmcuid/NMCU_01
In our next step we will make a get request using POSTMAN –
Fig. 9 Get Request Postman Output
As we can see we are getting all the required information in the response, henceforth confirming our API works fine.
In our next step we will call this API from Arduino code which will complete the application.
Deploying the API on cloud
Till now we have created the API on local. Firebase is an excellent container and can host our API on it’s own cloud [36].
We need to issue “Firebase Deploy” command for terminal like below –
Fig. 10 Deploy Command
This command will deploy our API at cloud and will provide as a web URL which we can use for our purpose. Once done we will get the message like below –
Fig. 11 Output Message After Deployment
So as we can see in above screenshot the URL for our API is – https://us-central1-fir-crud-restapi-488fa.cloudfunctions.net/app
Since our route for GET is api/getmcuid/{mcu_id} our final URL for get request becomes –
https://us-central1-fir-crud-restapi-488fa.cloudfunctions.net/app/api/getmcuid/NMCU_01
We can hit this URL on web browser to check if we can verify our results –
Fig. 12 Output Data About Controller Id NMCU_01
We can see hitting the URL gives us the data about controller id NMCU_01.
Putting Things Together :
Now we need to modify our existing Arduino program and make it capable to call the Firebase API
Below is the updated code:
Program Code 3
Explanation of code-
The suggested technology may be used in real time by Internet of Things-based home monitoring devices. Smart homes are built with an integrated architecture of sensors, cameras, and other cutting-edge technology; this research will examine unlawful entry into such homes. The system operates on two levels: hardware and software.
This technique was created to avoid flat theft while the owners are gone. After receiving the SMS, the owner could notify the security guard to conduct a security check at the flat. Because a security camera is a relatively unknown thing, robbers may be unaware of the system and will continue to ransack, increasing their chances of being caught.
In this work the SMS is received generally within 5 seconds of object detection. To avoid false positives, we can configure in Firebase when to send SMS. For example, configure it to send only when no one is there or the house is locked.
Future Scope
This system will be relatively inexpensive, with component costs ranging from 400 to 500 rupees, and it has the potential to be industrialized with simple tweaks, providing huge benefits to the corporation and peace of mind to users. Such systems may find use outside of their initial setting as well.