Embedded System-Based Enhanced Smart Security Systems for Intelligent Monitoring Applications: A Review

P. Lokesh *
Department of Electronics and Communication Engineering, Vemu Institute of Technology, Pakala, Andhra Pradesh, India.
Periodicity:July - December'2023
DOI : https://doi.org/10.26634/jes.12.1.20369


The advanced smart security system uses palm vein technology and machine learning to enhance authentication. It combines biometric data with behavioral analysis, continuously adapting to improve security. AI integration allows for anomaly detection, distinguishing normal user interactions from suspicious activities. The user-friendly interface makes it accessible for various applications, ensuring resilient protection against evolving threats. The palm vein technology not only enhances security but also minimizes the risk of false positives and negatives, ensuring a reliable and efficient authentication process. In practical scenarios, the proposed system's versatility extends to securing confidential information in various sectors such as finance, research institutions, and government facilities. Its adaptability and compatibility with existing infrastructure make it a seamless and effective solution for organizations seeking to bolster their security measures. Moreover, the system's integration with mobile devices enables users to receive real-time notifications, allowing for prompt action in the event of a security breach. This feature contributes to the overall responsiveness and effectiveness of the security system, especially in remote locations where immediate intervention may be crucial. In conclusion, the advanced smart security system with palm vein technology not only introduces a novel approach to authentication but also addresses the limitations of existing models. The incorporation of machine learning, behavioral analysis, and real-time notifications significantly enhances its overall security features, making it a costeffective and reliable solution for a wide array of applications.


Security, Recognition, Phone Message, Authentication, Palm Vein Technology, Smart Security System, Intelligent Monitoring, Security Enhancement.

How to Cite this Article?

Lokesh, P. (2023). Embedded System-Based Enhanced Smart Security Systems for Intelligent Monitoring Applications: A Review. i-manager’s Journal on Embedded Systems, 12(1), 16-25. https://doi.org/10.26634/jes.12.1.20369


[1]. Arriany, A. A., & Musbah, M. S. (2016, September). Applying voice recognition technology for smart home networks. In 2016 International Conference on Engineering & MIS (ICEMIS) (pp. 1-6). IEEE.
[2]. Hanumanthu, G., & Chandra, D. (2013). Wireless Identification of RFID, Fingerprint & IRIS. International Journal of Innovative Research and Development, 2(5).
[3]. Kak, N., Gupta, R., & Mahajan, S. (2010). Iris recognition system. International Journal of Advanced Computer Science and Applications, 1(1).
[4]. Indumathi, J., Asha, N., & Gitanjali, J. (2020). Smart security system using IoT and mobile assistance. In Emerging Research in Data Engineering Systems and Computer Communications: Proceedings of CCODE (pp. 441-453). Springer Singapore.
[5]. Malhotra, S. (2014). Banking locker system with odor identification & security question using RFID & GSM Technology. International Journal of Advances in Electronics Engineering–IJAEE, 4(3), 156-159.
[6]. Manjunath, M. P., Kumar, P. R., Kumar, P., Gopinath, N., & Haripriya, M. E. (2015). NFC based bank locker system. International Journal of Engineering Trends and Technology (IJETT), 23(1), 15-19.
[7]. Mustafah, Y. M., Azman, A. W., Bigdeli, A., & Lovell, B. C. (2007, September). An automated face recognition system for intelligence surveillance: Smart camera recognizing faces in the crowd. In 2007 First ACM/IEEE International Conference on Distributed Smart Cameras (pp. 147-152). IEEE.
[8]. Prasad, S., & Suneel, D. (2015). Proximity sensor based security lock and theft detection. International Journal of Science Technology and Management, 4(12), 81-88.
[9]. Srinivasan, R., Mettilda, T., Surendran, D., Gobinath, K., & Sathishkumar, P. (2015). Advanced locker security system. International Conference on Information Engineering, Management and Security (ICIEMS), 4(1), 1465-1471.
[10]. Taiwo, O., Ezugwu, A. E., Oyelade, O. N., & Almutairi, M. S. (2022). Enhanced intelligent smart home control and security system based on deep learning model. Wireless Communications and Mobile Computing, 1-22.
[11]. Tistarelli, M., & Schouten, B. (2011). Biometrics in ambient intelligence. Journal of Ambient Intelligence and Humanized Computing, 2, 113-126.
[12]. Zhai, Y., & Cheng, X. (2011). Design of smart home remote monitoring system based on embedded system. In 2011 IEEE 2nd International Conference on Computing, Control and Industrial Engineering, (Vol. 2, pp. 41-44). IEEE.
[13]. Zhu, X., Qu, W., Qiu, T., Zhao, L., Atiquzzaman, M., & Wu, D. O. (2020). Indoor intelligent fingerprint-based localization: Principles, approaches and challenges. IEEE Communications Surveys & Tutorials, 22(4), 2634-2657.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.