Development of the System Is for the Selection of Films With the Use of Client-server Architecture

: pp. 78 - 86
Lviv Polytechnic National University
Lviv Polytechnic National University
Lviv Polytechnic National University
Lviv Polytechnic National University

This article proposes a cost effective IoT smart home security platform that delivers data in the cloud for applications. The smart security system includes a network for sensing home monitoring devices via wireless ISM communication, a home security system control controller with an Internet connection using a Wifi connection, and a backup method of notifying the user is implemented by SMS message via GSM cellular network, cloud server and applications for mobile phones on the Android operating system. The developed application combines the application of a cloud server, client sensors and a database. It also clarified the hardware and software implementation of the IoT-based home security system and their relative functions.

  1. Internet veschey: uchebnoe posobie. A.V. Roslyakov, S.V. Vanyashin, A.Yu. Grebeshkov. — Samara: PGUTI, 2015, 200 с.
  2. 1IoT Based Home Security System Using Raspberry Pi with Email and Voice Alert. Reena Rani, S. Lavanya,. B.Poojitha Published Computer Science, 2018 pp 21-26.
  3. Home Security System using IOT and AWS Cloud Services.Mahendra Mehra; Vedant Sahai; Pratik Chowdhury; Elvis Dsouza. International Conference on Advances in Computing, Communication and Control (ICAC3), 2019 pp 159-163.
  4. Anitha A, “Home security system using internet of things”, IOP Conf. Series: Materials Science and Engineering 263, 2017 pp 1-11.
  5. Molugu Surya Virat, Aishwarya B, Bindu S M, Dhanush B N and Manjunath R Kounte. “Security and Privacy Challenges in Internet of Things”, International Conference on Trends in Electronics and Informatics, 11-12, May 2018 pp 454-460.
  6. OneM2M Architecture Based Secure MQTT Binding in Mbed OS. Ahsan Muhammad, Bilal Afzal, Bilal Imran, Asim Tanwir, Ali Hammad Akbar, Ghalib A. Shah. Computer Science. IEEE European Symposium on Security and Privacy, 2019 pp 48-56.
  7. Elektronnaya kniga “SHablony korporativnogo prilozheniya”. URL: