You are on page 1of 16

CSJ3403: Special Topic in Software Engineering

Case Study Documentation Template

Embedded Security System

Version 1.0

20/11/2016

Department and Faculty

Prepared by: Ctrl Alt Delete

Revision Page
a. Overview
Describe the content of the current version.
b. Target Audience
State the targeted audience.
c. Project Team Members
Noorzool Hilmi Bin Noormuin SX132522CSJF03
Jaafar Bin Sulaiman SX130129CSJS03
Saankarganesh A/L Krishnasamy SX132525CSJF03
Mohamad Shukri Bin Bahari SX132520CSJF03

d. Version Control History


Version

1.0

Primary
Author(s)

Description of
Version

Date
Completed

Initail Document

19 nov 2016

Note:
This Case Study Documentation template is based on guideline from (Runeson et al.2012),and customized
to meet the need of SCSJ3403 course at Faculty of Computing, UTM. Compiled and checked by Shahliza
Abd Halim, PhD on 9th October 2016. Examples of case study are from GoPhone case study
by Satzinger (2011). The template is also based on the original template by Dr Shahida Sulaiman.

Table of Contents
1

Introduction
1.1

Purpose

1.2

Scope

1.3

Definitions, Acronyms and Abbreviations

1.4

References

1.5

Overview

Case Study Design


2.1

Rationale

2.2

Objective

2.3

Unit of Analysis

2.4

Theoretical Framework

Data Collection
3.1

Data source selection

3.2

Understanding the product portfolio

3.3

Product portfolio

Data Analysis
4.1

Domain Analysis of domain

4.2

Common and Variable Features

Reporting and Dissemination


5.1

Audience of the report

5.2

Reports produced

Lesson Learned

6.1

Design and Planning lesson

6.2

Data Collection Lesson

6.3

Data Analysis Lesson

Appendices (if any)

1. Introduction
When we look at our family, and our home, we want them to be safe, always out of harms way.
When we leave for work, we expect to come back to a smiling family, and to a home that is secure.
But as they say, hope is not a strategy. The growing crime rates across cities reflect the bitter
reality. Many people overlook, ignore, and underestimate the need of taking appropriate home
security measures. A burglary or theft can lead to devastating consequences, both emotionally and
financially. While the financial loss may be recoverable, the trauma inflicted on our family may
last forever. Security system is take a main part to secure our home and our family in safe.

1.1 Purpose
The purpose of the case study to identify the features of embedded security system:
Create comparison features table of embedded security system differentiate between
basic and nonbasic features.
Purpose method to build the system with using product line method.
1.2 Scope
The software product is about
1.

Embedded Security system

2. Only home security system

1.3 Definitions, Acronyms and Abbreviation

Embedded system special-purpose system in which the computer is completely encapsulated


by the device it controls. Unlike a general-purpose computer, such as a personal computer, an
embedded system performs pre-defined tasks, usually with very specific requirements. Since
the system is dedicated to a specific task, design engineers can optimize it, reducing the size
and cost of the product.

RTOS - real-time operating system ,is an operating system (OS) intended to serve real-time
applications which process data as it comes in, typically without buffering delays. Processing
time requirements (including any OS delay) are measured in tenths of seconds or shorter
increments of time. They either are event driven or time sharing. Event driven system switches

between task based on their priorities while time sharing switch the task based on clock
interrupts.

Modular - is a design approach that subdivides a system into smaller parts

Sensor - device that detects and responds to some type of input from the physical environment.
Actuator - component of a machine that is responsible for moving or controlling a mechanism
or system. An actuator requires a control signal and a source of energy. The control signal is
relatively low energy and may be electric voltage or current, pneumatic or hydraulic pressure,
or even human power.

Control panel - a part where control or monitoring instruments are displayed.

1.4 References

Simon. (2016). Simon XT/XTi Lineup. Retrive from


http://www.interlogix.com/intrusion/brand/simon-xti
Ademco. (2012). CCTV/Video. Retrive from
http://www.ademco.eu
Sager.A (2014). Bundle up for the holiday. Retrive from
https://canary.is
(2013). IJRASET. Retrive from
www.ijraset.com/
Harry. (2016). Imagination at work. Retrive from
www.ge.com

1.5 Overview
The reports sections reflect the main activities case study documentation.. The first is The Overall
Description and the second is `the Specific Requirements. The Overall Description will describe
the requirements of the embedded security system. The Specific Requirements section will
describe in detail the requirements of the system.
2. Case Study Design
Nowadays there are many security systems .The product in the market today do not have a specific
standard. To improve the security embedded systems is a step to prepare the necessary standards.
With this the development and manufacture of their products can be standardized to make it more
convenient and flexible for customers to choose the system that suits their needs.

