Submit your paper : editorIJETjournal@gmail.com Paper Title : Secured realtimesmart roomautomation using aes algorithm ISSN : 2395-1303 Year of Publication : 2020 10.29126/23951303/IJET-V6I4P10 MLA Style: -Gouthame P , Dr.M.Manikandan " Secured realtimesmart roomautomation using aes algorithm" Volume 6 - Issue 4(57-62) July - August,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org APA Style: -Gouthame P , Dr.M.Manikandan " Secured realtimesmart roomautomation using aes algorithm" Volume 6 - Issue 4(57-62) July - August,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org Abstract - In the digital era, IoT plays a major role in taking up the standard of the digital world to the next level. The advancement in IoT provides better comfort to the human community a campus could be turned into a smart e-campus. The privacy and security have been becoming the most demanding tasks in the Internet of Things (IoT) network. This addsdeployment of an IoT framework on authentication enhances the IoT system and turns it to be an authorized or secured smart system. In this paper, an attempt is made to propose and implement a secured real-time smart automation of classroom using IoT in MIT campus, Anna University. TheIoT security issues with cloud access are addressed through a suitable standard and efficient algorithm like AES. The effectiveness of the proposed work is explicit from the outcome obtained, discussed in the results section of this paper. The major highlight of this work is that the IoT framework is designed in an indigenous manner suiting the existing scenario of the college campus. Reference 1. S.[1] A. H. Ngu, M. Gutierrez, V. Metsis, S. Nepal, and Q. Z. Sheng, “IoTmiddleware: A survey on issues and enabling technologies,” IEEE Internet Things J., vol. 4, no. 1, pp. 1–20, Feb. 2017. [2] A.Botta, W. De Donato, V. Persico, and A. Pescapé, “Integration of cloud computing and Internet of Things: A survey,” Future Gener.Comput. Syst., vol. 56, pp. 684–700, Mar. 2016. [3] Mr. Pranay P. Gaikwad, Mrs. Jyotsna P. Gabhane, Mrs. Snehal S.Golait ”A Survey based on Smart Homes System Using InternetofThings”, 2015 International Conference OnComputation Of Power, Energy, Information AndCommunication, Pp.330-335. [4] R. Piyare, “Internet of Things: Ubiquitous Home Control and Monitoring System using Android based Smart Phone,” International Journal of Internet of Things, vol. 2 no. 1, pp. 5-11, 2013 [5] S. Kulkarni, S. Durg, and N. Iyer, "Internet of Things (IoT) security," 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016, pp. 821-824. [6] F. J. D'sSouza and D. Panchal, "Advanced encryption standard (AES) security enhancement using hybrid approach," 2017 International Conference on Computing, Communication, and Automation (ICCCA), Greater Noida, 2017, pp. 647-652. [7] NikeshGondchawar, Prof. Dr. R. S. Kawitkar, “IoT based Smart Agriculture” International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 6, ISSN (Online) 2278-1021 ISSN (Print) 2319 5940, June 2016. [8] P. M. Varela, J. Hong, T. Ohtsuki, and X. Qin, “IGMM-based co-localization of mobile users with ambient radio signals,” IEEE Internet Things J., vol. 4, no. 2, pp. 308–319, Apr. 2017. [9] PrasoonRaghav, Rahul Kumar and Rajat Parashar, “Securing Data in Cloud Using AES Algorithm”,International Journal of Engineering Science and Computing, 2016, ISSN 2321 3361,pp: 3672-3675. [10] FisnikDalipi and SuleYildirimYayilgan, “Security and Privacy Considerations for IoT Application on Smart Grids: Survey and Research Challenges”, 4th International Conference on Future Internet of Things and Cloud Workshops2016, pp: 63-68. [11] Augustine Ikpehai, etal “Low-Power Wide Area Network Technologies For Internet-Of-Things: A Comparative Review” Ieee Internet Of Things Journal, Vol. 6, No.2, Pp 2225-2239,2019. [12] Dina M. Ibrahim “Internet of Things Technology based on LoRaWAN Revolution” 10th International Conference on Information and Communication Systems (ICICS),pp 234-237, 2019. [13] Takayuki Suyama, Yasue Kishino and FutoshiNaya ”Abstracting IoT devices using a virtual machine for wireless sensor nodes”, Internet of Things (WF-IoT), 2014 IEEE World Forum, Seoul,2014, pp. 367-368 [14] Sean Dieter Tebje Kelly, Nagender Kumar Suryadevara, and Subhas Chandra Mukhopadhyay ”Towards the Implementation of IoT for Environmental Condition Monitoring in Homes”, IEEE SENSORS JOURNAL,OCTOBER 2013, VOL. 13, NO. 10, pp. 3846-3853. [15] Andreas Jacobsson, Paul Davidsson ”Towards a Model of Privacy and Security for Smart Homes”, IEEE Conference,2015 [16] YAN Wenbo, WANG Quanyu, GAO Zhenwei ”Smart Home Implementation Based on Internet and WiFi Technology”, Proceedings of the 34th Chinese Control ConferenceHangzhou, China, July 28-30, 2015, pp. 9072-9077. Keywords Arduino UNO, ESP 8266 (wifi-module), AES algorithm, |