A Smart IoT Device for Child’s Safety Real Time Monitoring System

Full Text (PDF, 991KB), PP.64-77

Views: 0 Downloads: 0

Author(s)

Vinod Kumar. B 1,* Sangeetha. J 1

1. Ramaiah Institute of Technology, Bengaluru, Karnataka, 560054, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijieeb.2023.06.05

Received: 1 Apr. 2023 / Revised: 7 May 2023 / Accepted: 25 Jul. 2023 / Published: 8 Dec. 2023

Index Terms

IoT applications, Raspberry pi, Temperature Sensor, Pulse Rate Sensor, Bluetooth Module, pi camera Twilio application

Abstract

The IoT technology is used to monitor the child’s safety in the real time. The overall system is controlled by the Raspberry pi 3 module and it is connected to all the IoT devices. The child’s body temperature and pulse rate values are extracted through sensors. Whenever child experiences any abnormal feelings or unusual activities like fear, anxiety, etc. the temperature and pulse rate values reach above threshold and when child speaks with a specific keyword (i.e. “Help Me” or “Save Me”) then the voice recognition system gets activated. The child’s input voice will be converted into text format. When these text formats gets matched with the keywords then immediately pi camera captures the image of an attacker and sends an E-mail alert and at the same time even SMS alert is sent to the parents/guardians. The parents can also watch the live video streaming of the attacker in the YouTube channel from their remote location. This safety system also sends SMS alert message through Twilio in the local language (i.e. Kannada and Hindi) to the registered phone numbers (i.e. surrounding/neighbors of the victim), so that any local citizen can read and understand the message to save the child.

Cite This Paper

Vinod Kumar. B, Sangeetha. J, "A Smart IoT Device for Child’s Safety Real Time Monitoring System", International Journal of Information Engineering and Electronic Business(IJIEEB), Vol.15, No.6, pp. 64-77, 2023. DOI:10.5815/ijieeb.2023.06.05

Reference

[1]Starner, Thad, Bernt Schiele, and Alex Pentland. "Visual contextual awareness in wearable computing." In Digest of Papers. Second International Symposium on Wearable Computers (Cat. No. 98EX215), pp. 50-57. IEEE, 1998.
[2]https://www.newindianexpress.com/cities/bengaluru/2019/dec/04/bengaluru-police-ask-women-to-use-safety-app-suraksha-2071414.html
[3]https://www.theweek.in/news/india/2020/03/08/over-one-third-of-women-in-media-faced-sexual-harassment-at-work-survey.html
[4]Das, Prabal Deep, and Sharmila Sengupta. "Implementing a next generation system to provide protection to vehicles from thefts and accidents." In 2017 International Conference on Innovations in Green Energy and Healthcare Technologies (IGEHT), pp. 1-6. IEEE,
[5]Kandaswamy, Rajesh, and D. Furlonger. "Blockchain-based transformation." Gartner’s Second Special Report on Blockchain (2018). Accessed: Jun. 5, 2018. [Online]. Available: https://www.gartner.com/en/ doc/3869696-blockchain-based-transformation-a-gartner-trend-insightreport/
[6]Gsma. Safety, Privacy and Security. Accessed: Jan. 29, 2019. [Online].
[7]Gharaibeh, Ammar, Mohammad A. Salahuddin, Sayed Jahed Hussini, Abdallah Khreishah, Issa Khalil, Mohsen Guizani, and Ala Al-Fuqaha. "Smart cities: A survey on data management, security, and enabling technologies." IEEE Communications Surveys & Tutorials 19, no. 4 (2017): 2456-2501.
[8]Eckhoff, David, and Isabel Wagner. "Privacy in the smart city—applications, technologies, challenges, and solutions." IEEE Communications Surveys & Tutorials 20, no. 1 (2017): 489-516.
[9]Xia, Xiaofang, Yang Xiao, and Wei Liang. "ABSI: An adaptive binary splitting algorithm for malicious meter inspection in smart grid." IEEE Transactions on Information Forensics and Security 14, no. 2 (2018): 445-458.
[10]Din, Ikram Ud, Mohsen Guizani, Byung-Seo Kim, Suhaidi Hassan, and Muhammad Khurram Khan. "Trust management techniques for the Internet of Things: A survey." IEEE Access 7 (2018): 29763-29787.
[11]Dlamini, Nomusa Nomhle, and Kevin Johnston. "The use, benefits and challenges of using the Internet of Things (IoT) in retail businesses: A literature review." In 2016 international conference on advances in computing and communication engineering (ICACCE), pp. 430-436. IEEE, 2016.
[12]Jose, Arun Cyril, and Reza Malekian. "Improving smart home security: Integrating logical sensing into smart home." IEEE Sensors Journal 17, no. 13 (2017): 4269-4286.
[13]Islam, SM Riazul, Daehan Kwak, MD Humaun Kabir, Mahmud Hossain, and Kyung-Sup Kwak. "The internet of things for health care: a comprehensive survey." IEEE access 3 (2017): 678-708.
[14]Suruthi, M., and D. Nivetha. "A Survey on Challenges, Technologies and Applications of IoT." IJARCCE 5, no. 3 (2018).
[15]Kurban, B., Zh Umarova, G. Koishibekova, Z. Makhanova, and Zh Kemelbekova. "Internet of things (IOT): challenges and future directions." VESTNIK KAZNRTU 142, no. 6 (2020): 92-95.
[16]Vyas, Chinmaya, and Shashikant Patil. "Smart home analysis in india: an iot perspective." International Journal of Computer Applications 144, no. 6 (2019): 29-33.
[17]Roshan, Rakesh, and Abhay Kr Ray. "Challenges and risk to implement IOT in smart homes: An Indian perspective." International Journal of Computer Applications 153, no. 3 (2019): 16-19.
[18]Shaikh, Yasmeen, V. K. Parvati, and S. R. Biradar. "Survey of smart healthcare systems using internet of things (IoT)." In 2018 International Conference on Communication, Computing and Internet of Things (IC3IoT), pp. 508-513. IEEE, 2018.
[19]https://ncrb.gov.in/sites/default/files/CII%202019%20Volume%201.pdf
[20]Prashanth, Dantu Sai, Gautam Patel, and B. Bharathi. "Research and development of a mobile based women safety application with real-time database and data-stream network." In 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT), pp. 1-5. IEEE, 2017.
[21]Bhanupriya, T., and T. V. P. Sundararajan. "Activity Tracker Wrist Band for Children Monitoring using IOT." International Journal on Recent and Innovation Trends in Computing and Communication 5, no. 11 (2017): 52-57.
[22]Seelam, Kalpana, and K. Prasanti. "A novel approach to provide protection for women by using smart security device." In 2018 2nd International Conference on Inventive Systems and Control (ICISC), pp. 351-357. IEEE, 2018.
[23]Hashim, N. M. Z., H. H. Basri, A. Jaafar, M. Z. A. A. Aziz, A. Salleh, and A. S. Ja. "Child in car alarm system using various sensors." ARPN Journal of Engineering and Applied Sciences 9, no. 9 (2014): 1653-1658.
[24]Bhoopal, Keerthana, Raksha Rajasimha, R. Kavya Sindhu, and R. C. Sreevidya. "CHILD SAFETY WEARABLE DEVICE USING WIRELESS TECHNOLOGY." (2019).
[25]Krishnamurthy, Vallidevi, S. Saranya, Sharanya Srikanth, and Simran Modi. "M-WPS: Mobile based women protection system." In 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), pp. 1701-1706. IEEE, 2017.