IoT Implementation for Server Room Security Monitoring Using Telegram API

Mochamad Fajar Wicaksono (1), Myrna Dwi Rahmatya (2), Ilham (3)
(1) Computer Engineering Study Program, Universitas Komputer Indonesia, Bandung, Indonesia
(2) Informatics Management Study Program, Universitas Komputer Indonesia, Bandung, Indonesia
(3) Computer Systems Study Program, Universitas Komputer Indonesia, Bandung, Indonesia
Fulltext View | Download
How to cite (IJASEIT) :
Wicaksono, Mochamad Fajar, et al. “IoT Implementation for Server Room Security Monitoring Using Telegram API”. International Journal on Advanced Science, Engineering and Information Technology, vol. 12, no. 5, Oct. 2022, pp. 1931-7, doi:10.18517/ijaseit.12.5.13922.
This research aims to create a system that can monitor server room security by utilizing IoT technology, controllers, sensors, actuators, and Telegram API. The system made includes security for the indoor and outdoor parts. The method used in this study is experimental. The output obtained by the user is telegram text messages, photos, and video. The main controller on this system is the Raspberry Pi. This study showed that if the server room temperature is >230C, the system will send a message via Telegram. If the PIR sensor_1 or PIR sensor_2 detects an intruder or the measured distance is <300cm from the side of the door, the system will send text messages, photos, and videos via Telegram. That way, the user can determine the next steps related to the condition of the server room. However, if the RFID tag is recognized, the solenoid door lock, PIR, and ultrasonic will be deactivated. Other features, Users can ask the system to record a video of the room conditions and also messages related to room temperature through commands sent via Telegram messages. Testing is carried out using 3 scenarios: testing command, testing regarding valid access, and testing regarding invalid temperature and intruder detection. Overall test results show all these tests were successful 100% and followed the objectives and program scenarios. This tool has fulfilled the objective where this tool can monitor the condition and security of the server room by utilizing IoT technology.

J. P. A. Yaacoub, O. Salman, H. N. Noura, N. Kaaniche, A. Chehab, and M. Malli, “Cyber-physical systems security: Limitations, issues and future trends,” Microprocess. Microsyst., vol. 77, pp. 1-45, Sep. 2020, doi: 10.1016/j.micpro.2020.103201.

I. Ghafir et al., “Security threats to critical infrastructure: the human factor,” J. Supercomput., vol. 74, pp. 4986-5002, 2018, doi: 10.1007/s11227-018-2337-2.

N. Scarpato, A. Pieroni, L. Di Nunzio, and F. Fallucchi, “E-health-IoT universe: A review,” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 7, no. 6, pp. 2328-2336, 2017, doi: 10.18517/ijaseit.7.6.4467.

Menteri Hukum Dan Hak Asasi Manusia, “Pedoman Penyelenggaraan Pusat Data Dan Ruang Server Di Lingkungan Kementerian Hukum Dan Hak Asasi Manusia Republik Indonesia,” Indonesia, M.HH-01.TI.05.02, 2017. [Online]. Available: https://www.kemenkumham.go.id/attachments/article/1522/Kepmen Tentang Pedoman Penyelenggaraan Pusat Data dan Ruang Server - final.pdf.

J. S. Jahlool, “Design and Simulation of Automatic Temperature Control and Alert System Based PIC16F887,” Int. J. Informatics Commun. Technol., vol. 6, no. 2, pp. 95-104, Aug. 2017, doi: 10.11591/ijict.v6i2.pp95-104.

S. A. u. R. Omer and E. Muhammad, “Design of intelligent air conditioner controller using fuzzy logic,” in 2017 International Conference on Innovations in Electrical Engineering and Computational Technologies (ICIEECT), 2017, pp. 1-5, doi: 10.1109/ICIEECT.2017.7916556.

S. Niraj, K. Kamlesh, W. Pankaj, S. Danish, and G. Arvind, “Server Room Access Control Using Smartphone,” Int. J. Eng. Tech., vol. 4, no. 3, pp. 56-59, 2018, [Online]. Available: http://www.ijetjournal.org.

M. Alvan, P. Utomo, A. Aziz, and B. Harjito, “Server Room Temperature & Humidity Monitoring Based on Internet of Thing (IoT),” in Journal of Physics: Conference Series, 2019, pp. 1-8, doi: 10.1088/1742-6596/1306/1/012030.

J. Sobota, M. Goubej, J. Kí¶nigsmarkoví¡, and M. ÄŒech, “Raspberry Pi-based HIL simulators for control education,” IFAC-PapersOnLine, vol. 52, no. 9, pp. 68-73, 2019, doi: https://doi.org/10.1016/j.ifacol.2019.08.126.

V. Chauhan, M. Patel, S. Tanwar, S. Tyagi, and N. Kumar, “IoT Enabled real-Time urban transport management system,” Comput. Electr. Eng., vol. 86, pp. 1-18, 2020, doi: https://doi.org/10.1016/j.compeleceng.2020.106746.

H. Hidayat, N. S. Hasibuan, and F. Wicaksono, “Design And Implementation Of Electronic Examination Device For Improving The Blind Students’ Comfort,” J. Eng. Sci. Technol., vol. 16, no. 1, pp. 807-815, 2021.

