0% found this document useful (0 votes)
149 views

Intruder Alarm System

An intruder alarm system is a security device designed to detect unauthorized entry into a property. It uses sensors like motion detectors, door/window

Uploaded by

0xzaccuit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
149 views

Intruder Alarm System

An intruder alarm system is a security device designed to detect unauthorized entry into a property. It uses sensors like motion detectors, door/window

Uploaded by

0xzaccuit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 68

DESIGN AND IMPLEMENTATION OF AN INTRUDER DETECTION

SYSTEM WITH LIVE STREAMING OVER SECURED WIFI

OLALEYE FAROUQ OLUWAPELUMI


U/19/CE/0233

BEING A PROPOSAL SUBMITTED TO THE


THE DEPARTMENT OF COMPUTER ENGINEERING IN PARTIAL
FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF
BACHELOR OF ENGINEERING
IN
RAHMON ADEDOYIN UNIVERSITY
OSUN, NIGERIA
[FEB 2024]
DECLARATION
This is to declare that the research project titled “DESIGN AND
IMPLEMENTATION OF AN INTRUDER DETECTION SYSTEM WITH
LIVE STREAMING OVER SECURED WIFI”. was carried out by OLALEYE
FAROUQ OLUWAPELUMI, U/19/CE/0233, is solely the results of my work
except where acknowledge as being from other person(s) or resources.

Signature: Date:
______________________ _________________________
CERTIFICATION
This is to certify that this project titled “DESIGN AND IMPLEMENTATION
OF AN INTRUDER DETECTION SYSTEM WITH LIVE STREAMING
OVER SECURED WIFI” was carried out by OLALEYE FAROUQ
OLUWAPELUMI, U/19/CE/0233, DEPARTMENT OF COMPUTER
ENGINEERING.

Name/Signature: Date:
_____________________________
__________________________
(STUDENT)
Name/Signature: Date:
_____________________________
__________________________
(PROJECT SUPERVISOR)
Name/Signature: Date:
_____________________________
___________________________
(HEAD OF DEPARTMENT)
Abstract.
A security alarm or detection system is crucial for protecting individuals or assets through a
network of interworking devices and components, often integrated with the Internet of Things
(IoT). This project involves the design and implementation of an intelligent intruder detection
and live streaming system over a secured Wi-Fi communication system. The objective of this
project is project is to design and develop a home security system that notify the owner of the
property of the presence of intruder, this notification is done via short messaging system and
finally send a live feed link for streaming the live occurrence in such location. This same project
should be able to detect intruder coming from any direction and automatically send an SMS to
the owner of such parameter. This system will be able to cover a radial distance of 6m and
effective detect intruder with such location. The system will be battery power and this will make
it fit for use in remote location where there may no availability of electricity. Generally, the
project will be design and implemented from the standpoint of cost effectiveness and compact
design in order to make the entire system discreet. The project will make use of Arduino uno and
the central data and variable unit which control the whole activities while taking input from
passive infrared sensor position at ninety degrees apart. Once an intruder is detected the system
activate sim800l module to send a link for streaming and to inform the premises owner of such
bridge.

Keywords: Security system, Arduino Uno, PIR sensor, ESP32-CAM, GSM modem, AT
commands, IoT, surveillance, SMS alert.
DEDICATION
This research project is dedicated to Allah, the uncreated, the creator of the creatures, for his
love, grace, faithfulness, and mercies towards me.
Also to my wonderful parents Mr. and Mrs. OLALEYE and my family for their prayers, moral,
physiological, psychological, financial, spiritual and emotional support ensuring I acquire the
best education affordable in life.
ACKNOWLEDGEMENT
All praises and adoration to Almighty Allah who made everything in-line and
disseminated his mercy and blessings upon his creatures in heaven and earth. I
give thanks to him for showering his mercy on my life till now for the
completion of my research work successfully.
My ample thanks goes to my competent, encouraging and hardworking
supervisor _____ for _____ guidance, kindness and humbleness towards the
succession of this research work. I pray that God, in His infinite mercy would
bless her endeavors.
My immeasurable gratitude goes to my wonderful, loving, amiable and caring
parents MR & MRS OLALEYE for their financial, psychological, moral,
spiritual and kind heartedness towards my academic success. I pray that Allah
will always continue to provide for their needs and keep them safe from all evils.
My heartfelt gratitude goes to my lovely, wonderful and affectionate family,
friends and everyone who in one way or the other assist me through the
completion of this project for their timely supports both financially and
spiritually. May Allah be with you all.
Contents
CHAPTER ONE..........................................................................................................................10
1.0 INTRODUCTION...............................................................................................................10
1.1 TYPES OF SECURITY ALARMS AND THEIR APPLICATIONS.....................................13
1.2 STATEMENT OF PROBLEM............................................................................................15
1.3 AIMS AND OBJECTIVES.................................................................................................15
1.3.0 Scope of Study..........................................................................................................15
1.3.1 Limitation of the Study.............................................................................................16
1.3.2 Significance of the Study.........................................................................................16
1.3.3 Operational definition of terms....................................................................................17
CHAPTER 2................................................................................................................................19
LITERATURE REVIEW.............................................................................................................19
HOME SECURITY SYSTEM USING GSM MODULE AND MICROCONTROLLER..............19
SECURITY SYSTEMBASED-ON MICROCONTROLLERINTEGRATED INTO THE
IMMOBILIZER SYSTEM.......................................................................................................19
SECURITY SYSTEM USING ARDUINO MICROCONTROLLER.........................................20
MICROCONTROLLER BASED HOME SECURITY SYSTEM WITH REMOTE
MONITORING........................................................................................................................21
ARDUINO BASED WIRELESS INTRUSION DETECTION USING IR SENSOR AND GSM. 21
HOME SECURITY ALARM SYSTEM USING ARDUINO.......................................................22
AN IOT BASED HOUSE INTRUDER DETECTION AND ALERT SYSTEM USING
HISTOGRAM OF ORIENTED GRADIENTS...........................................................................22
CHAPTER 2................................................................................................................................33
METHOD, MATERIALS AND COMPONENTS.........................................................................33
2.0 METHODOLOGY..............................................................................................................33
2.0.0 Building a Secure Alarm Intrusion System with Face Recognition and SMS
Notification..........................................................................................................................33
2.0.1 Optional Enhancements:...............................................................................................34
2.1 Power Management and System Integration:...............................................................34
2.2 Security Considerations:......................................................................................................35
2.2 COMPONENT SELECTION..............................................................................................35
2.2.1 Arduino Uno...............................................................................................................35
2.2.2 ESP 32 CAM...............................................................................................................36
2.2.3 PIR Sensor.................................................................................................................37
2.2.4 Face Recognition Module..............................................................................................38
2.2.5 GSM Module (SIM900).....................................................................................................38
2.2.6 Additional Components.................................................................................................39
CHAPTER 3................................................................................................................................43
DESIGN AND IMPLEMENTATION.......................................................................................43
3.0 System Block Diagram.....................................................................................................43
3.1 Components and Connections..........................................................................................44
3.2 Functionality Workflow...................................................................................................46
3.3 Applications..................................................................................................................48
3.4 Hardware Setup..................................................................................................................49
3.5 Software Development:........................................................................................................50
3.5.1 Development Environment:...........................................................................................50
3.5.2 Libraries:......................................................................................................................51
3.5.3 Code Structure:............................................................................................................51
CHAPTER 4................................................................................................................................57
ANALYSES, IMPLICATIONS AND LIMITATIONS..............................................................57
4.0 Analyses and Implications of the Alarm Intrusion System with Face Recognition and SMS
Notification...............................................................................................................................57
4.1 Analyses of Core Functionalities..........................................................................................57
4.1.0 Motion Detection:.........................................................................................................57
4.1.1 Face Recognition:..........................................................................................................58
4.1.2 Database management:.................................................................................................58
4.1.3 SMS Notification:..........................................................................................................58
4.2 Overall System Performance............................................................................................59
Analyses and Implications of the Alarm Intrusion System with Face Recognition and SMS Notification
(continued).................................................................................................................................59
4.3 IMPLICATIONS.................................................................................................................60
Enhanced Home Security:.....................................................................................................61
Scalability:............................................................................................................................61
Privacy Considerations:........................................................................................................61
Cost-Effectiveness:................................................................................................................61
4.3.0 Future Advancements.......................................................................................................60
CHAPTER 5................................................................................................................................62
CONCLUSION AND RECOMMENDATIONS........................................................................62
CONCLUSION.........................................................................................................................62
STRENGTHS AND LIMITATIONS.........................................................................................62
RECOMMENDATIONS..........................................................................................................63
FUTURE CONSIDERATIONS.................................................................................................64
REFERENCES.............................................................................................................................65
General Security Systems and Alarm Intrusion.........................................................................65
PIR Sensors and Motion Detection............................................................................................65
Face Recognition Technology....................................................................................................65
SMS Notification and Communication Protocols.......................................................................66
Security Considerations and Privacy.........................................................................................66
Additional Resources................................................................................................................67
Smart Home Integration and Security Systems.........................................................................67
Machine Learning and Anomaly Detection...............................................................................67
CHAPTER ONE

1.0 INTRODUCTION

The evolution of security detection systems traces back to early human history, where primitive
forms of alerting mechanisms like shouts and sounds were employed to warn communities of
potential threats such as abductions or burglaries. These methods, while crucial, were unreliable
and lacked a systematic approach. Over time, advancements led to more structured approaches,
such as the introduction of hand-clapping signals in certain African societies, notably in Nigeria.

The first significant leap towards electronic security detection systems came with William F.
Channing's development of an automatic fire alarm detector. This innovation marked a pivotal
moment, paving the way for further advancements in the field. Following Channing, electrical
electronics engineer Moses G. Farmer made critical contributions to the technology, refining the
system's design and functionality. It was in Boston, USA, where the initial implementation of
these systems took place, using automatic indicator boxes to pinpoint fire outbreaks.
Fig 1.0 Alarm Intruder System

As technological progress continued, the focus shifted towards creating more sophisticated
intruder and fire security alarm systems. These developments diversified rapidly, incorporating
remote signaling capabilities, notably in the early 1970s. Such systems offered rapid responses to
alarms, revolutionizing security protocols across industries and organizations.

Today, the landscape of electronic security alarm systems is vast and intricate, catering to diverse
security needs with varying levels of complexity. This evolution has become increasingly vital in
light of rising crime rates globally, underscoring the critical importance of safeguarding
buildings and properties using advanced security technologies.

Fig 1.2 Security Alert Setup System


In essence, from the rudimentary warning methods of ancient societies to the cutting-edge
electronic systems of today, the journey of security detection systems exemplifies a continuous
quest for innovation in protecting lives and property against threats.

Security alarm devices vary significantly in price, contingent upon their technological
sophistication and the specific security needs they address. These devices are integral to
contemporary electronic security detection systems, encompassing a wide array of modern
applications. Examples include threat alarms, burglar alarms, industrial alarms, anti-theft vehicle
alarms, and speed limit alarms, each designed to cater to distinct security requirements.

The functionality of these intruder security alarms typically revolves around a closed-loop
automated circuit. When triggered, either an audible alarm sounds or notifications are sent to
alert the property owner of potential threats. Central to these systems is a control box that
monitors various sensor inputs and perimeter protections, promptly issuing alerts or alarms upon
detecting unauthorized activity.

Fig 1.3 Intruder Alarm Block Diagram


One prevalent technology used in these security systems is magnetic contact sensors,
strategically positioned at entry points of industries, organizations, and buildings. These sensors
activate an alarm when they detect a signal above a preset threshold, effectively safeguarding
against unauthorized access.

For motion detection, ultrasonic sensors are commonly employed. Positioned strategically, such
sensors can detect movement and trigger alarms, effectively alerting against potential criminal
activities near points of vulnerability such as doors or windows.

In advanced security setups, ultrasonic sensors play a crucial role in monitoring sensitive
environments, ensuring prompt detection of intruders. These systems are essential not only in
commercial and residential settings but also in critical institutions like hospitals, schools,
universities, and even prisons, where they monitor movements and ensure safety.

Today, security detection systems often integrate with closed-circuit television (CCTV) to
provide comprehensive surveillance. The design and implementation of these systems begin with
a thorough assessment of the property's security needs, existing infrastructure, technological
requirements, and budget considerations. Installation is meticulously planned to optimize
effectiveness and coverage.

Looking globally, countries like the United States face significant challenges with auto theft and
break-ins, underscoring the critical need for reliable security solutions. Traditional non-
automated systems, such as lock and key mechanisms, are increasingly seen as vulnerable and
insufficient. Even human presence as security guards may not provide foolproof protection
against sophisticated threats.

Ensuring the security of homes and organizations requires robust, reliable security detection
systems. Homeowners and business owners alike must feel confident that their properties are
well-protected, allowing them to leave without worry. This peace of mind is achievable only
through the deployment of advanced security technologies tailored to meet specific security
demands.
1.1 TYPES OF SECURITY ALARMS AND THEIR APPLICATIONS

Security alarm devices encompass a broad spectrum of technologies and applications tailored to
address diverse security needs. They range from basic residential burglar alarms to complex
industrial and institutional security systems. Modern advancements have enabled these devices to
integrate seamlessly with smart home technologies, enhancing their functionality and user
accessibility.

In residential settings, security alarms often include motion sensors, door and window sensors,
and glass break detectors. These components work together to create a layered defense system
that detects unauthorized entry attempts and triggers alarms to alert occupants or monitoring
services. Wireless connectivity has revolutionized these systems, allowing for easy installation
and remote monitoring via smartphones or computers.

For commercial and industrial applications, security alarms are more sophisticated, often
incorporating advanced sensors like infrared detectors, which can detect heat signatures to
identify intruders even in low-light conditions. Perimeter protection systems may include CCTV
cameras with motion detection capabilities and automatic alerts, providing real-time surveillance
and proactive security measures.

Anti-theft vehicle alarms utilize technologies such as GPS tracking and remote disabling
mechanisms to deter theft and aid in recovery efforts. These systems play a crucial role in
automotive security, particularly in regions with high rates of vehicle theft.

In institutional environments like hospitals and schools, security detection systems are essential
for safeguarding vulnerable populations and valuable assets. Integration with access control
systems ensures restricted areas remain secure, while panic alarms provide immediate assistance
in emergencies.
Technological advancements such as artificial intelligence (AI) and machine learning are
increasingly being applied to security systems, enabling predictive analytics and behavioral
pattern recognition. These capabilities enhance the accuracy of threat detection and reduce false
alarms, improving overall system reliability and efficiency.

From a societal perspective, the deployment of effective security detection systems contributes to
a safer community environment by deterring criminal activity and enhancing law enforcement
response capabilities. Public spaces benefit from enhanced surveillance, reducing the incidence
of vandalism, theft, and violent crime.

Despite these advancements, ongoing research and development are crucial to stay ahead of
evolving threats and vulnerabilities. Cybersecurity measures are also increasingly important as
interconnected devices become more prevalent, ensuring that security systems themselves
remain resilient against hacking and tampering attempts.

The evolution of security alarm technologies continues to shape how individuals, businesses, and
institutions protect their properties and assets. By leveraging innovative solutions and integrating
multiple layers of defense, comprehensive security detection systems provide peace of mind and
enhance safety in an increasingly interconnected world.

1.2 STATEMENT OF PROBLEM


Crime rate in the world is of a great increase in the recent years. In the world today, it’s a fact
that crimes against property and human lives are not only increasing, they’re moving more and
more frequently into the suburbs and areas away from the city center to even local areas and
homes. Installing a reliable home security system may be the best decision any person would
ever have made especially in a country like Nigeria where the rate of insecurity of lives and
properties are highly increasing.
1.3 AIMS AND OBJECTIVES
The main aim of this project is to design and develop a home security system that notify the
owner of the property of the presence of intruder, this is done via short messaging system and
finally send a live feed link for streaming the live occurrence in such location
The specific objectives are:
 To develop and construct an embedded system for automatic detection of intruder into
any given premises
 To develop a notification system for such unwanted intruding into such premises
 To live stream in real time at the instance of intruding over Wi-Fi.
 To test the performance of the developed system over an average household
 To understand how to implement such security system in our local premises

1.3.0 Scope of Study


The existing home security system and its techniques as available today becomes ineffective
because of the following;
i) Increase in failure rate of the existing home security system due improper
energy management, this is the limitation of CCTV camera,
ii) Lack of theft live streaming and image capturing,
iii) The system is not smart enough to detect intrusion into a given premises.

The burglary of house and business premises is now a booming business. Fortunately, most
thieves like easy pickings and the casual thief will tend to avoid home that are security locked
with no valuable evaluation, for the professional thief a more active form of deterrent is
required and this simple GSM notification to the house owner and further security operatives
can be notify appropriately. The scope of this project is to develop and implement a home
automation system for detecting intruder with SMS notification and live stream in case of
intrusion of secure Wi-Fi network.
1.3.1 Limitation of the Study
This project will focus on providing intruder detection and alarm notification system with live
streaming over secured Wi-Fi network for individuals homes and industries.
However, there would be possibility for expansion to cover other areas like laboratories,
offices, bank vault and restricted areas like high tension voltage areas as well as radioactive
areas. This project cannot be used for public places due to limitation in the detection system to
be use.

1.3.2 Significance of the Study


This project will be beneficial to the user in a situation where they will continuously monitor
the surround premises with the aid of paid employee inform security operatives. Besides that,
the user will know the state of his investment he can also verify the effectiveness of the
security operatives. The system is a complete one stop solution giving a live stream in real
time what is happen within the premises.

1.3.3 Operational definition of terms


Intruder Detection System (IDS): A security mechanism that works mainly in the network
layer of an IoT system, designed to analyze packets of data and generate responses in real-
time, analyze data packets in different layers of the IoT network with different protocol stacks,
and adapt to different technologies in the IoT environment.
Live Streaming: The real-time transmission of video or audio data over the internet, in this
case, over a secured WiFi network.
Secured WiFi: A WiFi network that uses encryption and authentication protocols to ensure
the confidentiality, integrity, and authenticity of data transmitted over the network.
Intrusion Detection and Prevention System (IDPS): A system that monitors networks for
possible incidents and threats, alerts administrators, and prevents potential attacks.
False Positives: Alerts or notifications generated by the IDPS that indicate a potential threat or
incident, but are actually false, and do not represent an actual threat.
False Negatives: Alerts or notifications generated by the IDPS that fail to detect a real threat or
incident.
Detection Accuracy: The ability of the IDPS to accurately detect and identify potential threats
or incidents.
Processing Time: The time it takes for the IDPS to process and analyze data packets.
Performance Overhead: The impact of the IDPS on the performance of the network, including
the processing power, memory usage, and network bandwidth.
Threshold Values: The set of parameters or rules used to determine when an alert or
notification should be generated by the IDPS.
Security Operations Center (SOC): A centralized facility or team responsible for monitoring
and responding to security incidents and threats.
Managed Detection and Response: A service that provides 24/7 monitoring and response to
security incidents and threats.
Digital Forensics: The process of investigating and analyzing cyber incidents and attacks to
identify the cause, scope, and impact.
Intrusion Detection and Prevention Techniques: Methods used by the IDPS to detect and
prevent potential threats, including signature-based detection, anomaly-based detection, and
behavior-based detection.
Protocol Stacks: The set of protocols used to transmit data over the network, including
TCP/IP, HTTP, and SSL/TLS.
Low Processing Capability: The limited processing power and resources available in IoT
devices, which can impact the performance and effectiveness of the IDPS.
Fast Response: The ability of the IDPS to quickly respond to potential threats or incidents.
High-Volume Data Processing: The ability of the IDPS to process large amounts of data in
real-time.
IDS Performance Factors: The factors that affect the performance of the IDPS, including
detection accuracy, false positives, processing time, performance overhead, and threshold
values.
CHAPTER 2

