0% found this document useful (0 votes)
44 views

Final Document

The document presents 'ProtectHer', an IoT-based smart security device aimed at enhancing women's safety through real-time monitoring and emergency alerts. It integrates various sensors and communication modules, enabling automatic alerts based on health metrics and environmental sounds, along with a mobile application for user and guardian interaction. The project aims to address the limitations of existing safety solutions by providing a comprehensive, reliable, and user-friendly security system for women.

Uploaded by

ipssiddu7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views

Final Document

The document presents 'ProtectHer', an IoT-based smart security device aimed at enhancing women's safety through real-time monitoring and emergency alerts. It integrates various sensors and communication modules, enabling automatic alerts based on health metrics and environmental sounds, along with a mobile application for user and guardian interaction. The project aims to address the limitations of existing safety solutions by providing a comprehensive, reliable, and user-friendly security system for women.

Uploaded by

ipssiddu7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 93

PROTECTHER

A SMART SECURITY DEVICE FOR WOMEN SAFETY AND


SURVEILLANCE
A Main Project Report submitted in partial fulfillment of the

requirements for the award of degree of

BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE AND ENGINEERING

Submitted

By

GANDI DHANA SAI JYOTHI SRI (21A91A05D3)

DONE SAI VARSHITHA (21A91A05C9)

CHITTURI VENU GOPAL (21A91A05C2)

NAKKA CHARAN SAI GANGADHAR (21A91A05G4)


Under the esteemed guidance of

Mr. M. KALYAN RAM, M.Tech (Ph.D).


Assistant Professor

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


ADITYA UNIVERSITY
(Formerly Aditya Engineering College (A))

2024-2025

i
DEPARTMENT OF COMPUTER SCIENCE AND
ENGINEERING

CERTIFICATE
This is to certify that the project work entitled “PROTECTHER A SMART
SECURITY DEVICE FOR WOMEN SAFETY AND SURVEILLANCE”
is being submitted by
G D S JYOTHI SRI (21A91A05D3)
D SAI VARSHITHA (21A91A05C9)
CH VENU GOPAL (21A91A05C2)
N CH S GANGADHAR (21A91A05G4)
in partial fulfillment of the requirements for award of the B.Tech. degree in
Computer Science and Engineering.

Project Guide Head of the Department


Mr. M.Kalyan Ram, M.Tech (Ph.D) Dr. K. Swaroopa, Ph.D.
Assistant Professor Assoc. Prof., CSE Dept.

External Examiner

ii
DECLARATION

We hereby declare that the project entitled “PROTECTHER A SMART


SECURITY DEVICE FOR WOMEN SAFETY AND SURVEILLANCE” is
a genuine project. This work has been submitted to the ADITYA UNIVERSITY
(Formerly Aditya Engineering College (A)), Surampalem in partial fulfillment
of the B.Tech. degree. We further declare that this project work has not been
submitted in full or part of the award of any degree of this or any other educational
institutions.

by

G D S JYOTHI SRI (21A91A05D3)


D SAI VARSHITHA (21A91A05C9)
CH VENU GOPAL (21A91A05C2)
N CH S GANGADHAR (21A91A05G4)

iii
ACKNOWLEDGEMENT

It is with immense pleasure that we would like to express our indebted gratitude to our
project Guide Mr. M. Kalyan Ram, M.Tech (Ph.D), Assistant Professor, Department of CSE
who has guided us a lot and encourage in every step of the project work, his valuable moral
support and guidance throughout the project helped us a greater extent.
We owe our sincere gratitude to our project coordinator Dr. K. Chandra Sekhar,
M.Tech, Ph.D, Associate Professor, Department of CSE for providing a great support and
guidance throughout the project.

We are grateful to Dr. K. Swaroopa, Associate Professor and HOD, for inspiring us all
the way and for arranging all the facilities and resources needed for our project.

We wish to thank our Dr. M.V. Rajesh, Associate Dean and Dr. Dola Sanjay, Dean
School of Engineering for their encouragement and support during the course of our project.

We would like to extend our sincere thanks to Dr. G. Suresh, Registrar,


Dr. S. Rama Sree, Pro Vice-Chancellor, Dr.M.B. Srinivas, Vice-Chancellor,
Dr. M. Sreenivasa Reddy, Deputy Pro Chancellor and Management, Aditya University for
unconditional support for providing us the best infrastructural facilities and state of the art
laboratories during our project.

Not to forget, Faculty, Lab Technicians, Non-Teaching Staff and our Friends who
have directly or indirectly supported us in completing this project on time.

iv
v
vi
vii
viii
ix
x
ABSTRACT

Women’s safety is a major concern in today’s world, and there is an increasing need for smart, real-
time security solutions. ProtectHer is an innovative IoT-based smart security device designed to
enhance women’s safety and surveillance. This device is integrated into a bag and consists of
multiple sensors and communication modules, including a microphone, pulse oximeter (for heart
rate and SpO2 measurement), GPS (for real-time location tracking), accelerometer (for motion
detection), and SIM900A (for sending alert messages). These components are controlled by an
ESP32 microcontroller, ensuring efficient data collection and transmission.
The system operates by continuously monitoring the user’s vitals and surroundings. If the heart
rate exceeds 150 bpm or if the microphone detects an extremely loud sound level (≥ 100), the
system automatically triggers an alert. Additionally, an SOS button is integrated into the device,
allowing the user to manually send an emergency message to their parent or guardian. This
message includes real-time GPS location details, enabling immediate tracking and response.
The device also includes a buzzer and LED indicators to alert nearby people in case of an
emergency.
A mobile application, developed using React Native, acts as the interface between the user and
the parent/guardian. The app is divided into two sections: the User Interface and the Parent
Interface. The user interface provides real-time monitoring of heart rate, SpO2 levels,
microphone input, and motion detection. It also includes a fake call option, an SOS button, and
a video recording feature to capture emergency situations. The contact page allows users to store
emergency contacts for quick access. The parent interface enables guardians to monitor their
child’s vitals, location, and receive emergency notifications when abnormal values are detected
or when the SOS button is pressed. The app also features a map-based navigation system to
guide the parent to the child’s exact location.
ProtectHer offers an efficient and reliable solution to enhance women’s security by providing
real-time monitoring, instant alerts, and seamless communication between the user and their
guardian.

