时间:2024-07-28
Afzal Badshah,Anwar Ghani,Muhammad Ahsan Qureshi and Shahaboddin Shamshirband
Abstract:Educational institutions are soft targets for the terrorist with massive and defenseless people.In the recent past,numbers of such attacks have been executed around the world.Conducting research,in order to provide a secure environment to the educational institutions is a challenging task.This effort is motivated by recent assaults,made at Army Public School Peshawar,following another attack at Charsada University,Khyber Pukhtun Khwa,Pakistan and also the Santa Fe High School Texas,USA massacre.This study uses the basic technologies of edge computing,cloud computing and IoT to design a smart emergency alarm system framework.IoT is engaged in developing this world smarter,can contribute significantly to design the Smart Security Framework(SSF)for educational institutions.In the emergency situation,all the command and control centres must be informed within seconds to halt or minimize the loss.In this article,the SSF is proposed.This framework works on three layers.The first layer is the sensors and smart devices layer.All these sensors and smart devices are connected to the Emergency Control Room(ECR),which is the second layer of the proposed framework.The second layer uses edge computing technologies to process massive data and information locally.The third layer uses cloud computing techniques to transmit and process data and information to different command and control centres.The proposed system was tested on Cisco Packet Tracer 7.The result shows that this approach can play an efficient role in security alert,not only in the educational institutions but also in other organizations too.
Keywords:Internet of things,smart security framework,massacres,terrorism,smart emergency alert.
Educational institutions massacres are the severe threat to security in increasing terrorist attacks.These are easy targets.The recent history reveals that thousands of children have been killed in such as attacks.In 2004,334 students killed and 783 were injured in Beslan School Siege,Russia.In 2000,191 students were killed and hundreds were injured in Walisongo School in Indonesia.In 1990,158 students were killed and hundreds were injured in Eastern University,Srilanka.In 2016,153 students were killed and hundreds were injured in Army Public School Peshawar,Pakistan.
Numbers of security system have been devolved.Security agencies have launched the number of initiatives to notify the attack on the institutions immediately.Emergency mobile phone numbers,alarm systems,and smart security cameras installed.Instead of spending billions of assets on security,no new technologies have been adopted to undertake these issues smartly.All these existing systems need to be updated to the new demands of threat and technology.The basic alarm system is not a valid solution for increasing attacks on educational institutions.To safeguard our children and assets,a smart alarming system must be installed in institutions[Tsakalozos,Verroios,Roussopoulos et al.(2017)].
IoT is becoming very popular in academia and day to day life as an emerging intelligent technology,in which smart devices are connected to the cloud.It uses the idea of fog and cloud computing to process a large amount of data.Its basic concept is to connect the smart devices to the cloud through the internet.IoT facilitates users to take the whole world on the smartphone.IoT is changing human lives by making it smart and easy.Data management,wireless communications,and real-time decisions are the key features of IoT.There has been a great deal of IoT research on different applications,such as smart homes,e-health systems,wearable devices,etc.According to the Industrial Analytical Firm(IAF),it is expected that about 50 billion devices will be connected to the internet up to 2020.Embedded technology is used in devices and sensors.Wireless technology enables them to connect with other devices or internet[Vermesan and Friess(2014)].
Smart home,smart e-health,and smart cities are popular topics in recent years,but Smart Security Frameworks have not been well investigated.IoT is the ideal technology to deal with such issues.The most beneficial is that existing infrastructure such as security cameras and control rooms may be utilized to convert them to the SSF.
The main contribution of this article is
●To design an SSF for educational institutions to instantly notify the concern departments to resist or to minimize the disaster.
●To remotely monitor and control the sensors and security devices during normal or in operational conditions to get full control over it at any time and from any place.Not only to monitor them but also to remotely program and configure all these devices.
●Collecting and analyzing data of all sensors and security devices to make smart decisions during an emergency or in abnormal situations.
Figure 1:Data flow diagram of smart security framework
In the proposed SSF,different types of sensors,security threat detectors,and security cameras are used.These devices are connected to the Emergency Control Room(ECR)and Central Emergency Control Center(CECC)by wire and wireless technologies.In an emergency situation,the proposed system instantly notifies the concerns within a second and starts all sensors and security cameras streaming to ECR.Panic button,installed on the smart watch,is used to activate the SSF manually.Fig.1 shows the data flow of Smart Security Framework.
