Addis Ababa University Addis Ababa Institute of Technology
Addis Ababa University Addis Ababa Institute of Technology
Addis Ababa University Addis Ababa Institute of Technology
Name ID No
Date 11/01/2017
1
Contents page
Abstract............................................................................................................................... v
CHAPTER ONE.................................................................................................................. 1
1.3 Objective......................................................................................................................... 2
CHAPTER TWO................................................................................................................. 4
2.1 WIFI...................................................................................................................................7
2.2 CDMA……………………………………………………………………………………7
2.3 GSM……………………………………………………………………………………...
i
CHAPTER THREE ..................................................................................................12
4. Methodology ...................................................................................................21
ii
4.2.2 16x4 LCD ...................................................................................................25
5.SIMULATIONANDIMPLIMENTATION ...........................................................27
CHAPTER 6 .............................................................................................................34
REFERENCE .......................................................................................................36
APPENDEX ......................................................................................................37
iii
List of figures …………………………………………………………….page
iv
Abstract
Robbery is a headache for everybody in one or another way. Police news headlines are
about robbery. Fire accidents on the other hand happen and cause a lot of damage. Most
of the time both robbery and fire accidents happen when the home owner is either away
from home or when he/she is asleep. It will be possible to control both fire and robbery
if there is an intelligent home security mechanism which helps the home owner to get
fire/robbery alarm message when he/she is away from home and alerts his/her
neighbors by generating alarm. Unfortunately it is very rare to see such type of home
Now days, remote controlling system is becoming emerging market and hot topic
due to technological advancement achieved in the past decades. This project work is
also on remote alarming system .The system monitors the status of a home and notify
the home owner if something goes wrong at his home while he is away from home by
sending a text message. The system immediately reports to the home owner or any
beyond a certain limit. This system also alerts the neighbors or anyone around by
generating alarm sound. We used the cellular network and different sensors.In addition
we used an application called SMS Backup+ in order to save the texts received into e-
mail.
v
1
i
CHAPTER ONE
Ethiopia is one of the growing countries in the world. With the booming economy,
the influx of people from all over Ethiopia and other countries takes the country’s
population to a new height every year. Robbery and fire accidents are also
increasing from time to time due to minimal and inefficient home security
mechanisms. GSM network coverage, on the other hand, is spreading to the whole
country and its quality is also increasing from time to time. Until now, we mostly
use the mobile mainly for calling, texting and using internet. Besides these basic
services we can use this GSM network and the mobile for real time remote
This project we designed wireless security system to home, office, and cabinet via
SMS using GSM technology. The system notifies the home owner or any concerned
alarm sound
2
1.2 Problem Identification
Robbery and fire accidents are increasing from time to time in our country and
other corners of the world .Most of us are victims of robbery and fire accidents in
come up with a solution for this problem. We tried to figure out the main causes of
the problem. When we do survey very small number of houses, trade centers and
industries have a home security mechanism in Addis Ababa and other big cities like
Bahirdar, Mekelle, Adama etc. The home security goes worse in rural areas and
other cities. From this we generalize that lack of a good home security is the reason
There are Modern complex home security systems include several security features
like fire, intruders, electronic door lock, heat, smoke, temperature, etc. Some security
systems may be a combination of all the security measures. However, such complex
systems may be expensive and may not be affordable by everyone. Looking on the
depth of the problem we designed a simple, cost effective and affordable home
This project presents a model that will provide s a wireless security system to home,
office, and cabinet via SMS using GSM technology. The system can be deployed
anywhere, where there is a GSM network and a neighbor. Incase if the network goes
down the alarm sound can awake the people on the surrounding.
1
1.3 Objective
Most of the time our society is vulnerable to robbery and fire .We are vulnerable in one
or another way. Such accidents usually happen while the home owner is away from
home. There must be a solution in which the home owner is provided with information
instantly when something goes wrong at his home. In order to achieve this, there must
be a wireless home security technology which sends alarm message to the home owner
alarm which will be activated if there is intruder or fire. The Sensors which will be used
for this purpose must be pet friendly and accurate to prevent a false alarm. The wireless
Our objective is to design and implement a wireless home security alarm system which
is not expensive but efficient and usable in every part of our country where there is a
GSM infra-structure.
