You are on page 1of 28

Home Security System

A
PROJECT REPORT ON 7TH SEMESTER
CATEGORY OF PROJECT
UDP
Submitted by,
Krunal Jethwa R. (150203117014)
Rahul Rana (140200117088)
Ranjit Gordiya (140200117089)
In partial fulfillment for the award of the degree
Of
BACHELOR OF ENGINEERING
IN
INSTRUMENTATION AND CONTROL

GOVERNMENT ENGINEERING COLLEGE, RAJKOT.


GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD
2017-18
Prof. SWETA K. PARMAR Prof. M.J. MODI
(Internal Guide) (Head of department)

Page | 1
GOVERNMENT ENGINEERING COLLEGE,
RAJKOT

CERTIFICATE

This is to certify that Mr. Krunal Jethwa Enrolment No.


150203117014 of B.E. (I.C.) SEM-7 has satisfactorily completed the
term work of project prescribed by Gujarat Technological University
during the academic term 2017-18

Date: 6/10/2017 Faculty In-charge Head of Department

Page | 2
GOVERNMENT ENGINEERING COLLEGE,
RAJKOT

CERTIFICATE

This is to certify that Mr. Rahul Rana Enrolment No. 140200117088


of B.E. (I.C.) SEM-7 has satisfactorily completed the term work of
project prescribed by Gujarat Technological University during the
academic term 2017-18

Date: 6/10/2017 Faculty In-charge Head of Department

Page | 3
GOVERNMENT ENGINEERING COLLEGE,
RAJKOT

CERTIFICATE

This is to certify that Mr. Ranjit Gordiya Enrolment No.


150203117032 of B.E. (I.C.) SEM-7 has satisfactorily completed the
term work of project prescribed by Gujarat Technological University
during the academic term 2017-18

Date: 6/10/2017 Faculty In-charge Head of Department

Page | 4
INDEX

Acknowledgement……………………………..…………………………………….………..…7

Abstract……………………………..………………………………..………………………...……8

List of Figures and Tables……………………………..…………………………………...…9

CHAPTER-1 Introduction to Home Security System…………………………...…10

1.1 Introduction……………………………..………………………………..……..10

1.2 Purpose of Home Security system…………………………….....…………..…10

1.3 Problems with conventional security system……………………….………..…11

1.4 Literature review……………………………..…………………………………11

1.5 Plan of working …………………………….………………………………..…12

1.6 Materials/Tools required……………………………………………………..…13

CHAPTER-2 Design: Design Methodology and Implementation…............21

2.1 Observation Matrix……………………………………..………………………21

2.2 Empathy……………..……………..……………………………..……………..22

2.3 Problem solving……………………………..………………………………..…23

Page | 5
2.4 Product development……………………………..……………………………..24

CHAPTER-3 Implementation……………………………..……………………………25

3.1 Work Done……………………………..………………………………..……...25

CHAPTER-4 Result and Future Scope……………….………………..……………26

4.1 Summary……………………………..…………………………………………26

4.2 Future Scope……………………………..…………………………………...…26

4.3 Features and advantages…………………...………..………………………..…26

Reference……………………………..………………………………………..…………………27

Page | 6
ACKNOWLEDGEMENT

It gives me a great pleasure in expressing heartfelt thanks and profound gratitude


to Lecturer of IC Engineering Department, ‘Miss Sweta Parmar’, Rajkot for allowing
me to take project under his guidance I extend my deep sense of gratitude for his
persistence, encouragement, and motivation which lead me to pinnacle of success.
Everything done would have been very difficult without his vast, experience, innovative
ideas, and through knowledge.

I am also sincerely thankful to Head of Department, ‘M. J. Modi’, of


Instrumentation and control Engineering, RAJKOT for giving permission me to take
this project and who in spite of his busy schedule spend some time to discuss about topic
with me. I am thankful to all my friends who have always motivated me and shown the
right way to proceed in my work.

Page | 7
ABSTRACT

The final year projects are a source of practical knowledge that one gets to learn
through research of previous made inventions, studying their problems and deficiencies.
Keeping them in mind a solution for those problems is found and resolved, resulting in a
better project design which is more efficient and problem free than its predecessors.

Applying the same research and problem solving skills, we, the final year
students of Bachelor of technology (Instrumentation and control), have taken the project
of ‘Home Security System’ as our final year project.

