This book you will get more details about GSM BASED HOME SECURITY SYSTEM which also helps you in doing allot of experience and came to know about so many new technologies.
This book provides a comprehensive overview of the
This book you will get more details about GSM BASED HOME SECURITY SYSTEM which also helps you in doing allot of experience and came to know about so many new technologies.
This book provides a comprehensive overview of the
This book you will get more details about GSM BASED HOME SECURITY SYSTEM which also helps you in doing allot of experience and came to know about so many new technologies.
This book provides a comprehensive overview of the
DEPARTMENT OF TELECOMMUNICATION ENGINEERING GOLLIS UNIVERSITY HARGIESA SOMALILAND 2014
II
GSM BASED HOME SECURITY SYSTEM
Mini project report submitted in partial fulfilment of the requirement for the award of the degree of bachelor engineering by:
Abdinasir Ahmed Iman ///Roll No:1887 Sabir Abdi Hirsi ///Roll No: 3057 Mohamed Dahir Gammur ///Roll No:2756 Abdihakin I smail Mohamed ///Roll No:1941 Abdiqani I smail Rooble ///Roll No:2721 Abdirahmaan Mohamed J ama ///Roll No:2905
Department of telecommunication engineering Gollis University Hargiesa Somaliland 2014
III
GOLLIS UNIVERSITY
Empowers its Students as Professional Leaders Committed to Make a Positive Difference
CERTIFICATE
This is to certify that the project report entitled gsm based on security system being submitted by Mr. Abdinasir Ahmed Iman, Sabir Abdi Hirsi, Mohamed Dahir Gammur, Abdihakin Ismail Mohamed, Abdiqani Ismail Rooble, Abdirahmaan Mohamed Jama, in partial fulfilment for the award of the degree of bachelor of technology in telecommunication to the Gollis university is a record of benefited work carried out by us under my guidance and supervision. The results embodied in this project report have not been submitted to any other University or institute for the award of any degree or diploma.
Dean of department Mohamed Ali Elmi Advisor name Bewnet Getachew Badda-Cas Area, Jijiga-yar District Hargeisa, Somaliland Phone: +252-7- 9720134 Mobile: 9119911 SOMTEL Email: info@gollisuniversity.com Website: www.gollisuniversity.com
IV
Acknowledgment
First we would like to express our special thanks of Allah who helps us in every time. Secondly we would also like to thanks our parents and friends who help us allot finishing this project within the limited time. We would like to express our special thanks of gratitude to our teacher eng: Bewnet Getachew as well as our principal eng: Mohamed Ali Elmi Samater who gave us the golden opportunity to do wonder full project on the topic GSM BASED HOME SECURITY SYSTEM which also helped us in doing allot of research and came to know about so many new thinks we really thank full to them. We are making this project not only marks but to also increase our knowledge.
THANK A GAIN TO ALL WHO HELPED US.
V
Abstract Security has becoming an important issue everywhere. Home security is becoming necessary nowadays as the possibilities of intrusion are increasing day by day. Safety from theft, leaking of raw gas and fire are the most important requirements of home security system for people. A traditional home security system gives the signals in terms of alarm. However, the GSM (Global System for Mobile communications) based security systems provides enhanced security as whenever a signal from sensor occurs, a text message is sent to a desired number to take necessary actions. This paper suggests two methods for home security system. The first system uses web camera. Whenever there is a motion in front of the camera, it gives security alert in terms of sound and a mail is delivered to the owner. The second method sends SMS which uses GSM-GPS Module (sim548c) and Atmega644p microcontroller, sensors, relays and buzzers.
VI
Table of contents Certificate Acknowledgment
Chapter one 1.1 . Introduction...............................................................................1 1.2 . Background...2 1.3 . Problem statement.....................................................................3 1.4 . Objectives...................................................................................4 1.5 . Assumption................................................................................4 1.6 . Motivation..................................................................................5 1.7 . Limitations of the projects.........................................................5 1.8 . Documentations.........................................................................5 Chapter two 2.1 . Introduction..........6 2.2 . OVERVIEW OF GSM.......11 2.3 . Structure of home security system.....16 2.4 . System Structure And Working Principle17 Chapter three 3.1 . Introduction....20 3.2 . GSM networks........21 3.2.1. Chosen of GSM Module...22 3.2.2. Design of System Software....22 3.3 . Wireless Sensor Network...24 3.3.1. Structure of a wireless sensor network......24 3.3.2 MESH NETWORK......24 3.3.3 HYBRID STAR-MESH NETWORK.........25 3.3.4 Design issues of a wireless sensor network.........25 3.3.5 Structure of a wireless sensor node.......27 3.3.6 Security issues in wireless sensor network....28 3.3.7 Wireless Sensor Network Node Module....29
VII
Chapter four Testing and working gsm based on home security system 4.1. Introduction...................................................................................31 4.2. Features..........................................................................................33 4.3 . Applications...................................................................................34 4.4 . Advantages.....................................................................................35 4.5. Future Development......................................................................35 Chapter five Conclusion.............................................................................................36 References..............................................................................................38
1 Chapter One 1.1 Introduction Security has been an important issue in the smart home applications. Conventional security systems keep homeowners, and their property, safe from thieves. A smart home security system, however, offers many more benefits. A smart home or building is a home or building, usually a new one that is equipped with special structured wiring to enable occupants to remotely control or program an array of automated home electronic devices by entering single command. GSM based home security system adopts voice dais of GSM network to send control command and receive alarm distantly. When a signal to system right away .the system then sends alarm to its preset mobile numbers and temporary dials the per set telephone /mobile phone numbers spontaneously. It will send alarm short message to the users through the GSM module and GSM network immediately. Automated security systems play an important role of providing an extra layer of security through user authentication to prevent break-ins at entry points and also to track illegal intrusions o r unsolicited activities within the vicinity of the home (indoors and outdoors). Remotely the system allows the user to effectively monitor and control the house/office appliances and equipments via the mobile phone set by sending commands in the form of SMS messages and receiving the appliances status. The main concept behind the project is receiving the sent SMS and processing it further as required to perform several operations. The type of the operation to be performed depends on the nature of the SMS sent. The principle in which the project is based is fairly simple. First, the sent SMS is stored and polled from the receiver mobile station and then the required control signal is generated and sent to the intermediate hardware that we have designed according to the command received in form of the sent message. We have selected a particular Nokia mobile set (Nokia 3310) for our project. The messages are sent from the mobile set that contain commands in written form which are then processed accordingly to perform the required task. A microcontroller based system has been proposed for our project. There are several terminologies that are used extensively throughout this project report. GSM (Global System for Mobile Communications): It is a cellular communication standard. SMS (Short Message Service): It is a service available on most digital mobile phones that permit the sending of short messages (also known as text messaging service).
2 1.1.1 Background The new age of technology has redefined communication. Most people nowadays have access to mobile phones and thus the world indeed has become a global village. At any given moment, any particular individual can be contacted with the mobile phone. But the application of mobile phone cannot just be restricted to sending SMS or starting conversations. New innovations and ideas can be generated from it that can further enhance its capabilities. Technologies such as Infra-red, Bluetooth, etc which has developed in recent years goes to show the very fact that improvements are in fact possible and these improvements have eased our life and the way we live. Remote management of several home and office appliances is a subject of growing interest and in recent years we have seen many systems providing such controls. These days, apart from supporting voice calls a mobile phone can be used to send text messages as well as multimedia messages (that may contain pictures, graphics, animations, etc). Sending written text messages is very popular among mobile phone users. Instant messaging, as it is also known, allows quick transmission of short messages that allow an individual to share ideas, opinions and other relevant information. We have used the very concept to design a system that acts a platform to receive messages which in fact are commands sent to control different appliances and devices connected to the platform. We have designed a control system which is based on the GSM technology that effectively allows control from a remote area to the desired location. The application of our suggested system is immense in the ever changing technological world. It allows a greater degree of freedom to an individual whether it is controlling the household appliances or office equipments. The need to be physically present in order to control appliances of a certain location is eliminated with the use of our system.