Keywords: Women’s Safety, IoT-based Security, Real-time Monitoring, Emergency Alert


System, GPS Tracking, React Native App, Sensor-based Surveillance

xi
INDEX Page No
1. INTRODUCTION 01
1.1 Introduction of IoT-based Women Safety 01
and Surveillance
1.2 Existing System and Disadvantages 02
1.3 Proposed System and Advantages 03
1.4 Objectives of the Project 05
1.5 Organization of Project 06
2. REQUIREMENTS ANALYSIS 10

2.1 Introduction 10
2.2 Hardware & Software Requirements 11
2.3 Software & Hardware Requirements Specification 14
3. LITERATURE SURVEY 17
3.1 Related Works 17
3.2 Comparative Analysis of Existing Systems 19
3.3 Survey Table 21
4. MODULES 23
4.1 Introduction 23
4.2 Module Implementation 24
5. SYSTEM DESIGN 32
5.1 Introduction 32
5.2 Process Flow of the Project 33
5.3 Flowchart Diagram 36
5.4 UML Diagrams 39
6. SYSTEM IMPLEMENTATION 45
6.1 Introduction 45
6.2 Selection Software 45
6.3 Steps Involved in Implementation of
Algorithm/Technology 48
6.4 Sample Code 51

xii
7. TESTING 56
7.1 Introduction 56
7.2 Functional Testing 57
7.3 Integration Testing 60
7.4 System Testing 61
7.5 Non Fuctional Testing 63
7.6 Test Cases 64

8. SCREENS & REPORTS 65


8.1 Introduction 65
8.2 Screenshots 66

9. CONCLUSION and FUTURE SCOPE 75


9.1 Conclusion 75
9.2 Future Scope 76

10. BIBILOGRAPHY 77
10.1 References 77
10.2 Web Links 78

xiii
LIST OF FIGURES

Figure No. Name of the Figure Page No.

5.1 System Design 32

5.2 Flow Chart Of The Proposed System 38

5.3 Use Case Diagram 40-41

5.4 Class Diagram 42

5.5 Activity Diagram 43

5.6 State Chart Diagram 44

Screenshots and Results

8.1 Security Bag for Womey Safety and Surveillance Prototype 66

8.2 Integration of pulse oximeter and microphone 67

8.3 Connections of ESP32 with sensors 67

8.4 Login Page of the application 68

8.5 Home Page of the User 68

8.6 Fake Call option in User View 68

8.7 Record option in the User view 68

8.8 contact page in the user view 69

8.9 Profile Page of the User 69

8.10 Home Page of the parent Interface 69

8.11 Users Emergency Videos 70

8.12 Notification Dashboard 70

8.13 Sign Up Pages of User and Parent 70

8.14 Delete Functionality of notifications 71

8.15 Profile Page of Parent 71

xii
LIST OF TABLES

Table No. Name of the Table Page No.

2.1 Hardware Requirements 14

2.2 Software Requirements 16

3.1 Comparative Analysis of Existing Systems Table 19

3.2 Survey Table 21

7.1 Sensor Functionality Testcases 57

7.2 Mobile Application Testcases 58

7.3 System Integration & Performance Testcases 60

7.4 Security and Usability Testcases 61

7.5 Unit Testing 62

7.6 Integration Testing 62

7.7 User Interface Testing 63

7.8 Performance Testing 64

7.9 Additional Testing 64

xiii
A Smart Security Device for Women Safety and Surveillance

1.INTRODUCTION

1.1 Introduction of IoT-based Women Safety and Surveillance :

In today’s rapidly evolving technological landscape, the integration of Internet of Things (IoT)
has significantly transformed various domains, including healthcare, security, and surveillance.
Among these, women’s safety remains a critical concern worldwide, necessitating the
development of smart, real-time security solutions. With increasing incidents of harassment,
stalking, and violence against women, traditional safety measures such as mobile applications
and helpline numbers often prove insufficient due to delayed response times or inaccessibility
during emergencies. This has led to the emergence of IoT-based safety devices, which provide
real-time tracking, alert systems, and automated response mechanisms to ensure security and
immediate assistance.
The IoT domain focuses on interconnecting physical devices through the internet, enabling
seamless communication between sensors, microcontrollers, and cloud-based services. IoT-
powered security systems leverage various sensors such as GPS modules, microphones,
accelerometers, and biometric sensors to monitor surroundings and vital signs, thereby offering
proactive security measures. By integrating real-time data processing, cloud storage, and
mobile applications, IoT solutions enhance the effectiveness of security systems in critical
situations.
The ProtectHer project falls under the IoT and smart security domain, where intelligent systems
are designed to detect threats, analyze real-time data, and alert guardians or authorities in case
of emergencies. This project utilizes ESP32 as the core microcontroller to interface with
multiple sensors, including a pulse oximeter (for heart rate and SpO2 monitoring), a
microphone (for abnormal sound detection), an accelerometer (for motion detection), and a
GPS module (for real-time location tracking). Additionally, the SIM900A module facilitates
emergency communication via SMS alerts when an SOS trigger is activated.
The mobile application, built using React Native, plays a crucial role in this ecosystem,
enabling seamless monitoring and interaction between the user and their guardian. The user
interface provides vital health statistics, location tracking, and emergency features such as fake
calls, video recording, and an SOS button. The parent interface, on the other hand, ensures real-
time tracking of the child’s vitals, location, and emergency notifications when abnormal
conditions are detected.

