An Optimal Panoramic Strategy for Women safety using IoT

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    This paper provides you an idea about Internet of Things and reviews the origin of IoT, key enabling technologies, IoT architecture, IoT in industrial areas, applications of IoT, Operating system used in IoT devices. As the Internet of Things(IoT) at large will foster billions of devices, people and services to interconnect and exchange information and useful data. We have proposed a real-time application device of IoT useful for women safety in today’s world. Considering the issues increasing on women atrocities, the Universal key question raising in every girl’s mind is when they will have a freedom to walk freely in the society even in odd hours without worrying about their security. This paper will help you to use technology with a new perspective for women safety and to provide proof-based evidence against the perpetrators of crime against women. Every Day women around the world are Harassed, Raped, and Killed. The change in society should come and leads to the time when media broadcast more of women successes rather than harassment. Since we can't respond pertinently in perilous situations, we need a device which automatically senses and saves the victim is one of the idea of this paper.

  • Keywords

    Internet of Things; Architecture; women security; Raspberry Pi; GSM.

  • References

      [1] K. Ashton, "Internet of Things," RFID Journal, June 22, 2009

      [2] R. van Kranenburg, E. Anzelmo, A. Bassi, D. Caprio, S. Dodson, and M. Ratto, “The Internet of things,” in Proceedings of 1st Berlin Symposium on Internet and Society, pp. 25-27, 2011.

      [3] X. Jia, O. Feng, T. Fan, and Q. Lei, "RFID technology and its applications in the Internet of Things (IoT)," in Proceedings of the 2nd IEEE International Conference on Consumer Electronics, Communications and Networks (CECNet), April 21- 23, 2012, pp.1282-1285.

      [4] C. Sun, "Application of RFID technology for logistics on the Internet of Things," AASRI Procedia, vol.1, pp.106-111, 2012.

      [5] E. W. T. Ngai, K. K. Moon, F. J. Riggins, and C. Y. Yi, “RFID research: an academic literature review (1995–2005) and future research directions,” International Journal of Production Economics, vol.112, no.2, pp.510-520, 2008.

      [6] Ashton, K.: That ‘Internet of Things’ Thing. RFID Journal 22, 97–114 (2009)

      [7] Auto-Id Labs.

      [8] The EPC global Architecture Framework, EPC global Final Version 1.3, Approved 19 March 2009,

      [9] Luigi Atzori, Antonio Iera, Giacomo Morabito “The Internet of Things: A Survey”, Article in press on Computer Networks, May 2010.

      [10] S. Li, L. Xu, and X. Wang, “Compressed sensing signal and data acquisition in wireless sensor networks and Internet of Things,” IEEE Transactions on Industrial Informatics, vol.9, no.4, pp. 2177-2186, 2013

      [11] W. He, and L. Xu, “Integration of distributed enterprise applications: a survey,” IEEE Transactions on Industrial Informatics, vol.10, no. 1, pp.35-42, 2014

      [12] D. Uckelmann, M. Harrison, and F. Michahelles, “An architectural approach towards the future internet of things”, in Architecting the Internet of Things, pp. 1- 24, Springer, 2011

      [13] S. Li, L. Xu, X. Wang, J. Wang, “Integration of hybrid wireless networks in cloud services-oriented enterprise information systems,” Enterprise Information Systems, vol.6, no.2, pp.165-187, 2012.

      [14] Li. Wang, L. Xu, Z. Bi, Y. Xu, “Data Filtering for RFID and WSN Integration,” IEEE Transactions on Industrial Informatics, vol.10, no.1, pp 408-418, 2014.

      [15] L. Ren, L. Zhang, F. Tao, X. Zhang, Y. Luo, Y. Zhang, "A methodology towards virtualization-based high-performance simulation platform supporting the multidisciplinary design of complex products," Enterprise Information Systems, vol.6, no.3, pp.267- 290, 2012.

      [16] F. Tao, Y. Laili, L. Xu, L. Zhang, “FC-PACO-RM: a parallel method for service composition optimalselection in cloud manufacturing system,” IEEE Transactions on Industrial Informatics, vol.9, no.4, pp.2023-2033, 2013.

      [17] Q. Li, Z. Wang, W. Li, J. Li, C. Wang, R. Du, “Applications integration in a hybrid cloud computing environment: modelling and platform,” Enterprise Information Systems, vol.7, no.3, pp.237- 271, 2013

      [18] Li Da Xu, Wu He, and Shancang Li “Internet of Things in Industries: A Survey”, IEEE Transaction on Industrial Informatics, Vol.10, No.4, November 2014

      [19] M. K. Lim, W. Bahr, and S. Leung, “RFID in the warehouse: a literature analysis (1995–2010) of its applications, benefits, challenges and future trends,” International Journal of Production Economics, vol.145, no.1, pp.409-430, 2013.


      [21] Shaik Mazhar Hussain1, Shaik Jhani Bhasha2: Design of women safety system using RFID, 8051microcontroller and GSM-based technology a prototype June (2014)

      [22] ZigBee – The Internet of Things, (accessed on November 2012)

      [23] Lee, J.S., Su, Y.W., Shen, C.C.: A comparative study of wireless protocols: Bluetooth, UWB, ZigBee, and Wi-Fi. In: 33rd Annual Conference of the IEEE Industrial Electronics Society (IECON 2007), pp. 46– 51 (November 2007)

      [24] Ee, G. K., Ng, C. K., Noordin, N. K., Ali, B. M.: A Review of 6LoWPAN Routing Protocols. In: Proceeding of Asia Pacific Advanced Network (2010)

      [25] Z. Yang et al., "Study and application of the architecture and key technologies for IoT," in Proc. ICMT, 2011, pp. 747–751.