N. Bafdal and I. Ardiansah, “Application of Internet of Things in Smart Greenhouse Microclimate Management for Tomato Growth,” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 11, no. 2, pp. 427-432, 2021, doi: 10.18517/ijaseit.11.2.13638.

T. Zou et al., “Raspberry promotes brown and beige adipocyte development in mice fed high-fat diet through activation of AMP-activated protein kinase (AMPK) α1,” J. Nutr. Biochem., vol. 55, pp. 157-164, 2018, doi: https://doi.org/10.1016/j.jnutbio.2018.02.005.

M. T. A. Seman, M. N. Abdullah, and M. K. Ishak, “Monitoring Temperature, Humidity And Controlling System In Industrial Fixed Room Storage Based On IoT,” J. Eng. Sci. Technol., vol. 15, no. 6, pp. 3588-3600, 2020.

I. Ardiansah, N. Bafdal, E. Suryadi, and A. Bono, “Greenhouse monitoring and automation using arduino: A review on precision farming and Internet of Things (IoT),” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 10, no. 2, pp. 703-709, 2020, doi: 10.18517/ijaseit.10.2.10249.

M. Jacob and P. Mani, “A Reference Model For Testing Internet of Things Based Applications,” J. Eng. Sci. Technol., vol. 13, no. 8, pp. 2504-2519, 2018.

S. Bin Saleh et al., “Smart home security access system using field programmable gate arrays,” Indones. J. Electr. Eng. Comput. Sci., vol. 11, no. 1, pp. 152-160, 2018, doi: 10.11591/ijeecs.v11.i1.pp152-160.

M. Murad, O. Bayat, and H. M. Marhoon, “Design and implementation of a smart home system with two levels of security based on IoT technology,” Indones. J. Electr. Eng. Comput. Sci., vol. 21, no. 1, pp. 546-557, 2021, doi: 10.11591/ijeecs.v21.i1.pp546-557.

S. Nuanmeesri and L. Poomhiran, “Optimization Shortest One-Way Path for Energy Saving Auto Robot Collecting Floating Garbage using Fast Approximate Nearest Neighbor Search,” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 11, no. 2, pp. 457-464, 2021, doi: 10.18517/ijaseit.11.2.13191.

L. Benny and P. K. Soori, “Prototype of parking finder application for intelligent parking system,” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 7, no. 4, pp. 1185-1190, 2017, doi: 10.18517/ijaseit.7.4.2326.

O. Appiah, E. Quayson, and E. Opoku, “Ultrasonic sensor based traffic information acquisition system; a cheaper alternative for ITS application in developing countries,” Sci. African, vol. 9, p. e00487, 2020, doi: https://doi.org/10.1016/j.sciaf.2020.e00487.

X. Mouy et al., “FishCam: A low-cost open source autonomous camera for aquatic research,” HardwareX, vol. 8, p. e00110, 2020, doi: https://doi.org/10.1016/j.ohx.2020.e00110.

K. Miikki et al., “An open-source camera system for experimental measurements,” SoftwareX, vol. 14, p. 100688, 2021, doi: https://doi.org/10.1016/j.softx.2021.100688.

J. AnnRoseela and T. Godhavari, “Biometric and RFID based authentication system for exam paper leakages detection using IoT technology,” Indones. J. Electr. Eng. Comput. Sci., vol. 20, no. 3, pp. 1271-1277, 2020, doi: 10.11591/ijeecs.v20.i3.pp1271-1277.

M. El Beqqal, M. Azizi, and J. L. Lanet, “Multimodal access control system combining RFID, fingerprint and facial recognition,” Indones. J. Electr. Eng. Comput. Sci., vol. 20, no. 1, pp. 405-413, 2020, doi: 10.11591/ijeecs.v20.i1.pp405-413.

M. VagaÅ¡, A. Galajdoví¡, D. Å imÅ¡í­k, and D. Onofrejoví¡, “Wireless data acquisition from automated workplaces based on RFID technology,” IFAC-PapersOnLine, vol. 52, no. 27, pp. 299-304, 2019, doi: https://doi.org/10.1016/j.ifacol.2019.12.677.

M. K. Kah Wen, N. binti Ahmad, and S. H. binti Ruslan, “Arduino based outing and attendance system for boarding school students,” Indones. J. Electr. Eng. Comput. Sci., vol. 20, no. 2, pp. 1053-1061, 2020, doi: 10.11591/ijeecs.v20.i2.pp1053-1061.

N. Jannati, N. Nakhaee, V. Yazdi-Feyzabadi, and D. Tjondronegoro, “A cross-sectional online survey on patients’ satisfaction using store-and-forward voice and text messaging teleconsultation service during the COVID”‘19 pandemic,” Int. J. Med. Inform., vol. 151, p. 104474, 2021, doi: https://doi.org/10.1016/j.ijmedinf.2021.104474.

A. Dargahi Nobari, M. H. K. M. Sarraf, M. Neshati, and F. Erfanian Daneshvar, “Characteristics of viral messages on Telegram; The world’s largest hybrid public and private messenger,” Expert Syst. Appl., vol. 168, p. 114303, 2021, doi: https://doi.org/10.1016/j.eswa.2020.114303.

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Authors who publish with this journal agree to the following terms:

    1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
    2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
    3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).