2
CHAPTER TWO
LITERATURE REVIEW
There are different types of home security mechanisms throughout the world.
Hiring a watchman, building a robust fence, lining an electric fence, looking
doors with strong locks etc. can be a way practiced to keep once home safe.As
technology advances other types of home security alarm mechanisms come
into the market. These modern types of security mechanisms provide
intruder detection, fire accidents alarms, smoke detection, temperature
detection and soon. The development in the wireless technology paves
another way for the introduction of new types of wireless home security and
alarm mechanisms.Eventhough these security systems are good enough they
are not affordable. The advantage of wireless security alarms inspired as to
do a cost effective, efficient and simple system which detects fire and
intruder. Choosing the proper type of wireless technology for our project
was the first step of our work.There are different types of wireless
technologies we have to choose from for our project.The main technologies
were
GSM
WIFI
CDMA
Choosing the good and efficient type of sensors inorder to detect intrusion was
another task we have to accomplish in order to realize our project.Some of the common
types of motion sensors were
3
2.1 Wi-Fi
Wi-Fi is a technology for wireless local area networking with devices based on the
IEEE 802.11 standards. Wi-Fi is a trademark of the Wi-Fi alliance. Devices that can use
Wi-Fi technology include personal computers, smartphones, digital cameras, tablet
computers. Wi-Fi compatible devices can connect to the Internet via a WLAN
network and a wireless access point.
4
2.2 CDMA
In TDMA Band width available for transmission is small which leads to compromise in
quality of transmission. Whereas in CDMA systems entire spectrum is used which
enhances voice quality.
In TDMA/FDMA, cell design requires more frequency planning which is tough job.
Whereas in CDMA frequency planning is minimal.
2.3 GSM
GSM (Global System For Mobile Communication) is widely used digital mobile
telephony system. It works on TDMA (Time Division Multiple Access) approach and
it is used in three digital wireless telephony technologies (TDMA, GSM and
CDMA).Today, more than 690 mobile networks provide GSM services across 213
countries and GSM represents 82.4% of all global mobile connections. According to
GSM World, there are now more than 2 billion GSM mobile phone users worldwide.
5
GSM is mature; having started in the mid-80s.This maturity means a more stable
network with robust features. CDMA is still building its network.
Thermal IR Sensor
Hermetically sealed reed switches
Passive infrared detectors
Ultrasonic detectors
Microwave detectors
Compact Surveillance Radar etc. .
6
CHAPTER THREE
temperature sensor that makes full use of Omron's proprietary MEMS sensing
technology. Unlike typical pyro electric human presence sensors that rely on motion
detection, the D6T thermal sensor is able to detect the presence of stationary humans by
detecting body heat, and can therefore be used to automatically switch off unnecessary
lighting, air conditioning, etc. when people are not present. As the D6T sensor is also
able to monitor the temperature of a room, it can also be used to continually maintain
thereby detecting factory line stoppages, or discover areas of overheating for early
Features
characteristics
7
Field of View Characteristics
Safety Precautions
8
Installation
• The Sensor may not achieve the characteristics given in this datasheet due to the
ambient environment or installation location. Before using the Sensor, please acquire an
actual system.
Operating Environment
• Do not use the Sensor in locations where dust, dirt, oil, and other foreign matter will
• Locations where the Sensor may come into contact with water or oil
• Outdoors
gases).
●Noise Countermeasures
• The Sensor does not contain any protective circuits. Never subject it to an electrical
load that exceeds the absolute maximum ratings for even an instance.
9
The circuits may be damaged. Install protective circuits as required so that the absolute
• Keep as much space as possible between the Sensor and devices that generates high
surges.
inductance component).
• In order to prevent inductive noise, separate the connector of the Sensor from power
lines carrying high voltages or large currents. Using a shielded line is also effective.
The smoke sensor we will use is the MQ-2. This is a sensor that is not only sensitive to
The MQ-2 smoke sensor reports smoke by the voltage level that it outputs. The more
smoke there is, the greater the voltage that it outputs. Conversely, the less smoke that it
The MQ-2 also has a built-in potentiometer to adjust the sensitivity to smoke. By
adjusting the potentiometer, you can change how sensitive it is to smoke, so it's a form
10
of calibrating it to adjust how much voltage it will put out in relation to the smoke it is
exposed to.