3 1.2 Problem Statement Technology has advanced so much in the last decade or two that it has made life more efficient and comfortable. The comfort of being able to take control of devices from one particular location has become imperative as it saves a lot of time and effort. Therefore there arises a need to do so in a systematic manner which we have tried to implement with our system. The system we have proposed is an extended approach to automating a control system. With the advancement and breakthroughs in technology over the years, the lives of people have become more complicated and thus they have become busier than before. With the adoption of our system, we can gain control over certain things that required constant attention. The application of our system comes in handy when people who forget to do simple things such as turn ON or OFF devices at their home or in their office, they can now do so without their presence by the transmission of a simple text message from their mobile phone. This development, we believe, will ultimately save a lot of time especially when people dont have to come back for simple things such as to turn ON/OFF switches at their home or at their office once they set out for their respective work. The objective of this project is to develop a device that allows for a user to remotely control and monitor multiple home/office appliances using a cellular phone. This system will be a powerful and flexible tool that will offer this service at any time, and from anywhere with the constraints of the technologies being applied. Possible target appliances include (but are not limited to) climate control system, security systems, lights; anything with an electrical interface. The proposed approach for designing this system is to implement a microcontroller-based control module that receives its instructions and command from a cellular phone over the GSM network. The microcontroller then will carry out the issued commands and then communicate the status of a given appliance or device back to the cellular phone.
4 1.3 Objectives Main objectives of this project are to design study and impalement wireless network sensor network gsm based on home security system. The main aim and objective of the system is to develop an interface between the GSM and electrical appliances for the users, used the mobile phone and to access the home appliances or other electrical devices remotely. The objective is to develop a system that allows for a user to remotely control and monitor multiple home appliances or electrical devices using a cellular phone or protocols. This system will be a powerful and flexible tool that will offer this service at any time, and from anywhere with the constraints of the technologies being applied. Possible target appliances include, security systems,; anything with an electrical interface. The proposed approach for designing this system is to implement a microcontroller-based control module that receives its instructions and commands from a cellular phone over the GSM network. The microcontroller then will carry out the issued commands and then communicate the status of a given appliance or device back to the cellular phone. The project GSM based Control System at the title suggests is aimed to construct a control system that enables the complete control of the interface on which it is based. General objectives of the project are defined as; a. To co-ordinate appliances and other devices through Short Message Service (SMS). b. To effectively receive and transmit data via SMS c. To eliminate the need of being physically present in any location for tasks involving the operation of appliances within a household/office. d. Minimize power and time wastage 1.4 Assumptions Certain assumptions have to be made in order to implement our project. The list of assumptions for our project is; a. The user and control unit will establish communication via GSM b. The cell phone and service provider chosen will support text messaging service. c. The user is familiar with the text messaging program on their cell phone. d. All service charges (standard messaging rates) from the service provider apply. e. The controlled appliances can and will have to have an electrical interface in order to be controlled by the microcontroller.
5 1.5 Motivation This project is very interesting project allowed you to design and also understanding very Smart equipment is used to detect by using infrared. Side encouragement in the process to do it when we looked at the part taken many problems facing society, which for being a thief. This loss severely is too much living in the country and lost belongings, for example in the fall of the homes, cars, businesses, and commercial areas of the country. To control and monitor specified security gates, and other wired peripherals. This system plays an important role of providing an extra layer of security through user authentication to prevent break-ins at entry points and also to track illegal disturbance or unsolicited activities within the surrounding area of the home. 1.6 Limitations of the projects Lack of material which is used to design and implement this project There are many barriers such as we have not enough experience about this project7 We are more confused to other courses so we have not enough time Group in collaboration with many challenges faced by the reason are some of our group Are workers and difficult to make discussions. 1.7 Documentations This project studies about five chapters to make more explanation implementing and testing this sensor connected to wireless network gsm based on home security system, the first chapter we will discuss or to mention the important and also the purpose to design this project to give us benefits and the main objectives of this smart system is used to secure your home when you go vacations and to motivate to use this very important furthermore the end of this chapter there are list of limitations and barriers of this system. On other hand in chapter two gives us details and over view about Telephony system such as gsm and also more details about wireless sensor network, and interconnection between them. The third chapter gives us more explanation and it is main point of our project, this part mention about components are used our project and how to design. Chapter fourth about testing and experimenting our project to know whether this project is successive or fail and last chapter will be conclusion of our project.
6 CHAPTER TWO Wireless Sensor Networks (WSN) 2.1 INTRODUCTION A wireless sensor network is a collection of nodes organized into a cooperative network. Each node consists of processing capability (one or more microcontrollers, CPUs or DSP chips), may contain multiple types of memory (program, data and flash memories), have a RF transceiver (usually with a single Omni-directional antenna), have a power source (e.g., batteries and solar cells), and accommodate various sensors and actuators. The nodes communicate wirelessly and often self- organize after being deployed in an ad hoc fashion. Systems of 1000s or even 10,000 nodes are anticipated. Such systems can revolutionize the way we live and work. Currently, wireless sensor networks are beginning to be deployed at an accelerated pace. It is not unreasonable to expect that in 10-15 years that the world will be covered with wireless sensor networks with access to them via the Internet. This can be considered as the Internet becoming a physical network. This new technology is exciting with unlimited potential for numerous application areas including environmental, medical, military, transportation, entertainment, crisis management, homeland defense, and smart spaces. A medium access control (MAC) Since a wireless sensor network is a distributed real-time system a natural question is how many solutions from distributed and real-time systems can be used in these new systems? Unfortunately, very little prior work can be applied and new solutions are necessary in all areas of the system. The main reason is that the set of assumptions underlying previous work has changed dramatically. Most past distributed systems research has assumed that the systems are wired, have unlimited power, are not real-time, have user interfaces such as screens and mice, have a fixed set of resources, treat each node in the system as very important and are location independent. In contrast, for wireless sensor networks, the systems are wireless, have scarce power, are real-time, utilize sensors and actuators as interfaces, have dynamically changing sets of resources, aggregate behavior is important and location is critical. Many wireless sensor networks also utilize minimal capacity devices which places a further strain on the ability to use past solutions. This Chapter presents an overview of some of the key areas and research in wireless sensor networks. In presenting this work, we use examples of recent work to portray the state of art and show how these solutions differ from solutions found in other distributed systems. In particular, we discuss the MAC layer (section 2),
7 routing (section 3). We also present a brief discussion of two current systems (section 7) in order to convey overall capabilities of this technology. We conclude in section 8. A medium access control (MAC) protocol coordinates actions over a shared channel. The most commonly used solutions are contention-based. One general contention- based strategy is for a node which has a message to transmit to test the channel to see if it is busy, if not busy then it transmits, else if busy it waits and tries again later. After colliding, nodes wait random amounts of time trying to avoid re-colliding. If two or more nodes transmit at the same time there is a collision and all the nodes colliding try again later. Many wireless MAC protocols also have a dozen modes where nodes not involved with sending or receiving a packet in a given timeframe go into sleep mode to save energy. Many variations exist on this basic scheme. In general, most MAC protocols optimize for the general case and for arbitrary communication patterns and workloads. However, a wireless sensor network has more focused requirements that include a local uni- or broad- cast, traffic is generally from nodes to one or a few sinks (most traffic is then in one direction), have periodic or rare communication and must consider energy consumption as a major factor. An effective MAC protocol for wireless sensor networks must consume little power, avoid collisions, be implemented with a small code size and memory requirements, be efficient for a single application, and be tolerant to changing radio frequency and networking conditions. One example of a good MAC protocol for wireless sensor networks is B-MAC. B-MAC is highly configurable and can be implemented with a small code and memory size. It has an interface that allows choosing various functionality and only that functionality as needed by a particular application. B-MAC consists of four main parts: clear channel assessment (CCA), packet back off, link layer asks, and low power listening. For CCA, B-MAC uses a weighted moving average of samples when the channel is idle in order to assess the background noise and better be able to detect valid packets and collisions. The Base Station has four open-collector transistor outputs and a 4-20mA current-loop driver output, corresponding to the inputs on the sensor node. The transistor outputs can either reflect the state of the switch inputs or they can be configured to turn on and off at analog input set points. For greater range or where the link quality is not sufficient, up to four Deeter Wireless Routers can be added to the system. The Deeter Wireless Sensor System is an ANY Sensor System, making it suitable for use with the following types of sensor: Humidity / Temperature Controllers & Control Systems
8 Thermal regulation Barometric pressure Humidity and temperature measurement Proximity sensors Flow sensors Vibration sensors It has come to be generally believed by academia and industry alike that the sensor network will have a key role to extend the reach ability of the next generation Internet. A key characteristic of this network is that there is no single node in the network that is powerful enough to perform the assigned tasks. An application should be served via the cooperation of several nodes or even the entire network. The network serves as an information base, and is data driven, as opposed to a provider for the point-to-point connection. The main challenge of this network is huge information organization, including information storage, searching and retrieval, especially in a continuous way. There are many specific and interrelated problems. We list a few examples. First, data accuracy: the correctness of the sensor network to represent the properties of the sensor field. Second, data search and retrieval delay; while low delay is always preferred, various applications have different delay constraints. Third, overhead; low transmission overhead is often the main consideration in system design, as it is directly related to the usage of energy, the most severely limited resource for sensors. In this thesis, we first discuss load balanced sensor coverage, which provides a lower layer support for long run sensor data collection. We then concentrate on how to balance the parameters in data collection of the sensor networks, so that the user queries and applications can be satisfied with reasonable delay and low overhead. Based on different application specifics, we try to use a smaller number of sensors, less number of transmissions by exploring historical and topological information, coding techniques and data distribution information. Our analysis and experimental results show that our architecture and algorithms provide both theoretical and practical insights for sensor network design and deployment. Routing Multichip routing is a critical service required for WSN. Because of this, there has been a large amount of work on this topic. Internet and MANET routing techniques do not perform well in WSN. Internet routing assumes highly reliable wired connections so packet errors are rare; this is not true in WSN. Many MANET routing solutions depend on symmetric links (i.e., if node A can reliably reach node B, then B can reach A) between neighbors; this is too often not true for WSN. These differences have necessitated the invention and deployment of new solutions.