1
A Smart Security Device for Women Safety and Surveillance

1.2 Existing System and Disadvantages:


 The current women’s safety systems rely on traditional methods such as mobile
applications, panic buttons, GPS trackers, and emergency helplines. While these
technologies provide some level of security, they are often ineffective in real-time
emergency situations. Most mobile safety apps require manual activation, meaning the
victim must unlock their phone and press a button to trigger an alert. However, in
dangerous situations, the user may not have enough time or the ability to manually send
an SOS signal. Additionally, many safety applications depend on an active internet
connection, making them unreliable in areas with weak network coverage.
 Wearable safety devices, such as smart rings, bracelets, or pendants with panic buttons,
have also been introduced to enhance women’s security. These devices allow users to send
distress signals with a single press. However, many of them require Bluetooth
connectivity, meaning they must be paired with a smartphone to function. If the attacker
snatches the victim’s phone, these devices become useless. Additionally, some safety
wearables have limited battery life, reducing their reliability in prolonged emergency
situations.
 Traditional safety mechanisms such as panic buttons in public transport and emergency
helpline numbers (e.g., 112, 911) also have significant drawbacks. While these methods
allow victims to contact law enforcement, they are not always effective due to delayed
response times. Many cases of harassment and assault occur in isolated or private spaces,
where public panic buttons are unavailable. Additionally, emergency helpline numbers
may be overloaded or slow to respond, making them unreliable in life-threatening
situations.
 Another major issue with existing safety solutions is the lack of real-time health
monitoring and automated threat detection. Most safety apps and devices focus only on
location tracking and emergency alerts but fail to detect physical distress. For example, if
a person experiences a sudden increase in heart rate due to panic or fear, existing systems
do not recognize it as an emergency. Similarly, if a victim is unconscious or unable to
press the panic button, the system fails to send an alert, leaving the individual vulnerable.
 The absence of video evidence collection is another major limitation of traditional safety
systems. In cases of assault or harassment, law enforcement often lacks sufficient evidence
to identify the perpetrator. Mobile applications and GPS trackers do not capture visual
proof, making legal proceedings difficult. Without proper evidence, tracking down

2
A Smart Security Device for Women Safety and Surveillance

suspects and ensuring justice becomes challenging.


 Cost is another barrier to accessibility. Many advanced safety wearables and GPS tracking
devices come with high purchase costs and monthly subscription fees. This makes them
unaffordable for many people, particularly in developing countries. As a result, women
from low-income backgrounds are often unable to access these safety technologies,
leaving them more vulnerable.
 Additionally, existing safety solutions do not facilitate direct communication with parents
or guardians. In many cases, guardians or trusted family members can respond more
quickly than law enforcement. However, most mobile safety applications prioritize calling
police hotlines instead of sending immediate alerts to parents. This delays rescue efforts
and increases the risk of harm.
 The lack of smart, technology-driven solutions further worsens the situation. Without IoT-
based monitoring, automated distress detection, and AI-powered threat recognition,
traditional safety systems remain reactive rather than proactive. In other words, most
existing solutions only provide assistance after an incident occurs, rather than preventing
it from happening in the first place.

1.3 Proposed System and Advantages :

The IoT Integrated Women’s Safety and Surveillance System, ProtectHer, is designed to
address the escalating challenges of personal security for women by integrating advanced
sensor technology, real-time monitoring, and automated communication features. The
system focuses on continuous monitoring of the user’s health and surroundings, enabling
immediate detection of potential emergencies and rapid dispatch of alerts. Its primary
objective is to offer a reliable, cost-effective, and efficient safety solution that empowers
women by ensuring that help is promptly available when needed.

The automated emergency detection process is achieved through a seamless combination


of state-of-the-art sensors and microcontroller technology. ProtectHer incorporates a
microphone to monitor ambient sound levels, a pulse oximeter for measuring heart rate
and blood oxygen saturation, a GPS module for accurate location tracking, and an
accelerometer for motion detection. These sensors, managed by an ESP32 microcontroller,
continuously analyze the user’s condition and environmental cues. If abnormal readings
are detected—such as a sudden spike in heart rate or elevated sound levels—or if the user

3
A Smart Security Device for Women Safety and Surveillance

manually triggers the SOS button, the integrated SIM900A module immediately sends an
alert message with the current location to pre-registered guardians or parents. This
automated process minimizes dependency on manual activation, ensuring that emergency
notifications are delivered even when the user is incapacitated.

A key feature of the system is its dual-interface mobile application, developed using React
Native, which provides tailored experiences for both the user and the guardian. The user
interface displays real-time data including heart rate, SpO₂ levels, ambient noise, and
motion detection, along with a dynamic map indicating the current location. Additional
features such as a fake call option, which can distract potential attackers, and a video
recording function to capture evidence during an emergency further enhance the system’s
utility. Meanwhile, the guardian interface offers continuous monitoring of the user’s vital
signs and location, delivering instant notifications whenever abnormal conditions are
detected. Direct communication options, like a one-tap call feature, ensure that guardians
can quickly respond to any alerts, facilitating a coordinated and efficient emergency
response.

