Вы находитесь на странице: 1из 4

INTERNATIONAL JOURNAL OF COMPUTING SCIENCE, VOL. 1, NO.

1, JANUARY 2012
ISSN (Online): 2164-1374, ISSN (Print): 2164-1366, Published online January, 2012 (http://www.researchpub.org/journal/ijcs/ijcs.html)

Design and Implementation of a Wireless Security System using RF Technology


Xiaolong Li and Qing-An Zeng

Abstract In the current world, the high value objects such as ipads, laptops, are prone to the theft and are required to be monitored to ensure safety. Monitoring the objects within a short distance by the use of a wireless security system is implemented with the help of modules which are capable of communicating with each other. The buzzer attached to the modules sounds instantly when the portable object moves approximately six meters away from the owner to the fixed location. The modules are designed with two ARMLPC2148 microcontrollers and CC2500 RF transceivers which are powered by a battery source. Index Terms wireless security system, CC2500, RF technology, microcontroller.

II. RELATED WORK The design of anti-theft alarm systems is an important safety measure to keep a portable article safe. The main idea of this design is to give an alarm or any kind of indication to the owner of the article when the article is moved from its original position. A personal property alarm device was designed and patented which works on a position sensing principle and gives out an audible alarm in case of theft (U.S. Patent No. 4,462,023, 1984). The device is housed in a sealed box with an opening for the sound signal to come out and is comprised of an alarm, sensing switch and a battery source. The device has two position sensitive switches which are employed in the design to overcome any faulty errors that may occur with the use of the single switch. The opening and closing of switches is dependent on the external physical movement of the article to be monitored. Any vibration or slight movement closes the switch, giving power output to the alarm and thus alerting the owner of the article. This design is prone to errors like malfunctioning of the switches, any kind of loose connections in the circuitry, and improper timing of the alarm giving a false indication to the owner to take necessary actions. A. MEANS FOR ASSISTANTING IN LOCATING AN OBJECT A Security System based on Position Sensing was further improvised by introducing wireless communication between the device to be monitored and the control unit producing the buzzer output if the device in consideration is moved within a short range of distance, and it received a patent with a title as Means for Assisting in Locating an Object (U.S. Patent No. 4,476,469, 1984). Theft security is achieved by a transmitter and receiver exchanging the position information using wireless communications (Figure 1).

I. INTRODUCTION thefts of valuable objects or portable goods are increasing every day. There is a tremendous increase of theft in airports in the last five years [1]. In the current situation how to protect the objects such as suitcases, laptops and ipads has become a tough task. These objects are easy for thieves to steal and resale. According to statistics, for every fifty three seconds a laptop is stolen [2]. A study in 2008 at the Ponemon institute showed that 12,000 laptops were lost weekly and 600,000 were lost annually in U.S. Airports [2]. Monitoring the physical presence and location of these devices is a tedious task needed at all times. There are numerous ways to protect the objects from being stolen. We can reduce the risk of theft by using an anti-theft alarm system. A buzzer is present in both of the communicating devices as an added safety measure for security of the article. The owner of the object is alerted by an alarm if the object is moved several meters away. In wireless communication, data is broadcasted by radio frequencies [3]. As a result, data may be captured when it is broadcasted. There are many wireless communication technologies such WIFI, Cellular, Bluetooth, etc. Different wireless technology has different communication range from centimeters to several hundred meters [4]. In this project a range approximately six meters is used because it is easy to protect the object from being stolen. The rest of this paper is organized as follows: Section II introduces the related work. Section III presents the design of the system. The building of the system is given in Section IV. Implementation of the system is provided in Section V. Finally, the conclusions are provided in Section VI.
HE Manuscript received December 18, 2011; revised on December 28, 2011; accepted January 5; 2012. Dr. Xiaolong Li is with Department of Electronics and Computer Engineering Technology, Indiana State University, Terre Haute, 47809, USA, (Email: Xiaolong.li@indstate.edu) Dr. Qing-An Zeng is with Department of Electronics, Computer & Information Technology, North Carolina A&T State University, Greensboro, NC 27411, USA (Email: qzeng@ncat.edu)