LITERATURE REVIEW

HOME SECURITY SYSTEM USING GSM MODULE AND


MICROCONTROLLER

In 2015, HOME SECURITY SYSTEM USING GSM MODULE AND


MICROCONTROLLER was implemented by Abhishek S. Parab and Prof. Amol Joglekar
department of Computer Science. Mithibai College Mumbai ,Maharashtra, India
The system was invented to keep homes safe from intruders. In this work, we present the design
and implementation of a GSM based wireless home security system. which takes very less
power. The system is a wireless home network which contains a GSM modem and magnet with
relay which are door security nodes. The system can respond rapidly as intruders detect and the
GSM module will alert the homeowner. This security system for alerting a house owner
wherever he will. In this system a relay and magnet installed at entry point to a precedence
produces a signal through a public telecom network and sends a message or redirect a call that
tells about your home update or predefined message which is embedded in the microcontroller.
Suspected activities are conveyed to remote users through SMS or Call using GSM technology.

SECURITY SYSTEMBASED-ON MICROCONTROLLERINTEGRATED


INTO THE IMMOBILIZER SYSTEM

In 2019, We have a publication on designing a Security System Based-on Microcontroller


Integrated into the Immobilizer System by Arief Goeritno and Muhammad Yusuf Afandi
The study indicated that there are two objectives of this paper, namely (a) programming and
verification testing and (b) board for minimum system, integrated wiring, and validation
testing.Programming for microcontroller consists of the algorithm and writing of the syntax.
Verification tests are three conditions in accordance with the existence of the system in detecting
(i) but not detected by the PIR sensor because not the original end user, (ii) but the original end
user has not been present, and (iii) the original end user has been detected. The minimum system
original of creation provides five main ports with integrated wiring and a connection to all
electronic components on the board, so that it is obtained a minimum acquisition for actuator
operation. Validation tests are (i) successful in detection, but the original end user not detected,
so that this is according to the function of the PIR sensor; (ii) in accordance with the existence of
the system in detecting, but the original end user has not been present, so that this is according to
the function of the PIR sensor and the fingerprint sensor is ready to detect; and c) in accordance
with the existence of the system in detecting and the original end user has been detected, so that
this is according to the function of the PIR and fingerprint sensor have detected. Conclusion as a
whole, a minimum system can be used as a preliminary safety that is integrated into the
immobilizer system in a vehicle.

SECURITY SYSTEM USING ARDUINO MICROCONTROLLER


In 2018, Suman Thakur, Mr. Manish Verma and Mr. Lumesh Sahu from the department
of Electronics and Communication Kalinga University, Raipur, C.G designed a Security
System using Arduino Microcontroller. Security has been becoming an important issue
everywhere. Every person wants his home, industry; bank etc to be secured. Home security is
becoming necessary. Nowadays the possibilities of intrusion are increasing day by day.
Hardware of this system has been designed using microcontroller AT Mega 328, PIR (Passive
Infra Red) motion sensor as the primary sensor for motion detection, camera for capturing
images, GSM module for sending and receiving SMS and buzzer for alarm. For software this
system uses Arduino IDE for Arduino and Putty for testing connection programming in the GSM
module. This Home Security System can monitor the home area that is surrounded by the PIR
sensor and send SMS, save images captured by the camera, and make people panic by turning on
the buzzer when trespassing the surrounding area that is detected by the PIR sensor. The
Modular Home Security System has been tested and succeed detect human movement.

MICROCONTROLLER BASED HOME SECURITY SYSTEM WITH


REMOTE MONITORING

In 2012, Nikhil Agarwal and G.Subramanya Nayak Department of EC EngineeringMIT,


Manipal constructed a microcontroller based automated Home Security System. The door lock
is password protected with an LED based resistive screen input panel which operates by
detecting differences in light intensity captured by the photodiode which is emitted by
surrounding red LEDs and reflected by the finger. The display is a 16X2 LCD panel. IR Laser
sensors are used to detect any obstacle while monitoring the windows and doors at night or when
away. Fire alarm system uses temperature sensor LM35 which senses sudden considerable
increase in temperature and raises alarm.
ARDUINO BASED WIRELESS INTRUSION DETECTION USING IR
SENSOR AND GSM

In 2013, Prakash Kumar a Final Year, M.Tech (CSE), NIET, MTU, Noida, India and
Pradeep Kumar Assistant Professor, Dept. of CSE, NIET, Greater Noida, India published
a research article on Arduino Based Wireless Intrusion Detection Using IR Sensor and
GSM.
Intrusion detection systems (IDS) strive to catch computer system intrusion & utilize by any
garnering and analyzing data. Wireless IDSs garner all local wireless transmissions and generate
alerts based either on predefined signatures or on anomalies in the traffic. These wireless IDS
can monitor and analyze user and system activities of known attacks, identity abnormal network
activity and detect policy violations. Intrusion detection systems (IDSs) should be designed to
facilitate the detection of attempted and actual unauthorized entry into designated areas and
should complement the security response by providing the security force with prompt
notification of the detected activity from which an assessment can be made and a response
initiated. We intended to avoid the access and keep track of the intruder’s attempts and
intentions. A clear and emerging new channel in the space of banking and payments is mobile. A
key challenge with gaming users adopting mobile banking and payment is the customer’s lack of
confidence in security of the services. The economic growth in wireless network faults,
vulnerabilities and attacks make the wireless local area network (WLAN) security management a
challenging research area. Deficiencies of security methods like cryptography (WEP) and
firewalls, causes the use of more complex security systems.

HOME SECURITY ALARM SYSTEM USING ARDUINO

In 2016, Suman Pandit, Shakyanand Kamble and Vinit Vasudevan DEPARTMENT OF


ELECTRONICS ENGINEERING VIDYALANKAR INSTITUTE OF TECHNOLOGY
WADALA (E), MUMBAI
The need for home security alarm systems nowadays is a serious demand. As the number of
crimes are increasing every day, there has to be something that will keep us safe. We are all
aware of the high-end security systems present in the market but they are not easily available to
everyone. We therefore intend to provide a solution by constructing a cost-efficient electronic
system that has the capability of sensing the motion of the intruders and setting off the alarm.
The basic idea behind this project is that all the bodies generate some heat energy in the form of
infrared which is invisible to human eyes. But it can be detected by an electronic motion sensor.
The project involves the use of Arduino, motion sensor, buzzer, LCD display and a simple
program. The sensor detects any motion in its permissible range and triggers the alarm. It will
also send the signal to Arduino which processes the signal and set off the alarm along with
detection message on display. With this system we can easily set up a security alarm in our home
for unwanted intruders.

AN IOT BASED HOUSE INTRUDER DETECTION AND ALERT SYSTEM


USING HISTOGRAM OF ORIENTED GRADIENTS

Nico Surantha and Wingky R. Wicaksono Department of Computer Science, BINUS


Graduate Program – Master of Computer Science, Bina Nusantara University, Jl. Kebon
Jeruk Raya No 27, Jakarta 11480, Indonesia
This research aims to design and implement a home security system with human detection
capability. Traditional home security systems, i.e., Closed-Circuit Television (CCTV) can only
capture and record videos without the ability of giving warning feedback if there is any
suspicious object. Therefore, an additional object detection and warning method is required. The
proposed design is implemented using Raspberry Pi 3 and Arduino, that is connected by USB
cable. The PIR sensor is installed on Arduino and webcam is mounted on Raspberry Pi 3. The
Raspberry Pi 3 is used to process inputs from sensors and process images for human detection.
PIR sensor detects the movement around the sensor to activate the webcam to capture a picture.
Then, the object recognition is performed using Histogram of Oriented Gradients (HOG) and
Support Vector Machine (SVM) to detect the suspicious object. If the suspicious object is
detected, then the alarm is activated and sends an email to warn the house owner about the
existence of the intruder. The results show that it takes on average 2 seconds for the proposed
system to detect an intruder and that the system can successfully detect the intruder with
accuracy of 90%.