2.1 Rationale
Most manufacturers of security alarm system has its own Advanced Features. There are
characteristics that can be considered as the basis for the system. To identify the basic features of
the system, we can classify into two parts, namely the common and optional feature. Almost all
manufacturers use the basic features but in a different way.
2.2 Objectives

To identify the similarities in the characteristics of embedded security systems


To find the features of similar security systems in the market.
To differentiate and comparison the feature of current security system in market.
To identify the advantages and disadvantages of the security system.

2.3 Unit of Analysis

Unit of analysis section we are choose multiple case study to complete our case study
documentation. Reason of choosing multiple case study analysis because we analyse about the one
of the embedded system which is embedded security system. In our case study we find 5 similar
features of embedded security system. We analyse each system and collect the data from their own
website which is we stated in references site. From the data we collected we compare the features

of the system, functions, advantages and disadvantages of system. Thus why we are choosing the
multiple case study.

2.4 Theoretical Framework


To complete our case study we refer to the 5 case study about the system which is similar in
embedded security system. The information we have collected is from their own website. All the
case study is about their invention of system. How it works in different way with its own features
to safe the home and surrounding environment with newest technology. Each case study gives the
information about how the developed that system, what kind the hardware and software they used
to complete the system and also how it works and how it secure.
3. Data Collection
3.1 Data Source Selection
The house's owner in Malaysia. Data was taken from newspaper, journal, past years statistic data
and survey. This research utilized the quantitative research methodology.

3.2 Understanding the Product Portfolio


Basic Home Security System - The first segment is detection. Detection is the part of the system
that detects status changes or emergencies (your door was opened by an unauthorized party or your
front window was broken, for example). Detection components include door and window contacts,
Passive Infrared (PIR) motion detectors, glass break sensors, smoke detectors, carbon monoxide
detectors and more.The second element of a system is annunciation. In a nutshell, annunciation
announces that a system has been breached or needs attention at the source: sirens, bells or flashing
lights are all examples of annunciation.
Its important to note that audible or visual annunciation occurs only at the source of the potential
security breach; in your home or business for example. The part of the system that alerts people
who are currently away from your homes perimeter is defined as monitoring or
communication.Which brings us to the third, and probably the most important, element of any
system. Your monitoring system is the element that communicates emergencies and system health
and maintenance information to a central station monitoring center.
It also broadcasts alerts to anyone who is directly associated with the premises. For example, if
you get a text alert saying that your patio door lock was disabled, thats a prime example of
monitoring and communication. This is the segment of your system that serves as the umbilical

cord, connecting you and the outside world. In most cases, your monitoring and communication
system is the element that minimizes (or even eliminates) the possibility of a disaster.
Secure Data - Cryptographic data transfer between part eg , sensor smart device etc
Secure Storage - kebanyakkan sistem yang menggunakan storage yg besar contohnya sistem yg
mempunyai kamera. Storage dalaman atau cloud akan di encrypted
Network GSM/Direct line- for systems that can be used to call other station for example to a police
station, fire department or to the phone owner.
3.3 Product Portfolio
a)

A typical home security system includes:


A control panel, which is the primary controller of a home's security system
Door and window sensors
Motion sensors, both interior and exterior
Wired or wireless security cameras
A high-decibel siren or alarm
A yard sign and window stickers

b) Main component in system


Control Panel: The control panel is the computer that arms and disarms the security systems,
communicates with each installed component, sounds the alarm when a security zone is
breached, and communicates with an alarm monitoring company. They typically feature a
touchpad for easy programming and interaction, is where pass codes are entered to arm and
disarm the system, can work on voice commands, and can be programmed to work with
wireless remote controls called key fobs.

Door and Window Sensors: Door and window sensors are comprised of two parts installed
adjacent to each other. One part of the device is installed on the door or window and the other
on the door frame or window sill. When a door or window is closed, the two parts of the sensor
are joined together, creating a security circuit. When the security system is armed at the control
panel, these sensors communicate with it by reporting that the point of entry is secure. Should
a monitored door or window suddenly be opened, the security circuit is broken and the control

panel interprets this as a breach of a secured zone. A high-decibel alarm is sounded and in most
instances the alarm monitoring company is automatically notified.

