Вы находитесь на странице: 1из 9

Neha Singh et al.

/ International Journal of Engineering Science and Technology (IJEST)

SELF INITIATED SMS/MMS ENABLED HOME SECURITY SYSTEM (SISME-HSS)


NEHA SINGH1
Computer Science Department, M.I.E.R University, Lakshmangarh, Sikar District, Rajasthan 332311, India

ANKITA GUPTA2
Computer Science Department, M.I.E.R University, Lakshmangarh, Sikar District, Rajasthan 332311, India

P.K.BISHNOI3
Computer Science Department, M.I.E.R University, Lakshmangarh, Sikar District, Rajasthan 332311, India

Abstract- We present an experimental model of self initiated SMS/MMS enabled surveillance system for maintaining security at home (SISME-HSS). The project features a web camera, installed in house premises, which is operated by an advanced information and communication system based on Internet, Java programming, Scheduler modelling and mobile phone mentoring. The web camera sensors are connected within house and software module is designed to be devoted to analyze the signals which are generated by it. The camera detects motion of any intruder in front of the camera dimensions. The software module communicates to the intended user either via Internet network, or via mobile services. This system is designed to be a powerful information and security tool for residence as well as office premises. Keywords: SMTP (Simple Mail Transport Protocol); GPRS (General Packet Radio Service); SMS (Short Message Service), MMS (Multimedia Message Service); GSM (Global System of Mobile Communications); HLR (Home Location Register); UPS (Uninterruptable Power Supply) 1. Introduction Security is the degree of protection against danger, damage, loss or any criminal activity. Security is defined as a condition so that one can develop and progress freely. An important aspect of security includes Home Security. It is very important, because we know that crime is increasing day by day and people have less time to spend at their houses. Moreover, there are many other reasons why people need security at their homes. The first reason that this system is established is to create a peace of mind for people. So that they can feel safe inside or outside their homes. This will help them to execute their work without any fear of their security. The other reason is to help in getting timely information about visitors at house. Through the use of security cameras users are able to monitor the situation at their homes and get timely information about persons visiting their homes. The objective of security is executed by our Self Initiated SMS/MMS Enabled Home Security System (SISMEHSS) by using three classes of data:

ISSN : 0975-5462

Vol. 3 No. 3 March 2011

2412

Neha Singh et al. / International Journal of Engineering Science and Technology (IJEST)

1.1 Inputs: Inputs are generated when our hardware subsystem becomes aware of a threat via the connected sensors (Web Camera) and alerts the software sub-system that some motion is detected, when an intruder is found at house premises. 1.2 Processing Data: The hardware subsystem, which is constantly monitoring with the help of connected sensors, then provides real time inputs to software subsystem which then processes these inputs to trigger different events. 1.3 Outputs: Upon arriving at a conclusion the software sub-system runs its pre-programmed checklist of appropriate responses. This includes posting the intruders snapshot to the users personal web page and sending an alert message via SMS or MMS to concerned users mobile phone.

2. Review and Analysis SISME-HSS provides a basic approach towards home security by exploiting the fundamental computing resources. These include a devoted Web Camera Sensor as well as a Personal Computer executing a scheduler program for motion detection and sending an alert message to users mobile phone. It features the security provided with mobility for intended user using mobile phone enablement to the security system. As the motion is detected, the system is programmed to inform its user that detection is made along with the snapshot of detected intruder. At this event , the user can plan out the next approach towards the security by figuring out and analyzing the snapshot. Thus, irrespective of the user location, there is a provision of proper vigilance by him. This is the most crucial advantage of our experimental system. 2.1 Market Research As per the research, people both at home and office spend a great factor of their budget for the purpose of providing efficient security. Through our market analysis, we are able to identify common characteristics of home security system which are listed below: 24 hours monitoring Ease of use Difficulty to hack Reliability Motion sensor Efficient , fast and precise notification system