AUTHORS PROBLEM METHODOLOGY RESULT COMMENT


(YEAR)
Abhishek S. The system was The system is a GSM module was This system can be
Parab and Prof. invented to keep wireless home used to provide a used as reference or
Amol Joglekar homes safe from network which convenient way of as a base for
realizing a scheme
department of intruders. In this contains a GSM transmitting signals
to be implemented
Computer work, they presented modem and magnet without conductors
in other project of
Science. the design and with relay which are and hence eliminating
greater including
Mithibai implementation of a door security nodes. attenuation and time
the audiovisual
College GSM based wireless The system can delay. camera by sending
Mumbai ,Maha home security respond rapidly as Users were also able the captured images
rashtra, India. system. which takes intruders detect and to control the robot to an email
(2015) very less power. The the GSM module will wirelessly. instantly. The
system is a wireless alert the homeowner. project itself can be
home network This security system modified to achieve

which contains a for alerting a house a complete home


automation system
GSM modem and owner wherever he
which will then
magnet with relay will. In this system a
create a motion
which are door relay and magnet
system which will
security nodes. installed at entry
then create a
point to a precedence platform for user to
produces a signal interface between
through a public himself and his
telecom network and household. In this
sends a message or system GSM shield

redirect a call that is a very important


tells about your home part for
update or predefined communication

message which is between mobile


phone and
embedded in the
microcontroller
microcontroller.
GSM Shield
required the SIM
card, due to range
fluctuation or busy
network sometimes
GSM shield will
not work properly.
Arief Goeritno There are two The integrated wiring The objective of this As a whole, a
and objectives of this to the minimum system project, namely to get minimum system

Muhammad paper, namely (a) is a connection to all the minimum system based on a
electronic components using the boards for microcontroller can
Yusuf Afandi programming and
on the board, so that it electronic circuits and be used as a
(2019) verification testing
is obtained a minimum assembled all the parts, preliminary safety
and (b) board for
acquisition of to make the programs that integrated into
minimum system,
ATmega32 for microcontroller the immobilizer
integrated wiring, microcontroller-based system, to perform the system. Conclusion
and validation integrated system for verification tests as a as a whole, a
testing.Programming actuator operation. form of simulation, and minimum system
for microcontroller Carrying out of the to carry out validation based on the
consists of the validation tests are: a) tests against the ATmega32
algorithm and the system is minimum system. microcontroller can

writing of the successful in detection, be used as a


but not the original end preliminary safety
syntax. Verification
user detected; b) the that integrated into
tests are three
system is in accordance the immobilizer
conditions in
with the existence of system.
accordance with the
the system in detecting, Programming for
existence of
the but the original end microcontroller
system in detecting user has not been consists the
(i) but not detected present; and c) the algorithm and
by the PIR sensor system is in accordance writing syntax. The

because not the with the existence of algorithm is a


the system in detecting minimal form that
original end user,
and the original end meets the criteria
(ii) but the original
user has been detected for operating a
end user has not
minimum system
been present, and
based on
(iii)
microcontroller. ..
Suman Thakur, Security has been Hardware of this . This Home Security This system is
Mr. Manish becoming an system has been System can monitor very simple. And

Verma and Mr. important issue designed using home area that the working of this

Lumesh (2018) everywhere. Every microcontroller AT surrounding by PIR system is very


person wants his Mega 328, PIR sensor and sending simple as well. In
home, industry; bank (Passive Infra Red) SMS, save images this system PIR
etc to be secured motion sensor as the capture by camera, sensor used for
Home security is primary sensor for and make people sensing and then
becoming necessary. motion detection, panic by turn on the microcontroller is
Now days as the camera for capturing buzzer when used for
possibilities of images, GSM module trespassing controlling
intrusion are for sending and surrounding area that purpose and a
increasing day by receiving SMS and detected by PIR GSM module
day. buzzer for alarm. For sensor. The Modular which is used for
software this system Home Security System SMS and calling
using Arduino IDE for has been tested and purpose. When
Arduino and Putty for succeed detect human anybody comes in
testing connection movement. Keywords: range of PIR
programming in GSM Microcontroller, sensor, then
module. Arduino, GSM, PIR sensor sends a
Sensor, SIM 800, Quad logic signal to
Band. security system microcontroller
that can monitor an and take control
industry & home. This and perform a
is a useful and simple given task.
security system. here,
our application uses
Arduino as its
controller to detect
the presence of human
and immediately
buzzer alerts is given
to intimate others.
Muhammad I have designed and When a user activates PIR sensor was tested When the user
Ahmad Baballe , implement a security the system, the by connecting the activates the
Abubakar Sadiq alarm system using Arduino output pin to the system, the
Muhammad and Arduino and a microcontroller will digital pin port of the Arduino
Mukhtar passive infrared ray read the data when Arduino. The motion microcontroller
ibrahim Bello. sensor, which is the PIR sensor detects was used to test the will read the data
(2021) portable, cost- an intruder. The performance of the when the PIR
effective, and highly Arduino Uno PIR sensor. The sensor detects an
effective as well. Microcontroller SIM900 GSM module intruder. The
Such alarm systems activates the buzzer was connected Arduino activates
are hugely in and sends a signal to properly and AT the buzzer, and
demand for security the LCD Showing the commands codes that also sends a signal
purposes, and thus intruding. The GSM communicate with the to the LCD
the given system can modem gets the controller were Displaying the
be proved useful and information from the written and uploaded intruding. The
effective. Microcontroller it will in the Arduino Uno GSM modem gets
send a short message through the Arduino information from
service to the Integrated the Arduino and
designated Mobile Development sends SMS to the
number registered in Environment (IDE). designated Mobile
the system. To The designed PIR number registered
communicate sensor, which is meant in the system.
between the Mobile to detect a motion and Communication
phone and GSM alert users through between the GSM
modem, AT command alarm action using a modem and
is applied to this buzzer and send SMS phone, AT
research. This is through a GSM command is
because the GSM modem, was tested. applied to this
modem can only Physical testing was research.
understand AT done to ensure that
command the system is working
declaration. properly.
Nico Surantha This research aims to The proposed design The results show that This paper has
and Wingky R. design and is implemented using it takes on average 2 proposed a
Wicaksono implement a home Raspberry Pi 3 and seconds for the security
(2019) security system with Arduino, that is proposed system to monitoring system
human detection connected by USB detect an intruder and based on IoT
capability. cable. The PIR sensor that the system can technology. The
Traditional home is installed on successfully detect the proposed system
security systems, i.e., Arduino and webcam intruder with consists of
Closed-Circuit is mounted on accuracy of 90%. Raspberry Pi 3,
Television (CCTV) Raspberry Pi 3. The Arduino, PIR
can only capture and Raspberry Pi 3 is used sensor, webcam
record videos to process inputs and buzzer. The
without the ability of from sensors and novelty of the
giving warning process images for system is the
feedback if there is human detection. PIR inclusion of
any suspicious sensor detects the human detection
object. movement around the capability by HOG
sensor to activate the and SVM method
webcam to capture a and buzzer as
picture. Then, the method to warn
object recognition is the house owner.
performed using The simulation
Histogram of results show that
Oriented Gradients the system can
(HOG) and Support detect an intruder
Vector Machine within seconds
(SVM) to detect the with accuracy of
suspicious object. If 90% with
the suspicious object processing time
is detected, then the around 2 seconds.
alarm is activated and Future research
sends an email to will explore other
warn the house feature extraction
owner about the and classification
existence of the method to
intruder. improve the
accuracy of
intruder detection.
Arief Goeritno The minimum In the present study successful in Conclusion as a
and Muhammad system is original of indicated, that there detection, but the whole, a minimum
Yusuf Afandi creation provides are two objectives of original end user not system can be
five main ports with this paper, namely (a) detected, so that this used as a
integrated wiring is a programming and is according to the preliminary safety
connection to all verification testing function of the PIR that integrated
electronic and (b) board for sensor; (ii) in into the
components on the minimum system, accordance with the immobilizer
board, so that it is integrated wiring, and existence of the system in vehicle.
obtained a minimum validation testing. system in detecting,
acquisition for Programming for but the original end
actuator operation. microcontroller user has not been
Validation tests are consists are the present, so that this is
(i) successful in algorithm and writing according to the
detection, but the of the syntax. function of the PIR
original end user not Verification tests are sensor and the
detected, so that this three conditions in fingerprint sensor is
is according to the accordance with the ready to detect; and c)
function of the PIR existence of the in accordance with the
sensor; system in detecting existence of the
(i) but not detected system in detecting
by the PIR sensor and the original end
because not the user has been
original end user, (ii) detected, so that this
but the original end is according to the
user has not been function of the PIR
present, and (iii) the and fingerprint sensor
original end user has have detected
been detected.
Nikhil Agarwal This paper proposes In case of Fire in the The system will get : In this system the
and construction of a house the the temperature from alarm is fired
G.Subramanya micro-controller temperature will the sensor IC and will when the
Nayak. (2012) based automated automatically rise, in display the temperature goes
Home Security order to detect this a temperature on LCD. above a
System. The door temperature sensor is The temperature is predefined value.
lock is password being used which will compared with the set When in this
protected with an detect the point temperature condition the
LED based resistive temperature of the declared by the user, if owner is notified
screen input panel surroundings and its more than that through SMS
which operates by send to the then the buzzer is about the alert.
detecting difference microcontroller activated else not. Motion Detector
in light intensity which will alarm in System: This is
captured by the case of very high used at the doors
photo diode which is temperature. An or windows for
emitted by ATmega16 AVR safety when not in
surrounding red microcontroller is the house. It
LEDs and reflected used to carry out all works on the
by the finger. the computation and principle of
control. It has an in- amount of light
built analog to digital falling on the
converter, hence an photodiode. When
external ADC is not the laser light is
required for falling
converting the analog continuously on
temperature into the photodiode its
digital value. An reading is 255 in
inexpensive decimals. But
temperature sensor when it’s
LM35 is used for interrupted by an
sensing the ambient obstacle / burglar
temperature. the voltage falls
less than 50 in
decimals. This
fires the alarm and
notifies the owner
about the break in
CHAPTER 2