SSF uses several types of algorithms to get data from all installed security devices.These algorithms help to categorize the alert.An alarm is issued to the concern departments with live streaming.The CECC is the centralized place in the region.CECC has members from police,rescue and ambulance services.Live updates and attack nature is displayed on monitoring screens.All top stack holders control and monitor the operation from that centres to make smart decisions.Tab.1 shows the symbols used in formulation.
The rest of the paper is arranged as follows.Section 2 reviews the related work on IoT,sensors and security systems.Section 3 discusses the proposed SSF model,different types of sensors,ECR and CECC for SSF.Section 4 discusses the proposed algorithms for the smart alerting system,smart decision and alarms.Section 5 discusses the experimental setup.The proposed system simulation was run for numbers of times to demonstrate the supremacy of the proposed approach.Finally,Section 6 concludes all work.
Table 1: Symbols used in the article
IoT is getting a full range of attention in today academia and market.Sensors are making this world smarter.Smart security systems are getting more attention due to the wide spread of terrorism.In Advanced Safety Life Support System,different sensors is used[Lei,Liao,Huang et al.(2010)].The system gathers different information such as contactless fingerprint and vein sensor,the intelligent detector of moving objects,the self-management security system on a Web and the 3D facial shape measurement system etc.This is a lowcost security system and can be installed by those organizations that cannot support costly security system.This work is limited only to the fingerprint security.Cho et al.designed low power CMIOS Image Sensor with a variable resolution technique for a smart security[Cho,Kim,Sohn et al.(2016)].CIS is based on the high-resolution mode.During normal conditions,the pixel of the picture drops to one-fourth of the original pixels.When any movement is detected,the high pixel is restored,and data is being transmitted to the server.In normal conditions,no data is transmitted to the server to save the cost.This work is limited only to video streaming and cost saving in security systems.
Radio Frequency(RF)is widely used in security projects.Bhawana et al.[Bhawna and Shweta(2017)]used RF to design a smart threat alert system.They proposed an emergency alert system combined with IoT to overcome some drawbacks of present EASs.It uses various types of detectors to identify transmission of various frequencies.They used Raspberry Pi to generate and detect different types of transmissions.This work is limited to radio frequency detection only.The same RF technology was used[Ruinian and Capurso(2017)]to design smart shopping system.The first time,UHFRFID was used to enhance the shopping experience and security issues.They developed a prototype to test the smart shopping system.With a smart cart system,billing can be conducted from the shopping cart itself,preventing customers from waiting in a long queue at the checkout.This work is limited to shopping billing security.This article helped us in SSF framework creation.
Now a day,IoT is widely used in electricity grids and electrical appliances.It is the primary market of the IoT industry.Guneet Bedi discussed the specific role of IoT in different smart systems[Guneet,Ganesh,Rajendra et al.(2018)].They provided a detailed assessment of the technical parameters of IoT.IoT reduces energy wastage and generates savings.it improves the efficiency,reliability,resiliency,security,and sustainability of the electric power networks.This article helped us to get familiar with IoT devices and its working.Li et al.[Li and Dong(2018)]developed a deep learning framework for large data coming from IoT sensors deployed in the complex environment.Because the nodes have limited capabilities of processing and storing,so they worked on the offloading framework to increase the performance of deep learning applications with edge computing.This article helps us how to process a large amount of data coming from different smart devices.Shoaib et al.[Shoaib,Havinga,Paul et al.(2016)]discussed the use of smoke sensors in smart devices,Deve et al.[Deve,Hanacke and Silva(2016)]discussed a smart system for fire detection and notification.Junhui et al.[Junhui and Guorong(2016)]worked on metal detectors.Alharbi et al.[Alharbi and David(2018)]discussed the motion detectors and lighting system for the city.Packet Tracer is the CISCO devices based network simulator.In its 7 versions,they have embedded IoT simulation tools.It is widely used for IoT devices simulation.Vijaya[Vijaya(2016)]discussed the use of Packet Tracer for different networking projects.They introduced a structured learning approach to learn Packet Tracer.These structure clear students in use of physical devices like router,access points,switch and their configurations.They introduced errors deliberately to remove errors in the simulations.In our proposed framework,we used Packet Tracer to simulate and evaluate the proposed framework.This article helped us in Packet Tracer usage.