9 For WSN, which are often deployed in an ad hoc fashion, routing typically begins with neighbor discovery. Nodes send rounds of messages (packets) and build local neighbor tables. These tables include the minimum information of each neighbors ID and location. This means that nodes must know their geographic location prior to neighbor discovery. Other typical information in these tables includes nodes remaining energy, delay via that node, and an estimate of link quality. Once the tables exist, in most WSN routing algorithms messages are directed from a source location to a destination address based on geographic coordinates, not IDs. A typical routing algorithm that works like this is Geographic Forwarding (GF). In GF, a node is aware of its location, and a message that it is routing contains the destination address. This node can then computes which neighbor node makes the most progress towards the destination by using the distance formula from geometry. It then forwards the message to this next hop. In variants of GF, a node could also take into account delays, reliability of the link and remaining energy. Another important routing paradigm for WSN is directed diffusion. This solution integrates routing, queries and data aggregation. Here a query is disseminated indicating an interest in data from remote nodes. A node with the appropriate requested data responds with an attribute-value pair. This attribute-value pair is drawn towards the requestor based on gradients, which are set up and updated during query dissemination and response. Along the path from the source to the destination, data can be aggregated to reduce communication costs. Data may also travel over multiple paths increasing the robustness of routing. Beyond the basics of WSN routing just presented, there are many additional key issues including: i. Reliability, ii. Integrating with wake/sleep schedules, iii. Unicast, multicast and anycast semantics, iv. Real-time, v. Mobility, vi. Voids, vii. Security, and viii. Congestion. o Reliability: Since messages travel multiple hops it is important to have a high reliability on each link, otherwise the probability of a message transiting the entire network would be unacceptably low. Significant work is being done to identify reliable links using metrics such as received signal strength, link quality index which is based on errors, and packet delivery ratio. Significant empirical evidence indicates that packet delivery ratio is the best metric, but it can be expensive to collect.
10
o Integration with wake/sleep schedules: To save power many WSN place nodes into sleep states. Obviously, a wake node should not choose an asleep node as the next hop (unless it first awakens that node). o Unicast, multicast and anycast semantics: As mentioned above, in most cases a WSN routes messages to a geographic destination. o What happens when it arrives at this destination? There are several possibilities. First, the message may also include an ID with a specific unicast node in this area as the target, or the semantics may be that a single node closest to the geographic destination is to be the unicast node. Second, the semantics could be that all nodes within some area around the destination address should receive the message. This is an area multicast. Third, it may only be necessary for any node, called anycast, in the destination area to receive the message. The SPEED protocol supports these 3 types of semantics. There is also often a need to flood (multicast) to the entire network. Many routing schemes exist for supporting efficient flooding. o Real-Time: For some applications, messages must arrive at a destination by a deadline. Due to the high degree of uncertainty in WSN it is difficult to develop routing algorithms with any guarantees. Protocols such as SPEED and RAP use a notion of velocity to prioritize packet transmissions. Velocity is a nice metric that combines the deadline and distance that a message must travel. o Mobility: Routing is complicated if either the message source or destination or both are moving. Solutions include continuously updating local neighbor tables or identifying proxy nodes which are responsible for keeping track of where nodes are. Proxy nodes for a given node may also change as a node moves further and further away from its original location. o Voids: Since WSN nodes have a limited transmission range, it is possible that for some node in the routing path there are no forwarding nodes in the direction a message is supposed to travel. Protocols like GPSR solve this problem by choosing some other node not in the correct direction in an effort to find a path around the void. o Security: If adversaries exist, they can perpetrate a wide variety of attacks on the routing algorithm including selective forwarding, black hole, Sybil, replays, wormhole and denial of service attacks. Unfortunately, almost all WSN routing algorithms have ignored security and are vulnerable to these attacks. Protocols such as SPINS have begun to address secure routing issues. o Congestion: Today, many WSN have periodic or infrequent traffic. Congestion does not seem to be a big problem for such networks. However, congestion is a problem for more demanding WSN and is expected to be a more prominent issue with larger systems that might process audio, video and
11
have multiple base stations (creating more cross traffic). Even in systems with a single base station, congestion near the base station is a serious problem since traffic converges at the base station. Solutions use backpressure, reducing source node transmission rates, throwing out less important messages, and using scheduling to avoid as many collisions as possible which only exacerbate the congestion problem. 2.2 OVERVIEW OF GSM INTRODUCTION The GSM technical specifications define the different entities that form the GSM network by defining their functions and interface requirements. The GSM network can be divided into four main parts: The Mobile Station (MS). The Base Station Subsystem (BSS). The Network and Switching Subsystem (NSS). The Operation and Support Subsystem (OSS). The architecture of the GSM network is presented in figure 1.
Figure 2.1 Mobile Station A Mobile Station consists of two main elements: The Subscriber Identity Module (SIM): It is protected by a four-digit Personal Identification Number (PIN). In order to identify the subscriber to the system, the SIM card contains amongst others a unique International Mobile Subscriber Identity (IMSI). User mobility is provided through maping the subscriber to the SIM card rather than the terminal as we done in past cellular systems. Mobile equipment/terminal (ME): There are different types of terminals (MN) distinguished principally by their power and application: o Fixed' terminals mainly installed in cars. Their maximum allowed output power is 20W o Portable terminals can also be installed in vehicles. Their maximum allowed output power is 8W.
12
o Handheld terminals; their popularity is owed to their weight and volume, which is continuously decreasing. According to some specification these terminals may emit up to 0.8W. However, as technology has evolved their maximum allowed power ouput is limited to 0.1W. Base Station Subsystem (BSS): The BSS provides the interface between the ME and the NSS. It is in charge of the transmission and reception. It may be divided into two parts:
Figure2.2 Base Station Controller (BSC): It controls a group of BTSs and manages their radio resources. A BSC is principally in charge of handoffs, frequency hopping, exchange functions and power control over each managed BTSs. Base Transceiver Station (BTS) or Base Station: it maps to transceivers and antennas used in each cell of the network. It is usually placed in the center of a cell. Its transmitting power defines the size of a cell. Each BTS has between 1-16 transceivers depending on the density of users in the cell. Network and Switching Subsystem (NSS). Its main role is to manage the communications between the mobile users and other users, such as mobile users, ISDN users, fixed telephony users, etc. It also includes data bases needed in order to store information about the subscribers and to manage their mobility. The different components of the NSS are described below.
