How to properly diagnose and proffer solutions to real-life security needs using IoT tools.

IoT is vastly shaping the World around us.

On account of the broad nature of the topic, we will narrow our discussion to one Use Case for the sake of clarity and comprehension. To begin any process of problem solving we begin by defining it. Problem-solving is a systematic process that involves steps. Before delving into the problem-solving process let’s examine the reason or reasons why a problem is prone to recurrence;

  1. Unidentified and Underlying issue: this is akin to having a short-term solution bias. Solutions aimed at providing immediate relief may not be sustainable in the long term.
  2. Inadequate Root Cause Analysis: when a problem is not properly defined or identified and a solution is proffered, no matter the well-meaning intentions, research has shown that there is a high chance of the problem recurring.
  3. Insufficient Implementation: due to the unavailability of the right tools, expertise, and resources, lasting solutions become easily far-fetched.
  4. Lack of monitoring and follow-up: without a preventive maintenance culture of effective feedback and scheduled time-based monitoring, the chances of a problem resurfacing are usually very high.
  5. Complexity: some problems are complex and will require more ongoing adjustments. This is because some of the problems are part of a larger one and hence completely solving it requires more effort over time using updates.

Given the above, we immediately see why there is always a need to correctly diagnose and proffer a solution in any given situation because the consequences are mostly dire. Homeowners, property managers facility administrators, and a host of other key responsibilities are bequeathed with this situation most of the time.

The following are the best practices when it comes to proper diagnoses of real-life security or comfortability needs

  1. Identify the problem: to understand a problem based on the needs of the moment, we start by gathering the relevant information. Also, we determine the extent or boundaries of the problem this is called the scope. We also differentiate between symptoms of the problem and its root cause.
  2. Analyze the problem: After gathering the required data, we can now analyze the problem to understand its context and implications. There are different techniques used in carrying out analysis. Some of these techniques are already popular and have grown in their use due to adoption. There are 5 Whys, Fishbone Diagram, RCA or Root Cause Analysis
  3. Generate Potential Solution: when analysis has been concluded, it’s now time to generate potential solutions. We also consider several factors such as the resources available, the potential impact of the solution, and the long- and short-term issues that will be encountered going forward.
  4. Evaluate and Select Solution: All solutions are thrown in the mix using a chart or a visual queue such as a decision tree
  5. Develop an Action Plan: this comes in after a vote of confidence is passed at the solutions stage. All factors are considered long-term and short-term simultaneously.
  6. Implement the Solution. Here we begin gathering the resources required and then we can now start the implementation by putting the action plan into practice.
  7. Evaluate the Results: From here we gather the necessary feedback needed to ensure the procedure or solution worked. If there exists an issue that was not considered or was an oversight, it is immediately worked on accordingly with the most critical concerns addressed first.

Let’s look at a real-life case study to see how the problem is defined and the solution proffered:

Case Study

A shop was burgled over the night and was only discovered in the morning after the incident. Goods worth millions were carted away at the expense of the shop owner. Fortunately, there was insurance cover which will cover some costs and possibly get the business up and running in no time. but let’s take a break here, things could have played out differently if some factors were in place.

Problem Definition: this is a case of a security breach. From the information gathered, there was no surveillance footage, it happened at night when visibility was low, Security personnel on duty were possibly distracted, there was no alarm system in place and hence no system breach triggered. Previous records showed that it was not a first-time occurrence. In this case, the symptoms were financial loss and property damage. The root cause was identified to be a skeletal or minimal security apparatus that was inefficient around the clock.

In consideration, the shop owner could either file a legal action against the security company and wait for security beef up or activate personal security. For several reasons, the latter and not the former is the best course of action to take because we were informed by the case study that an insurance process was involved.

To prevent such incidents in the future, a robust IoT-based security system can be implemented in the shop.