METHOD, MATERIALS AND COMPONENTS

2.0 METHODOLOGY

2.0.0 Building a Secure Alarm Intrusion System with Face Recognition


and SMS Notification
The growing need for robust security solutions has spurred the development of innovative alarm
systems. This design and implementation of an alarm intrusion system leverages face recognition
technology for enhanced security and SMS notification for real-time alerts.
The system's core functionality revolves around motion detection. A passive infrared (PIR)
sensor continuously monitors the designated area for changes in infrared radiation, indicating
movement. Upon detecting motion, the system triggers a sequence of events:
 Image/Video Capture: A Wi-Fi camera captures an image or short video clip to capture the
individual present in the scene. The chosen camera should offer a balance between resolution,
frame rate, and power consumption to provide adequate detail for face recognition while
maintaining efficient battery life.
 Face Recognition Analysis: The captured data is sent to a dedicated face recognition module for
analysis. This module should prioritize high recognition accuracy to minimize false positives
(identifying an intruder as the owner) and false negatives (failing to recognize the owner). The
chosen module should also have sufficient memory capacity to store enrolled face data (owner's
face) and handle temporary image/video storage for recognition.
 Alert Notification: If the face recognition module identifies the individual as the owner, the
system remains inactive. However, if an intruder is detected, the system activates real-time
notification through an SMS alert sent to the owner's phone number using a GSM module
(SIM900). This notification typically includes details like the timestamp and the captured
image/video clip for verification.
2.0.1 Optional Enhancements:
The core functionality can be further expanded to include additional features:
 Alarm Activation: The system can be configured to trigger an external alarm siren or flashing
lights upon intruder detection, providing immediate audible and visual deterrence. This requires a
relay module to control the external devices.
 Mobile App Integration: A mobile application can offer remote monitoring capabilities. Users
can view the system's current state (armed, disarmed, triggered) and receive real-time
notifications on their phones. Additionally, the app can enable remote arming and disarming of
the system, and potentially even access a live stream or captured images/videos from the Wi-Fi
camera for enhanced situational awareness.
 Cloud Storage: Integrating cloud storage for captured images/videos provides several benefits. It
acts as an offsite backup, ensuring data accessibility even if the local storage device is damaged
or stolen. Furthermore, it allows for remote access to captured data from any internet-connected
device, providing a more comprehensive review of events.
 Multi-Camera Support: Expanding the system to support multiple Wi-Fi cameras allows for
wider coverage of the monitored area. However, the software needs to be modified to handle data
streams from multiple cameras efficiently.

2.1 Power Management and System Integration:


A crucial aspect of this project is ensuring the system operates reliably for extended periods.
Selecting a battery with sufficient capacity for the desired runtime is vital. Consider factors like
component power consumption, desired runtime, and battery self-discharge rate. Rechargeable
batteries like lithium-ion are often preferred due to their high capacity, low self-discharge rate,
and lightweight design. A DC-DC converter might be necessary if the chosen battery voltage
doesn't match the operating voltage of all components.
The system can be built on a breadboard (prototyping board) for initial development and testing
due to its flexibility. However, for a permanent and robust solution, designing a custom PCB is
recommended. Software development involves writing code for the microcontroller to manage
the system logic and interact with various components. Libraries for camera control, face
recognition module communication, GSM module interaction, and sensor data acquisition can
simplify code development.
2.2 Security Considerations:
Implementing robust security practices is essential:
 Secure Face Recognition Data Storage: Utilize encryption techniques to safeguard the enrolled
face data stored within the face recognition module.
 Secure SMS Communication: We considered using a secure communication protocol for SMS
notifications if transmitting sensitive information like access codes.
 User Authentication (for Mobile App): Implement user authentication mechanisms like
password or fingerprint recognition within the mobile app to prevent unauthorized access.

Building a secure alarm intrusion system with face recognition and SMS notification presents a
rewarding and challenging project. By carefully selecting components, designing efficient power
management, and implementing well-structured software, can create a reliable and user-friendly
system that safeguards property.

2.2 COMPONENT SELECTION


The success of this project hinges on selecting appropriate components that seamlessly integrate
and fulfill the desired functionalities. Here's a breakdown of the crucial components along with
key considerations:

2.2.1 Arduino Uno

Fig 2.0 Arduino Uno


Function: The brain of the system, responsible for processing sensor data, controlling
other components, and executing the alarm logic.

Selection Criteria:
o Processing Power: Choosing a microcontroller with sufficient processing
capability to handle image/video capture (if applicable), face recognition data
communication, and real-time decision-making. Popular options include Arduino
Uno, ESP32, or Raspberry Pi (depending on the chosen face recognition module).
o Input/Output (I/O) Pins: Ensure the microcontroller offers enough I/O pins for
connecting all the necessary modules (PIR sensor, WiFi camera, face recognition
module, GSM module, optional relay module, and user interface elements like
LEDs).
o Connectivity: Consider the communication protocols required for connecting
with other modules (e.g., I2C, SPI, UART).
o Development Environment: Choose a microcontroller with a well-established
development environment with readily available libraries and tutorials to simplify
programming.

2.2.2 ESP 32 CAM

Fig 2.1 ESP 32 CAM


Function: Captures images or short video clips upon system activation for face
recognition analysis.

Selection Criteria:
o Resolution\ and Frame Rate: Aim for a camera with a resolution and frame rate
that provide adequate image detail for face recognition while maintaining efficient
memory usage. A minimum resolution of 640x480 and a frame rate of 15 fps are
recommended.
o Connectivity: Ensure the camera supports Wi-Fi connectivity for seamless
integration with the microcontroller. Some cameras might offer APIs for image
capture control, while others may require triggering based on motion detection
within the camera itself.
o Power Consumption: Consider the camera's power consumption to optimize
battery life in the complete system.

2.2.3 PIR Sensor

Fig 2.2 PIR Sensor


 Function: Detects motion by sensing changes in infrared radiation emitted by objects
within its field of view.
 Selection Criteria:
o Detection Range: Choose a PIR sensor with a detection range that covers the
desired area for effective motion detection. Common ranges include 3-10 meters.
o Sensitivity: Adjustable sensitivity allows tailoring the sensor to respond to actual
human movement and minimize false alarms triggered by pets or minor
environmental changes.
o Field of View (FOV): Select a sensor with an FOV that aligns with the area of
interest. Common FOVs range from 60 to 120 degrees.

2.2.4 Face Recognition Module


 Function: Analyzes the captured image/video clip to identify the individual present in
the scene.
 Selection Criteria:
o Recognition Accuracy: Prioritize a module with high recognition accuracy to
minimize false positives (identifying an intruder as the owner) and false negatives
(failing to recognize the owner).
o Processing Speed: Consider the module's processing speed, especially if real-
time face recognition is crucial. Some modules might require transferring
images/videos to the microcontroller for processing, introducing latency.
o Memory Capacity: Ensure the module has sufficient memory to store enrolled
face data (owner's face) and handle temporary image/video storage for
recognition.
o Connectivity: Choose a module that integrates seamlessly with your selected
microcontroller. Common options include I2C, SPI, or UART communication protocols.
 Development Tools: Select a module with readily available libraries and development tools for
the chosen microcontroller platform to simplify integration and coding.

2.2.5 GSM Module (SIM900)

Fig 2.3 GSM Module


 Function: Sends SMS notifications to the owner's phone number in case of an unrecognized face.
 Selection Criteria:
o Network Compatibility: Ensure the GSM module is compatible with the cellular
network provider you intend to use for SMS communication.
o Signal Strength: Consider the signal strength in your location and choose a module with
reliable reception.
o Development Resources: opt for a module with well-documented libraries and tutorials
for the chosen microcontroller platform to facilitate programming for SMS sending.

2.2.6 Additional Components

Fig 2.4 Jumper wire

Jumper Wires
These facilitate easy connections between the various components on a breadboard or PCB (Printed
Circuit Board). Choose appropriate lengths and quantities based on your layout.

Fig 2.5 Battery


Battery
Select a battery with sufficient capacity to power the entire system for the desired runtime. Consider
factors like battery type (e.g., lithium-ion, rechargeable), voltage output, and discharge rate.

Fig 2.6 Battery Case


 Battery Case: Securely houses the battery and protects it from damage.

Fig 2.7 DC-DC Converter


DC-DC Converter (Optional): If the battery voltage doesn't match the operating voltage requirements of
all components, a DC-DC converter can step up or down the voltage to ensure proper functionality.
Fig 2.8 Relay Module

Relay Module
Connects and controls external devices like sirens or lights, allowing the system to trigger audible or
visual alarms upon intrusion detection. Choose a relay module with a voltage rating compatible with the
selected siren/light and sufficient current capacity to handle the device's operating current.

Fig 2.9 LED

LED
Provides visual indication of the system's status (armed, disarmed, triggered) for user feedback. Choose
an LED with appropriate voltage requirements and a resistor for current limiting.

Fig 2.10 Veroboard


Vero Board
A prototyping board for building the circuit without soldering. It's helpful for initial testing and
development but can be replaced with a permanent PCB for a more robust and compact solution.

Fig 2.11 Switch

Switch
Allows the user to manually arm or disarm the security system. Choose a switch type (e.g., toggle,
pushbutton) that aligns with your desired user interaction.
CHAPTER 3

DESIGN AND IMPLEMENTATION

3.0 System Block Diagram


A block diagram provides a visual representation of the system’s components and their
interconnections. Here’s a high-level representation:

Fig 3.0 System Block Diagram

This block diagram represents an intruder alarm system that integrates multiple components for
motion detection, image capture, and notification. Here's a more detailed breakdown, including
the pin connections:
3.1 Components and Connections

Fig 3.1 Schematic Diagram Showing the System Connection

3.1.0 PIR Sensors

PIR SENSOR 1

VCC (Power) connected to 5V pin on the Arduino.

GND (Ground) connected to GND pin on the Arduino.

OUT (Signal) connected to a digital input pin, e.g., D2 on the Arduino.

PIR SENSOR 2

VCC connected to 5V pin on the Arduino.

GND connected to GND pin on the Arduino.

OUT connected to another digital input pin, e.g., D3 on the Arduino.


Additional PIR Sensors: These sensors will follow a similar connection scheme to different
digital pins on the Arduino, e.g., **D4**, **D5**, etc.

3.1.1 ARDUINO

The central microcontroller processes input signals from the PIR sensors and controls the output
to other components.

PIR SENSOR 1 connected to D2.

PIR SENSOR 3 connected to D3.

- SIM 800L GSM Module:

- VCC connected to 5V pin on the Arduino.