Figure 1. Block diagram of Means for Assisting in Locating an Object. (U.S. Patent No. 4,476,469, 1984) The timer present in the transmitter generates timing signals which are encoded and transmitted. These signals are decoded and received by the receiver. If this process aborts or delays for a time interval, the buzzer rings and alerts the system to take

INTERNATIONAL JOURNAL OF COMPUTING SCIENCE, VOL. 1, NO. 1, JANUARY 2012


ISSN (Online): 2164-1374, ISSN (Print): 2164-1366, Published online January, 2012 (http://www.researchpub.org/journal/ijcs/ijcs.html)

preventive measures to restore the object to its original position. B. OUT-OF-RANGE PERSONNEL MONITOR AND ALARM With the same idea of using wireless communication in theft prevent systems, a patent named Out-of Range Personnel Monitor and Alarm was implemented (U.S. Patent No. 4,593,273, 1986). A transmitter and receiver section was used along with an alarm that is attached to the device to be monitored and this monitoring is based on detection of frequency signals F1 and F2. If the receiver gets a weak frequency signal, less than the threshold frequency signal F1 set from the transmitter, the buzzer present in the receiver section rings and alerts the person who takes necessary action.

Transmitter (UART 0) in ARMLPC2148 microcontroller and the CC2500 RF transceiver. The UART0 provides a transmit/receive data lines with standard baurd rates. An UART0 provides a transmit and receive first in first out (FIFO) for transfer of data between ARM LPC2148 to CC2500 RF transreciever.

Figure 3. Block diagram of wireless security system The microcontroller-based embedded device along with CC2500 RF transceiver in one module will maintain full duplex communication with another module. CC2500 RF transceiver in both modules provides extensive hardware support for effective RF communication in six meters of distance. When any of the modules move six meters away from the fixed location, the communication between two modules will be lost and it generates a buzzer sound, which is connected to pin 25 of the microcontroller.

Figure 2. Block diagram of Out-of range Personnel monitor and Alarm. (U.S. Patent No. 4,593,273, 1986 As shown in the Figure 2, the design consists of a base unit and multiple mobile units which communicate repeatedly with the base unit. The buzzer in the mobile unit sounds when the received signal from the base unit is less than the threshold value set in the receiver and thus alerts the user of the owner. C. THEFT PREVENTIVE APPARATUS WITH AN ALARM OUTPUT DEVICE Theft Preventive Apparatus with an Alarm Output Device was invented to produce an alarm sound when the apparatus is detached from the article in consideration is moved (U.S. Patent No. 5,610,587, 1997). The entire safety system is comprised of an apparatus which senses the movement and a battery source to power the alarm. The patent lacks information on type of communication, and it is a kind of wired communication that senses the physical motion of the invented apparatus with respect to the attached box and is crucial in giving the alarm by notifying the owner regarding the theft. The demand for an effective anti-theft alarm system for vehicles was also raised in the beginning of 1990. These are battery operated small RF transmitters operating with a frequency 433.92MHz, which are mostly used in the integral alarm and central locking system [5].

IV. BUILDING THE SYSTEM In order to meet the project objectives, the building system is developed in four phases. In the initial phase, the required system criteria, such as inputs and housing size, are identified and established. In the second phase, both CC2500 RF transceivers were designed to maintain a full duplex communication between two modules. In the third phase, all hardware components are configured for proper operation. The RS232 communication protocol is used to interface ARMLPC2148 microcontroller UART0 and the CC2500 RF transceiver [6]. Keil software is used to program a microcontroller and a compiled C program is downloaded in the ARMLPC2148 microcontroller (Figure 4).