SSF uses IoT,fog and cloud concepts.IoT devices sense the environment.This data is further forwarded toward fog cloud servers.In case of alerts or request,this is streamed to cloud centers.Higher authorities take decisions according to the sensing data.The great type of decisions and operations depends on the good type of sensing and communicating data to the control centers.In this section,we evaluated the functioning of the proposed framework.This could be precise advantageous to combine IoT into safety and emergency alerting schemes.Several sorts of sensors are utilized to implement the SSF.All the sensors remain active and connected to the internet round the clock.Fig.2 shows the proposed structure of the Smart Security Framework.
Figure 2:Proposed structure of smart security framework
Smart Sensor Board is a circuit board which has different types of sensors.Every sensor board has pressure,temperature,humidity,smoke,motion,flames and high-sensitive voice sensors.Smart board uses embedded technology.Algorithms are used to transmit its data to the ECR and to the CECC.Other smart security tools such as smart metal detectors,the smart walk through gats,smart alarm system and also security cameras are used.In case of any exceptions,it automatically notifies the concern admins.Smart sensor board uses Algorithm 1 to initialize the SSF.Tab.2 shows the threshold values used in the experimental setup.
3.1.1 Temperature sensor
The temperature fluctuates during flames,firing or explosion.This fluctuation is used to categorize the alert and to determine the reason.ECR is alerted if the temperature rises from the initial threshold value.An emergency alert is sent to the CECC if the temperature rises from the second threshold value.The temperature reading is continuously displayed on the ECR display board.
Table 2: Threshold values used in article
3.1.2 Vibration/wind sensor
Firing or explosion produces a strong wave force.Vibration sensors in smart board detect any type of vibration in the walls.The “x” and “y” vibration can easily be detected and categorized that what object has hit the wall.This vibration helps the CECC team to categorize the type of alert.If vibration increases from the first threshold,an alert is sent to ECR and if passes by the second threshold value,CECC is notified.
3.1.3 Light sensor
Light fluctuates during flames,firing,and explosion.These fluctuations help to categorize the nature of the alert.
3.1.4 Smoke sensor
Smoke is the indication of flames or firing.In the case of fire,it timely informs the concern authorities.If the smoke crosses the initial threshold value,ECR is alerted,secondly,CECC is notified.Smoke reading is continuously displayed on the ECR display board.
3.1.5 Sound sensor
The intensity of sounds not only help to alert the smart security system in an emergency but also help the CECC officials to categorize the alert.It also helps during operations.voice recognition software may also be used to categorize firing,explosions and screaming.
3.1.6 Air pressure sensor
During the analysis of the nature of the alert,an air pressure sensor plays a good part.If the air pressure sensor is forcefully activated,it clearly shows that some explosion has taken place.Air pressure fluctuations also help to categorize the alert.
3.1.7 Metal detector
The smart metal detector and walk through gates are placed on the entrance.If metal is detected on someone entry,ECR is notified.This also helps to monitor the security guards too,because most of the security guards do not properly scan the people at the entrance.On such phenomenon,security guards may be directed to rescan the person.
3.1.8 Panic button
The panic button is installed on the smart watch.It is a traditional button instead of touch functionality.More than one person has the smart watch panic button so to press it instantly in case of any attack or danger.
Type of alert may be classified by different sensors data such as the temperature,light intensity,wave shocks,value of smoke,and intensity of sound etc.
Fog computing is the edge of IoT and cloud computing.Instead of sending all data to the cloud for processing,primarily,it is send to local devices for processing.The ECR uses the concept of fog computing.This saves the cost of sending all streaming to cloud servers.Although CECC may access the gateway any time to monitor the situations.All the sensors,metal detectors,security cameras,emergency alarm and the panic button is connected to ECR.All initial alerts is notified to ECR.