- GND connected to GND pin on the Arduino.

- TXD (Transmit) connected to RX pin on the Arduino (e.g., D7).

- RXD (Receive) connected to TX pin on the Arduino (e.g., D8).

- RING (Ring Indicator) connected to a digital input pin if used for interrupt signaling,
otherwise can be left unconnected.

3.1.2 ESP 32 CAM Module

- VCC connected to 3.3V pin on the Arduino (if using 3.3V logic) or 5V (if using a 5V
compatible module).

- GND connected to GND pin on the Arduino.

- TXD connected to a digital input pin, e.g., D9.

- RXD connected to a digital output pin, e.g., D10.


Buzzer:

VCC connected to 5V pin on the Arduino.

GND connected to GND pin on the Arduino.

- Signal connected to a digital output pin, e.g., D11.

3.2 Functionality Workflow

3.2.1 Motion Detection:

The PIR sensors are placed strategically to cover various areas. When any PIR sensor detects
motion, it sends a high signal to its connected Arduino pin (e.g., D2 for PIR SENSOR 1).

3.2.2 Signal Processing:

- The Arduino continuously monitors the digital pins connected to the PIR sensors. When a
high signal is detected on any of these pins, the Arduino recognizes it as motion detection.

3.2.3 SMS Notification:

- Upon detecting motion, the Arduino sends a command to the SIM 800L GSM module via
the TX and RX pins (e.g., D7 and D8).
Fig 3.2 Message sent to registered phone number from the security system

- The SIM 800L sends an SMS notification to a predefined phone number, alerting the user of
the detected motion.

3.2.4. Image Recognition:

- Simultaneously, the Arduino sends a signal to the ESP 32 CAM module via the TXD and
RXD pins (e.g., D9 and D10).
Fig 3.3 Image Of Registered Owner

- The ESP 32 CAM captures an image or video of the area where motion was detected and
processes it for visual confirmation.

3.2.5 Audible Alert:

- The Arduino activates the buzzer connected to the Signal pin (e.g., D11), producing an
audible alert to deter potential intruders immediately.

3.3 Applications

This detailed intruder alarm system can be used for:

Home Security

Detecting unauthorized entry and alerting homeowners via SMS and an audible buzzer.

Office Security

Monitoring office premises after hours and sending alerts to security personnel.
Industrial Security

Protecting warehouses or sensitive areas by detecting unauthorized access and capturing images
for evidence.

The intruder alarm system effectively integrates PIR sensors for motion detection, an Arduino
microcontroller for processing, a SIM 800L GSM module for SMS notifications, an ESP 32
CAM module for image recognition, and a buzzer for audible alerts. Each component is
connected to specific pins on the Arduino to ensure coordinated operation, providing a robust
security solution.

3.4 Hardware Setup

1. System Assembly:
o Assemble the components on a breadboard using jumper wires, following the datasheets
for proper connection and voltage levels. Alternatively, design and fabricate a custom
PCB for a more permanent solution.
o Connect the microcontroller to the WiFi camera, PIR sensor, face recognition module,
GSM module (SIM900), and any optional components (LED, relay module).

Fig 3.4 Project Assembly (Front view)


Fig 3.5 Project Assembly (Side View)

3.5 Software Development:

3.5.1 Development Environment:

The Arduino IDE is an open-source software, which is used to write and upload code to the
Arduino boards. The IDE application is suitable for different operating systems such
as Windows, Mac OS X, and Linux. It supports the programming languages C and C++. Here,
IDE stands for Integrated Development Environment.

The program or code written in the Arduino IDE is often called as sketching. We need to connect
the Genuine and Arduino board with the IDE to upload the sketch written in the Arduino IDE
software. The sketch is saved with the extension '.ino.'

The Arduino IDE will appear as:


Fig 3.6 Arduino IDE interface

3.5.2 Libraries:
o Include necessary libraries for interacting with different components:
 WiFi camera library (if using Arduino libraries for camera control)
 Face recognition module communication library
 GSM module communication library (e.g., SIM800C_TinyGSM for Arduino)
 Sensor data acquisition library (e.g., for PIR sensor)

3.5.3 Code Structure:


o Organize the code into well-defined functions for readability and maintainability.
Consider functions for:
 Initialization: Establishes communication with all connected components and
sets up system parameters.
 Main Loop: Continuously monitors the PIR sensor for motion detection.
 Motion Detected: Triggers upon PIR sensor activation.
 Capture Image/Video: Instructs the WiFi camera to capture an image or
video clip (use libraries or camera API if available, otherwise trigger
based on motion detection in the camera itself).
 Face Recognition Processing: Sends the captured data to the face
recognition module for analysis.
 Face Recognition Result: Handles the outcome (owner recognized or
intruder detected).
 Owner Recognized: System remains inactive.
 Intruder Detected:
 Send SMS Notification: Utilizes the GSM module and
libraries to send an SMS alert with details (timestamp,
image/video clip) to the owner's phone.
 Trigger Optional Alarm (if implemented): Activates
the relay module to control an external siren or flashing
lights.
 Sleep Mode (Optional): Places the microcontroller in a low-power mode during
inactivity to conserve battery life.

Integrating Arduino Code:

Here's a breakdown of integrating your Arduino code into the system:

1. Include Libraries:
C
#include "esp_camera.h"
#include <WiFi.h>
#include "esp_timer.h"
#include "img_converters.h"
#include "Arduino.h"
#include "fb_gfx.h"
#include "soc/soc.h" // disable brownout problems
#include "soc/rtc_cntl_reg.h" // disable brownout problems
#include "esp_http_server.h"
#include <ESP32Servo.h>

2. Define Pin Connections:


C
// ... Define other pin connections as needed
// Replace with your network credentials
const char* ssid = "Redmi 12";
const char* password = "7zky2kp9xg255vy";

#define PART_BOUNDARY "123456789000000000000987654321"


#define CAMERA_MODEL_AI_THINKER
//#define CAMERA_MODEL_M5STACK_PSRAM
//#define CAMERA_MODEL_M5STACK_WITHOUT_PSRAM
//#define CAMERA_MODEL_M5STACK_PSRAM_B
//#define CAMERA_MODEL_WROVER_KIT

#if defined(CAMERA_MODEL_WROVER_KIT)
#define PWDN_GPIO_NUM -1
#define RESET_GPIO_NUM -1
#define XCLK_GPIO_NUM 21
#define SIOD_GPIO_NUM 26
#define SIOC_GPIO_NUM 27

#define Y9_GPIO_NUM 35
#define Y8_GPIO_NUM 34
#define Y7_GPIO_NUM 39
#define Y6_GPIO_NUM 36
#define Y5_GPIO_NUM 19
#define Y4_GPIO_NUM 18
#define Y3_GPIO_NUM 5
#define Y2_GPIO_NUM 4
#define VSYNC_GPIO_NUM 25
#define HREF_GPIO_NUM 23
#define PCLK_GPIO_NUM 22

#elif defined(CAMERA_MODEL_M5STACK_PSRAM)
#define PWDN_GPIO_NUM -1
#define RESET_GPIO_NUM 15
#define XCLK_GPIO_NUM 27
#define SIOD_GPIO_NUM 25
#define SIOC_GPIO_NUM 23

#define Y9_GPIO_NUM 19
#define Y8_GPIO_NUM 36
#define Y7_GPIO_NUM 18
#define Y6_GPIO_NUM 39
#define Y5_GPIO_NUM 5
#define Y4_GPIO_NUM 34
#define Y3_GPIO_NUM 35
#define Y2_GPIO_NUM 32
#define VSYNC_GPIO_NUM 22
#define HREF_GPIO_NUM 26
#define PCLK_GPIO_NUM 21
#elif defined (CAMERA_MODEL_M5STACK_WITHOUT_PSRAM)
#define PWDN_GPIO_NUM -1
#define RESET_GPIO_NUM 15
#define XCLK_GPIO_NUM 27
#define SIOD_GPIO_NUM 25
#define SIOC_GPIO_NUM 23

#define Y9_GPIO_NUM 19
#define Y8_GPIO_NUM 36
#define Y7_GPIO_NUM 18
#define Y6_GPIO_NUM 39
#define Y5_GPIO_NUM 5
#define Y4_GPIO_NUM 34
#define Y3_GPIO_NUM 35
#define Y2_GPIO_NUM 17
#define VSYNC_GPIO_NUM 22
#define HREF_GPIO_NUM 26
#define PCLK_GPIO_NUM 21

#elif defined (CAMERA_MODEL_AI_THINKER)


#define PWDN_GPIO_NUM 32
#define RESET_GPIO_NUM -1
#define XCLK_GPIO_NUM 0
#define SIOD_GPIO_NUM 26
#define SIOC_GPIO_NUM 27

#define Y9_GPIO_NUM 35
#define Y8_GPIO_NUM 34
#define Y7_GPIO_NUM 39
#define Y6_GPIO_NUM 36
#define Y5_GPIO_NUM 21
#define Y4_GPIO_NUM 19
#define Y3_GPIO_NUM 18
#define Y2_GPIO_NUM 5
#define VSYNC_GPIO_NUM 25
#define HREF_GPIO_NUM 23
#define PCLK_GPIO_NUM 22

#elif defined (CAMERA_MODEL_M5STACK_PSRAM_B)


#define PWDN_GPIO_NUM -1
#define RESET_GPIO_NUM 15
#define XCLK_GPIO_NUM 27
#define SIOD_GPIO_NUM 22
#define SIOC_GPIO_NUM 23

#define Y9_GPIO_NUM 19
#define Y8_GPIO_NUM 36
#define Y7_GPIO_NUM 18
#define Y6_GPIO_NUM 39
#define Y5_GPIO_NUM 5
#define Y4_GPIO_NUM 34
#define Y3_GPIO_NUM 35
#define Y2_GPIO_NUM 32
#define VSYNC_GPIO_NUM 25
#define HREF_GPIO_NUM 26
#define PCLK_GPIO_NUM 21