Figure 4. ARMLPC2148 and CC2500 RF interface The CC2500 RF transceiver is configured for obtaining optimum register settings and to meet the design aspects of the communication channel. CC2500 RF transceiver is interfaced to an ARMLPC2148 microcontroller and this controller is able to:

III. DESIGN OF SYSTEM As shown in Figure 3, a RS232 communication protocol was used to interface Universal Asynchronous and Receiver and

INTERNATIONAL JOURNAL OF COMPUTING SCIENCE, VOL. 1, NO. 1, JANUARY 2012


ISSN (Online): 2164-1374, ISSN (Print): 2164-1366, Published online January, 2012 (http://www.researchpub.org/journal/ijcs/ijcs.html)

10

read and write buffered data to and from CC2500 for lossless communication. program CC2500 in different modes to meet the requirements of the communication channel.

In transmit mode, the packet handler adds all fields to the packet stored in TX, and in the receive mode, it deconstructed the data packet. The packet transfer depends on modes. When TX is activated, the chip will remain in transmit mode until the signal is successfully transmitted, and when RX is activated, the chip will remain in receive mode until the signal is successfully received. In the fourth phase, the project of the wireless security system using RF technology is evaluated by three factors in consideration, such as effective distance, time delay, and noise associated with the system. The distance between two modules can be varied depending on the application selected. CC2500 RF transceiver is specifically used for short distance communications at lower power levels in a frequency range of 2400-2483.5MHz. By practically testing the system, the buzzer is observed in both modules when any of the modules is moved six meters from the fixed location. A minimum time delay is observed due to the interference of the communication channel between modules. The initial processing of the system with getting started and initialization of the registers of CC2500 requires some time. Also the time gap between the transmission and reception of data between the modules is observed. As noise consideration is an important factor when designing a system, the entire setup is tested in different environments. Noise is tested by placing the modules in a closed box and when the modules are in the external environment. There was more noise effect when modules are tested in external environment.

by the read and write operations of SPI (Figure 6). The CC2500 RF transceiver implementation is based on the support of four I/O pins. The most significant bit is done first for all address and data transfer on the SPI interface. The entire function of serial peripheral interface depends on the four pins: SCLK (clock in pin for SPI interface) CSn (chip select pin for SPI interface) SI (date on pin for SPI interface) SO (data output pin for SPI interface)

Figure 6. Read and Write operation of SPI [7] The CSn pin is low during the data and address transfer. Transfer is cancelled if the CSn pin goes high during access. CC2500 RF transceiver maintains different modes to meet the requirements of the communication channel. There are two modes of operation in CC2500 RF transceiver: transmit mode and receive mode. CC2500 RF transceiver is calibrated automatically and controlled by setting three states such as IDLE to RX or TX, RX or TX to IDLE, and when going from either RX or TX to IDLE after every fourth calibration. The two pins RF_N and RF _P act in two modes depending on the incoming signal, such as RF_N pin in receiving mode to LNA (low noise amplifier) and in transmitting mode from PA (power amplifier). RF_P pin acts in receiving mode to LNA and transmitting mode to PA. This signal is amplified by low noise amplifier and is then converted to the selected modulated frequencies. Also at IF receiver the incoming analog signals are digitized by the analog to digital converters, which then are passed through the automatic gain control and channel filtering. Finally, the data is demodulated along with the synchronization. A crystal oscillator generates the clock signal that matches the reference frequency of the synthesizer as well as the analog to digital circuitry. In CC2500 RF transceiver, first it is set in TX mode which is initiated in one module and data is transferred completely. After completing data transfer, it is automatically changed to RX. These modules are set to default settings from the factory and can communicate to one another without any configuration. The CC2500 RF transceiver supports up to 255 bytes of packet length in variable packet length mode. The channel number can be used to different channels from 0-255. Here the channel number is selected as 0 which is a default number in both modules of CC2500 RF transceiver. A RS232 communication protocol is used to interface ARMLPC2148 microcontroller and the CC2500 RF transceiver with a baud rate of 9600. The CC2500 RF transceiver supports amplitude, frequency and phase shift modulation formats. Frequency shift keying (FSK)

V. IMPLEMENTATION OF THE SYSTEM An RF enabled wireless security system is built around CC2500 RF transceiver and an ARMLPC2148 microcontroller. A CC2500 RF transceiver is interfaced to microcontroller using UART0. The entire program for monitoring the presence of the object is written in C language and is loaded into the microcontroller using keil software. The complete system setup is illustrated in Figure 5.

