Copyright © 2018 Authors. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted
use, distribution, and reproduction in any medium, provided the original work is properly cited.
International Journal of Engineering &Technology, 7 (1.6) (2018) 8-16
International Journal of Engineering & Technology
Website: www.sciencepubco.com/index.php/IJET
Research paper
An Optimal Panoramic Strategy for Women safety using IoT
Afiya Parveen Begum
1
*, Dr. S. Satyanarayana
2
, Dr. K. Bhagavan
3
1
M.Tech Scholar, Department of Computer Science , Koneru Lakshmaiah Educational Foundation ,Guntur , Andhra Pradesh, India
2
Professor, Department of Computer Science, Koneru Lakshmaiah Educational Foundation, Guntur, Andhra Pradesh, India
3
Professor, Department of Computer Science, Koneru Lakshmaiah Educational Foundation, Guntur, Andhra Pradesh, India
*E-mail: afiyaparveen786@gmail.com
Abstract
This paper provides you an idea about Internet of Things and reviews the origin of IoT, key enabling technologies, IoT architecture, IoT
in industrial areas, applications of IoT, Operating system used in IoT devices. As the Internet of Things(IoT) at large will foster billions
of devices, people and services to interconnect and exchange information and useful data. We have proposed a real-time application de-
vice of IoT useful for women safety in today’s world. Considering the issues increasing on women atrocities, the Universal key question
raising in every girl’s mind is when they will have a freedom to walk freely in the society even in odd hours without worryin g about their
security. This paper will help you to use technology with a new perspective for women safety and to provide proof-based evidence
against the perpetrators of crime against women. Every Day women around the world are Harassed, Raped, and Killed. The change in
society should come and leads to the time when media broadcast more of women successes rather than harassment. Since we can't re-
spond pertinently in perilous situations, we need a device which automatically senses and saves the victim is one of the idea of this paper.
Keywords: Internet of Things; Architecture; women security; Raspberry Pi; GSM.
1. Introduction
IoT is presently not just about a Technology worldwide but a re-
ality. It is the logical step in the evolution of the Internet. As we
live in the AGE OF AFTER GOOGLE where information is just
one touch and one click away. The IoT is near future of AG. The
IoT technology is enormously developing day-by-day because of
continues efforts of the wide community, stretching from hobby-
ists all the way to researches and getting more attentiveness due to
the evolution of wireless technology. IoT is an Umbrella term for
a wide range of underlying technologies and services such as ana-
lytics, Artificial Intelligence, Big Data etc. Initially, the term re-
fers to uniquely recognizable interoperable connected objects with
RFID technology [1], afterward many research correlate IoT with
many technologies such as embedded sensing and communication
possibility devices.
Today a commonly accepted definition is: IoT is a system of a
dynamic global network infrastructure with self-configuring capa-
bilities and interrelated computing devices, machines, objects,
animals and people with unique IP address and use intelligent
interfaces that are integrated into the network to transmitting the
data without requiring person-to person or person-to-computer
interaction. Specifically, the integration of sensor, actuators, RFID
tags, and communication technology functions as the base of IoT
and explain how a numerous heterogenous devices around us con-
nect and communicate with one another to reach the common goal
[2]. As IoT is evolving reality, unquestionably the strength is its
visibility in both working and domestic facets of daily-life and
behavior of potential users and similarly from the perspective of
the business user. Real life IoT deployment across a variety of
sectors such as IoT in business & industries, fields of automation
and industrial manufacturing, intelligent transportation, logistics
etc and IoT in consumer space where there are many thousands of
devices & applications for a broad variety of purposes. According
to research survey by 2020, nearly 50 billion of IoT devices are
connected to the Internet. As the technology is fast evolving,
threats deriving from widespread technology are also stressed.
Many challenging threats/issues should be addressed & freed be-
fore the IoT being accepted. Currently, many standardization,
researches & industries are involved in the development of such
solution IoT facing today in order to highlight the technological
requirements.
The paper is summarized as 2. The Origin of IoT. 3.IoT enabling
technologies. 4. IoT architecture. 5.Role of IoT in industries. 6.IoT
Applications 7. Operating Systems used in IoT devices. 8.Existing
system 9. Proposed System 10. conclusion.
2. The Origin of IoT:
RFID is an initial technology for IoT, which allows Microchips to
transmit the identification data to the reader. It is root technology
and an initial path for the development of IoT vision, but it is not
the only one. RFID allows to identify, track, and monitor the ob-
jects combined with RFID tags automatically [3]. The most real-
life implementation of RFID is logistic, retailing, supply chain
management, warehouses, public transportation, identification,
electronic toll collection, etc [4][5]. The growing usage of RFID
decreases the cost of RFID and increases the standardization.
Many technologies along with RFID are key components for full
deployment of IoT. Internet of Things is coined by Kevin Ashton
in a presentation to Proctor & Gamble in 1999 [6] (P&G), he is an
Executive director and Co-founder of MIT'S Auto-ID center. It is
the big year for IoT & MIT. He came up with an idea of “When