#else
#error "Camera model not selected"
#endif

#define SERVO_1 14
#define SERVO_2 15

#define SERVO_STEP 5

3. Write Functions: Develop the core functionalities mentioned in the code structure,
utilizing relevant libraries and functions:
C++
void setup() {
Serial.begin(9600); // Initialize serial communication for debugging
// Initialize communication with all components using library functions
}

void loop() {

COST ESTIMATION

COMPONENTS COST
WIFI CAMERA #16,500
ARDUINO UNO #17,000
PIR SENSOR (3) #4,500
GSM MODULE #7400
JUMPER WIRE # 1800
BATTERY # 4800
BATTERY CASING # 1200
DC-DC CONVERTER # 2500
ALARM NOTIFICATION # 3500
RELAY MODULE # 1400
VERO BOARD # 500
MALE & FEMALE HEADER # 1400
SWITCH # 500
CASING # 2000

TOTAL #64,400
CHAPTER 4

ANALYSES, IMPLICATIONS AND LIMITATIONS

4.0 Analyses and Implications of the Alarm Intrusion System with Face Recognition and
SMS Notification

This report delves into the in-depth analyses and implications of the alarm intrusion system
designed with face recognition and SMS notification capabilities. The system aims to provide a
comprehensive security solution for homes or businesses, offering real-time intruder detection,
identification, and notification.

4.1 Analyses of Core Functionalities

4.1.0 Motion Detection:


o Strengths: The PIR sensor plays a crucial role by effectively detecting motion within its
designated area, triggering the system upon intruder presence. This provides a vital first
line of defense, alerting the system to potential security breaches.
o Limitations: False positives can occur due to various factors like pets walking within the
sensor's range, sudden temperature changes, or wind gusts. These limitations can be
mitigated by:
 Implementing a time delay: The system can be programmed to wait a
predetermined amount of time (e.g., 30 seconds) after the initial motion detection
before triggering an alarm. This allows for the possibility of transient movements
(e.g., pets) to subside without triggering a false alarm.
 Combining with other sensors: Integrating the PIR sensor with additional
security measures like door or window contact sensors can enhance accuracy. An
alarm would only be triggered if both motion is detected and a door/window
breach is confirmed.
4.1.1 Face Recognition:
o Strengths: Face recognition significantly strengthens the system's security by
distinguishing authorized individuals (owner) from intruders. This eliminates the
limitations of traditional motion detection systems, which cannot differentiate between
authorized entry and unauthorized attempts.
o Factors Affecting Accuracy: The chosen face recognition module's accuracy is
paramount. Several factors influence recognition success, including:
 Lighting conditions: Poor lighting, excessive brightness, or variations in
lighting angles can affect recognition accuracy. Implementing additional lighting
sources or choosing a module with advanced lighting compensation algorithms
can improve performance.
 Facial variations: Facial features can change over time due to aging, hairstyles,
or glasses. The face recognition database needs to be updated periodically with
recent photos of authorized individuals to maintain optimal accuracy.

4.1.2 Database management:


The enrolled facial data needs to be well-organized and secure. Techniques like liveness detection
(verifying the person is present and not a photograph) can further enhance security.

4.1.3 SMS Notification:


o Strengths: Real-time SMS alerts sent to the owner's phone upon intruder detection offer
immediate awareness of a security breach. This allows for timely intervention by the
owner or designated contacts, potentially preventing further damage or loss.
o Limitations: Cellular network coverage can be unreliable in certain areas, and signal
disruptions can occur. Additionally, SMS delivery might not be instantaneous, potentially
causing a delay in receiving the notification.
o Alternative Notification Methods: Redundancy can be built into the system by
exploring alternative notification methods. These could include:
 Push notifications: Utilizing a dedicated mobile application for the system can
deliver real-time notifications directly to the owner's smartphone, potentially
offering faster and more reliable communication compared to SMS.
 Email notifications: While not as immediate as SMS or push notifications, email
alerts can provide a backup notification method, especially if cellular service is
unavailable.
4.2 Overall System Performance
 Reliability: The system's reliability depends on several factors:
o Component quality: Utilizing high-quality, reliable components from reputable
manufacturers minimizes the risk of hardware failure.
o Robust connections: Proper wiring and soldering techniques ensure secure and reliable
electrical connections between all components.
o Well-written software: The software code governing the system's logic and
functionality needs to be well-developed, tested thoroughly, and free of bugs to ensure
smooth operation and accurate decision-making.
o Regular testing: The system should be tested periodically to verify all functionalities
operate as intended. This includes simulating various scenarios like motion detection,
face recognition, and notification processes.
 Power Consumption: Battery life is a crucial aspect for systems relying on battery
power. Factors influencing power consumption include:
o Component selection: Choosing energy-efficient components can significantly extend
battery life. Opting for low-power microcontrollers, cameras with power-saving features,
and efficient communication protocols can minimize power consumption.
o Battery capacity: Selecting a battery with sufficient capacity to meet the system's
operational needs is essential. Battery capacity is typically measured in Ampere-hours
(Ah) and should be chosen based on the system's estimated power draw and desired
runtime between charges.
o System usage patterns: The frequency of motion detection, face recognition processing,
and notification transmissions will impact power consumption. Optimizations can be
implemented:

Analyses and Implications of the Alarm Intrusion System with Face Recognition and SMS
Notification (continued)

 Sleep mode (continued): The system can be programmed to wake up periodically (e.g., every
minute) to check for motion detection. If no motion is detected, the system can return to sleep
mode, significantly reducing power consumption. * Sensor optimization: PIR sensors can be
adjusted to reduce their detection range, focusing on critical areas. This minimizes unnecessary
activations and conserves battery life.
4.3 IMPLICATIONS
This project demonstrates the feasibility and potential benefits of building a customized alarm
intrusion system using readily available components. Here's a detailed exploration of the
implications:

Enhanced Home Security:


o The system offers a proactive approach to home security by combining motion detection
with face recognition for intruder identification. This deters potential break-ins by
creating a visible security presence and allowing for a faster response to security
breaches.
o The ability to distinguish between authorized individuals (owner) and intruders
eliminates the need for the owner to deactivate the system when entering the premises,
improving overall security posture.

Scalability:
The core functionalities of the system offer a foundation for expansion and
customization based on specific security needs:
o Additional cameras: Integrating multiple cameras can provide wider coverage,
monitoring critical entry points or larger areas within a property.
o User profiles: The face recognition database can be expanded to include additional
authorized individuals like family members, housekeepers, or trusted visitors. Assigning
access schedules to specific user profiles allows for even more granular control over the
system.

Privacy Considerations:
Facial recognition technology raises privacy concerns, particularly regarding the
collection, storage, and usage of facial data. Here are some crucial aspects to consider:
o Data security: Implementing robust data security measures is essential. This includes:
 Encrypted storage: Encrypted storage of enrolled facial data on the
microcontroller or a secure cloud platform protects the data from unauthorized
access in case of a system breach.
 Secure communication protocols: Utilizing secure communication protocols
(e.g., HTTPS) for transmitting facial data between the system and the face
recognition module ensures data privacy during processing.
o User consent: Obtaining explicit user consent for the collection and storage of facial data
is paramount. This consent should clearly explain how the data will be used, stored, and
secured. Users should also have the right to request the deletion of their data at any time.

Cost-Effectiveness:
While the project requires an initial investment for components and potentially a cloud
storage subscription (if applicable), it offers a potentially cost-effective security solution
compared to professionally monitored systems. Here's a breakdown of cost
considerations:
o Component costs: The overall cost can be managed by selecting readily available
components with varying price points. Open-source hardware platforms like Arduino can
further reduce costs compared to proprietary systems.
o Ongoing costs: Beyond the initial investment, ongoing costs may include:
 Battery replacements: The frequency of battery replacement depends on the
chosen battery capacity and system usage patterns.
 Cellular network charges (if applicable): SMS notification relies on cellular
network connectivity. Depending on the chosen plan, per-message charges might
apply. Alternative notification methods like push notifications could minimize
these costs.
 Cloud storage subscription (optional): If cloud storage is implemented for
captured images/videos, a subscription fee might be associated with the chosen
cloud storage provider.

4.3.0 Future Advancements

This project serves as a stepping stone for further exploration and potential advancements:
 Cloud Integration: Integrating cloud storage for captured images/videos during intruder
detection allows for several benefits:
o Remote access: The owner can access captured footage remotely from a smartphone,
computer, or tablet, providing a detailed view of security events. This can be helpful for
reviewing incidents, verifying alerts, or providing evidence to law enforcement.
o Offsite backup: Storing captured data in the cloud offers an offsite backup solution. In
case of a system malfunction or theft, the critical security footage remains accessible.
o Scalable storage: Cloud storage offers a scalable storage solution compared to limited
onboard storage capacity on the microcontroller. This allows for storing more extensive
video recordings for extended periods.
 Machine Learning: Implementing machine learning algorithms for anomaly detection within
captured video feeds could identify suspicious activities beyond simple motion detection. Here
are some potential applications:
o Object recognition: Machine learning models can be trained to recognize specific
objects or activities within the video feed. This allows for flagging suspicious events like
unidentified people entering restricted areas or attempts to tamper with security cameras.
o Loitering detection: The system could identify individuals lingering in specific areas for
extended periods, potentially indicating suspicious behavior.
 Smart Home Integration: The system could be integrated with smart home platforms to trigger
automated actions upon intruder detection
o Smart lights: The system can be programmed to automatically activate smart lights upon
intruder detection, potentially startling intruders and deterring further actions.
Additionally, illuminating the area can assist with remote video surveillance and provide
valuable footage for law enforcement.
o Door locks: Integration with smart door locks allows for automatic locking upon intruder
detection, further securing the premises.
o Sirens (indoor/outdoor): Smart sirens can be triggered for audible deterrence upon
detecting an intruder. Options include indoor sirens to alert occupants and outdoor sirens
to attract attention from neighbors.

