Author
Listed:
- Sonali Prasad
(M. Tech. scholar, Department of Computer Science & Engineering/Information Technology, Global Institute of Technology Jaipur (Rajasthan), India-302022)
- Pankaj Jain
(Assistant Professor, Department of Computer Science & Engineering/Information Technology, Global Institute of Technology Jaipur (Rajasthan), India-302022)
Abstract
Security systems are more ubiquitous in our daily lives. It is well acknowledged that safeguarding assets in a secure place, such as a bank vault or similar facility, is essential. Businesses are increasingly utilizing surveillance cameras to create safe environments. IoT Security pertains to the examination and formulation of strategies to safeguard data and infrastructure employed by IoT devices. IoT security pertains to the safeguarding of networked or Internet-connected devices against unauthorized access. The notion of the “Internet of Things†has gained prominence with technological advancements. Devices ranging from thermostats to video game consoles to wristwatches now possess the capability to connect to the internet and other electronics. The techniques and instruments employed to ensure the security of interconnected devices are collectively termed “Internet of Things†(IoT) security. The interlinked nature of IoT devices renders them more vulnerable to assaults. The extent of IoT security is boundless, akin to the IoT itself. Consequently, several methods exist to impact IoT security. IT administrators may safeguard their businesses from the escalating risks of cybercrime and cyberterrorism by employing strategies such as public key infrastructure (PKI) authentication, network security, and API security. It is scarcely discernible. Currently, individuals are more focused about safeguarding their information, residences, lifestyles, and belongings. As security technology advances, an increasing number of dangers arise. The implementation of security measures using the Internet of Things (IoT) and biometric identification has escalated as a consequence of this. Cyber-attacks persist as a significant concern because to the inconsistent design of IoT devices and the substantial volume of data they handle. Numerous prominent cases using the exploitation of fundamental IoT devices to breach and assault larger networks have underscored the necessity of IoT security. Distance recognition is regarded as a straightforward and easily collected biometric technique. Biometric distance recognition employs the same differentiating traits that individuals utilize for personal identification. This work utilized distance recognition to develop a reliable door locking mechanism. The system performs real-time distance detection and identification when an object or someone enters a specified range of the door detector. A functioning prototype was developed and assessed.
Suggested Citation
Sonali Prasad & Pankaj Jain, 2025.
"Distance Recognition and Internet of Things-Based Intelligent Security,"
International Journal of Research and Scientific Innovation, International Journal of Research and Scientific Innovation (IJRSI), vol. 12(6), pages 61-86, June.
Handle:
RePEc:bjc:journl:v:12:y:2025:i:6:p:61-86
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bjc:journl:v:12:y:2025:i:6:p:61-86. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Dr. Renu Malsaria (email available below). General contact details of provider: https://rsisinternational.org/journals/ijrsi/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.