Here is a more comprehensive solution:

IoT-based Security System for the Shop
  • Smart Surveillance Cameras:
    • 24/7 Monitoring: Install high-definition, night-vision cameras both inside and outside the shop to monitor activities around the clock.
    • Real-time Alerts: Cameras equipped with motion detection and AI can send real-time alerts to the shop owner’s smartphone and security personnel if unusual activity is detected during closed hours.
    • Cloud Storage: Store footage securely in the cloud for easy access and review, ensuring evidence is available if needed.
  • Smart Alarm System:
    • Intrusion Detection: Install sensors on doors and windows that trigger alarms if forced entry is detected.
    • Silent Alarms: Set up silent alarms that alert the shop owner and authorities immediately without tipping off the intruders.
    • Integration with Surveillance: Link the alarm system with surveillance cameras to start recording and send alerts when the alarm is triggered.
Access Control System:
  • Smart Locks: Use IoT-enabled smart locks that can be controlled remotely and log entry and exit times.
  • Biometric Access: Implement biometric or RFID access controls to limit and monitor who can enter the shop, especially after hours.
  • Remote Access Management: Allow the shop owner to grant or revoke access remotely, ensuring only authorized personnel can enter.
Environmental Sensors:
  • Glass Break Sensors: Install sensors that detect the sound of breaking glass and trigger alarms.
  • Vibration Sensors: Place vibration sensors on walls and ceilings to detect drilling or other attempts to breach the shop’s security.
Automated Lighting:
  • Smart Lighting: Use smart lights that turn on automatically when motion is detected during closed hours to deter intruders.
  • Randomized Lighting Schedule: Program lights to turn on and off at random intervals to create the illusion of activity inside the shop.
Security Monitoring Service:
  • Professional Monitoring: Enlist a professional security monitoring service that receives alerts and can respond immediately by contacting authorities.
Backup Power Supply:
  • Uninterruptible Power Supply (UPS): Ensure all IoT devices, including cameras and alarms, have backup power to continue functioning during power outages.
Regular Maintenance and Testing:
  • Routine Checks: Schedule regular maintenance and testing of all security devices to ensure they are functioning correctly.
  • Software Updates: Keep the software and firmware of all IoT devices up to date to protect against vulnerabilities.
Scenario: How It Could Have Played Out Differently
Night of the Incident:
  • Intruder Entry: The intruders attempt to break in by smashing a window.
  • Glass Break Detection: The glass break sensor triggers an alarm and sends an immediate alert to the shop owner and security personnel.
  • Surveillance Activation: The smart cameras start recording and streaming live footage to the cloud and the shop owner’s phone.
  • Intruder Deterrence: The smart lighting system activates, flooding the shop with bright lights, and possibly deterring the intruders.
  • Silent Alarm: A silent alarm notifies the local police without alerting the intruders.
  • Real-time Monitoring: The shop owner and the security service monitor the situation in real time through their smartphones.
Immediate Response:
  • Police Arrival: Police are dispatched quickly due to the silent alarm and arrive at the scene while the intruders are still inside or nearby.
  • Evidence Collection: High-definition footage from the surveillance cameras provides clear evidence of the intruders’ identities and actions.
Benefits of the IoT-based Security Solution
  • Enhanced Security: The integrated system provides multiple layers of security, making it difficult for intruders to succeed.
  • Real-time Response: Immediate alerts and responses can prevent significant losses and increase the chances of catching the intruders.
  • Peace of Mind: The shop owner can rest assured knowing the shop is being monitored and protected even when they are not present.
  • Insurance Benefits: Demonstrating the use of advanced security systems can potentially lower insurance premiums and ensure quicker claims processing.

In summary, the shop owner can implement a full surveillance system inside and outside the shop. This surveillance system consists of a motion camera, system integrity breach alarm, and notification to shop owners’ mobile for live footage. As shown above, the burglary could have been truncated as the shop owner would have immediately alerted the police on how the events were unfolding in real-time.

By implementing these IoT-based solutions, the shop owner could significantly enhance security and reduce the risk of future burglaries.

 

NouseNephesh

Writer

All Posts

Leave a Reply

2024©Westeserve. All rights reserved.

Scroll to Top