The system offers a comprehensive security solution with motion detection, intruder
identification, and real-time notification capabilities. While limitations exist in areas like false
positives from motion detection and potential delays in SMS notifications, the system provides a
strong foundation for home or business security. Scalability through additional cameras and user
profiles, alongside considerations for data privacy and cost-effectiveness, make this a relevant
security solution in today's world. Looking ahead, advancements in cloud integration, machine
learning, and smart home integration offer exciting possibilities for further enhancing the
effectiveness and capabilities of this security system.
By carefully considering the analyses and implications presented in this report, you can make
informed decisions about building, deploying, and maintaining this alarm intrusion system.
Remember to prioritize reliable components, robust connections, well-written software, and
regular testing to ensure optimal performance. Furthermore, addressing privacy concerns through
data security measures and user consent is crucial. As technology continues to evolve, the
potential for even more sophisticated and intelligent security systems is vast. This project serves
as a springboard for further exploration and innovation in the realm of home and business
security solutions.

CHAPTER 5

CONCLUSION AND RECOMMENDATIONS


This report has comprehensively explored the design, implementation, and implications of the
alarm intrusion system with face recognition and SMS notification. The system offers a
multifaceted approach to security, combining motion detection with the power of face
recognition for intruder identification and real-time SMS alerts for immediate awareness.

CONCLUSION

The project successfully demonstrates the feasibility of building a customized and effective
alarm intrusion system using readily available components. The core functionalities provide a
strong foundation for home or business security:

Motion Detection: The PIR sensor effectively detects unauthorized movement within the
designated area, triggering the system and initiating security protocols.
Face Recognition: Integrating face recognition significantly enhances security by differentiating
authorized individuals from intruders. This eliminates the need to deactivate the system upon
entry, improving overall security posture.
SMS Notification: Real-time SMS alerts provide immediate notification of potential security
breaches, allowing for timely intervention by the owner or designated contacts.

STRENGTHS AND LIMITATIONS

The system offers several strengths:

Customization: The design allows for customization based on specific security needs.
Additional cameras can expand coverage, and the face recognition database can be populated
with authorized user profiles.
Cost-effectiveness: Compared to professionally monitored systems, this solution offers a
potentially cost-effective approach to security, with the initial investment potentially recouped
over time.
Scalability: The core functionalities can be scaled to accommodate larger areas or integrate with
existing smart home systems for a more comprehensive security network.

However, limitations exist that require consideration:

False Positives: Motion detection can trigger false alarms due to pets, wind gusts, or sudden
temperature changes. Implementing time delays or combining the PIR sensor with other security
measures can mitigate these.
Face Recognition Accuracy: Accuracy depends on factors like lighting conditions, facial
variations, and database management. Regular updates and potential lighting adjustments can
improve recognition success.
SMS Notification Limitations: Cellular network coverage and potential signal disruptions can
affect the reliability of SMS notifications. Exploring alternative notification methods like push
notifications can provide redundancy.

RECOMMENDATIONS

Based on the analyses and considerations presented in this report, the following
recommendations are offered for further development and deployment of the system:

Component Selection: Utilize high-quality, reliable components from reputable manufacturers


to minimize the risk of hardware failure. Prioritize components with low power consumption to
extend battery life.
Software Development: Invest time in developing well-written, well-tested software to ensure
accurate decision-making and reliable system operation. Implement features like sleep modes to
conserve battery life when the system is inactive.
Security Measures: Prioritize data security by encrypting facial data storage and utilizing secure
communication protocols for face recognition processing. Obtain explicit user consent for the
collection and storage of facial data.
Scalability and Integration: Explore options for expanding the system with additional cameras
or integrating it with existing smart home platforms. This allows for functionalities like
automated smart light activation or door locking upon intruder detection.
Advanced Features: Consider incorporating cloud storage for captured footage to enable remote
access and offsite backups. Additionally, explore the potential of implementing machine learning
algorithms for anomaly detection within video feeds, enabling the system to identify suspicious
activities beyond simple motion detection.

FUTURE CONSIDERATIONS

As technology evolves, exciting possibilities exist for further enhancing this security system:

Advanced Facial Recognition Algorithms: Advancements in facial recognition algorithms


promise even greater accuracy in identifying authorized individuals and intruders under various
lighting conditions and with facial variations.
Enhanced Machine Learning: Machine learning can be further developed to detect a wider
range of suspicious activities within video feeds, potentially including object recognition,
loitering detection, or identifying attempts to tamper with security cameras.
Integration with Emerging Technologies: The system could be integrated with future smart
home technologies or personal assistant devices, offering even more sophisticated security
solutions and streamlined user interactions.

By carefully considering these recommendations and staying abreast of technological


advancements, you can refine and improve this alarm intrusion system, making it an even more
robust and effective solution for home or business security needs.
REFERENCES

General Security Systems and Alarm Intrusion

 [1] Goldsmith, M. (2011). Security systems and signal processing. Newnes. (Focuses on
the technical aspects of security systems and their integration with signal processing
techniques)
 [2] Gonzalez, G., Daughman, J., & Walker, M. (2004). Biometric security systems.
Springer Science & Business Media. (Provides a broad overview of biometric security
systems, including facial recognition)
 [3] National Institute of Standards and Technology (NIST). (2007). Electronic security
systems for commercial facilities (Special Publication 800-30).
https://www.nist.gov/privacy-framework/nist-sp-800-30 (Discusses security best
practices and considerations for commercial facilities)
 [4] Wright, M. D., & David, L. O. (2013). Key factors affecting false alarm rates of
wireless security systems. Security Journal, 52(1), 49-63. (Analyzes factors contributing
to false alarms in security systems)

PIR Sensors and Motion Detection

 [5] Robotronics Learning. (2019, July 18). How PIR sensors work [Video]. YouTube.
https://m.youtube.com/watch?v=XK9S0QthQB4 (Video explanation of PIR sensor
functionality)
 [6] SparkFun Electronics. (n.d.). PIR (passive infrared) sensor tutorial.
https://learn.sparkfun.com/tutorials/pir-motion-sensor-hookup-guide/introduction
(Detailed guide on PIR sensors, including selection and interfacing with microcontrollers)

Face Recognition Technology

 [7] Facial Recognition Coalition. (n.d.). About facial recognition.


https://www.ajl.org/facial-recognition-technology (Provides information on facial
recognition technology, including its applications and limitations)
 [8] National Institute of Standards and Technology (NIST). (n.d.). Face Recognition
Vendor Test (FRVT). https://pages.nist.gov/frvt/html/frvt11.html (NIST's program for
evaluating the performance of facial recognition algorithms)
 [9] Owayjan, M., Dergham, A., Haber, G., Fakih, N., Hamoush, A., & Abdo, E. (2013).
Face Recognition Security System, Sms Alert and Embedded Network Video Monitoring
Terminal. International Journal of Engineering Research, 3(2), 14-26. (Research paper
on a security system with face recognition and SMS notification)

SMS Notification and Communication Protocols

 [10] GSMA. (n.d.). SMS - A global messaging platform. https://www.gms.net/


(Information on SMS technology and its functionalities)
 [11] Twilio. (n.d.). Programmable SMS - Integrate SMS into your applications.
https://www.twilio.com/docs/messaging/quickstart (Information on SMS APIs for
integrating SMS notification into applications)

Security Considerations and Privacy

 [12] Electronic Privacy Information Center (EPIC). (n.d.). Facial Recognition Technology.
https://epic.org/ (Discusses privacy concerns associated with facial recognition
technology)
 [13] European Union Agency for Fundamental Rights (FRA). (2021). Facial Recognition
Technology and its Use in the EU Area. https://fra.europa.eu/en/publication/2019/facial-
recognition-technology-fundamental-rights-considerations-context-law (Report on facial
recognition technology in the European Union, addressing legal and ethical
considerations)
 [14] National Institute of Standards and Technology (NIST). (2020). Framework for
Managing Risk from Facial Recognition Technology.
https://www.nist.gov/document/osac-technical-guidance-document-framework-
implementing-passive-live-facial-recognition-jan (NIST framework for managing risks
associated with facial recognition technology)
Additional Resources

 [15] Arduino Project Hub. (n.d.). Browse by Category: Security.


https://www.pinterest.com/castlesearcher/ardunio-security-projects/ (Collection of
Arduino-based security projects for inspiration)
 [16] OpenCV. (n.d.). OpenCV org. https://opencv.org/ (Open source computer vision
library that can be used for facial recognition tasks)

Smart Home Integration and Security Systems

 [17] Z-Wave Alliance. (n.d.). Z-Wave: The leading wireless technology for smart
homes. https://www.z-wave.com/ (Information on Z-Wave, a popular wireless
communication protocol used in smart home devices)
 [18] Chen, S., Xu, W., Liu, D., Zhou, Z., & He, D. (2018). Security analysis of
lightweight encryption algorithms for smart home communications. IEEE Internet
of Things Journal, 5(3), 1834-1843. (Research paper on security considerations
for communication in smart home systems)

Machine Learning and Anomaly Detection

 [19] Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep Learning. MIT Press.
(Comprehensive textbook on Deep Learning concepts and techniques,
applicable to anomaly detection)
 [20] Patchava, S. R., & Yallamanda, S. (2020). Anomaly detection techniques for
network security: A survey. Journal of Network and Computer Applications, 160,
102624. (Survey paper on anomaly detection techniques, including applications
in network security)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy