A Smart Approach to Provide the Women Safety by Using Smart Security Devices

Authors

  • K. M. Umamaheswari SRM Institute of Science and Technology Author

DOI:

https://doi.org/10.61841/9196ze25

Keywords:

(IoT) Internet of Things,, Women Security,, Human Heartbeat and Body Sensors,, Microcontrollers, For Example, Arduino UNO, Global Positioning System(GPS).

Abstract

Presently a-days women face a few issues upheld for their uncertainties. The apparatus that is arranged has capacity to follow scopes and longitudes of them and can send content to the close by police control rooms and can likewise the output enlisted numbers. This tireless isn't exclusively utilities for cases like inappropriate activities and rebels doing eve prodding anyway this furthermore help them from any obviousness or any unfitness like dropping down out of nowhere. Worldwide situating framework assists with following the position of the affected injured individual and to send instant messages, the spot and poisonings of the unfortunate casualty to the close by police headquarters and furthermore the contact quantities of the family members of the person in question. This encourages ladies to beat stress and can do the things what they like to do.

Downloads

Download data is not yet available.

References

[1] Orlando Pereira, Joao M. L. P. Caldeira, Joel J.P.C Rodrigues "Body detector Network Mobile Solutions for training program Monitoring", Springer Science +Business Media, LLC ,2010.

[2] MirjamiJutila, mythical being Rivas, PekkaKarhula, Book of Susanna Pantsar "Implementation of a wearable detector Vest for the protection and Well-being of Children", The second international Workshop on Body space detector Networks(BASNet-2014), Elsevier B.V, 2014.

[3] Samuel Tajikistani monetary unit, VineethaKalavally, Ng Kok Yew, JussiParkkinen "Development Of A image sensible Home Intelligent Lighting management design exploitation Sensors aboard A Mobile Computing System", http://dx.doi.org/10.106/j.enbuild.2016.12.0 69, 2016, Enb 7248.

[4] Jesudoss A. and Subramaniam N.P., “EPBAS: Securing Cloud-Based health care info Systems exploitation increased Password-Based Authentication Scheme”, Asian Journal of knowledge Technology, Vol. 15, Issue 14, 2016, pp. 2457-2463.

[5] Jesudoss A. and Subramaniam N.P., “Enhanced Kerberos Authentication for Distributed Environment”,

Journal of Theoretical and Applied info Technology, 2014 Vol. 69, No. 2, pp. 368- 374. (Scopus Indexed)

[6] Lakshmanan, L. and D. SuganthiSharmila, A,(2017), “Security Improvement for net based mostly Banking Authentication by Utilizing Fingerprint”, world Journal of Pure and mathematics RIP Asian country, Vol. 13, sends message.

[7] Lakshmanan, L. and Sankar,(2015), “Dynamic psychological feature system for ill from vulnerable attacks in social network”, International journal of Applied Engineering analysis, RIP India, Vol. 10, No.4,pp.10365-10374,India, 2015, ISSN: 1087--1090.

[8] ParthSethi, LaksheyJuneja, Punit Gupta and Kaushlendra Kumar Pandey "Safe Sole Distress device for feminine Security exploitation IOT", Springer Nature Singapore Ptc Ltd. 2018.

[9] Pooshkar Rajiv, Rohit Raj, Mahesh Chandra "The Email based mostly Remote Access and closed-circuit television for sensible Home Infrastructure", views in Science, http://dx.doi.org/doi:10.1016/j.pisc.2016.04. 104, 2016.

[10] Enji Sun, Xing Zhang, Zhongxue Li "The net Of Things(IOT) and cloud computing(CC) based mostly tailings dam observance and pre-alarm system in mines", the primary International conference on Mine Safety Science and Engineering, Elsevier, 2011.

[11] Zheng Yan, Peng Zhang, Athanasios V. Vasilakos "A Survey on Trust and Management for net Of Things(IOT)", Journal of Network and laptop Applications, Elsevier, 2013.

[12] AlessioBotta, director First State Donato, Valerio Persico, Antonio Pescape "Integration of Cloud Computing and net Of Things(IOT): A Survey", Future Generation laptop Systems, 2015.

[13] Luigi Atzori, Antonio Lera, GiacomoMorabito, Michele Nitti, "The Social net Of Things(SIOT)", laptop Networks, Elsevier, 2012.

[14] S.Sicari, A.Rizzardi, L.A. Grieco, A. Coen- Porisini "Security, Privacy and Trust in net Of Things(IOT)",

laptop Networks, Elsevier, 2014.

[15] Andre Gloria, FenciscoCercas, NunoSouto, "Design and Implementation of an online Of Things(IOT) entree to form sensible Environments", The eighth International Carolyn Witzman, Margaret Shaw, King of England Andrew and Kathryn Travers, "The Effectiveness of ladies Safety Audits", Security Journal twenty two, 205 218 doi:10.1057/sj.2009.1:, 2009.

[16] Min Chen ,Yujun Ma, Jeumgeum /song,

[17] Chin, Feng Lai, Bin Hu "Smart wear : Connecting Human with Cloud and massive information for property Health Monitoring" Springer Science + Business Media ny, 2016.

[18] Mandeep Singh, Neelu Jain, "Design and Validation of mechanical man based mostly Wireless Integrated Device for omnipresent Health Monitoring" Springer Science + Business Media ny, 2015.

[19] Susana E. P. Costa1 & Joel J. P. C. Rodrigues & Bruno M. C. Silva1 &João N. Isento1 & Juan M. Corchado, "Integration of wearable Solutions in AAL Environments with quality Support", Springer Science + Business Media ny, 2015.

[20] John Ayoade, "Roadmap to resolution Security and Privacy considerations in RFID Systems", Privacy and RFID Systems, 2007, Elsevier.

[21] Rolf H. Weber, "Internet Of Things-New Security and Privacy Challenges", Elsevier, 2010.

Downloads

Published

30.06.2020

How to Cite

Umamaheswari, K. M. (2020). A Smart Approach to Provide the Women Safety by Using Smart Security Devices. International Journal of Psychosocial Rehabilitation, 24(4), 4039-4045. https://doi.org/10.61841/9196ze25