Professional Documents
Culture Documents
1. INTRODUCTION 2. SYSTEM ARCHITECTURE 3. SELECTION AND DESIGN OF SYSTEM HARDWARE 3.1 WIRELESS SENSOR NETWORK NODE MODULE 3.2 CHOSEN OF GSM MODULE 4. DESIGN OF SYSTEM SOFTWARE 4.1 SOFTWAR MODULE FOR WSN NODE COMMUNICATION 4.2 SOFTWAR MODULE FOR GSM COMMUNICATION 5. SET UP A PROTOTYPE SYSTEM AND TEST 6. WSN CHARACTERISTICS 6.1 WI-FI 6.2 BLUETOOTH 6.3 ZIGBEE 6.4 NETWORK TOPOLOGY 6.5 COMMUNICATION PROTOCOLS AND ROUTING 6.6 POWER MANAGEMENT 6.7 NETWORK COVERAGE 7. CURRENT & FUTURE DEVELOPMENT 8. PROPOSED WORK 8.1 TEMP SENSOR 8.2 PIR SENSOR 8.3 GAS SENSOR 8.4MICROCONTROLLER 8.5 CAMERA CONCLUSION REFERENCES
ABSTRACT
Security is primary concern for every one. There are many ways to provide security at homes or in industries. But what if the security is assured irrespective of the person is inside or outside the house. This Project describes a design of effective security alarm system that can monitor the house with different sensors using GSM modem. Home Security System is a security system using wireless concept that monitors the status of each sensor continuously. This project is mainly useful in homes, industries etc to continuously safeguard homes and industries. The main aim of this project is to provide security to the homes using GSM technology. The security system contains various sensors like reed switches which serve as door sensors, vibration sensor, temperature (LM35), IR transmitter and receiver, LDE-LDR pair, fire and gas sensors. The system continuously monitors the output of all these sensors and if any of the sensors trigger, the controlling unit immediately identifies the change in the output of the sensor and sends the predefined message to the user mobile through GSM modem and also alerts the buzzer.
CHAPTER 1 INTRODUCTION
Security has been an important issue in the smart home applications. Conventional security systems keep homeowners, and their property, safe from intruders. A smart home security system, however, offers many more benefits. A smart home or building is a home or building, usually a new one that is equipped with special structured wiring to enable occupants to remotely control or program an array of automated home electronic devices by entering single command. For example, a homeowner on vacation can use a Touchtone phone to arm a home security system, control temperature gauges, switch appliances on or off, control lighting, program a home theater or entertainment system, and perform many other tasks. The WSN data collecting node module is connected with Piezoelectric Infrared Detector, Temperature Sensor, Smoke Detector and Gas Sensor separately. When the PIR finds that some people intrudes into the house or when the temperature sensor detects too high indoor temperature or when the gas sensor detects leakage of gas, the data collecting node will send encoded alarm signal to the WSN center node through the wireless sensor network established in home. Once the WSN center node receives alarm signal, it will send alarm short message to the users through the GSM module and GSM network immediately. Similarly the user can also control the various devices connected with device control unit through SMS. Using Bio sensors to measure heart rate and blood pressure from human body this method is using especially for old people. Biosensor senses data and send to the owners or users mobile phone. It will send alarm short message to the users through the GSM module and GSM network immediate
CHAPTER 2
SYSTEM ARCHITECTURE
SMS
PORT1
IR Sensor
GSM MODEM
Fire RS-232
8051
Sensor
Modular design is throughout the system. System is built on the embedded system, and it can monitor the important position through the CMOS camera. Home state SMS and images MMS are sent to specialized mobile phones. Besides, household appliances can be remotely controlled by SMS. ZigBee module connects household appliances, the system motherboard with smoke, temperature, gas sensors, forming a wireless networking. The alarm system adopts SMS data transmission and voice platform of GSM/GPRS network to archive transmitting and remotely control the alarm data when a signal is detected by detectors, the detectors will send alarm signal to host immediately, then the host sends alarm SMS to its pre-set mobile phone numbers, and meanwhile dials its pre-set telephone/mobile phone numbers automatically and drive wiretap. In addition, users can dial the system and set it in arm/disarm mode by any remote phones.