Figure2.3
13
MSC: the central component of the NSS. The MSC performs the switching functions of the network. It also provides connection to other networks. GMSC: A gateway that interconnects two networks: the cellular network and the PSTN. It is in charge of routing calls from the fixed network towards a GSM user. The GMSC is often implemented in the same machines as the MSC. HLR: The HLR stores information of the subscribers belonging to the coverage area of a MSC; it also stores the current location of these subscribers and the services to which they have access. The location of the subscriber maps to the SS7 address of the Visitor Location Register (VLR) associated to the MN. VLR: contains information from a subscriber's HLR necessary to provide the subscribed services to visiting users. When a subscriber enters the covering area of a new MSC, the VLR associated to this MSC will request information about the new subscriber to its corresponding HLR. The VLR will then have enough data to assure the subscribed services without needing to ask the HLR each time a communication is established. The VLR is always implemented together with a MSC; thus, the area under control of the MSC is also the area under control of the VLR. Authentication Center (AuC): It serves security purposes; it provides the parameters needed for authentication and encryption functions. These parameters allow verification of the subscriber's identity. Equipment Identity Register (EIR): EIR stores security-sensitive information about the mobile equipments. It maintains a list of all valid terminals as identified by their International Mobile Equipment Identity (IMEI). The EIR allows them to forbid calls from stolen or unauthorized terminals (e.g., a terminal which does not respect the specifications concerning the output RF power). GSM Interworking Unit (GIWU): The GIWU provides an interface to various networks for data communications. During these communications, the transmission of speech and data can be alternated. Operation and Support Subsystem (OSS) It is connected to components of the NSS and the BSC, in order to control and monitor the GSM system. It is also in charge of controlling the traffic load of the BSS. It must be noted that as the number of BS increases with the scaling of the subscriber population some of the maintenance tasks are transferred to the BTS, allowing savings in the cost of ownership of the system.
14
Geographical areas A cell, as identified by its Cell Global Identity (CGI) number, maps to the radio coverage of a BTS. Similarly an LA as identified by its Location Area Identity (LAI) number is a cluster of cells served by a single MSC/VLR. A group of LA under the control of the same MSC/VLR defines the MSC/VLR area. A Public Land Mobile Network (PLMN) is the area served by one network operator. Network operations In this paragraph, the description of the GSM network is focused on the different functions to fulfill by the network and not on its physical components. In GSM, five main functions can be defined: Transmission: of data and signaling. Not all the components of the GSM network are strongly related with both types of types of Tx. While the MSC, BTS and BSC, among others, are involved with data and signaling, components such as HLR, VLR or EIR registers, are only concerned with signaling. Radio Resources Management (RRM). Mobility Management (MM). Communication Management (CM). Operation, Administration and Maintenance (OAM). Radio Resources Management (RRM) The role of the RR function is to establish, maintain and release communication links between mobile stations and the MSC. The elements that are mainly concerned with the RR function are the MN and the BTS. However, since the RR component performs connection management also during cell handoffs, it also affects the MSC which is the handoff management component. The RR is also responsible for the management of frequency resources as well as varying radio interface conditions. Main component operations are: Channel assignment, change and release. Handoff Frequency hopping. Power-level control. Discontinuous transmission and reception. Timing advance. Handoff The user movements may result a change in the channel/cell, when the quality of the communication is degrading; this is known as handoff. Handoffs occur between:
15
between channels within a cell between cells controlled by the same BSC between cells under the same MSC but controlled by different BSCs between cells controlled by different MSCs Handoffs are mainly controlled by the MSC. However to avoid unnecessary signaling, the first two types of handoffs are managed by the respective BSC (thus, the MSC is only notified of the handoff). To perform the handoff the mobile station controls continuously its own signal strength and the signal strength of the neighboring cells. The list of cells that must be monitored by the mobile station is given by the base station. Power measurements allow deciding which the best cell is in order to maintain the quality of the communication link. Two basic algorithms are used for handoffs: The `minimum acceptable performance' algorithm. When the quality of the transmission degrades, the power level of the mobile is increased, until the increase of the power level has no effect on the quality of the signal. Upon this link layer hint, a handoff is initiated. The power budget algorithm, Here the handoff pre-empts the power increase, to obtain a good SIR. Mobility Management (MM) The MM component handles: Location Management: Location is managed through periodically or on-demand. At power-on time, the MH signals an IMSI attach. On-demand location updates are signaled when the MN moves to a different PLMN or new location area (LA). The signal is sent to the new MSC/VLR, which forwards it to the subscriber's HLR. Upon authorization in the new MSC/VLR, the subscriber's HLR removes the registration entry of the MN at the old MSC/VLR. If after the update time interval, the MN has not registered, it is then deregistered. On power-off, the MN performs an IMSI detach. Security and authentication: Authentication involves the SIM card and the Authentication Center. A secret key, stored in the SIM card and the AuC together with a ciphering algorithm called A3, are used to authenticate the user. The MN and the AuC compute a SRES through A3 using the secret key and a nonce generated by the AuC. If the two computed SRES are the same, the subscriber is authenticated. The different services to which the subscriber has access are also checked. Next the security check is performed in the equipment identity (IMEI). If the IMEI number of the mobile is authorized in the EIR, the mobile station is allowed to connect the network. To assure user confidentiality, the user is registered with a Temporary Mobile Subscriber Identity (TMSI) after its first location update procedure. Enciphering is another option to guarantee Avery strong security. Communication Management (CM)
16
The CM component manages: Call control (CC): it controls call setup, management and tear-down in relation to management of type of service. Call routing is the primary task for this component. To reach a mobile subscriber, a user dials the Mobile Subscriber ISDN (MSISDN) number which includes: o a country code o a national destination code; this identifies the subscriber's operator o a code mapping to the subscriber's HLR. o The call is then passed to the GMSC (if the call is originated from a fixed network) that 'knows' the HLR corresponding to the particular MSISDN number. The GMSC signals the HLR for call routing information. The HLR requests this information from the subscriber's current VLR. This VLR allocates temporarily a Mobile Station Roaming Number (MSRN) for the call. The MSRN number is the information returned by the HLR to the GMSC. It is latter that routes the call through the MSRN number, to the subscriber's current MSC/VLR. In the subscriber's current LA, the mobile is paged. Supplementary Services management: This involves the MN and the HLR. SMS management: Here the GSM network contacts the Short Message Service Center through the two following interfaces: o SMS-GMSC for Mobile Terminating Short Messages (SMS-MT/PP). It has the same role as the GMSC. o SMS-IWMSC for Mobile Originating Short Messages (SMS-MO/PP). Operation, Administration and Maintenance (OAM) The OAM component allows the operator to monitor and control the system as well as modify the configuration of the elements of the system. Not only the OSS is part of the OAM, but also the BSS and NSS participate in functions such as: Provide the operator with all the information it needs. This information is forwarded to the OSS to control the network. Perform self-test tasks in addition to the OAM functions. Control of multiple BTSs by the BSS. 2.3 Structure of home security system Sensors are generally divided into two main groups: sensors intended to protect the home perimeter and sensors to protect the interior of the home. The first line of defense of an alarm system is the sensors guarding the perimeter. These sensors identify the burglar when he first enters the house - through the window or door. The most common sensors of this group are Magnetic Sensors. These
17
sensors are composed of two parts, one of which is installed on the frame head of the window or door and the other on the window or door itself.
Figure2.4 Skylink WD-318T Wireless Magnetic Sensor When the window or door is closed, the two pieces are adjacent to one another. In the event the window or door has been opened, the magnetic sensors are separated and the alarm is triggered. A flaw of this system is seen, for example, when a burglar breaks the window and therefore does not alert the magnetic sensors. A solution to this problem is found in special windows containing foil wires. When such a window is broken, the wires are severed, triggering the alarm. But what if a burglar manages to bypass even this security measure? This is what pressure mats are intended for; sensors installed under the carpet at strategic points - near windows and doors or other areas likely to have a burglar walk through them. The sensors are activated when pressure- such as a foot step- is applied to them. The second lines of defense of the alarm system are the sensors guarding the interior of the home. Unlike the perimeter sensors, the internal sensors are not programmed to identify a certain action by a burglar (opening of a window or door), since the burglar's actions inside the home are unpredictable. Therefore, these sensors are programmed to identify movement in general, an action that any burglar must do while in the house. There is a wide range of motion detectors which work in different methods. Each one is suited to a different area of the home and to different environments: 2.4 SYSTEM STRUCTURE AND WORKING PRINCIPLE The system structure is illustrated in Fig.2.5. It is composed of the MCU-based home wireless control center, one WSN center node module, and several data collecting nodes, GSM module, GSM network and mobile phone. The WSN data collecting node modules are connected with pyroelectric infrared detector, temperature sensor, smoke detector and gas sensor separately. When the pyroelectric infrared detector finds that some people intrudes into the house abnormally; or when the temperature sensor detects too high indoor temperature and at the same time, the smoke sensor
18
detects overproof smoke concentration; or when the gas sensor detects overproof combustible gas concentration, the sensors will send encoded alarm signal to the home control center through the wireless sensor network established in home. Once the wireless controlcenter receives alarm signal, it will send alarm short message to the users through the GSM module and GSM network immediately.