Motion Sensors: These security components, when armed, protect a given space by creating
an invisible zone that cannot be breached without sounding an alarm. These are typically used
to protect rooms containing valuables, as well as areas less frequented in larger homes.

Surveillance Cameras: Available in both wired and wireless configurations, surveillance


cameras can be used in several different ways as part of an overall security system. Surveillance
cameras can be accessed remotely on computers, smartphones, and tablets. They are often used
in this method when homeowners are out of town, to watch for deliveries and other service
personnel like caregivers and landscapers, and to monitor the arrival of children after school.
They can also be used to record any security breaches, which could result in having footage of
a home invasion, including a good look at the burglars and perhaps even the vehicle they drove.

High-decibel Alarm: Loud enough for neighbours to hear, home security alarms serve a few
different purposes. First, they alert the people inside the house that a problem occurred. They're
also shrill enough to send a burglar running while also notifying nearby neighbours to the
situation.

Yard Sign and Window Stickers: On the surface, these items might seem like nothing more
than marketing tools for alarm companies, but they play important roles in home security.
When you place a security company's sticker in a front window and plant their sign in your
front yard, you are telling burglars you home is professionally protected and not a wise choice
for an attempted burglary. They are effective at conveying this message and should be used as
recommended by the security company.

c) Typical uses include monitoring:


Hard to see or distant areas of your property
Remote buildings like garages, barns, and workshops
Entry points, both exterior and interior, like garage doors and front doors

Nowadays, house alarms or home security systems are preferably needed to ensure the house
security from burglars and criminals. Installing a home security system can improve the safety of
your family and property. Another efficient device that is in demand nowadays is the burglar
alarm system. These safety alarms are featured as electronic devices that have sensors. They are
connected to a main control panel through either a low voltage narrowband RF signal or hardwire.
When a connection is made between the unit and the signal, it can create an announcing alarm
leading for an elicit response.

The most common burglar alarm sensors can indicate the opening of a window or door. The new
designed systems are predominantly hardwired for economic purposes. While the retrofit wireless
systems can also be more economical and are quicker to set up. As for burglar alarm systems, you
can find systems that are dedicated to a particular purpose only. Others also handle intrusion,
handle fire, and are for safety alarms simultaneously. Designs and features may range from small
to built-in noisemakers. There are also those complicated hi-tech designs with multi-zoned
computer based systems and monitoring outputs. Many of these conceptualized designs may apply
to portable alarms for protecting your house and vehicles.

Efficiency of burglar alarms depends on the zone triggered, number of zones, time of the day and
other aspects installed within the monitoring system. These systems can initiate various actions or
can be instructed to call the police department, fire department and ambulances immediately.
Others can also call the property supervisor to try to determine if the alarm is true and genuine.
Other functions may also include calling a list of telephone numbers provided by the owner to
contact listed persons to go and check the secured premises. Some zones can make calls to the
local oil heating company to go to inspect the system or to contact the owner with specific details
of which area are getting flooded. You may also find burglar alarm systems that are attached to a
video surveillance system so that monitoring can be instantly played on a remote monitor.

The desired result you seek from a burglar alarm system is to cause a specific alarm output and
response quickly when the sensors identify a valid condition that may have triggered the alarm.
The ability of the unit to communicate back to the monitoring system is one crucial aspect to the
monitoring efficiency of the alarm made. Some insurance companies and local government
agencies may require alarm systems be installed with codes. They should also acquire certification
from a third party organization that inspects the efficiency and quality of these alarm systems.
Those with independent certifications should ensure that their system meets the level of
qualifications beyond what the dealer promotes and offers. This will only ensure that you have an
alarm system that is reliable, efficient and made of high quality.

Premises control unit (PCU), Alarm Control Panel (ACP), or simply panel: The "brain" of the
system, it reads sensor inputs, tracks arm/disarm status, and signals intrusions. In modern systems,
this is typically one or more computer circuit boards inside a metal enclosure, along with a power
supply.
Sensors: Devices which detect intrusions. Sensors may be placed at the perimeter of
the protected area, within it, or both. Sensors can detect intruders by a variety of
methods, such as monitoring doors and windows for opening, or by monitoring
unoccupied interiors for motions, sound, vibration, or other disturbances.

Alerting devices: These indicate an alarm condition. Most commonly, these are bells,
sirens, and/or flashing lights. Alerting devices serve the dual purposes of warning
occupants of intrusion, and potentially scaring off burglars. These devices may also be
used to warn occupants of a fire or smoke condition.