Beyond immediate emergency management, ProtectHer supports long-term personal


safety and strategic security planning. The system’s continuous data logging and analytics
enable it to track trends over time, offering insights that can help in refining safety
protocols and understanding recurring risk factors. Its modular design allows for future
upgrades—such as the integration of AI-based threat detection or enhanced cloud data
storage for comprehensive incident analysis—ensuring that the solution remains at the
cutting edge of personal security technology. Moreover, by utilizing SMS-based alerts
through the SIM900A module, the system maintains effective communication even in
regions with limited internet connectivity, thereby enhancing its reliability.

Overall, ProtectHer represents a transformative approach to women’s safety by


combining automated health monitoring, precise location tracking, and real-time
emergency communication into one compact, user-friendly package. This comprehensive
safety solution not only reduces reliance on traditional, manually activated systems but
also empowers users and guardians with proactive tools for immediate crisis management.
By bridging the gap between advanced IoT technology and everyday personal security
needs, ProtectHer sets a new benchmark for ensuring a safer environment, ultimately
fostering greater confidence and independence for women in all settings.

4
A Smart Security Device for Women Safety and Surveillance

1.4 Objectives of the Project :


 To develop an IoT-based smart security device that enhances women’s safety and
surveillance by integrating multiple sensors into a compact system.
 To integrate advanced sensors—including a microphone for sound monitoring, a pulse
oximeter for heart rate and SpO₂ measurement, a GPS module for real-time location
tracking, and an accelerometer for motion detection—into the device.
 To continuously monitor both the user’s vital signs and the surrounding environment,
enabling prompt detection of potential emergencies.
 To automate emergency alerts using an integrated SIM900A module that sends SMS
notifications, complete with real-time GPS coordinates, to pre-registered guardians or
parents.
 To design and develop a React Native-based mobile application that provides two
distinct interfaces: one for the user (for monitoring vitals, location, and accessing
emergency features) and one for the guardian (for real-time monitoring and direct
communication).
 To implement both manual and automated alert systems, minimizing the reliance on
manual activation in critical situations where the user may be incapacitated.
 To incorporate innovative features such as a fake call option and emergency video
recording, which can serve as additional measures for distraction and evidence
collection during an incident.
 To ensure reliable operation in areas with limited internet connectivity by leveraging
SMS-based alert mechanisms, thereby maintaining continuous communication during
emergencies.
 To enable data-driven decision-making through the continuous logging and analysis of
sensor data, helping refine safety protocols and enhance overall system performance.
 To provide immediate and direct communication channels between the user and
guardians, thereby reducing emergency response times and ensuring rapid assistance.
 To enhance user empowerment and confidence by offering a comprehensive personal
safety solution that integrates advanced IoT technology with real-time monitoring and
emergency response features.
 To minimize risks by automatically detecting abnormal conditions—such as elevated
heart rate or sudden changes in ambient sound—and triggering alerts without requiring
manual intervention.

5
A Smart Security Device for Women Safety and Surveillance

1.5 Organization of the Project - PROTECTHER


Chapter 1: Introduction
Traditional personal safety solutions, such as basic mobile apps or standalone panic
buttons, often lack real-time monitoring and automated response features. In critical
moments, delays in emergency activation can have serious consequences. This project
introduces an IoT-integrated smart security by combining multiple sensors—including a
microphone, pulse oximeter, GPS, and accelerometer—with an automated communication
module, the system continuously monitors the user’s health and surroundings.

Chapter 2: Literature Review


This chapter reviews existing safety solutions such as mobile safety applications and
wearable devices. It highlights their limitations, including manual activation, dependency on
active network connectivity, and inadequate integration of real-time health monitoring with
location tracking. Prior research on IoT-based personal security systems is analyzed,
revealing a gap in comprehensive solutions that merge sensor data with automated emergency
alerts and dual-interface mobile applications.

Chapter 3: Problem Statement


Current personal safety systems suffer from delayed emergency notifications and
require manual intervention. Many do not monitor vital parameters or environmental cues,
which can be critical during a distress event. There is an urgent need for a system that
automatically detects emergencies—based on factors like abnormal heart rate, high sound
levels, or abrupt motion—and sends immediate alerts.

Chapter 4: Objectives of the Project


 To design a dual-interface mobile application (user and guardian) for real-time monitoring,
emergency alert management, and direct communication.
 To ensure effective operation even in areas with limited internet connectivity through SMS-
based notifications.
 To create a cost-effective, scalable, and user-friendly solution that enhances women’s
personal safety and reduces emergency response times.

6
A Smart Security Device for Women Safety and Surveillance

Chapter 5: System Architecture


The architecture of ProtectHer comprises an integrated network of hardware sensors,
an ESP32 microcontroller for data processing, and a SIM900A module for communication. A
detailed block diagram illustrates the data flow—from sensor input, through processing and
decision-making, to real-time alert transmission and mobile app integration demonstrating the
system’s scalability and reliability in various environments.

Chapter 6: Hardware Components


Key hardware components include:
 ESP32 Microcontroller: Core processing and IoT communication.
 Microphone: Monitors ambient sound levels for potential distress cues.
 Pulse Oximeter: Measures heart rate and SpO₂ levels continuously.
 GPS Module: Provides accurate, real-time location tracking.
 SIM900A Module: Sends SMS alerts with embedded GPS coordinates.
 SOS Button, Buzzer, and LED: For manual activation and local alerting.