For the proposed simulation,we are using the following threat categorization techniques to categorize the alert.Implementers' or organization may alter it according to the requirements and sensitivity of the security.
Eq.(9)shows the situation when anyone sensor reading crosses the first threshold values.If temperature,smoke,vibration or noise little bit increases from the normal situation then ECR is notified.
Eq.(10)shows the situation when almost all sensors reading crosses the first threshold values.If temperature,smoke,vibration or noise all reading increases from the normal situation then ECR and CECC is notified.
Eq.(11)shows the situation when sensors reading crosses the second threshold values.If temperature,smoke,vibration or noise increases from the second threshold value then ECR as well as CECC is notified.
Eq.(12)shows the situation when almost all sensors reading crosses the second threshold values.If temperature,smoke,vibration or noise increases from the second threshold values then CECC is notified.
Eq.(13)shows abnormal attacked position in the institutions.CECC is informed in such like situations.
3.2.1 Smart watch
A panic button is installed on the smart watch.It is a traditional button which can be pressed easily,instead of a touch sensor.It has all the smartphone sensors and Wi-Fi connection.When the panic button is pressed,all the smart watch sensors are activated and data is automatically streamed to the ECR and CECC.More than one person has the smart watch button due to security issues.
3.2.2 Smart phone
The ECR applications are also run on several smartphones to instantly generate an alert.Smartphones are popularly used devices today.In the proposed scenario they are connected with the ECR.All sensors can be accessed on a smartphone.In case of an emergency,its application opens automatically to categorize the threat.If the user fails to respond,the system automatically categorizes the threat.
3.2.3 Laptop
The smart home gateway is used to integrate all the smart devices.This gateway is connected to the laptop to monitor the system.LCD monitor may also be used to monitor the system.The laptop is used tomake changes in connections,functions or algorithms.3.2.4 Security cameras
Smart security cameras are the most important part of the security systems.The modern Digital Video Recorder(DVR)has advance types of software which help in threat detection.Smart cameras are used to record the videos,detect any motions,detect faces and also for voice alerts.In educational institutions,because there are too many students,so we are not going to use its voice and face recognition functionality for threat detection.In case of any alert,cameras streaming is directed to the CECC.In normal situations,video streaming is not forwarded to the CECC to save the cost and traffic load.Security cameras existing functionality may be used to get alert at ECR.
3.2.5 Emergency gate
Every organization has emergency doors and gates for emergency exit.In an emergency,it is not possible to manually open these doors for the exit.We have proposed to attach these doors and gates with SSF.In SSF,as the alert is notified,all the connected emergency doors get open automatically.
The IoT and cloud,both services work together.IoT has billion of devices and produces massive data.Cloud computing provides the infrastructure to process and store this large amount of data.In an emergency call,the cloud server starts to receive live streaming from different sensors.With the help of different algorithms,the nature of the attack is categorized.Notifications are sent to concern departments.Incoming streaming is directed toward CECC.
CECC is a building or room where all emergency alerts are received from the region.Every district has its own CECC.CECC guarantees a 24/7 service through a complex communications' system.It also uses the emergency numbers to receive emergency phone calls.CECC permits the police,the armed forces,civil protection department and the rescue department to take urgent action.Initially,CECC is monitored by an operator.In case of an emergency,stockholders officer take the control of CECC.CECC has the representatives of police,the ambulance services,the fire brigade,and rescue services.Live streaming of all the sensors are shown in CECC.All concern stack holders monitor the issue.They manage the response to the alert.Hospitals are updated according to the situations.
Figure 3:Conditional data flow of smart security system
The proposed system notifies the concerns in case of an emergency.Fig.3 shows the conditional flow of the proposed framework.In the normal situation,data is only streamed to the ECR situated within the organization to save the network cost.Although,CECC may get the live streaming of sensors any time.In case of an alert detection,all sensors data is directed to the CECC.Fig.3 shows the conditional data flow of Smart Security Framework
An Algorithm 1 is embedded in smart-board and ECR.It reads temperature,pressure,smoke,motion and sounds etc.If the values increase from the threshold values,emergency notification is sent to the ECR and CECC and the smart emergency alarm starts ringing.