      [26] M. Wu, T. J. Lu, F. Y. Ling, J. Sun, and H. Y. Du, “Research on the architecture of Internet of Things,” in Proc. 3rd ICACTE, 2010, pp. V5-484–V5-487.

      [27] D. Locke, “MQ telemetry transport (MQTT) v3. 1 protocol specification,” IBM developer Works, Markham, ON, Canada, Tech. Lib., 2010. [Online]. Available: Http://Www.Ibm.Com/Developerworks/ Webservices/Library/Ws-Mqtt/Index.Html

      [28] U. Hunkeler, H. L. Truong, and A. Stanford-Clark, “MQTT-S—A publish/subscribe protocol for wireless sensor networks,” in Proc. 3rd Int. Conf. COMSWARE, 2008, pp. 791–798.


      [30] D. Locke, “MQ telemetry transport (MQTT) v3. 1 protocol specification,” IBM developer Works, Markham, ON, Canada, Tech. Lib., 2010. [Online]. Available: Http://Www.Ibm.Com/Developerworks/ Webservices/Library/Ws-Mqtt/Index.Html

      [31] U. Hunkeler, H. L. Truong, and A. Stanford-Clark, “MQTT-S—A publish/subscribe protocol for wireless sensor networks,” in Proc. 3rd Int. Conf. COMSWARE, 2008, pp. 791–798.


      [33] M. Darianian, m.p. Michael, smart home mobile RFID-based internet of-things systems, and services, 2008 international conference on advanced computer theory and engineering. (2008) 116–120.

      [34] A.M. Vilamovska, E. Hattziandreu, R. Schindler, C. Van Oranje, H. DeVries, J. Krapelse, RFID Application in Healthcare-Scoping and Identifying Areas for RFID Deployment in Healthcare Delivery, RAND Europe, February 2009

      [35] H. Jun-Wei, Y. Shouyi, L. Leibo, Z. Zhen, W. Shaojun, A Crop Monitoring System Based on Wireless Sensor Network, Procedia Environmental Sciences. 11 (2011) 558–565.


      [37] R.k. rana, c.t. chou, S.S. kanhere, N. Bulusu, w. Hu, ear-phone: an end to-end participatory urban noise mapping system, in: ACM request permissions, 2010.


      [39] "Arduino due".

      [40] Red wire Econotag II".

      [41] "Z1 datasheet".

      [42] "IoT-LAB: Very large scale open wireless sensor network testbed".

      [43] "OpenMote-CC2538".

      [44] "Telos—Ultra Low Power IEEE 802.15.4 compliant wireless sensor module".

      [45] C. Bormann, M. Ersue, A. Keranen, "Terminology for constrained node networks", May 2014.

      [46] R. Jedermann, T. Pötsch, C. Lloyd, "Communication techniques and challenges for wireless food quality monitoring", Philos. Trans. Roy. Soc. London A: Math. Phys. Eng. Sci., vol. 372, 2017.

      [47] W. Dong, C. Chen, X. Liu, J. Bu, "Providing OS support for wireless sensor networks: Challenges and approaches", IEEE Commun. Surv. Tuts., vol. 12, no. 4, pp. 519-530, 2010

      [48] L. Saraswat, P. S. Yadav, "A comparative analysis of wireless sensor network operating systems", Int. J. Eng. Technosci., vol. 1, no. 1, pp. 41-47, 2010.

      [49] R. Min et al., "Energy-centric enabling technologies for wireless sensor networks", IEEE Wireless Commun., vol. 9, no. 4, pp. 28-39, Aug. 2002

      [50] J.-H. Hoepman, B. Jacobs, "Increased security through open source", Commun. ACM, vol. 50, no. 1, pp. 79-83, Jan. 2007

      [51] A. Dunkel’s, B. Grönvall, T. Voigt, "Contiki—A lightweight and flexible operating system for tiny networked sensors", Proc. 29th Annu. Int. Conf. Local Computer. Network. (LCN), pp. 455-462, 2004.

      [52] "Contiki operating system".

      [53] P. Levis, W. Weber, J. M. Rabaey, E. Aarts et al., "TinyOS: An operating system for sensor networks" in Ambient Intelligence, Berlin, Germany: SpringerVerlag, pp. 115-148, 2005

      [54] E. Baccelli, O. Hahm, M. Günes, M. Wählisch, T. C. Schmidt, "RIOT OS: Towards an OS for the Internet of Things", Proc. 32nd IEEE INFOCOM, 2013

      [55] "RIOT operating system".

      [56] Berkeley’s OpenWSN project".

      [57] "CNN lite: Lightweight implementation of the content centric networking protocol", 2014.

      [58] R. Barry, "Free RTOS a free open source RTOS for small embedded real-time systems".

      [59] "Embedded Linux/microcontroller project".

      [60] "NuttX real-time operating system—NuttX real-time operating system", 2015






      [66] Alexandrous Plantelopoulous and Nikolaos. G. Bourbakis, “A Survey on Wearable sensor based system for health monitoring and prognosis,” IEEE Transaction on system, Man and Cybernetics, Vol.40, No.1, January 2010.




Article ID: 9629
DOI: 10.14419/ijet.v7i1.6.9629

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.