Keypads: Small devices, typically wall-mounted, which function as the humanmachine interface to the system. In addition to buttons, keypads typically feature
indicator lights, a small multi-character display, or both.

Interconnections between components. This may consist of direct wiring to the control
unit, or wireless links with local power supplies.

Security devices: Devices to detect thieves such as spotlights, cameras & lasers

4. Data Analysis
4.1 Data Analysis Technique

The instruments used to collect the data ware questionnaire. A set of questionnaire containing 25
questions divided into four section was developed based on a questionnaire. Different questiontypes, such as multiple choice, short answer, linear scale, multiple choice grid and yes-no were
used in the questionnaire. The different sections of the questionnaire were:
i)

Background information,

ii)

The causes,

iii)

The effects,

iv)

The solutions. The questionnaire was distributed at Bayan Baru, Kulim, Baling and
Seberang Jaya on 12 November 2016, 8.00AM to 3.00PM.

The in survey was utilised to confirm the findings from the questionnaire as well as to triangulate
the data collection methods. 51 respondents were involved in the survey.
4.2 Domain Analysis Result

FEATURE

Simon XTi

ADEMCO

Canary

IJRASET

GE
Interlogix

RTOS

User Identification

Smartphone
Apps,
Touch Screen soft
button

Keypad

Keypad

SMS, Call

Remote
Handheld
Touchpads
,
Dialog
Touchtalk
2-Way RF
Touchpads
,
Keychain
Touchpads

Secure Connection

Wired Sensing
Loop

no

no

no

Cryptogra
phic , RF

Secure Storage

Build In Flash

Internal
ROM

Encrypted
cloud
storage

Secure
database

Cryptogra
phic
Storage

Sensor

Door/Window
Sensors,
PIR motion
detector,
Image sensor,
Glassbreak sensor,
Smoke and heat
Detector,
Carbon Monoxide
detector

Motion,
Smoke,
Door/Win
dows,

3-axis
accelerom
eter,
Ambient
light,
Capacitive
touch,
Motion
detection
Camera

Motion
sensor,PIR
,Ultrasonic
sensor,,Mi
crowave
detector,
Inertia
sensor,vibr
ation

Motion
Sensors,
Door/Win
dow
Sensors,
Freeze
Sensors,
Carbon
Monoxide
Sensors,

Actuator

Siren, Auxiliary
power

Alarm
Sirens

Siren
Alarm ,
Lamp

Servo
motor

Alarm
Sirens and
Lamp
Modules

no

2.4GHz
Wi-Fi
(802.11
b/g/n),
Wired
Ethernet,
Bluetooth
Low
Energy
(BLE)

no

Network (FIxed Land DTMF or pulse,


Line)
Modem ,
Telephone
interface Line
seizure relay

6 - Preset
Tel
number

GSM

1000-ft. open-air
receiving range

no

no

Triggered
Center
( eg.
Police)

no

Backup Battery

Monitoring (24 hrs)

LCD Display,

LCD BW

PC,mobile

7-segment

Handheld

Info Display

Apps Base Mobile


& PC

display

phone,web
-based
monitorin
g

display

Display

5. Reporting and Dissemination


5.1 User Characteristics
-

Embedded security system Engineer and designer

Embedded security system Project manager

Researcher about Embedded security system

5.2 Consecutive reports

Reports about data security methods that can be agreed upon by many manufacturers
Study other embedded systems that are modular.
Proposals for those who want to study this further information to continue the case study.

6. Lesson Learned
6.1 Design and Planning Lesson
The lesson we have been learned while we design and planning our case study is what are the
feature they used and how its worked and solve the problem for human kind. Nowadays crime
become conquer the world. How much the features is work to solve the problem. Many of the
manufacture system is working under the network such as wifi connectivity. While we planning
the design our case study first of all we find their features and how it works this is the lesson we
learned from this part.

6.2 Data Collection Lesson

Most manufacturers are hiding certain parts, for example rtos, the encrypted data, sensor and
electronic component used. The user manuals supplied less technical, this may prevent the system
to emulate. Some manufacturers do not supply the info to an system but need to contact them to
get more info.

6.3 Data Analysis Lesson

From our analysis , most the system does not allow customers to customize the system according
to the requirements of their home. If there is a system that allows customers to customize is better.
Appropriate methods such as modular systems need to be considered, this line of products conform
to the rules. We envision a system that has two parts, a core that provides the basic framework and
can be connected to the module according to customer preferences, for example, sensors and
actuators which optional and easy to connect. With these customers are more satisfied than
package existing in the market now.

You might also like