Figure2.5. System structural diagram The wireless sensor network in home of this system is composed of one center node module and several data collecting node modules, operating in point-to-multipoint communication mode. In different application, the formation of a WSN node is not always the same. In general, a WSN node includes four parts: data collecting unit, data processing unit, wireless communication unit and power management unit, as illustrated in
Figure2. Composing block diagram of WSN node
19
The data collecting unit is composed of the sensors and A/D conversion module. In this remote wireless home security system, some pyroelectric infrared detectors, temperature sensors, smoke detectors and gas sensors are used. The data processing unit is responsible to save and deal with the data collected by the sensors and received from other nodes. In this system, the C8051F310 MCU from Cygnal Corporation is chosen as the data processing unit. The wireless communication unit is often composed of the low power consumption, short distance radio frequency (RF) transceiver. In this system, the wireless dual-way chip CC1100 dedicated in wireless and low power consumption application is chosen to implement wireless communication. C8051F310 MCU can control the main working parameter of CC1100 and communicate with CC1100 through SPI interface. The SPI standard interface include main output slave input (MOSI), main input slave output (MISO) and serial clock (CLK). The master CLK is synchronized with the slave CLK.CC1100 can set the working mode, read and write cache data and status register through SPI bus. The RF chip is connected with MCU through SPI interface to make a wireless communication system that can control receiving and sending function freely. The hardware connection between C8051F310 with CC1100 is showed in Fig. 3 [3]. The SPI interface of CC1100 is to be connected to the hardware SPI interface of CPU. In general,GDO0 or GDO2 pin of CC1100 can be connected to any pin of CPU. But if an interrupt service program is to be used to implement the function of data receiving and transmitting or wireless wakeup, GDO0 or GDO2 pin of CC1100 must be connected to the out interrupt pin of CPU .Use CR2032 button cell to provide power for the WSN node. It can provide approximately 200mAh power when the voltage is higher than 2.8v. The data collecting nodes of this system are composed of these four units described before. The center node is a little
20
Chapter three Designing and implementation of home Security system 3.1 INTRODUCTION Safety is the most important requirement of home for people. With the development of IT technology, network and automatic control technology, a remote home security monitoring and alarming system becomes more and more practicable today. By combining wireless sensor network (WSN) and GSM technology, this paper designs a low-power consumption remote home security monitoring and alarming system that can detect the theft, leaking of raw gas and fire, and send alarm message to the house owners mobile phone. Wireless sensor network is composed of a large amount of miniature self-organizing wireless sensor nodes. By combining three kinds of technology such as sensor, micromechatronics and wireless communication, WSN can detect, collect and deal with the object information in its covering area, and send data to the observer. In a word, WSN technology has the advantages of wide covering area, able to remote monitoring, high monitoring precision, fast network establishment and reasonable cost GSM network has the advantages of mature technology, wide covering area, long communication distance, and sound communication effect and so on. The remote home security system presented in this paper combines so many advantages of WSN and GSM. Firstly, wherever the users are, once some dangerous instance happens in home, such as thief intruding, this system can send alarm short message to the users through GSM network immediately, informing people the possible dangerous circumstances in home. Secondly, the wireless sensor network established in home has the features of ease establishment, without use of cable, and low- power consumption.
Figure3.1 Hardware components of home security system
21
3.3 GSM networks Global system for mobile communication (GSM) is a globally accepted standard for digital cellular communication. GSM is the name of a standardization group established in 1982 to create a common European mobile telephone standard that would formulate specifications for a pan- European mobile cellular radio system operating at 900 MHz It is estimated that many countries outside of Europe will join the GSM partnership. Cellular is one of the fastest growing and most demanding telecommunications applications. Throughout the evolution of cellular telecommunications, various systems have been developed without the benefit of standardized specifications. This presented many problems directly related to compatibility, especially with the development of digital radio technology. The GSM standard is intended to address these problems. From 1982 to 1985 discussions were held to decide b/w building an analog or digital system. After multiple field tests, a digital system was adopted for GSM. The next task was to decide between a narrow or broad-band solution. In May 1987, the narrowband time division multiple access (TDMA) solution was chosen. GSM provides recommendations, not requirements. The GSM specifications define the functions and interface requirements in detail but do not address the hardware. The reason for this is to limit the designers as little as possible but still to make it possible for the operators to buy equipment from different suppliers. The GSM network is divided into three major systems: the switching system (SS), the base station system (BSS), and the operation and support system (OSS).
Figure3.2 GSM Architecture
22
3.2.1 Chosen of GSM Module As the third generation GSM dual frequency module, TC35 GSM module has the following features: compact and low power consumption; support dual frequency of GSM900 and GSM1800; provide standard AT command interface to users; provide fast, reliable and safe transmission of data, voice, short message and fax. It is ideal for this system because of its high quality short message function.
Figure3.2.1 GSM BASED HOME SECURITY SYSTEM 3.2.2 DESIGN OF SYSTEM SOFTWARE The system software, which is developed with C51 programming language, has two main modules, one for the WSN node communication, and one for the GSM communication. Software Module for WSN Node Communication In the indoor wireless sensor network, the communication protocol is divided into three layers. The first layer is physical layer whose function has been implemented by CC1100 hardware itself. The second layer is network layer which applies TEEN (threshold sensitive energy efficient sensor network) protocol. The data will be transmitted through the WSN only when the observed value changes suddenly. The third layer is application layer in this layer, the systems application software is divided into two modules, WSN data collecting node software module and WSN center node software module. The former, running on the slave MCU of data collecting nodes, is responsible for collecting sensor data and wireless transmitting them. The latter, running on the master MCU of WSN center node, is responsible for wireless receiving data and judging whether its need to start the alarming process or not. If yes, it will drive TC35 GSM module to send alarm short message to users mobile phone.
23
The software flow of center node module is illustrated in Fig. 4. And the software flow of data collecting node module is illustrated in Fig. 5. 536 serial ports Some GSM AT commands relevant to short message are listed in table 1. The sending mode of short message depends on the interface supported by the short message service center in the GSM network. European Telecommunications Standards Institute (ETSI) has defined three kinds of interface protocol for sending short message: Block mode, Text mode and PDU mode. Block mode requires the mobile phone manufacture to provide driving support. Text mode doesnt support Chinese text. So at present, PDU mode has become the core of most mobile phone for their short message communication. It can provide more powerful functions than the other modes. So, this system applies PDU mode to send alarming short message. TABLE I. SOME AT COMMANDS RELEVANT TO SHORT MESSAGE AT Command Command Function AT+CSMS Select short message service AT+CMGF Set short message encoding mode (1 for text mode, 0 for PDU mode) AT+CMGS Send short message AT+ CSCA Short message service center number
24
3.3 Wireless Sensor Network Wireless Sensor Networks (WSNs) can be defined as a self-configured and infrastructure-less wireless networks to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to cooperatively pass their data through the network to a main location or sink where the data can be observed and analyzed. A sink or base station acts like an interface between users and the network. One can retrieve required information from the network by injecting queries and gathering results from the sink. Typically a wireless sensor network contains hundreds of thousands of sensor nodes. The sensor nodes can communicate among themselves using radio signals. A wireless sensor node is equipped with sensing and computing devices, radio transceivers and power components. The individual nodes in a wireless sensor network (WSN) are inherently resource constrained: they have limited processing speed, storage capacity, and communication bandwidth. After the sensor nodes are deployed, they are responsible for self-organizing an appropriate network infrastructure often with multi-hop communication with them. Then the onboard sensors start collecting information of interest. Wireless sensor devices also respond to queries sent from a control site to perform specific instructions or provide sensing samples. The working mode of the sensor nodes may be either continuous or event driven. Global Positioning System (GPS) and local positioning algorithms can be used to obtain location and positioning information. Wireless sensor devices can be equipped with actuators to act upon certain conditions. Wireless sensor networks (WSNs) enable new applications and require non-conventional paradigms for protocol design due to several constraints. Owing to the requirement for low device complexity together with low energy consumption (i.e. long network lifetime), a proper balance between communication and signal/data processing capabilities must be found. 3.3.1 Structure of a wireless sensor network Structure of a WSN includes different topologies for radio communications networks. A short discussion of the network topologies that apply to wireless sensor networks are outlined below. 3.3.2 MESH NETWORK A mesh network allows transmitting data to one node to other node in the network that is within its radio transmission range. This allows for what is known as multi-hop communications, that is, if a node wants to send a message to another node that is out of radio communications range, it can use an intermediate node to forward the message to the desired node.