Algorithm 2 works in Emergency Control Room and in home-gateway.As emergency accrues,alert categorization application automatically opens on smartphones and ECR alarm starts ringing to categorize the alert.If the user fails to respond to the application,It automatically sends the alert to CECC.
Algorithm 3 is used in CECC.As the alert is received,CECC starts to get data from all the sensors placed in different locations.According to the data,the nature of alert is categorized.Notification and live streaming are issued to the concern departments.
This section first describes the experimental setup and then presents the performance evaluation of the proposed framework.We used Cisco Packet Tracer 7 and Java,which is popularly used simulation tool for IoT network simulation.Cisco Packet Tracer 7 is specially designed to simulate IoT applications.This package includes different IoT devices,sensors,gateways and IoT servers for simulation.
In the laboratory setup,we distributed the work into three layers.In the first layer,all sensors read the environment.On the second layer,fog computing technologies are utilized to analyze these data and send an alarm to the ECR&CECC.On the third layer,all the concern departments and CECC works.All the sensors are remotely monitored and controlled and smart decisions are made.Fig.4 shows the simulation structure of Smart Security Framework.
Figure 4:Simulation structure of smart security framework
5.1.1 Sensor board
Several types of sensors are connected to Microprocessor Control Unit(MCU).MCU is a small circuit board,which have links to install sensors on it.Using IoT cable,we connected temperature,motion,smoke,sound sensors and also the panic button to it.We programmed the MCU using java language to read data from all the connected sensors and transmit it to the ECR.To make the sensor board remote connection with the home gateway,IP address is assigned to the home gateway and set the MCU default gateway as the home gateway.We programmed the MCU to transmit its reading toward the home gateway.
5.1.2 Emergency control room
After making all connections,we connected the MCU board with home gateway.The home gateway is a wireless switch device,which can connect numbers of devices.It uses the fog computing concepts to process initial data on edge before sending it to the cloud.Digital Video Recorder(DVR),which has connections to numbers of cameras,are also connected to the home gateway.Home gateway has a wireless card to easily connect wireless devices to it.Laptop,smartphone,and smart watch are connected to the home gateway to get notifications from all sensor devices during on warning.Sirens installed in different locations of the institution are also connected to the home gateway.This emergency alarm ring during any alert.MCU circuit boards are used to connect emergency doors to the home gateway.In case of an emergency,all emergency doors open automatically.The laptop is used to get access to the home gateway and to implement programs on different sensor devices.It also facilitates to impose different types of conditions on the sensors and other connected IoT devices.To monitor SSF,we first converted the home gateway as IoT server.To implement the program,we opened the IoT monitor application,registered gateway as IoT server.The same application helps to program and executes the devices remotely.We wrote proposed algorithms here to get detail monitoring data from different sensors and to analyze that data.ECR and CECC are notified as any threat is detected.For example,when the panic button is pressed it instantly play the emergency alarm at ECR and CECC.
5.1.3 Central emergency control center
We used switches to create different departments.CECC is the central place where all the security devices are monitored.When a warning is identified,its emergency alarm starts ringing.The concern location is monitored online to get detail information about any warning.CECC has the authorization to access the local gateway.Alarm and the display screens are connected with the MCU board.Laptop and smartphone are also connected to the internal switch.MCU is programmed to receive notification from all over security devices.When an alert is received,the alarm system starts ringing.
The proposed system is tested for different types of Alerts.We examined its functionality and performance.Average results of different tests are shown in below tables.Fig.5 shows the snapshot of CISCO Packet Tracer results.
Figure 5:Running time of IoT devices
Tab.3 describes the test of a motion sensor.To check the operation of a motion sensor,we switched the Packet Tracer to simulation mode and brought the Alt+Mouse closer to it which is the default trigger of the motion sensor.As we brought it closer,the emergency alarm system of ECR started ringing.Same movement option is displayed on CECC.Packet Tracer result shows that the response time of the motion sensor is 0.01 seconds while the transfer time to the emergency alarm is 1.557 seconds.