Chapter 7: Software Components


The project leverages several software tools:
 Arduino IDE: For programming the ESP32 and sensor integration.
 React Native: For developing a cross-platform mobile application.
 IoT Communication Protocols (Wi-Fi, SMS): Ensuring real-time data transmission.

Chapter 8: Sensor Integration and Data Processing


This chapter explains how sensor data is collected, processed, and interpreted. The
ESP32 microcontroller aggregates inputs from the microphone, pulse oximeter, GPS, and
accelerometer, applying predefined thresholds to detect emergencies. The processed data
triggers automated actions—such as SMS alerts—ensuring prompt response without relying
solely on user intervention.

Chapter 9: Real-Time Monitoring and Alert System


The system continuously monitors vital signs and environmental conditions. If
abnormal readings (e.g., a sudden spike in heart rate or high ambient noise levels) or manual
activation occurs, the SIM900A module sends an SMS alert, complete with the user’s current

7
A Smart Security Device for Women Safety and Surveillance

location, to pre-registered guardians.

Chapter 10: Mobile Application and User Interface


The mobile application, developed with React Native, is divided into two interfaces:
 User Interface: Displays real-time data (heart rate, SpO₂, sound level, motion), a
dynamic map, an SOS button, a fake call option, and a video recording feature for
capturing emergency evidence.
 Guardian Interface: Provides live monitoring of the user’s status, notifications of
emergency alerts, direct communication options (call feature), and navigation
assistance to the user’s location.

Chapter 11: Implementation and Methodology


This chapter details the step-by-step process of integrating sensors with the ESP32,
programming the microcontroller, and developing the mobile app. It covers system calibration,
testing of sensor accuracy, and the configuration of communication protocols. The
methodology ensures robust real-time performance and seamless interaction between the
hardware and software components.

Chapter 12: Emergency Response and Communication


ProtectHer is designed to deliver immediate alerts through automated and manual
triggers. This chapter describes the SMS-based notification system, detailing how alerts are
dispatched even in low-connectivity scenarios. It also explains the direct call and video
evidence features that facilitate a quick and informed emergency response by guardians.

Chapter 13: Testing and Performance Evaluation


Comprehensive testing is conducted to validate sensor accuracy, response times, and
overall system reliability. The performance evaluation includes real-world simulations to
assess the effectiveness of the alert system, mobile app responsiveness, and the accuracy of
location tracking. The results help fine-tune the system for optimal performance under
diverse conditions.

8
A Smart Security Device for Women Safety and Surveillance

Chapter 14: Future Enhancements


Potential future improvements include:
 Integration of cloud-based data storage and advanced analytics for trend analysis.
 AI-driven threat detection and predictive emergency modeling.
 Enhanced mobile app features for improved user experience and direct integration
with emergency services.

Chapter 15: Conclusion


This final chapter summarizes how ProtectHer leverages IoT technology to
revolutionize personal security for women. By automating real-time monitoring, integrating
multiple sensors, and facilitating rapid emergency communication through a dual-interface
mobile application, the system provides a comprehensive, scalable, and cost-effective safety
solution.

9
A Smart Security Device for Women Safety and Surveillance

2. REQUIREMENTS ANALYSIS
2.1 INTRODUCTION
The Requirements Analysis phase is fundamental in understanding and defining the
hardware and software components necessary for developing the ProtectHer smart security
device for women's safety and surveillance. This stage ensures that all functional, technical,
and operational requirements are clearly identified and aligned with the project's goals. The
system is designed to provide real-time monitoring, emergency alerting, and enhanced security
features using IoT technology.

A well-defined requirements analysis is essential because it prevents implementation


issues, improves system performance, and ensures that all hardware and software components
work seamlessly together. The project requires various sensors, a microcontroller for
processing data, a communication module for IoT connectivity, a React Native mobile
application for real-time monitoring, and a database for storing collected data. This section
provides a detailed breakdown of the system’s requirements, explaining their roles and
significance in the overall project.

The ProtectHer system is designed to provide real-time security features by integrating


multiple sensors and components into a smart bag. The primary functions of this system
include:

1. Emergency Alert System:


 Button Activation: Pressing an emergency button triggers an alert to pre-defined
emergency contacts.
 Buzzer & LED Indicator: Emits sound and visual signals to draw attention to an
emergency situation.
 SIM900A Communication Module: Sends an SMS alert containing the live location
of the user.
2. Health Monitoring System:
 Pulse Oximeter Sensor: Measures heart rate (HR) and oxygen saturation (SpO2)
levels.
 Microphone Sensor: Detects high noise levels, indicating distress.
 Accelerometer: Detects sudden movements or falls, which could indicate an

10
A Smart Security Device for Women Safety and Surveillance

emergency situation.
3. Real-Time Tracking & Monitoring:
 GPS Module: Provides real-time location tracking.
 React Native Mobile Application: Allows users and guardians to monitor health
parameters, motion detection, and receive emergency alerts.
 Cloud Database: Stores and manages historical data for analysis and future reference.
4. Video & Audio Recording:
 Camera Integration: Captures emergency video footage for evidence.
 Fake Call Feature: Simulates an incoming call for a quick deterrent effect in
suspicious situations.
5. Parent Monitoring Interface:
 Dashboard: Displays real-time health and location data.
 Notifications: Alerts parents upon SOS triggers or abnormal sensor readings (e.g., HR
> 150 bpm, microphone detecting high noise levels).
 Emergency Video Storage: Allows access to recorded emergency footage.