CHAPTER 3
FIG. 3.1 WIRELESS SENSOR NETWORK NODE MODULE The WSN is built of "nodes" from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting.
CHAPTER 4
CHAPTER 5
CHAPTER 6
6.1WI-FI
Wi-Fi (also spelled Wi- fi or Wi- Fi) is a popular technology that allows an electronic device to exchange data wirelessly (using radio waves) over a computer network, including high-speed Internet connections. The Wi-Fi Alliance defines Wi-Fi as any "wireless local area network (WLAN) products that are based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards". The homes Wi-Fi network was implemented through a standard Wireless (802.11b and 802.11g) ADSL Modem Router, with a 4 port switch. The modem provides two primary functions. Firstly, the modem provides the connection between the Internet and local Wi-Fi network; hence extending access to the Wi-Fi enabled home gateway to any location with Internet access. Secondly, any local Wi-Fi enabled device within range of the homes Wi-Fi network can directly access the home gateway. This provides a low cost communication method with the home network, reduced infrastructure costs where Wi-Fi devices are already in use. Moreover, homeowners can monitor and control the smart home network, using familiar technology and devices.
6.2 BLUETOOTH
Bluetooth, is a wireless technology standard for exchanging data over short distances (using short-wavelength radio transmissions in the ISM band from 24002480 MHz) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. Created by telecom vendor Ericsson in 1994, it was originally conceived as a wireless alternative to RS-232 data cables. It can connect several devices, overcoming problems of synchronization. The vast network of Bluetooth devices includes billions of phones, tablets, PCs and TVs in use today worldwide. These devices can not only talk to each other, but also communicate with Bluetooth enabled appliances, heating and cooling systems, and other devices in the smart home. Companies that commercialize this emerging market by selling smart home devices with Bluetooth technology will be able to take advantage of the Bluetooth network effect, ensuring their products can work with the phones, tablets, PCs and TVs homeowners already own.
FIG.6.2 BLUETOOTH
6.3 ZIGBEE
ZigBee is relatively new, wireless personal area network technology based on IEEE 802.15.4, with transmission range 100+ meters. ZigBee Home Automation offers a global standard for interoperable products enabling smart homes that can control appliances, lighting, environment, energy management and security, as well as the expandability to connect with other ZigBee networks. Smarter homes allow consumers to save money, be more environmentally aware, feel more secure and enjoy a variety of conveniences that make homes easier and less expensive to maintain. ZigBee operates in the industrial, scientific and medical radio bands 868MHz in Europe, 915 MHz in the USA and 2.4 GHz in most other countries in the rest of the world. ZigBee is a radio frequency (RF) communications standard based on IEEE 802.15.4. Fig2 depicts the general architecture of a Zigbee based home network. The Zigbee coordinator is responsible for formulating and maintain the network. The ZigBee home automation network consists of a coordinator, routers for the purpose of routing in communication and several end devices. The coordinator is responsible for starting the ZigBee network. During the network initialization phase, the coordinator scans the available radio channels to find the relevant one. Usually, this will be the channel with the least number of active channels, in order to reduce the level of interference. It is possible to limit the channels scanned, for example excluding that frequency ranges used by the Wi-Fi network included in the proposed architecture. The ZigBee devices developed for the home network, as mentioned, includes a light switch, safety sensor and ZigBee remote control. A ZigBee end node has been integrated with these devices. As the devices are started, during their respective initialization stage, the node scans for available channels to identify the network it wishes to join. There may be multiple networks in the same channel; these networks are normally distinguished by their PAN ID. The node selects which network to join based on the PANID. The node sends a request to the network coordinator to join the network. The request is sent to the coordinator directly or through a neighboring router on the desired network with which the node shares the best signal. On receipt of the request the coordinator judges whether the requesting device is permitted to connect to the smart home network.
The Code Blue integrates sensor nodes and other tasks, such as device discovery naming, routing, prioritization of critical data, security and tracking device locations. The inventors designed Code Blue for rapidly changing, critical care environments. It acts as an Information Plane, letting various devices detect each other, report events, and establish communication channels. For medical applications, Code Blue is designed to scale across a wide range of network densities, ranging from sparse clinic and hospital deployments to very dense, ad hoc deployments at a mass casualty site. Code Blue must also operate on a range of wireless devices, from resource-constrained motes to more powerful PDA and PC-class systems. The main advantage of this kind of structure is, it incorporates a flexible naming scheme, robust publish and subscribe routing framework; authentication and encryption provisions and handoff. The other services the Code Blue provides to the network are location tracking, in-network filtering and aggregation. wireless devices in the network, thus performing various
CHAPTER 7
CHAPTER 8
PROPOSED WORK
In this project automation of an entire building is controlled using zigbee. This is new standard designed for automation and control network. The standard is aiming to be low cost, low power solutions for systems consisting of device in house, factories and offices. The transmitter section has three sensors namely gas sensor, temperature sensor and PIR sensor. These are connected for sensing the gas leakage, excess temperature and human presence. The sensors connected detect the changes occurring in the environment. When any changes are detected the microcontroller transmits the signal through zigbee which could be analyzed through the pc with help of a camera and also a message is sent to the user through GSM.
8.4MICROCONTROLLER
When we have to learn about a new computer we have to familiarize about the machine capability we are using, and we can do it by studying the internal hardware design (devices architecture), and also to know about the size, number and the size of the registers. A microcontroller is a single chip that contains the processor (the CPU), non-volatile memory for the program (ROM or flash), volatile memory for input and output (RAM), a clock and an I/O control unit. Also called a "computer on a chip," billions of microcontroller units (MCUs) are embedded each year in a myriad of products from toys to appliances to automobiles. For example, a single vehicle can use 70 or more microcontrollers. The following picture describes a general block diagram of microcontroller In this project we interfaced 8051 microcontroller with Motorolas C168 GSM mobile phone to decode the received message and do the required action. The protocol used for the communication between the two is AT command. The microcontroller pulls the SMS received by phone, decode it, recognizes the Mobile no. and then switches on the relays attached to its port to control the appliances. After successful operation, controller sends back the acknowledgement to the users mobile through SMS.
8.5 CAMERA
Cameras may work with the light of the visible spectrum or with other portions of the electromagnetic spectrum. A camera generally consists of an enclosed hollow with an opening (aperture) at one end for light to enter, and a recording or viewing surface for capturing the light at the other end. \ A majority of cameras have a lens positioned in front of the camera's opening to gather the incoming light and focus all or part of the image on the recording surface. The diameter of the aperture is often controlled by a diaphragm mechanism, but some cameras have a fixedsize aperture. Most cameras use an electronic image sensor to store photographs on flash memory. A security camera system or CCTV (Closed-Circuit Television) provides access to information otherwise unavailable to you and to law enforcement officials when your home or business has been invaded. Most people do not consider CCTV necessary to a good home security system. But your normal magnetic sensors and motion detectors only alert you and others at the moment of invasion. When considering a CCTV, you must remember that the primary purpose of a security camera system is documentation. Because of what it is used for, you want to consider what the camera has to offer in order of sensitivity, resolution, and features.
CHAPTER 9
Recent advances in embedded computing systems have led to the emergence of wireless sensor networks, consisting of small, battery-powered "motes" with limited computation and radio communication capabilities. Sensor networks permit data gathering and computation to be deeply embedded in the physical environment.
GSM technology capable solution has proved to be controlled remotely, provide home security and is cost-effective as compared to the previously existing systems. Hence we can conclude that the required goals and objectives of HACS have been achieved.
This technology has the potential to impact the delivery and study of resuscitative care by allowing vital signs of a person to be automatically collected and fully integrated into the patient care record and used for real-time triage, correlation with hospital records, and long-term observation. The basic level of home appliance control and remote monitoring has been implemented. The system is extensible and more levels can be further developed using automatic motion/glass breaking detectors so the solution can be integrated with these and other detection systems. In case of remote monitoring other appliances can also be monitored such that if the level of temperature rises above certain level then it should generate SMS or sensors can also be applied that can detect gas, smoke or fire in case of emergency the system will automatically generate SMS. System allowed the provision of security such that system took no action against the instructions received from unauthorized number. The required task was performed only when the pre-configured number instructed the system. System sent breach alert when the intrusion was detected. Remote Controlling capability of the system allowed user to switch on/off through simulating the appliance as directed by the incoming SMS. The system automatically performed tests and checked support for available features and SMS sending and receiving capability and configured system accordingly
CONCLUSION
This paper presents one solution for establishing a low power consumption remote home security alarm system. The system, based on WSN and GSM technology, can detect the theft, leaking of raw gas and fire, and send alarm massage remotely. The hardware of this system includes the single chip C5081F310, wireless receiving and sending chip CC1100as well as the SIMENS TC35 GSM module. The system software developed in Embedded C language has the ability of collecting, wireless receiving and transmitting data, and can send a piece of alarm short message to the users mobile phone when some dangerous condition has been detected and users automatically stop the devices with messages. With the advantages of reliability, easy usage, complement wireless, and low power consumption, the system also has practical value in other fields
At present, the system can also be hardware and software upgrades and integration of new functional modules to meet the intelligent home security on the future development needs. Tested showed that the stable operation of the system to achieve the design requirement. The system also can be used in banks, libraries and museums, such as required security and remote monitoring of the place.
REFERENCES
1.2010 Second International Conference on Networks security, Wireless Communication and Trusted Computing. 2. Wu Chengdong, Zheng Jungang, Liu Daren, Xie Kun, Study on Smart Home Network Technology Based on Wireless Sensor Network, Academic Journal of Shenyang Jianzhu University, Vol. 21, No. 6, pp.753-756, Nov. 2005 (in Chinese) 3. Ren Fengyuan, Huang Haining, Lin Chuang, Wireless sensor network, Journal of Software, Vol. 14, No. 7, pp.1282-1291, March, 2003 (in Chinese) 4. Li Wenzhong, Duan Chaoyu, C8051F Series MCU and Short Distance Wireless Data Communication, Beijing, Beijing University of Aeronautics & Astronautics Press, 2007, pp.188-190 (in Chinese) 5. Qiao Qu, Zhao Guohao, Wei Baohua, Design of Home Safeguard System Based on GSM Technique, Electronic Engineer, vol.32, No.11, pp.76-78, Nov.2006 (in Chinese)\ 6. TC35 /TC37 Hardware Interface Description, Version 04. 00. 2002. 7. AT Commands GSM Reference Guide, Revision A. 2003. 8. Jin Rencheng, Zhangf Tianchao, Design and Implementation of Security and Defense System based on GSM, Computer Application, Vol.24 No.12, pp.75-77, Dec. 2004 (in Chinese) 9. Automated advanced industrial and home security using GSM and FPGA, Department of Electronics and Communication Engineering BV.C Engineering College, Odalarevu, Amalapuram, India International Journal of Computer Science and Information Technologies, Vol. 2 (4) , 2011. 10. Design and Implementation of Pyro electric Infrared Sensor Based Security System Using Microcontroller, Proceeding of the 2011 IEEE Students Technology Symposium14-16 January, 2011, IIT Kharagpur. 11. AT Commands Set for Nokia GSM and WCDMA products, Version 1.2, July 2005, available. 12. A ZigBee Based Embedded Remote Control System, 2010 2nd International Conference on Signal Processing Systems (ICSPS). 13. A Review on Security in Smart Home Development , Rosslin John Robles and Tai-hoon Kim, International Journal of Advanced Science and Technology Vol. 15, February, 2010 . 14. Automatic detection of human and Energy saving based on Zigbee Communication ,Chairman Sujana , Department of ECE ,Sri Vasavi Engg College, Tadepalligudem , International Journal on Computer Science and Engineering (IJCSE),June 2011. 15. International symposium on Intelligent Information Technology application workshop.