Today’s modern day society takes the safety of their housing seriously. Thus a
Home security system that is affordable and efficient at its work is a necessity in every
home. We have made a home security system that uses much lesser resources, is easier
to install, and provides the same level of safety that an expensive system does.

Page | 8
List of Figure

Figure: - 1.1 Block diagram of the Home Security System………………………………..12


Figure: - 1.2 Arduino hardware structure……………………………..………………...…14
Figure: - 1.3 Arduino Uno structure and port nomenclature……………………………....15

Figure: - 1.4 Optical Proximity sensor……………………………..…………………...…16


Figure: - 1.5 Glass break sensor installed on a window……………………………..…….17
Figure: - 1.6 Laser trip wire sensor……………………………..……………………...….18
Figure: - 1.7 Bluetooth module (HC-05) …………………………………………….…....18
Figure: - 1.8 GSM module (SIM 800C) …...………………………..…………………….19
Figure: - 2.1 Observation Canvas……………………………..…………………………...21

Figure: - 2.2 Empathy Mapping Canvas……………………………..……………………22


Figure: - 2.3 Ideation Canvas……………………………..……………………………….23
Figure: - 2.4 Product development……………………………..……………………….....24
Figure: - 3.1 Arduino Uno and Bluetooth Module HC-05 Communication………………25
Figure: - 3.2 Arduino Uno and Bluetooth connection with a phone………………………26

List of Tables

Table: - 1.1 Arduino Uno details…………………………………………………………..15

Page | 9
1.1 Introduction

The modern day housing has become well advanced and smart in many of the fields,
may that be in leisure, entertainment or comfort. Thus the security aspect must also be taken in
thought. Much research has been done on how a house can be made safe from the threats of
intrusion, theft, or robbery in the most cost effective and secure way possible.

Many application of a security system requires the system to interact with the objects in
the field as well as identifying people, which requires huge computational power and space,
where as some application requires systems to be as compact as possible and to deal with the
problem as well as being interactive with the user. Feedback given by the system is considered
as a great feature that a security system must have.

Thus a GSM feature that notifies the owner of any intrusions gives the owner option to
call the authorities directly from wherever he might be. Security systems are considered a vital
part of home automation and need special space and money requirements that are needed to be
kept in mind while purchasing one. Security systems can be easy or difficult to install
depending on various factors, such as climate, terrain, and number of entrances, number of
doors and windows, and the application itself.

1.2 Purpose of Home Security System


A conventional security system is a network of sensors, cameras and alarms that
work together to provide a safe surrounding for the property owner as well as the
society. The main concern for a person about security of his house when he is out is
taken care of by the security system. The GSM feature of the security system notifies the
user about any break-ins and what sensor is triggered.

Page | 10
The second thought before installing a security system is its cost. This is not a
problem with our project as it is a modular design it can handle all the necessary sensors
along with maintaining the cost and the security aspect of the system.

1.3 Problems with conventional security systems

There are three types of security systems currently available in the market, which
are:
 Monitored Security systems
 Unmonitored Security systems
 Wireless Security systems

All of these systems have their own benefits and faults, some of which are: high
cost, intrusive, some of them take more time to respond to the sensor triggering, where
as some systems require way too much space that installing them in a regular housing
facility is impossible.

Another problem with conventional systems is that it requires maintenance on a


regular basis, like changing the batteries of the wireless modules. Our home security
system does not require any such maintenance as there is use of batteries. Power failures
are handled by a UPS which acts as a backup power supply until the power is restored.

1.4 Literature Review

For figuring out the flaws of the already existing security systems we went through
some of the papers and patents that got us to know about the current security systems and its
working.
We studied an invention with the same name “Home security system” [1] which
specializes on monitoring a facility with cameras and image recognition through a controller.
This invention is used for high end facilities that have high level of security needed, which is not
feasible to apply in a housing property.

Page | 11
But the literature got us to know about the placement and communication of the sensor
with the controller. The problem with the invention is that it will need a high power source for
backup in case of power outage. The cameras and image recognition require a lot of processing
power which makes the system bulky.
The datasheets for the controller and the communication module were taken from the
following sites [2] and [3], which provided us with the specification of the controller input and
output ports and operating range of the modules.