Figure 5. System setup of wireless security system A four-wire SPI interface is used for configuring and data buffer access. A RS232 communication protocol is used to interface ARMLPC2148 microcontroller and the CC2500 RF transceiver. The interface of data through ARMLPC2148 microcontroller and CC2500 RF transceiver can be explained

INTERNATIONAL JOURNAL OF COMPUTING SCIENCE, VOL. 1, NO. 1, JANUARY 2012


ISSN (Online): 2164-1374, ISSN (Print): 2164-1366, Published online January, 2012 (http://www.researchpub.org/journal/ijcs/ijcs.html)

11

modulation is used in both modules with symbol encoding as 0 for negative deviation and 1 for positive deviation. The UART0 in ARMLPC2148 microcontroller has a transmitter and receiver which communicate with CC2500 RF transceiver using RS 232 communication protocol by the use of START and STOP pulses. When the power is turned ON, microcontroller initializes the code in flash memory and resets all the registers. The instructed program in ARMLPC2148 microcontroller executes the required function (transmitting and receiving of an ASCII value to ensure communication between the modules) through RS 232 with a baud rate of 9600 and make communication establishment with CC2500 RF transceiver. The UART0 receives the acknowledgement from CC2500 RF transceiver and updates the test flag, which is used to monitor the continuous communication (the initial serial communication is set by PINSEL0 as 0x00000005 which makes the port pins of TXDO and RXDO UART 0 active) process ensuring security. When there is continuous communication between two modules of CC2500 RF transceiver, the buzzer is in off condition. And when two modules move away six meters, the communication is lost and this results in a buzzer sound (IOSET1 Port Output Set register is used to enable the buzzer and IOCLR1 Port Output clear register is used to disable the buzzer which is connected to po.25th pin of the microcontroller) present in both modules.

VI. CONCLUSION A wireless security system affixed to the object in consideration was proved to be an efficient way to alert the user in case of theft. The wireless communication between two modules is achieved through CC2500. The size of the system can be decreased by decreasing the battery sizes, making it more accessible and compact to install on many portable devices.

REFERENCES
[1] Clarke, S. Laptop Theft - a growing trend. Retrieved September 2010 from: http://www.articlealley.com/article_137840_10.html#YeddaComboPosit ion. Ponemon Institute Airport Insecurity: The Case of Lost Laptops, sponsored by Dell. Retrieved September 2010 from Airport Insecurity:The case of missing and lost laptops: http://www.dell.com/downloads/global/services/dell_lost_laptop_study. pdf. Su, G., Tan, L., A Tradeoff Scheme in Multi-User System with Block Diagonal Geometric Mean Decomposition, The Computing Science and Technology International Journal, Vol. 1, No. 1, pp. 5-14, August, 2011. Li, F., Opportunistic Relaying in Cooperative OFDM Networks with Limit Feedback, The Computing Science and Technology International Journal, Vol. 1, No. 1, pp. 15-19, December, 2011. Finkenzeller, K. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication, Third Edition, John Wiley and Sons. Yao, H., Dynamic Restoration for Survivable Traffic Grooming in WDM Networks, The Computing Science and Technology International Journal, Vol. 1, No. 1, August, 2011. Texas Instruments, Retrieved August 2010, from http://focus.ti.com/docs/prod/folders/print/cc2500.html

[2]

[3]

[4]

[5]

[6]

[7]

Вам также может понравиться