The IoT-based ProtectHer system is designed to function autonomously, reducing


dependency on manual interventions while enhancing safety and security. By integrating
multiple sensors, a microcontroller, communication modules, and cloud storage, the system
ensures a data-driven approach to personal security. The React Native mobile application
allows parents and emergency responders to monitor real-time data, receive instant alerts, and
respond effectively to potential threats. This section establishes the foundation for analyzing
the necessary hardware and software components, ensuring that the system operates smoothly
and effectively.

2.2 Hardware & Software Requirements


The ProtectHer smart security device integrates a combination of hardware components to
ensure real-time monitoring, emergency alerting, and enhanced security. These components
include multiple sensors for health and environmental monitoring, microcontrollers for data
processing, actuators for alerts, communication modules for IoT connectivity, and a power
supply for continuous operation.
The hardware components can be categorized into five sections:

11
A Smart Security Device for Women Safety and Surveillance

1. Sensors for Health Monitoring and Security


The system employs multiple sensors to monitor the user's health status and detect
distress situations in real-time.
 Pulse Oximeter Sensor (MAX30100) – Heart Rate & SpO2 Monitoring
 Measures heart rate (HR) and oxygen saturation (SpO2) levels.
 Provides real-time biometric tracking for emergency health alerts.
 Helps detect abnormal heart rates, triggering an alert when HR > 150 bpm.
 Microphone Sensor – Distress Detection
 Monitors environmental noise levels to detect distress signals.
 Triggers an alert if high noise levels (e.g., screams) are detected.
 Helps identify potential threats in real-time.
 Accelerometer (ADXL345) – Motion and Fall Detection
 Detects sudden movements or falls, which may indicate an emergency.
 Sends alerts if irregular motion patterns are detected.
 Enhances situational awareness and safety.
 GPS Module (NEO-6M) – Real-Time Location Tracking
 Provides accurate location data for emergency alerts.
 Sends real-time location updates to parents or emergency contacts.
 Enables tracking via the mobile application.
2. Microcontrollers for Processing and Control
 ESP32 Microcontroller
 Serves as the primary processing unit, managing real-time sensor data and
communication.
 Built-in Wi-Fi and Bluetooth connectivity for IoT-based communication.
 Low power consumption, ensuring efficient long-term operation.
 Handles mechanical operations such as activating the buzzer and LED alerts.
3. Actuators for Alerts and Notifications
 Buzzer (Active Piezo Buzzer Module)
 Emits a loud alarm when an emergency is detected

 LED Indicator (High-Intensity LED)


 Flashes to indicate an active alert situation.
 Helps visually notify nearby individuals of an emergency.

12
A Smart Security Device for Women Safety and Surveillance

4. Communication Modules for IoT Connectivity


 SIM900A GSM Module
 Sends SMS alerts to emergency contacts when triggered.
 Enables mobile network-based communication in case of distress.
 Wi-Fi and Bluetooth (Built-in ESP32)
 Enables wireless communication between the device and the mobile
application.
 Supports real-time data transfer and updates.
5. Power Supply and Backup
 Rechargeable Lithium-ion Battery (3.7V, 2500mAh)
 Provides power for continuous operation.
 Ensures functionality even during power outages.
 Voltage Regulator (LM7805)
 Maintains stable voltage output for safe operation.
 Protects components from voltage fluctuations.

By integrating these hardware components, the ProtectHer system ensures an efficient


and reliable solution for real-time security monitoring, emergency alerts, and enhanced
personal safety.

2.2 Software Requirements:


The software system consists of firmware for microcontrollers, a database management
system, cloud backend services, and a mobile application for real-time monitoring and alerts.
Programming and Firmware
 Cpp Programming (Arduino IDE)
 Used to program the ESP32 microcontroller.
 Manages sensor inputs (heart rate, SpO2, microphone, GPS, accelerometer).
 Controls actuators (buzzer, LED, GSM module) and handles data transmission.
 JavaScript & React Native
 Used to develop the ProtectHer mobile application for both user and parent
interfaces.
 Key functionalities include:
o User Interface: Real-time health monitoring, motion detection, location
tracking, SOS button, and emergency video recording.

13
A Smart Security Device for Women Safety and Surveillance

o Parent Interface: Receives alerts for critical events, tracks the user’s
location, and provides emergency response options.

Cloud Backend Services


 Supa base (PostgreSQL-based Cloud Backend)
 Provides API endpoints for secure data retrieval and real-time updates.
 Manages user authentication and secure storage of emergency event data.
 Enables parents and security personnel to instantly access distress signals and
recorded evidence.

2.3 Software & Hardware Requirements Specification :


 Hardware Requirements Specifications

 Table: 2.1 Hardware Requirements Table

Component Specification Function Working Application


Principle

32-bit Receives input Acts as the central


Controls and
microcontroller, from sensors and controller for data
ESP32 processes all
Wi-Fi & communicates via processing and
sensor data
Bluetooth Wi-Fi/Bluetooth communication

Converts sound Monitors for loud


Detects
Microphone A132013 waves into noises and potential
sound levels
electrical signals distress signals

Uses LED
Monitors Detects abnormal
Pulse absorption to
MAX30100 user’s vital heart rate and stress
Oximeter measure blood
signs levels
oxygen

Receives satellite
Sends location to
Tracks real- signals to
GPS Module NEO-6M parent during an
time location determine
emergency
coordinates

14
A Smart Security Device for Women Safety and Surveillance

Uses MEMS
Detects
technology to
sudden Identifies unusual
Accelerometer ADXL345 measure
movements motion or falls
acceleration
or falls
changes