25
Figure3.3.2. A Mesh network topology 3.3.3 Hybrid Star-Mesh Network A hybrid between the star and mesh network provides a robust and versatile communications network, while maintaining the ability to keep the wireless sensor nodes power consumption to a minimum. In this network topology, the sensor nodes with lowest power are not enabled with. The ability to forward messages. This allows for minimal power consumption to be maintained. Figure3.3.3. a Hybrid Star Mesh Network Topology 3.3.4 Design issues of a wireless sensor network There are a lot of challenges placed by the deployment of sensor networks which are a superset of those found in wireless ad hoc networks. Sensor nodes communicate over wireless, loss lines with no infrastructure. An additional challenge is related to the limited, usually non-renewable energy supply of the sensor nodes. Let us now discuss the individual design issues in greater detail. Fault Tolerance: Sensor nodes are vulnerable and frequently deployed in dangerous environment. Nodes can fail due to hardware problems or physical damage or by exhausting their energy supply. We expect the node failures to be much higher than the one normally considered in wired or infrastructure-based wireless networks. The protocols deployed in a sensor network should be able to detect these failures as soon as possible and be robust enough to handle a relatively large number of failures while maintaining the overall functionality of the network. This is especially relevant to the routing protocol design, which has to ensure that alternate paths are available for rerouting of the packets. Different deployment environments pose different fault tolerance requirements. Scalability: Sensor networks vary in scale from several nodes to potentially several hundred thousand. In addition, the deployment density is also variable. For collecting high-resolution data, the
26
node density might reach the level where a node has several thousand neighbors in their transmission range. The protocols deployed in sensor networks need to be scalable to these levels and be able to maintain adequate performance. Production Costs: Because many deployment models consider the sensor nodes to be disposable devices, sen-sor networks can compete with traditional information gathering approaches only if the individual sensor node can be produced very cheaply. The target price envisioned for a sensor node should ideally be less than $1. Hardware Constraints: At minimum, every sensor node needs to have a sensing unit, a processing unit, a transmission unit, and a power supply. Optionally, the nodes may have several built-in sensors or additional devices such as a localization system to enable location-aware routing. However, every additional functionality comes with additional cost and increases the power consumption and physical size of the node. Thus, additional functionality needs to be always balanced against cost and low- power requirements. Sensor Network Topology: Although WSNs have evolved in many aspects, they continue to be networks with constrained resources in terms of energy, computing power, memory, and communications capabilities. Of these constraints, energy consumption is of paramount importance, which is demonstrated by the large number of algorithms, techniques, and protocols that have been developed to save energy, and thereby extend the lifetime of the network. Topology Maintenance is one of the most important issues researched to reduce energy consumption in wireless sensor networks. Transmission Media: The communication between the nodes is normally implemented using radio communication over the popular ISM bands. However, some sensor networks use optical or infrared communication, with the latter having the advantage of being robust and virtually interference free. Power Consumption: As we have already seen, many of the challenges of wireless sensor networks revolve around the limited power resources. The size of the nodes limits the size of the battery. The software and hardware design needs to carefully consider the issues of efficient energy use. For instance, data compression might reduce the amount of energy used for radio transmission, but uses additional energy for computation and/or filtering. The energy policy also depends on the application; in some applications, it might be acceptable to turn off a subset of nodes in order to conserve energy while other applications require all nodes operating simultaneously.
27
3.3.5 Structure of a wireless sensor node A sensor node is made up of four basic components such as sensing unit, processing unit, transceiver unit and a power unit which is shown in Fig3.3.5a.
Figure.3.3.5a the components of a sensor node It also has application dependent additional components such as a location finding system, a power generator and mobilizes. Sensing units are usually composed of two subunits: sensors and analogue to digital converters (ADCs). One of the most important components of a sensor node is the power unit. Power units can be supported by a power scavenging unit such as solar cells. A functional block diagram of a versatile wireless sensing node is provided in Fig.3.3.5b.
Figure.3.3.5b. Functional block diagram of a sensor Modular design approach provides a flexible and versatile platform to address the needs of a wide variety of applications. For example, depending on the sensors to be deployed, the signal conditioning block can be re-programmed or replaced. This allows for a wide variety of different sensors to be used with the wireless sensing node. Similarly, the radio link may be swapped out as required for a given applications wireless range requirement and the need for bidirectional communications.
28
3.3.6 Security issues in wireless sensor network Security issues in sensor networks depend on the need to know what we are going to protect. In (Zia et al., 2006), the authors defined four security goals in sensor networks which are Confidentiality, Integrity, Authentication and Availability. Another security goal in sensor network is introduced in (Sharma et al., 2011).Confidentiality is the ability to conceal message from a passive attacker, where the message communicated on sensor networks remain confidential. Integrity refers to the ability to confirm the message has not been tampered, altered or changed while it was on the network. Authentication Need to know if the messages are from the node it claims to be from, determining the reliability of messages origin. Availability is to determine if a node has the ability to use the resources and the network is available for the messages to move on. This requirement is especially important when the WSN nodes use shared-keys for message communication, where a potential adversary can launch a replay attack using the old key as the new key is being refreshed and propagated to all the nodes in the WSN. Having built a foundation of security goals in sensor network, the major possible security attacks in sensor networks are identified in. Routing loops attacks target the information exchanged between nodes. False error messages are generated when an attacker alters and replays the routing information. Routing loops attract or repel the network traffic and increases node to node latency. Selective forwarding attack influences the network traffic by believing that all the participating nodes in network are reliable to forward the message. Once a malicious node cherry picks on the messages, it reduces the latency and deceives the neighboring nodes that they are on a shorter route. Effectiveness of this attack depends on two factors. First the location of the malicious node, the closer it is to the base stations the more traffic it will attract. Second is the percentage of messages it drops. When selective forwarder drops more messages and forwards less, it retains its energy level thus remaining powerful to trick the neighboring nodes. In sinkhole attacks, adversary attracts the traffic to a compromised node. The simplest way of creating sinkhole is to place a malicious node where it can attract most of the traffic, possibly closer to the base station or malicious node itself deceiving as a base station. One reason for sinkhole attacks is to make selective forwarding possible to attract the traffic towards a compromised node. The nature of sensor networks where all the traffic flows towards one base station makes this type of attacks more susceptible. Sybil attacks are a type of attacks where a node creates multiple illegitimate identities in sensor networks either by fabricating or stealing the identities of legitimate nodes. Sybil attacks can be used against routing algorithms and topology maintenance; it reduces the effectiveness of fault tolerant schemes such as distributed
29
storage and disparity. Another malicious factor is geographic routing where a Sybil node can appear at more than one place simultaneously. In wormhole attacks an adversary positioned closer to the base station can completely disrupt the traffic by tunneling messages over a low latency link. Here an adversary convinces the nodes which are multi hop away that they are closer to the base station. This creates a sinkhole because adversary on the other side of the sinkhole provides a better route to the base station. In Hello flood attacks a Broadcasted message with stronger transmission power is pretending that the HELLO message is coming from the base station. Message receiving nodes assume that the HELLO message sending node is the closest one and they try to send all their messages through this node. In this type of attacks all nodes will be responding to HELLO floods and wasting the energies. The real base station will also be broadcasting the similar messages but will have only few nodes responding to it. Denial of service (DoS) attacks occur at physical level causing radio jamming, interfering with the network protocol, battery exhaustion etc. in which a sensor nodes power supply is targeted. Attacks of this type can reduce the sensor lifetime from years to days and have a devastating impact on a sensor network. 3.2.7 Wireless Sensor Network Node Module The wireless sensor network in home of this system is composed of one center node module and several data collecting node modules, operating in point-to-multipoint communication mode. In different application, the formation of a WSN node is not always the same. In general, a WSN node includes four parts: data collecting unit, data processing unit, wireless communication unit and power management unit. As illustrated in Fig1 & Fig. 2.
30
The data collecting unit is composed of the sensors and A/D conversion module. In this remote wireless home security system, some pyroelectric infrared detectors, temperature sensors, smoke detectors and gas sensors are used. The data processing unit is responsible to save and deal with the data collected by the sensors and received from other nodes. In this system, the C8051F310 MCU from Signal Corporation is chosen as the data processing unit. The wireless communication unit is often composed of the low power consumption, short distance radio frequency (RF) transceiver. In this system, the wireless dual-way chip CC1100 dedicated in wireless and low power consumption application is chosen to implement wireless communication. C8051F310 MCU can control the main working parameter of CC1100 and communicate with CC1100 through SPI interface. The SPI standard interface include main output slave input (MOSI), main input slave output (MISO) and serial clock (CLK). The master CLK is synchronized with the slave CLK.CC1100 can set the working mode, read and write cache data and status register through SPI bus. The RF chip is connected with MCU through SPI interface to make a wireless communication system that can control receiving and sending function freely. The hardware connection between C8051F310 with CC1100 is showed in Fig. 3.
Figure3. The hardware connection between C8051F310 with CC1100 The SPI interface of CC1100 is to be connected to the hardware SPI interface of CPU. In general, GDO0 or GDO2 pin of CC1100 can be connected to any pin of CPU. But if an interrupt service program is to be used to implement the function of data receiving and transmitting or wireless wakeup, GDO0 or GDO2 pin of CC1100 must be connected to the out interrupt pin of CPU. Use CR2032 button cell to provide power for the WSN node. It can provide approximately 200mAh power when the voltage is higher than 2.8v. The data collecting nodes of this system are composed of these four units described before. The center node is a little different, in that it is not connected with sensors but with the GSM module through the indoor wireless control center.
31
CHAPTER FOUR Testing and working gsm based on home security system 4.1 INTRODUCTION GSM BASED HOME SECUITY Alarm System can cover 8 alarm zones within the premises. In addition, the unit can be connected to window breaking sensors, motion detectors and other alarm triggers. Once triggered, alerts can be sent to 8 pre-set numbers. The SMS alarm unit also comes completed with 3 sms remote control zones. Through this, you can activate a number of electrical appliances and equipment like the air-conditioner, generator, sensors, and lighting remotely via sms or phone call. Using this service can help in theft prevention as lighting can be switched on or off remotely to give the impression that there are people on the premises. If the premises comes with an auto gate, the WT-1010SA GSM alarm system can also be used to open/close the gate via either the remote control unit or via a command through the telephone unit The SMS alarm system comes with 2 remote control units to arm and disarm the burglar alarm system. These remote control units are also multi-functional and can be used not just for arming and disarming the security alarm system, but also as an emergency/panic button, as a remote to open the garage door/ main gate, to switch on/off electrical appliances within the home. Another feature of the WT-1010SA is that the GSM alarm can be armed and disarmed remotely using the mobile phone. As the WT-1010SA SMS alarm works on a wireless system, the risk of thieves cutting the connection is low as there are no wires to connect the unit to the telephone line. Even if the thieves use a GSM jammer to cancel the wireless signal, the WT-1010SA SMS alarm has been designed to overcome this. When a GSM jammer is detected, the unit will automatically send out a sms and trigger the alarm siren. To ensure that in cases of power failure or if the power supply has been cut by thieves, the WT-1010SA burglar alarm is equipped with a standby rechargeable battery to ensure that the unit continues to function. In the event of power cut, the unit will again automatically send out a sms to the pre-set mobile number to inform that the battery has failed. Another feature of the WT-1010SA
Figure4.1a
32
GSM intruder alarm is the auto test reporting system whereby the system will, at the programmed time, test to ensure that the system is alive. A message is then sent to the pre-set mobile number. This auto test ensures that the security alarm system is constantly functioning WT-1010SA as a Telephone System
Fig4.1b Lets face it, installing a new phone landline can be a nightmare. From the moment you apply till the time the line is installed, it could take a long while as the date of installation is determined by the availability of personnel from the telephone company. While waiting for installation, there is also the inconvenience of not having a communications line available Installation of a landline telephone system also normally involves the payment of a deposit, which could be a significant amount of upfront expenditure if its for a business premises. Apart from the deposit, theres also a month phone line rental regardless of whether or not calls are made. When the time is ready for installation of the landline telephone system, for aesthetic purposes, there might be small renovations involved. This will incur additional costs. The WT-1010SA unit can also be connected to a basic telephone and used to make phone calls. Using the WT-1010SA as a telephone system has many advantages over traditional landlines.
33
Firstly, all thats needed to activate the phone line is a GSM SIM card which is easily applied for can be used almost immediately. The system works with both prepaid and postpaid SIM cards. In todays communications environment, many phone calls are made to mobile lines. Mobile phone operators normally have plans that offer very low cost or complimentary calls within the same network. By using a GSM based phone for your premises, it can help to save on your monthly phone bill as there is no monthly phone line rental costs to bear and calls made between landline and mobile lines normally cost more too. The WT-1010SA GSM alarms and telephone system offers the perfect solution for those who are renting their premises. Apart from the upfront and on-going savings, when the lease is over, the system can be very quickly dismantled ready to install in your new rented premises. 4.2 Features Eight Alarm Inputs: The system has the function to send sms and call to the user in the even of input triggered. For example, Zone 4 connected to an electrical door, when there is intruder or electrical door is open illegally, WT-1010SA GSM alarms will receive short circuit impulse on Zone 4 and automatically sends a signal to the pre-set number and notify the owner. It is possible to arm/ disarm the unit remotely via SMS or phone call. Alternatively, it also can connect to the basic telephone to perform arm/disarm. Remote control also will be provided Input alarm zoning can be edited and programmed up to 50 characters long. You can use this function to program any languages. You can change the displayed text by sending a command by SMS to the unit. For examples, changing the Zone 4 to DOOR OPEN Three SMS remote control output. These open collector outputs (that can sink max 300ma per output) can be turned on and off remotely through a SMS or phone call. The SMS remote control will be reachable by sending a SMS or phone call with a certain command. For example sms/ call in to switch on lighting, air conditional, generator, sensor or other equipment Automatically call to 8 pre-programmed phone numbers while alarming. The WT-1010 GSM intruder alarm also will SMS to 8 programmable phone number to notify the user if any intruder Open your auto gate with your basic telephone. Connect the WT-1010 with the auto gate and your house basic telephone. Besides you can use the WT-1010 as your house telephone, you also can open your auto gateway by pressing a command at the basic telephone or remote control which we provided Most of the countries, GSM Mobile operator offer cheaper call plan compared to telecom landline. The WT 1010 GSM home alarm can connect to the basic telephone to make call. If any intruder, the WT-1010 SMS alarm will cut the telephone call and sent the alarm messages first.
34
In order prevent professional thief to disconnect GSM home alarm by using GSM Jammer, the WT-1010 security alarm will transmit the alarm if signal drop immediately and trigger the siren The owner will automatically receive the SMS text messages for Battery Fail, Telecom Line Fail, AC Fail, INPUT 1 INPUT 4 Fail, GSM Alive if any of the above having problem Auto test reporting system after the owner program the reporting time, the WT-1010 home alarm will dial the programmable number to inform that GSM Alive. This is to make sure that in case of emergency, the GSM home alarms still will function well Standby recharger battery to prevent power failure or electricity cut off by intruder. The GSM home alarm will function as normal when no electricity supply. LCD display to check the GSM signal strange and battery capacity 4.3 Applications: 1.This project has its main application in security system. This project can be used in home as SMS based domestic security system. It will be really useful for the security of flat, bungalow or any row house. It can be used in our house for theft detection at night time. The other part of the project (password detector) can be used to automate the door locking process, so the user need not to carry the door lock keys along with him, he/she can just remember the password and use it later to open the door. 2.Various parameters monitored in this project like LPG gas leakage, theft detection and overheat due to fire are also applicable for industrial purpose as well. So this system can also be used in industries as a GSM based industrial security system. 3.We can use this project in Restaurants as well as hotels, since LPG Gas cylinders are majorly used for cooking purpose in hotels and restaurants. Also they are very much prone to fire. So this project can be fitted in cooking section or kitchen of hotels. We can also use this project for the lodging rooms in hotels or rented rooms in a hotel. User will be provided a password to enter in this room and various parameters in this room will be monitored. 4.This project can be used in hospitals. We need to do little bit modifications for use in hospital. We can add oxygen gas sensor to detect the leakage in oxygen gas cylinders, as it can also cause fire. The password operated locking section can be used in hospitals for those rooms which have limited access like rooms with chemical or x-ray machine units. So only authorized person can gain access to this areas/rooms/sections.
35
4.4 Advantages: 1.Remote indication: With the use of GSM technology owner of the house or industry get remote indication through SMS. So even if the user is away from home or industry, he/she will be intimated about the hazardous or undesirable conditions / situations inside the house. 2.This system is fully automated. So once this system is installed inside home or industry, then it does not require any human interaction to operate. With the use of this system we can save the life of person inside home / industry. Since the accidents caused due to fire and LPG gas leakage can cause life threat. 3.Also the property inside house and various materials inside the house and industry are saved from to theft and from fire detection. 4.This system is Cost effective. Also it is Fast and efficient 4.5 Future Development: 1.Voice announcement system can be added to indicate device conditions. We can add voice announ- cement system along with the buzzer so if there are hazardous parameters detected then respective voice message will be announced. 2.We can add fingerprint sensor instead of password based door operating. So entry will be allowed for the authorized person using their fingerprints. 3.We can monitor and control more parameters and devices. We can implement other related modules like fire sensor, wind sensor.
36
Conclusion Home security has been a major issue where crime is increasing and everybody wants to take proper measures to prevent intrusion. In addition, there is need to automate home so that the user can take the advantage of technological advancement. This project presents a model that will provide security to their home, office or cabin etc via SMS using GSM technology. Keeping in view the rapid growth of wireless communication we are inspired to work on this project. The idea behind this project is to meet the upcoming challenges of the modern practical applications of wireless communication and to facilitate our successors with such splendid ideas that should clear their concept about wireless communication and control system. The applications of SMS/GSM Based security system are quite diverse. There are many real life situations that require control of different devices remotely and to provide security. There will be instances where a wired connection between a remote appliance/device and the control unit might not be feasible due to structural problems. In such cases a wireless connection is a better option. Basic Idea of our project is to provide GSM Based security even if the owner is away from the restricted areas. For this we adopted wireless mode of transmission using GSM. Beside this there are many methods of wireless communication but we selected GSM in our project because as compared to other techniques, this is an efficient and cheap solution also, we are much familiar with GSM technology and it is easily available. This project is designed to provide ubiquitous access to the system for the security using extensive GSM technology for communication purposes and microcontroller for device control. The highlights of our system are the long range of communication and password security. The security is provided by sending a message to our access number, controlling and acknowledgement is done through SMS code between our access number and the authenticated user. This system consists of a GSM modem for sending and receiving the SMS, Intel 89S52 microcontroller which is controlling the entire system, LCD for the display purpose , keypad for entering the password and supporting circuitries like rectifier for ac to dc conversion. It can be installed at any desired location e.g., office (to protect important files and document), banks (to protect cash in locker) etc. In this system, the authorized person will have the entire control and he will decide which people will be allowed in that restricted area. Those person who can have access to that area, will have a password in advance. If anyone wants to enter in that restricted area in the absence of authorized person, then that person will enter the password on the keypad. If the password will be correct, then a message containing the details like name, address and designation etc. of that person will be
37
forwarded to authorized person via GSM Modem. Now the authorized person will send a coded reply to the microcontroller via GSM Modem. Depending upon the response from the authorized person, microcontroller will decide whether to permit or not. If the approval will be positive then the controller will turn on the relay connected to the door and the authenticated user will be in a position to have access to that area else the request will be rejected and the door will not open. The GSM modem provides the communication mechanism between the user and the microcontroller system by means of SMS messages. The microcontroller is an exiting, challenging, and growing field; it will pervade industry for decades to come. To meet the challenges of this growing technology, we will have to conversant with the programmable aspect of the microcontroller. Programming is a process of problem solving and communicating in a strange language of mnemonics. The projects could be developed significantly faster and much easily using a microcontroller. The purpose of this project is to implement the various concepts of microcontroller and embedded designing environment. An embedded microcontroller is a chip which has a computer processor with all its support functions (clock & reset), memory (both program and data), and I/O (including bus interface) built into the device. These built in functions minimize the need for external circuits and devices to be designed in the final application. This Project is a very good example of embedded system as all its operations are controlled by intelligent software inside the microcontroller. Read more about what is embedded system. The aim of this project is to provide security to the restricted area even if the owner is anywhere in the world. For this purpose user can use any type of Mobile, This way it overcomes the limited range of infrared and radio remote controls. Short Message Service (SMS) is defined as a text-based service that enables up to 160 characters to be sent from one mobile phone to another. In a similar vein to email, messages are stored and forwarded at an SMS centre, allowing messages to be retrieved later if you are not immediately available to receive them. Unlike voice calls, SMS messages travel over the mobile networks low- speed control channel. "Texting", as its also known, is a fast and convenient way of communicating. In fact, SMS has taken on a life of its own, spawning a whole new shorthand language thats rapidly being adopted as the norm. Technology Used: As microcontrollers are the core of the todays digital circuit design in industry, this system uses it for the centralized operation and digital processing.
38
The technology used here is embedded technology which is the future of todays modern electronics. Here we have used a very high speed Microcontroller i.e. 89S52. This runs on 6-clk cycle period instead of 12-clk cycle. This makes the communication rate faster at 115200kbps. Since we are using F-Bus protocol with the mobile, a full duplex communication with the above baud rate is required. Features: The following are the prominent features of SMS based security system Can provide security to 8-devices, User-programmable plain text message control, Communicate from any other mobile, Password protected, Can be controlled from anywhere, anytime, In-system programmable i.e. we can modify the code of the Controller at anytime depending upon our requirement without taking out the controller from the board.
What contributions would the project make? If this system is installed in an office cabin where all important files (share paper, tender files or other files) are kept and the owner is in away from the place (e.g., London) attending a meeting and at the same day he is supposed to submit a tender. In this case he can allow any of his trustworthy employees and get the work done. In this way he will be saved from the bearing a heavy loss. This system can be used for home automation too with desired changes in the program and by some additional hardware. If you need to turn pumps, lights etc. on remotely or need to remotely monitor equipment alarms then this project is for you. There are thousands of uses, like turning on remote pumps, lights, monitoring cool room temperatures, open doors etc.
39
References [1] The-History-of-Home-Security 4th July 2010 [Online]. Available: http://ezinearticles.com. [2] V. Karri and J. S. Daniel Lim, Method and Device to Communicate via SMS After a Security Intrusion, 1st International Confe-rence on Sensing Technology, Palmerston North, New Zealand, (2005) November 21-23. [3] Y. Zhao and Z. Ye, Low cost GSM/GPRS BASED wireless home security system, IEEE Trans. Consumer Electron, vol. 56, no. 4, (2007) January, pp. 546-567. [4] Z. Bing, G. Yunhung, L. Bo, Z. Guangwei and T. Tian, Home Video Security Surveillance, Info-Tech and Infonet, 2001,Proceedings,ICII 2001-Beijing. 2001 International Conference, vol. 3, pp. 202-208. [5] M. Meyer, M. Hotter and T. Ohmacht, A new system for Video-based Detection of moving objects and its integration into digital networks, Security Technology 1996, 30th Annual 1996 International Carnahan Conference, (1996), pp. 105-110. Internet Sources a. www.gsmworld.com, October 2008 b. www.google.com c. www.gnokii.org, November 2008 d. www.keil.com, November 2008