2.1.1 Market Products: (1) Low cost GSM/GPRS home security system presents a design which contains a home network including a GPRS/GSM gateway and three kinds of wireless security sensor nodes. This system can respond quickly to alarm incidents and has a user interface. [1] (2) Home Video Security Surveillance provides a new method of moving object detection by combination of pixel illumination with its chroma in YUV color space. This algorithm will provide maintenance with 3 key values. It is very robust and effective to reduce false alarms in case of swaying objects.[2] (3) A new system for Video-based Detection of moving objects and its integration into digital networks has provided detection and description based on an object oriented, statistical multi feature analysis of video sequences .This is a self adaptive analysis and the calibration effect is low.[3] (4) Person Detection by Mobile Manipulator for Monitoring, monitors any system by moving cameras. It can increase the efficiency of monitoring and can eliminate the blind spots of fixed cameras. In this system, a mobile manipulator is developed which is equipped with cameras at the arm end for purpose of monitoring.[4]

ISSN : 0975-5462

Vol. 3 No. 3 March 2011

2413

Neha Singh et al. / International Journal of Engineering Science and Technology (IJEST)

(5) Real-Time Human Tracker based on location and motion recognition of user for Smart Home, provides an automatic home service via analysis of human contexts. The system provides a real time human tracker that detects human motion with the help of three kinds of images of empty room, image of room with appliances and image of human. Human recognition is decided from pixel number in array line. [5] 2.2 Technical Research: A significant amount of time was spent to find out the best and approachable technology to be used in SISMEHSS. With extensive research, different technical aspects of our system were explored to find most convenient and widely used technologies: 2.2.1 Operating System: Maximum of personal computer users use Microsoft operating system and related products. Therefore, this technology is based on Microsoft framework. The scheduler and Web based programming is done in Java which is easily deployed at any web server and at any platform. 2.2.2 Database: We did research on many relational databases such as Oracle, SQL server 2000, Sybase, FoxPro, MYSQL etc. For the purpose of storing snapshots with minimum cost and the ease to fetch them, it was found that MYSQL provides an integrated relational database and so it is being used in our system. 2.2.3 Web Browsers: Research had shown that maximum of household PCs used IE6.0 or above and some uses Netscape 5 or above on a window platform. Therefore, this system is designed to run on any of these browsers. 2.2.4 SMS-Server: Research helped in choosing an appropriate server to implement the sending of alert messages upon motion detection. It was found that with respect to cost and ease of use, Ozeki SMS Server is attuned to our needs. 2.2.5 Hardware: According to the research conducted on different models of mobile phones, we found that Nokia mobile phones are used widely. The software, Nokia PC suite is found compatible with most of programming interfaces and thus could easily cope up with our systems performance. Nokia mobile set with a GSM modem featuring a GPRS connection is utilized as a message sender to communicate at the advent of any event. With different kinds of sensors available in market to detect motion, we found that Web camera is easily suited to our cost and consumption estimate. The web camera can easily be configured and installed at any obscure location in a given house layout as illustrated in fig 2. Also, Java Media framework is found compatible with Microsoft WDM video device which is being used in our system. These findings helped us to develop different attributes of our security system. Out of these features , the ease of use and the convenience in installation are quite vital ones . Mostly people prefer a security system that can not only be directed from the house itself but also from any remote location. Thus, the need for a comprehensive web based and mobile phone features enabled home security system was evolved. 3. Design and Algorithm The system is initialized to grab an image which is referred to as Old in the Flowchart fig. f1. According to the systems inbuilt timer, the next image is grabbed which is referred to as Current. If there exists a difference in the Old and Current images RGB values, the motion is said to occur which is detected by the Sensors. Here motion detection algorithm is based on frame difference calculation in terms of RGB values and brightness threshold values stored in byte arrays [8]. The algorithm compares two consecutive frames Old and Current, pixel by pixel to generate a difference value. If the difference value is greater than a fixed value (randomly taken), then motion is detected. Else if, there is no difference between previous and current frames byte arrays then Old is set to Current. The process repeats according to the programs set timer.

ISSN : 0975-5462

Vol. 3 No. 3 March 2011

2414

Neha Singh et al. / International Journal of Engineering Science and Technology (IJEST)

If a motion is detected then image which is grabbed is stored in a database. In the next step the scheduler is invoked which triggers a series of events. The scheduler program performs following actions to inform the remote user about the event of motion detection. At first, it will send an Alert message which is stored in the form of SMS in database. At the next step, the scheduler will fetch the snapshot of detected motion, which is stored in the database earlier, and sends it to the user via MMS along with the alert message. At last, the scheduler posts the snapshot to a Web page designed specifically to be viewed by the user provided with user id and user password (as per configuration made by the user).