1.5 Plan of working

FiG1.5: Block diagram of the Home Security System

The block diagram of the security system is shown in Fig1. As can be seen this
security system falls into the class of monitored and wireless security system, as it
contacts the owner through GSM module, and also sounds the siren for the neighbors to
be notified as well of the intrusion.

The sensors i.e. proximity sensors, glass-break sensors, and the laser trip wires are
the eyes of the security system. The proximity sensors see whether any windows or doors
are opened. Laser trip sensors are for motion detection as well.

Page | 12
The Arduino controller receives the signals from the sensors and decides whether
to sound the siren or not depending on the programming. Arduino requires a power
supply of 5 volts to operate.

The GSM module provides the wireless feature of the system that notifies the
owner of any intrusions when away from home, by sending an SMS to the
preprogrammed number. Then the owner can call the authorities and be known of the
situation himself as well.

Alarms and flashing lights are installed as an on-point indication of the situation.
The flashing lights and alarms also alerts the neighbors of the situation so they can act
upon it by either contacting the owner or the authorities themselves.

Also the wireless door opening feature of the system ensures that the owner
himself is opening the door and no one else. The Bluetooth module HC-05 only connects
with the device that is once paired with the system. This ensures that only the selected are
given access. Then by pressing a key on the phone through an integrated application for
the Bluetooth, one gets to open the door without requiring a key of any sorts.

1.6 Materials/ Tools required

1.6.1 Arduino
Arduino are open source microcontrollers that are commercially available at a
very low cost. Arduino microcontrollers have a wide range of inputs and outputs that also
provide PWM and ADC ports for stepper motor controls as well as analog inputs.

The greatest benefit of using an Arduino controller is its incredible ease of


programming that can be easily done using a standard PC with its own open source

Page | 13
software. There are many variants of the Arduino controller available in the market, one
can choose any of them according to their needs and applications.

The major difference between them is the number of analog and digital input
ports and the memory. The controller variants having the number of input ports in the
increasing order are Arduino Uno with 14 digital I/Os, Arduino Leonardo with 20
digital I/Os, Arduino due with 54 digital I/O etcetera.

Fig 1.2 [4]: Arduino hardware structure

1.6.2 Arduino Uno

Arduino Uno R3 is the smallest and cheapest version of the series based on the
ATmega328 chip. It has 14 digital I/O pins and 6 analog inputs. This controller works
best where there are only digital outputs required.

It works on an onboard 16 MHz crystal. It also has USB port for programming,
DC power jack, and a reset button. The main thing about this board that it can take its
supply either from the DC power jack or from the USB, the power supply is selected by
itself.

Page | 14
Fig 1.3 [5]: Arduino Uno structure and port nomenclature

Microcontroller ATmega328
Operating voltage 5V
Input voltage 7-12V
Digital I/O pins 14
Analog Input pins 6
Dc current 40mA
Flash memory 32Kb
Clock speed 16Mhz
Table 1.1 [6]: Arduino Uno details

Page | 15
1.6.3 Proximity sensor

A proximity sensor is a closeness detector that determines whether an object is


close to the sensor or far. The proximity sensor can sense an object without any physical
contact to the object making it an important part of the home security system. The
proximity sensor emits an electromagnetic beam and receives measures the amount
reflected back from the target. The more the light reflected back from the object, closer
the object is to the sensor.

We have used an optical (infrared sensor) for detection of the status of the doors
and windows. The nominal range for these sensors is around 3-4 inches which is suffice
for door status detection.

Fig 1.4 [7]: Optical Proximity sensor

1.6.4 Glass-break sensor

A glass-break sensor is a theft or a breach detection sensor that generates


an output if anyone tries to tamper the glass or breaks it. This sensor works on the
principle of detection of resonance frequency of the glass, it uses microphone or a
piezoelectric crystal to sense the vibrations in the glass. The resonance frequency is set

Page | 16
in the sensor, thus it will only activate when same frequency is received by the
microphone.

Such sensors are costly, and are used when higher level of security is needed. In
a security system this sensor is placed either on the veranda Glass doors or possible
entry points where a glass screen is used.

Fig 1.5 [8]: Glass break sensor installed on a window

1.6.5 Laser Trip wire sensor

A laser tripwire, is a type of motion detector that triggers when an object barges
in the line of the detector. It is a pair of optical transmitter (laser) and a receiver
(photodetector). A pair of photodetectors are placed in position of a possible entry point,
and it will trigger alarms when the sensor is tripped.