Sends Uses cellular Sends alerts with


SMS Module SIM900A emergency network to send location details to
SMS alerts messages parents

Manually Completes an Allows the user to


Push Button Simple switch triggers SOS electrical circuit send an emergency
alert when pressed alert manually

Converts electrical Alerts user when


Small electronic Provides
Buzzer signals into sound danger is detected or
speaker audible alerts
waves system is activated

Indicates system
Provides Emits light when
LED Indicator light status
visual alerts powered
(active/inactive)

Ensures portability
Powers the Stores and releases and continuous
Battery Pack 3.7V Lithium-Ion
entire system electrical energy operation of the
device

15
A Smart Security Device for Women Safety and Surveillance

 Software Requirements Specifications

Table: 2.2 Software Requirements Table

Component Technology Used Function Features Application

Processes sensor
Executes
Microcontroller Controls sensors, data and sends
Embedded C++ commands in
actuators, and alerts in
Firmware (Arduino IDE) ESP32, handles
data processing emergency
sensor inputs
situations

User-friendly,
Allows users and
Mobile App Provides UI for cross-platform
React Native parents to track
monitoring user support
(JavaScript) health data,
safety (Android &
location, and alerts
iOS)

Manages
Scalable,
Database Management Supabase Stores user data, authentication,
secure, real-
(PostgreSQL- sensor readings, emergency
time data
based) and alerts contacts, and app
updates
data

Location Displays the user’s


Provides real- Live location
Services location and
Google Maps API time GPS tracking, route
directions for
tracking mapping
parents

Ensures seamless
Cloud Handles API Secure
communication
Backend requests between authentication,
Supabase API between IoT
the app and real-time
device and mobile
database updates
app

App Simplifies app Pre-built UI Speeds up mobile


Development Expo development and components, app development
Framework deployment API integration and debugging

16
A Smart Security Device for Women Safety and Surveillance

3. LITERATURE SURVEY
3.1 Related Works on Women Safety and IoT-based Solutions
[1] 2018 - P. Praveen, R. S. Kumar, A. B. Aravind, and J. Kumar, "IoT-Based
Smart Wearable Device for Women Safety"

Women’s safety is a critical concern in today’s world, as cases of harassment and violence
continue to rise. Many existing safety mechanisms rely on manual alerts, which may not always
be feasible during an emergency. To address this issue, a smart wearable device was proposed,
which integrates IoT and sensor-based technologies to provide real-time monitoring and
emergency alerts.

The device features an emergency SOS button that, when pressed, sends an alert message with
the victim’s live location to predefined emergency contacts. Additionally, the system includes
a heartbeat sensor that detects abnormal heart rate variations, a microphone for sound level
analysis, and an accelerometer for motion tracking. If any abnormal conditions are detected,
the system automatically triggers an alert without manual intervention.

The smart wearable device is built using a microcontroller (Arduino/ESP32), GSM module for
SMS alerts, and a GPS module for live tracking. The proposed solution enables quick
emergency response, thereby increasing personal safety and security.

[2] 2019 - S. Gupta, P. Sharma, and A. Khanna, "IoT-Enabled Smart Security


System for Women"

With increasing incidents of crime against women, there is a growing need for intelligent
security systems that can provide immediate assistance during distress situations. This study
introduces an IoT-enabled smart security system that utilizes multiple sensors and
communication modules to ensure the safety of women.

The system is designed to be embedded into wearable accessories such as smart bracelets or
pendants. It features a GPS module for real-time location tracking, a pulse sensor to monitor
stress levels, and a GSM module to send emergency messages. The system is integrated with
a mobile application that allows family members to monitor the user’s location and receive
alerts in case of emergencies.

One key feature of this system is its ability to detect sudden jerks or motion abnormalities,
indicating potential physical assault. If such an event is detected, the system automatically
triggers an SOS alert, providing the exact GPS location of the user. The mobile app also offers
a fake call feature to help the user escape dangerous situations.

[3] 2020 - M. Rani, K. Dutta, and R. Mishra, "Smart Bag for Women Safety with
IoT and AI Integration"

17
A Smart Security Device for Women Safety and Surveillance

This study presents an IoT-based smart bag designed specifically for enhancing women’s
safety. The smart bag is equipped with various sensors, including a pulse oximeter,
microphone, accelerometer, and GPS module. The system continuously monitors the user's
physiological and environmental conditions and triggers an alert if any abnormal readings are
detected.

The smart bag features a dedicated SOS button that instantly sends an emergency alert to
predefined contacts. Additionally, it can automatically detect distress situations by analyzing
heart rate fluctuations, high ambient noise levels, or sudden impact through the accelerometer.
The integration of AI allows the system to learn and improve its response based on past
emergency situations.

A mobile application was developed alongside the smart bag, allowing family members to track
the user’s location, view real-time health data, and receive emergency alerts. The system
enhances personal security and provides immediate assistance in critical situations.

[4] 2021 - J. Kaur, A. Verma, and P. Narang, "Women Safety Using IoT and
Cloud-Based Real-Time Monitoring"

This research highlights the importance of cloud-based IoT solutions for real-time monitoring
of women’s safety. The system integrates wearable sensors and cloud computing to provide
continuous tracking and emergency response features.

The smart device in this study is designed as a wearable accessory that continuously monitors
the user’s heart rate, motion, and sound levels. If an anomaly is detected, such as a sudden
increase in heart rate, loud distress sounds, or abrupt movements, the device triggers an SOS
alert. The alert includes the user's location and sensor data, which are stored on a cloud server
for real-time monitoring.