The gas sensor needs about 5 volts of power in order to operate. This is done by
The Output pin gives out the voltage reading, which is proportional to the amount of
smoke that the sensor is exposed to. Again, a high voltage output means the sensor is
exposed to a lot of smoke. A low or 0 voltage output means the sensor is exposed to
Arduino MQ-2 Smoke Sensor Circuit Schematic The circuit we will build is shown
below.
11
So to power the smoke sensor, we connect pin 2 of the smoke sensor to the 5V terminal
of the arduino and terminal 3 to the GND terminal of the arduino. This gives the smoke
The output of the sensor goes into analog pin A0 of the arduino. Through this
connection, the arduino can read the analog voltage output from the sensor. The
12
Depending on the value that the arduino reads determines the action that will occur
with the circuit. We will make it in our code that if the sensor outputs a voltage above a
certain threshold, the buzzer will go off, alerting a user that smoke has been detected
Used to defend high-security locations around the world, Terminus Shock Sensors alert
customers to entry attempts while any harmful activity is taking place. This early
intrusion detection gives you the safety and peace of mind of being able to detect
Terminus Shock Sensors reliably safeguard your assets from intruders, even in the most
physical barriers such as doors, fences, windows, walls, roofs, and more.
In addition, Terminus Shock Sensors provide the highest level of intrusion detection for
depositories.
13
3.1.3 Other motion Sensor Considerations
All objects with a temperature above absolute zero emit heat energy in the form of
radiation. Usually this radiation isn't visible to the human eye because it radiates at
infrared wavelengths, but it can be detected by electronic devices designed for such a
purpose.
The term passive in this instance refers to the fact that PIR devices do not generate or
radiate any energy for detection purposes. They work entirely by detecting the energy
given off by other objects.[1] PIR sensors don't detect or measure "heat"; instead they
detect the infrared radiation emitted or reflected from an object.
Operation
An individual PIR sensor detects changes in the amount of infrared radiation impinging
upon it, which varies depending on the temperature and surface characteristics of the
objects in front of the sensor. When an object, such as a human, passes in front of the
background, such as a wall, the temperature at that point in the sensor's field of view
will rise from room temperature to body temperature, and then back again. The sensor
converts the resulting change in the incoming infrared radiation into a change in the
output voltage, and this triggers the detection. Objects of similar temperature but
different surface characteristics may also have a different infrared emission pattern, and
thus moving them with respect to the background may trigger the detector as well.
PIRs come in many configurations for a wide variety of applications. The most common
models have numerous Fresnel lenses or mirror segments, an effective range of about
ten meters (thirty feet), and a field of view less than 180 degrees.
Models with wider fields of view, including 360 degrees, are available—typically
designed to mount on a ceiling. Some larger PIRs are made with single segment mirrors
14
and can sense changes in infrared energy over one hundred feet away from the PIR.
There are also PIRs designed with reversible orientation mirrors which allow either
broad coverage (110° wide) or very narrow "curtain" coverage or with individually
selectable segments to "shape" the coverage.
sensors, used in the automatic trash bin, automatic water taps, and different
(monitoring a specific scope) they're less prone to false positives. Their main
(your phone's camera works) or any IR detection mechanism, after that they can
monitoring the only door to a room), the adversary can detect the source of the
beam and find the receiver, then emit a beam of their own. Some AIR-based
replicate, but of course the adversary can learn that pattern and replay it to the
receiver.
frame rate, each frame (or several frames) are analyzed by an algorithm that can
detect the difference between the last frames. If something is different, a motion
backgrounds with a solid color. That, of course, can be solved with using thermal
video amplification. Researchers at MiT were able to detect a person's heart rate
15
Piezoelectric: I personally haven't seen or used those. They basically use the
materials). They can be mounted on the floor in order to detect pressure and
Ultrasonic: They work by emitting an ultrasonic "beam". They work the same
visible or infrared light beams across an area, where these beams may be
obstructed. To improve the detection surface area, the beams are often employed
and receivers are staggered to create a fence-like barrier. Systems are available
for both internal and external applications. To prevent a clandestine attack using
a secondary light source being used to hold the detector in a 'sealed' condition
whilst an intruder passes through, most systems use and detect a modulated
light source.