Table 3: Motion sensor test
Tab.4 explains the working of a metal detector.To evaluate the performance of the metal detector,we run the Packet Tracer in simulation mode and brought the metal closer to the metal detector which is its default trigger.As we brought it closer,the emergency alarm system of ECR started ringing.Packet Tracer results show that the response time of the metal sensor is 0.01 seconds.Transfer time of metal sensor signal to CECC is 2.19 seconds.
Table 4: Metal sensor
Tab.5 displays the functioning of a temperature sensor.Temperature sensor reads the temperature of the current environment and detail is sent to the ECR.A check has been placed on temperature to ring the alarm if the temperature passes by 50C.Temperature sensor was efficiently displaying results on ECR.Packet Tracer result shows that the transfer time of metal sensor signal to CECC is 1.226 seconds.
Table 5: Temperature reader
Tab.6 shows the working of a smoke sensor.The smoke sensor detects the smoke of current environment and detail is shown on ECR display.A check has been placed on smoke to ring the alarm if the smoke crosses 50 pp.The smoke sensor was efficiently displaying results on ECR.Packet Tracer result shows that the transfer time of the metal sensor signal to CECC is 1.524 seconds.
Table 6: Smoke sensor
Tab.7 demonstrates the working of the panic button.To check the panic button,we run the Packet Tracer in simulation mode and pressed the panic button.As we pressed the button,the emergency alarm of ECR and CECC started ringing.Packet Tracer result shows that the response time of the panic button is 0.01 seconds and the transfer time of the emergency signal to CECC is 1.674 seconds.
Table 7: Panic button
Tab.8 shows the operations of security cameras.Security cameras video is displayed 24/7 at ECR.The video is streamed to CECC only in emergency detection.However,CECC may watch this online streaming at any time.To assess the working of security cameras,we run the Packet Tracer in simulation mode and pressed the panic button.As we pressed the button,the security cameras video is directed toward the server.Packet Tracer result shows that the response time of security camera is 0.01 seconds and the transfer time of the emergency signal to CECC is 0.111 seconds.
Table 8: Security cameras
Tab.9 represents the working of emergency gates.We have connected one door to the Smart Security Framework to check it is working.Emergency gates are open only on an emergency call.To check the working of the emergency gate,we run the Packet Tracer in simulation mode and pressed the panic button.As we pressed the button,the gates open automatically.Packet Tracer result shows that the response time of gate is 0.01 seconds.
Table 9: Emergency doors
Tab.10 shows the different protocols used by different devices during transmission.We used the ping command to note the protocol used and time taken in the transfer.Fig.5(d)shows that when the IoT protocols and micro-controller are used the transfer time increases.
Table 10: Protocol used in simulation
Fig.9 shows the results of Packet Tracer.We checked it only for the ping command to note down the total time taken in request transfer.Tab.10 shows the protocol used in communication.The result shows that transfer time increases where MCU is used.It also uses the IoT protocol to communicate.In the proposed simulation,we are keeping the wire length constant.The result shows that the transfer time also increases if we increase intermediate communication nodes.
Figure 6:Packet Tracer simulation results
The above result and discussion shows that SSF is very good initiative towards instant notification about security issues.Security departments will be able to instantly move toward the threat direction.With this setup,control centers official will be able to properly guide the operation to minimize the losses.
In this article,Smart Security Framework(SSF)has been introduced for educational institutions.The recent past massacres have taken many precious lives.This might be depreciated by adopting an efficient and smart alerting system.SSF is efficient and intelligent in alerting concerns in case of an emergency.Different types of sensors are placed in different locations of the building,reading environment 24/7.In case of any warning detection,an alert is sent to the Emergency Control Room(ECR)and also to Central Emergency Control Center(CECC).Smart emergency doors are connected with the proposed system which automatically opens in case of any alert detection.SSS is not confined only to the educational institutions,it may also be used in any other organizations for security objects.Our future plane is to extend this framework for the Smart Security Framework for the City(SSSC).In the SSSC,sensors will be placed in streets,public places and especially religion places to notify the concern on time.
我们致力于保护作者版权,注重分享,被刊用文章因无法核实真实出处,未能及时与作者取得联系,或有版权异议的,请联系管理员,我们会立即处理! 部分文章是来自各大过期杂志,内容仅供学习参考,不准确地方联系删除处理!