ISSN : 0975-5462

Vol. 3 No. 3 March 2011

2415

Neha Singh et al. / International Journal of Engineering Science and Technology (IJEST)

Fig f1 The Algorithm to implement Motion Detection and Security action taken

4. Electronic Model Referring to Fig. 1, SISME-HSS there is a personal computer is connected to a GSM mobile4 and a Web cam 15.A UPS 14 provides a battery backup power for random time limit (1 hr). This constitutes the hardware subsystem installed at house premises. The message sending is initiated at the server running on PC and further sent via a GSM phone network 1 including a short message service center 2 , sending and receiving mobile phones 3 , 4 , first and second base transceiver stations 5 , 6 , a home location register 7 , an SMS gateway 8 and first and second mobile switching centers 11 , 12 . The mobile phones 3, 4 can send and receive text (SMS) messages via the base transceiver station 4 , the short message service center 2 , the SMS gateway 8 and the mobile switching centers 12 , 13 . For instance, the first mobile phone 3 can send a text message to the second mobile phone 4 using this network. The short message service center 2 is also connected to an SMS-SMTP gateway 9 which is itself connected to a data network 10, preferably comprising the Internet. The receiver computer 11 is also connected to the data network 10 On receiving an SMS message the first mobile phone 3 , from the second mobile phone 4 , the short message service center 2 queries the home location register 7 for the SMS gateway for the user of the first mobile phone 3 .

ISSN : 0975-5462

Vol. 3 No. 3 March 2011

2416

Neha Singh et al. / International Journal of Engineering Science and Technology (IJEST)

Fig.1. The figure represents the electronic model of SISME-HSS comprising of GSM Network Cloud and Internet Network Cloud

The alert message at the PC can also be accessed by the user at the email on the computer 11. Firewall security is enabled at SMSC interface to prevent any intermittence in the way of sending the alert message to the end user. As demonstrated in the electronic model , the hardware subsystem detects the intruder and alert is made by software subsystem .The alert message is send through the GSM network and Network cloud to the receiver terminal which is another GSM mobile or a PC. 5. Implementation and User Case Model: The user case model demonstrates the working scenario of SISME-HSS when it is actually integrated in a house. As shown in Fig. 2, there is a typical 1-BHK flat comprising of a main door, a living room, a bed room etc. A web camera acting as sensor is installed at the main door to grab the view of the outside premises of the house. While the software subsystem comprising of a personal computer and an attached GSM modem enabled mobile phone is kept at somewhere inside the house as shown in the fig. 2. It also has a UPS connected, to give a battery backup at the event of power failure. Mobile phones are GPRS enabled both at system end and user end to provide for sending and receiving MMS. An intruder arriving at the main gate can be easily viewed with the help of web camera and the snapshot is sent to the software subsystem with the help of proper hardwiring connections between the two subsystems. The triggered flow of events can be initialized using the two subsystems. The layout presents a raw idea of how the system is implemented using the two subsystems. It can be envisaged as a simple system by few of our clients. The simplicity has been seen in the ease of installation at any house structure , low resources and maintenance requirements and fast responses reached to the end user. There are three modes of security being provided at different stages: Obscure location for setting the Web Camera Password enablement at PC so that data flow cannot be interrupted accidently or deliberately. Also, there is a login password for remote accessing the security data by the end user.

ISSN : 0975-5462

Vol. 3 No. 3 March 2011

2417

Neha Singh et al. / International Journal of Engineering Science and Technology (IJEST)

Mobile network featuring the sending of alert messages in the form of SMS or MMS has firewall protection so that the user home register location is traceable.

Fig. 2 This figure represents a Model Layout of SISME-HSS installed in a 1-BHK House

6. Result and Analysis The stipulated time for conducting different actions involved during working of SISME-HSS is analyzed. It is varied according to different performance indices of the system. The average time involved in these actions are calculated and analyzed as demonstrated in the Table 1:
Table 1 Average Time for 1 Cycle of Events

SL.NO 1. 2. 3. 4.

ACTION PERFORMED Motion Detection Scheduler Program Ozeki Initialization Sending of SMS/MMS Total Time taken by SISMEHSS for 1cycle

AVERAGE TIME TAKEN (ms) 1000 10 300 15000 16310 ~ 16 sec

The systems performance measures depends upon events which are triggered by software subsystem followed by the execution of different security tasks. These events begin at the advent of motion detection as shown in the pictorial view:

ISSN : 0975-5462

Vol. 3 No. 3 March 2011

2418

Neha Singh et al. / International Journal of Engineering Science and Technology (IJEST)

Without Intruder

With Intruder

The analysis also determines parameters for failure of the system which can be seen as a function of system dependent and independent variables:6.1 Dependent Variables These include failure because of power dependencies including UPS failure to provide backup power. Sensor error attributed to Web Camera damage that can lead to swaying image detection. Mobile handset failure that can break the entire connection to user end.

ISSN : 0975-5462

Vol. 3 No. 3 March 2011

2419

Neha Singh et al. / International Journal of Engineering Science and Technology (IJEST)

6.2 Independent Variables These correspond to network dependencies like GPRS failure, Network Congestion, Gateway failure etc that can lead to jamming of the network cloud which will prevent the SMS/MMS to be send at the very instant. 7. Conclusion This paper presents the design and implementation of a home security system. SISME-HSS has a friendly user interface and employees methods to solve security problems using fundamental resources which are easily maintainable. Communication of the system with the user is based on latest technologiy of sending SMS/MMS and remote controlling using Internet network cloud. The system is easy to install and uses minimum of resources. It is low cost and easily operable. In addition to these existing provisions of information transmission, the wireless transceiver using mobile phone can also enable the system to transfer other form of information like Video, Voice etc. As a result, the system can also be conveniently expanded to other applications. The system has a secured login password. As a future work, extended efforts are being made to enhance the security provisions. Acknowledgement In endeavoring to this project, we would like to give our sincere thanks to Department of Computer Science And Engineering, Mody Institute of Technology And Science, for giving this opportunity to work on this challenging project and timely guidance in administration related commands. References
[1] [2] [3] [4] [5] Yanbo Zhao and Zhaohui Ye, "Low cost GSM/GPRS BASED wireless home security system "IEEE Trans.Consumer Electron ., VOl.56 , no.4, pp 546- 567jan 2007 . Zhou Bing ;Gu Yunhung ;Li Bo ;Zhang Guangwei;Tian Tian; Home Video Security Surveillance Info-Tech and Infonet,2001,Proceedings,ICII 2001-Beijing. 2001 International Conferance .; Vol.3 Page(s) 202-208 . Meyer M. ;Hotter, M. ; Ohmacht T.; A new system for Video-based Detection of moving objects and its integration into digital networks ,Security Technology 1996, 30th Annual 1996 International Carnahan Conference, pp.1996 page(s) 105-110. Mae , Y,; Sasao , N .; INNoue ,K. ; Arai,T.; Person Detection by Mobile Manipulator for Monitoring,SICE 2003 Annual Conference, pages-2801-2806. QUoc Cuong Nguyen; Dongil Shin ; Dongkyoo Shin; Juhan kim;Real-Time Human Tracker based on location and motion recognition of user for Smart Home, Multimedia and Ubiquitous Engineerin,2009.MUE'09.Third International Conference pp.4-6 June 2009 page(s):243-250 http://cahit.wordpress.com/2008/07/08/how-the-motion-detection-algorithm-works/. [6] Akihiko Iketani , Yoshinori Kuno, et al. Real time Surveillance System Detecting Persons in complex Scenes. Iketani,A.;Kuno,Y.; Shimada,N.; Shiri ,Y.Image Analysis and Processing,1999. Proceedings. International Conference on, 1999. Page(s):1112-1115 Robert T.Collins,et al,A System for video surveillance and Monitoring,CMU-RI-TR-00-2,http://www.cs.cmu.edu. Vision : http://homepage.ntlworld.com/lawrie.griffiths/vision.html. Ozeki-Server: http://www.ozeki.hu/index.phtml?ow_page_number=170 http://www.ozeki.hu/attachments/2/Product_guide_v6.pdf

[6]

[7] [8] [9]

ISSN : 0975-5462

Vol. 3 No. 3 March 2011

2420

Вам также может понравиться