16
3.2 GSM (Global System for Mobile Communication)
GSM (Global System for Mobile Communication) is widely used digital mobile
telephony system. It works on TDMA (Time Division Multiple Access) approach and
CDMA).Today, more than 690 mobile networks provide GSM services across 213
countries and GSM represents 82.4% of all global mobile connections. According to
GSM World, there are now more than 2 billion GSM mobile phone users worldwide.
GSM, which stands for Global System for Mobile communications, reigns
(important) as the world’s most widely used cell phone technology. Cell phones use a
cell phone service carrier’s GSM network by searching for cell phone towers in the
nearby area. GSM is a globally accepted standard for digital cellular communication.
pan-European mobile cellular radio system operating at 900 MHz It is estimated that
A GSM network consists of several functional entities whose functions and interfaces
are defined. The GSM network can be divided into following broad parts
17
Figure GSM Archtecture
Transmission Rate
The total symbol rate for GSM at 1 bit per symbol in GMSK produces 270.833
K symbols/second. The gross transmission rate of the time slot is 22.8 Kbps. GSM is
Frequency Band
The uplink frequency range specified for GSM is 933 - 960 MHz (basic 900 MHz band
only). The downlink frequency band 890 - 915 MHz (basic 900 MHz band only).
Channel Spacing
This indicates separation between adjacent carrier frequencies. In GSM, this is 200 kHz.
18
Why we choose SMS Service?
most of the service providers are charging their customer's SMS services based on
number of text messages sent from their mobile phone. There are other prime SMS
services available where service providers are charging more than normal SMS charge.
And also we can send the text even if the network is poor to make a call
Europe. CDMA will work in Asia, but not France, Germany, the U.K. and other
GSM is mature; having started in the mid-80s.This maturity means a more stable
19
CHAPTER FOUR
4. Methodology
The Thermal IR Sensor detects both motion and raise in temperature. When the
Thermal infrared Sensor finds that some people intrudes into the house or when the
temperature is too high it will send a signal to the Microcontroller. The Smoke Sensor
detects smoke in the house and notifies the microcontroller if there is a smoke in the
house. The Shock Sensor is used to detect a shock or a vibration on the door and
window .It sends alarm signal the microcontroller via data collecting node of the
microcontroller if there is a shock. Once the microcontroller receives alarm signal, it will
send short message alarm to the user or the home owner and any concerned body
through the GSM module and GSM network immediately. The system can be activated
and deactivate if needed by using the keypad interface with the system. In order to
differentiate the home owner with the intruder there will be a password based control
mechanism. The home owner can activate or deactivate the system by inserting a
password.
The motion and shock sensing unit will deactivated by inserting a correct password. If
20
Flow Chart
Start
No
Is value Yes
of
TIR/Shock
>
Threshold
Correct
Incorrect Check
keypad
value
No
Yes No Yes Is value of
Attempt
>3 TIR/Smoke
>
Threshold
End
means that it is able to display 16 characters per line on two lines. This LC D has two
resisters.
Liquid Crystal Display (LCD) is an optical device consisting crystals arranged on a thin
surface.
LCD has certain features such as; its size is much less than the regular screen, light and
easy to transport, does not need high voltage of electricity like in the regular
screens, Comfortable for the eyes compared to regular screen, their shape is much better
than normal screen and its quality is higher than normal screens in terms of colors.
22
Figure GSM modem
Is use in this implementation as it allows sending SMS to the owner of the home via
internet? This modem is a type of modem that accepts SIM card, and operates through a
subscription to a mobile operator. It works like a mobile phone for sending and
receiving SMS or MMS through radio waves. It is slim and compact, the main
advantage of choosing this particular modem is, it has low power consumption. This
modem has a GPRS feature that allows transmitting the data via the internet in different
The specialized feature of this modem is that it also accepts a SIM card, and just like a
mobile phone, it operates over a subscription to a mobile operator. So, it just looks like
a mobile phone. It provides various applications like SMS for sending and receiving
messages over the modem. Here the charges are to be taken for sending and receiving
messages as done on a mobile phone. All these tasks are performed on a GSM modem
and that modem must support an “extended AT command set” for sending/receiving
SMS messages.
23
The Arduino Uno is a microcontroller board based on the ATmega328 (datasheet). It
has 14 digital input/output pins (of which 6 can be used as PWM outputs), 6 analog
inputs, a 16 MHz crystal oscillator, a USB connection, a power jack, an ICSP header,
and a reset button. It contains everything needed to support the microcontroller; simply
battery to get started. The Uno differs from all preceding boards in that it does not
use the FTDI USB-to-serial driver chip. Instead, it features the Atmega8U2
easy-to-use Hardware and software. It's intended for artists, designers, hobbyists,
sense the environment by receiving input from a variety of sensors and can affects its
the board is programmed using the Arduino programming language and the Arduino
CHAPTER FIVE
25
5. SIMULATION AND IMPLIMENTATION
For simulation we have used Protues.The code for the Arduino is written on Arduino IDE. We
preferred Proteus due to its simplicity and the presence of vast majority of components.
Arduino
Arduino is the main processing component of the system. It is the heart of our project.
The Arduino reads values of the sensors and interpret it to action following the code
COMPI Port
The COMPIM model is a Physical Interface Model of a serial port. Incoming serial data
is buffered and presented to the circuit as a digital signal, whilst serial digital data
generated by a CPU or UART model appears at the PC's physical COM port. The
COMPIM model also provides for baud rate translation, and for optional hardware or
software handshaking on both the physical and virtual sides of the device.
applications that use serial ports. It is able to create various virtual devices to
transmit/receive data. One Serial port can be opened into many different applications
and use their different functionality. With VSPE it is possible to share physical serial
port data for several applications, create virtual serial port device pairs and so on.In our
project we used VSPE to map virtual port of COMPIM with the physical port of our PC
By using a mobile which has a serial port we are able to send message from proteus
simulation.
26
Protues Simulation Description
CHAPTER 6
27
Conclusion Recommendation and Future
Work
6.1 Conclusion
In order to have a stabilized society the properties of the members of the society should
be secured. Every home should be safe no matter where the home owner is.This system
is designed to help people to know the status of their home and other properties
from anywhere. This project has many benefits, some of the advantages include;
In general, the implementation of the project provides a valuable security asset for a
society.
28
This project aims to use GSM network cooperatively with some other device such as
sensors, sound systems and a microcontroller to create automatic remote alarming
system. Using the same basic principles and technology it can be extended into many
applications such as; home security, car security, property security and etc. The
system can provide efficient remote security while the owner is away from his
properties.
Next semester the project will be implemented in hardware level. Since we have done
most part of the job the implementation will not be difficult. In addition to that we don’t
stop trying to add many features to the project. Therefore, next part of the project will
be implementation to the hardware by adding additional features as much as possible.
We have already started gathering the required hardware and we will implement the
project as soon as we can if we get all the materials we need.
References
29
[1]Bill Waters. "How Motion Sensors Work with a Security System". The Home
Security Adviser.com.
[3] GSM SECURITY SYSTEM MAY, 2012, MOHD AZWAN BIN RAMLAN, Faculty of
Electrical & Electronics Engineering University Malaysia Pahang
[5] ZTE CORPORATION, 2011. ZXWN MSCS MSC Server Product Description.
Version: V3.10.20
Appendix
30
The code written on the Arduino IDE is given bellow
#include<LiquidCrystal.h>
int row [] = {A0, A1, A2, A3}; // Defining row pins of keypad
connected to Arduino pins
int smoke_level,vib_level,TempValue;
void setup()
pinMode(vibrationPin, INPUT);
pinMode(TempPin, INPUT);
31
lcd.begin(16, 2);
pinMode(row[i], OUTPUT);
pinMode(col[i], INPUT);
digitalWrite(col[i], HIGH);
while(!Serial)
void loop()
output();
SetPassword();
32
// Password Setting Loop Ends
key_id = 0;
check[count] = temp_press;
count++;
if (temp_press == '*')
checkPassword();
if (flag == 0 )
lcd.setCursor(0, 0);
lcd.print("UNLOCKED");
errorcounter=0;
else
{
33
lcd.setCursor(0, 0);
errorcounter++;
if(errorcounter==3)
lcd.setCursor(0, 0);
intrusion();
digitalWrite(buzzerPin, HIGH);
checkPassword();
if (flag == 0)
lcd.setCursor(0, 0);
34
key_id = 0;
entry = 0;
} else {
lcd.setCursor(0, 0);
lcd.print("WRONG PASSWORD");
lcd.setCursor(0, 0);
lcd.print("LOCKED");
35
/* Main Program Ends */
void output()
TempValue=0.48828125*TempValue;
vib_level=digitalRead(vibrationPin);
if (TempValue>45){
digitalWrite(buzzerPin, HIGH);
lcd.setCursor(1, 1);
lcd.clear();
lcd.print("FIRE!UUUU!!!");
delay(7000);
digitalWrite(buzzerPin, LOW);
lcd.clear();
delay(100000);
36
}
else if(smoke_level==HIGH){
digitalWrite(buzzerPin, HIGH);
lcd.setCursor(1, 1);
lcd.print("Smoke!UUUU!!!");
delay(7000);
digitalWrite(buzzerPin, LOW);
lcd.clear();
delay(1000000);
else if(vib_level==HIGH)
digitalWrite(buzzerPin, HIGH);
lcd.clear();
lcd.setCursor(1, 1);
lcd.print("INTRUDER!UUUU!!!");
37
intrusion();
digitalWrite(buzzerPin, HIGH);
intrusion();
intrusion();
intrusion();
else{
38
lcd.setCursor(1, 1);
digitalWrite(buzzerPin, LOW);
Serial.begin(9600);
void intrusion()
digitalWrite(buzzerPin, HIGH);
lcd.setCursor(1, 1);
lcd.print("intruder!UUUU");
delay(2000);
digitalWrite(buzzerPin, LOW);
lcd.clear();
delay(1000000);
Serial.println("AT\r");
delay(100);
Serial.println("AT+CMGF=1");
delay(100);
39
Serial.println("AT+CMGS=\"+251931670319\"");
delay(100);
Serial.println(message);
delay(500);
Serial.write(0x1A);
Serial.println("");
delay(100);
Serial.println("AT\r");
delay(100);
Serial.println("AT+CMGF=1");
delay(100);
Serial.println("AT+CMGS=\"+251913990659\"");
delay(100);
Serial.println(message2);
delay(500);
Serial.write(0x1A);
Serial.println("");
delay(100);
40
}
keyscan();
if(key_id==1)
lcd.setCursor(0,0);
lcd.print("INVALID KEYS");
entry=0;
else
pass[entry]=temp_press;
key_id=0;
if(entry==5)
lcd.clear();
41
lcd.setCursor(0,0);
digitalWrite(row[0],HIGH);
digitalWrite(row[1],HIGH);
digitalWrite(row[2],HIGH);
digitalWrite(row[3],HIGH);
digitalWrite(row[i],LOW);
col_scan=digitalRead(col[j]);
if(col_scan==LOW)
key_id=1;
entry++;
42
temp_press=keypress(i,j);
lcd.setCursor(lcd_count++,1);
lcd.print(temp_press);
if(temp_press=='*'||temp_press=='0'||temp_press=='#')
lcd_count=0;
lcd.clear();
delay(300);
break;
}}
if(i==0&&j==0)
return('1');
if(i==0&&j==1)
return('2');
43
}
if(i==0&&j==2)
return('2');
if(i==0&&j==3)
return('3');
if(i==1&&j==0)
return('4');
if(i==1&&j==1)
return('5');
if(i==1&&j==2)
return('5');
44
if(i==1&&j==3)
return('6');
if(i==2&&j==0)
return('7');
if(i==2&&j==1)
return('8');
if(i==2&&j==2)
return('8');
if(i==2&&j==3)
return('9');
if(i==3&&j==0)
45
{
return('*');
if(i==3&&j==1)
return('0');
if(i==3&&j==2)
return('0');
if(i==3&&j==3)
return('#');
void checkPassword() // Subroutine to Check User Input Data with SET Password
flag=0;
for(i=1;i<=5&&flag==0;i++)
46
{
if(check[i]==pass[i])
flag=0;
else
flag=1;
47