It is a vital part of a security system as a pair of this sensor placed on the


windows will act as a safety layer in case of forced entry and will notify the controller if
tripped.

Page | 17
Fig 1.6 [9]: Laser trip wire sensor

1.6.6 Bluetooth Module (HC-05)

HC-05 is a Bluetooth Serial Port Protocol (SPP) module, designed for wireless
communication setup. It has a Bluetooth V2.0 with Enhanced Data Rate and 3Mbps
modulation. It uses a 2.4 GHz radio trans-receiver pair for communication. It has a
small size which is compatible with most of the controllers available in the market.
Hardware features of HC-05 [10]
 Typical -80dBm sensitivity
 Up to +4dBm RF transmit Power
 Low power 1.8V Operation,1.8 to 3.6V I/O
 PIO control
 With integrated antenna

Fig 1.7 [10]: Bluetooth module (HC-05)

Page | 18
1.6.7 GSM module (SIM 800C)

GSM module are used to use the SMS feature of the phone to be used with the
Projects that require automation or a feedback to the user. These communication
modules are easily available in the market, cost-effective, and easily compatible with
any controller. SIM800C is a complete Quad band GSM module that has FM and
Bluetooth adaptability features at a low cost.

Fig 1.8 [11]: GSM module (SIM 800C)

1.6.8 Program
The software that is compatible with the programming of Arduino controller is
its own open source software Integrated Development Environment (IDE) [12]. The
language used with it is C language. Other integrating software used with the IDE is
Waltech ladder logic.

Page | 19
Page | 20
Chapter 2 Design: Analysis, Design Methodology and
Implementation

2.1 Observation Matrix Canvas

Fig 2.1: Observation Canvas

The domain for our project is a housing society or an apartment. The objective of
this canvas was to observe the domain and note down the activities and people we saw at
the scene.
The main activities that we saw in a house was sitting, walking and sleeping. The
users were civilian people, women and children. Environment was humid with no air,
but that is likely to change with the change of season. Objects in the domain were,
couch, bed, TV, refrigerator, dining table etcetera.

Page | 21
2.2 Empathy Mapping Canvas

Fig 2.2: Empathy Mapping Canvas


The Empathy mapping is a technique that makes you connect to the user,
understanding their problems that inspires you to work in a way that works out in a way
that helps the users and the field as well.

After observing the domain we talked to some of the houses if they had any
problems related to security. We recorded their responses, and learned that security is of
great concern to a civilian, by making a security system that would be in their budget
and also meet the security standards was a challenge for us.

Page | 22
2.3 Ideation Canvas

Fig 2.3: Ideation Canvas

The ideation canvas deals with the identification of problems of the users and try
to figure out a solution that is most appropriate and feasible to the user and the
application.
We talked to the people about their daily routine, their problems with the security
issue, how they are afraid to leave their valuables in the house just on a sole lock that
could be broken with ease.
They talked about how they had problems with keys and how they would lock
themselves out forgetting the keys inside. We discussed all of the problems and tried to
come up with the solutions that would help solve them.

Page | 23
2.4 Product development

Fig 2.4: Product development


After learning about the problems that the users face about the topic of security,
we solved the most concerning problems that needed to solved, and neglected some that
weren’t possible to solve with a security system.

We designed a security systems that would sort out some of the problems. We
listed out the components required, and the features that it will have aside the security
system. After a promising design was made, we showed it to the user we talked to see
what improvements were needed and what things weren’t quite useful.

Page | 24
Chapter 3 Implementation

3.1 Work done


The issue we solved first was the wireless access control with Bluetooth via
smartphone. The smartphone works as a key when needed to unlock the door. The
Bluetooth module communicates with the controller to the phone.
The controller is programmed to triggers a relay when the key on the phone is
pressed. The relay is then connected to a digital lock that opens and closes the door with
the relay.

Fig 3.1: Arduino Uno and Bluetooth Module HC-05 Communication

The programming is added to the controller through the IDE and then relay is
attached to one of the output ports. The smartphone paired with the module is then used
to communicate with the controller. An application named ‘Arduino Bluetooth Control’
provides the easiest interface to control the relay.

The application provides feedback from the module, whether the command from
the phone is received by the controller or not. The key to open the door can either be a
command or a key. This simply becomes a password protected interface that only allows
the user that gives the password command to be able to enter the premises

Page | 25
Fig 3.2: Arduino Uno and Bluetooth connection with a phone

Chapter 4 Summary and Future scope

4.1 Summary
An automated home security system that features Bluetooth and GSM notification
system with a password verified access control at low cost can be considered a good product.
Features that this design provide which are unique are wireless control and modular design with
lower cost. To summarize this system provides access control with password verification, and
burglar alarm with mobile notification.

4.2 Future scope


Future scope for this system can be garage door control with analog control using Mega
controller and face recognition system.

4.3 Features and advantages


The main features and advantages that makes this home security system affordable than
the conventional security system are:

Page | 26
 Cost effective and affordable
 Ease of access
 Easy to install
 Modular design
 Password based access control
 Nonintrusive

References

[1] https://patents.google.com/patent/US6759957B2/en
[2]https://www.google.co.in/url?q=https://www.farnell.com/datasheets/1682209.pdf&sa=U
&ved=0ahUKEwjwkOOez8fWAhWBLY8KHX_wAXsQFggeMAE&usg=AFQjCNH
4NyxcSiVexYeoUDVZfj_jBjOvoA
[3]https://www.google.co.in/url?q=http://www.electronicaestudio.com/docs/istd016A.pd
f&sa=U&ved=0ahUKEwiu9PbOz8fWAhXMrY8KHTcJAcUQFgglMAA&usg=AF
QjCNEjF3xb1x5Wm6XFJzvwgrFjDaxoIg
[4] https://encrypted-
tbn1.gstatic.com/images?q=tbn:ANd9GcQV2OBsuIHUhFzGGW1LtSz5AVe3uY9eJ
6QOCddydcIF3F1EJJ7Jog
[5] https://encrypted-
tbn2.gstatic.com/images?q=tbn:ANd9GcQkicthImq23gLxlQxWGmwsc5pFCzsFUz
Ne_aUNberC6LWFn_dg9Q
[6]https://www.google.co.in/url?q=https://store.arduino.cc/usa/arduino-uno-
rev3&sa=U&ved=0ahUKEwim2ajV0MfWAhVLsI8KHegXABQQFggpMAA&usg
=AFQjCNF3LwZ4gwMAYL65mwK0VzmGMH0ctQ
[7] https://encrypted-
tbn2.gstatic.com/images?q=tbn:ANd9GcT0hbUCatTeUVt_M7zkerU9rf5hNVEHrJv
9Hd9o7bHqYD-7SgymZQ
[8] https://encrypted-
tbn2.gstatic.com/images?q=tbn:ANd9GcRByiVL4GV9YMYhYwSXznWRjXctJkT
SH6-GrfiG3YV5xx_4JXtB
[9] https://encrypted-
tbn3.gstatic.com/images?q=tbn:ANd9GcRZ_7CG_HjAZcqpcrVlqqb4uY5QZt1jeeN
6G4LWQ2JF6EvEwlRylw

Page | 27
[10]https://www.google.co.in/url?q=http://www.rhydolabz.com/wireless-bluetooth-ble-
c-130_132/hc05-bluetooth-module-masterslave-p-
1169.html&sa=U&ved=0ahUKEwjzn-
270cfWAhVGP48KHVIyAccQFgg2MAE&usg=AFQjCNEWrG0tJvnool8093d_Ed9
Iwk4xqQ
[11] https://encrypted-
tbn0.gstatic.com/images?q=tbn:ANd9GcSzzkS1sTpxTDyiwwIdONhKIGQoWUq-
JQzVgb1Q12rCaQL-KBMawQ
[12] https://encrypted-
tbn1.gstatic.com/images?q=tbn:ANd9GcS4CeQ5XY9aLE17EdNn9V2ujqkPbZvKzb
AapIKsxxLJl_L_5fxr
[13]https://www.google.co.in/url?q=https://www.arduino.cc/en/main/software&sa=U&v
ed=0ahUKEwjsv_uu0sfWAhXMNY8KHbvdCtsQFgghMAA&usg=AFQjCNEurFy
GyNHSbwvvJgZ674hg4O5sBg

Page | 28

You might also like