A mobile application was developed to provide live tracking, emergency contact management,
and voice-based alert features. The system offers a high level of security, ensuring that
emergency responses are fast and efficient.

[5] 2023 - A. Roy, P. Desai, and R. Mehta, "AI-Powered Smart Security System
for Women"

This research introduces an AI-driven smart security system designed to assist women in
distress situations. The system integrates IoT and AI technologies to enhance real-time
monitoring and automated emergency response mechanisms.

The proposed system includes a wearable device that continuously tracks physiological and
environmental conditions. The AI model analyzes sensor data to predict distress situations
based on user behavior and surrounding noise levels. The device is capable of automatically
triggering an alert if an attack is detected, sending the user’s GPS location and live audio
recording to emergency contacts.

18
A Smart Security Device for Women Safety and Surveillance

The study also explores deep learning techniques for sound recognition, enabling the system
to detect distress sounds like screams or cries for help. The integration of AI allows for
proactive threat detection, making the system more reliable and effective.

3.2 Comparative Analysis of Existing Systems


Table: 3.1 Comparative Analysis of Existing Systems Table

Traditional
Wearable Proposed IoT-
Safety Devices AI-Powered Safety
Feature Panic Based ProtectHer
(Pepper Spray, Apps
Buttons System
Whistles)

None (Requires Partial Full (IoT-enabled


Level of Full (AI-based
manual (Button press automatic threat
Automation event detection)
activation) required) detection)

Automated
(Triggered by
Emergency Manual AI triggers alert
No alert system abnormal heart
Alert (User must based on voice/text
rate, motion, mic
Mechanism press button) recognition
levels, or button
press)

Real-Time Yes (Only Yes (GPS-enabled


Yes (Limited to app
Location No after button live tracking via
users)
Tracking press) IoT)

Yes (Monitors
Health &
Partial (Only tracks heart rate, SpO2,
Safety No No
movement) motion, and sound
Monitoring
levels)

Yes (Automatic
Audio/Video voice recording
Yes (Only when
Evidence No No and video capture
manually activated)
Collection during
emergencies)

Yes (IoT-enabled,
Internet &
Yes (Limited to app cloud-based data
Cloud No No
data) storage &
Connectivity
analytics)

19
A Smart Security Device for Women Safety and Surveillance

Moderate Very Fast


Response Slow (User- (Requires Fast (AI-based (Automated
Speed dependent) manual triggers) emergency
activation) detection and
alerting)

Yes (Directly
Fake Call
No No Yes (App-based) accessible via
Feature
mobile app)

Yes (Auto-
Yes (User-
SOS Alert Yes (App-based triggered SMS
No triggered
System emergency alerts) with live location
message)
via SIM900A)

Optimized
Battery &
High (Mobile- (Energy-efficient
Power Not applicable Moderate
based) ESP32-based IoT
Efficiency
system)

Very High (IoT &


High (AI models
Scalability Low Moderate cloud-based, easily
improve)
expandable)

Optimized (Cost-
Cost Low setup cost High (AI
Moderate effective IoT
Efficiency but limited use infrastructure costs)
solution)

Very Low (IoT


High (User must
User Effort Low (AI detects automates
manually Moderate
Required threats) detection and
activate)
alerts)

20
A Smart Security Device for Women Safety and Surveillance

3.3 Survey Table


Table: 3.2 Survey Table

S.no Reference paper Purpose Drawback


Tittle

1. IoT-Based Women Proposes a wearable safety device Requires continuous network


Safety System Using integrated with IoT, GPS, and GSM connectivity for real-time
Smart Wearables to send real-time SOS alerts to alerts. Sensor sensitivity may
emergency contacts. The system lead to false alarms.
uses sensors like pulse oximeters
and accelerometers for distress
detection.
2. AI-Enabled Smart Uses AI and ML to detect distress High computational cost due
Security for Women situations based on sensor data. to AI processing.
Using Machine Features include automated Dependence on large datasets
Learning emergency alerts, location tracking, for training accurate threat
and voice command activation for detection models.
safety.
3. Smart Bag with IoT for
Introduces a smart bag equipped Increased hardware
Women’s Security with panic buttons, GPS tracking, complexity and cost. Battery
and an emergency alert system. It limitations may affect
detects sudden movements or falls continuous monitoring.
and sends alerts with location
details.
4. Implements an IoT-enabled safety Requires a stable internet
device that continuously tracks connection for real-time
Real-Time Women
location, monitors vital signs, and monitoring. Limited
Safety Monitoring
triggers alerts in emergencies. functionality in areas with
System Using IoT
Supports GSM and Wi-Fi for poor network coverage.
communication.
5. Emergency Alert A GSM and GPS-based security Relies solely on manual
System for Women system that allows women to trigger activation, which may not be
Using GSM and GPS an emergency alert through a button feasible in certain distress
press. Sends real-time location situations. No AI-based

21
A Smart Security Device for Women Safety and Surveillance

updates to pre-registered contacts. threat detection for proactive


safety measures..
6. Smart Shoes for A safety device embedded in Requires manual activation,
Women’s Safety footwear with hidden emergency limiting its effectiveness in
buttons, GPS, and GSM modules to unconscious situations. Not
send distress alerts and location suitable for all types of
updates when activated. footwear.
7. Women’s Safety App A mobile application that allows Dependent on smartphone
with Real-Time users to share real-time locations, availability and battery life.
Location Sharing trigger SOS alerts, and access Cannot function effectively
emergency contacts instantly. without an active internet
connection.
8. IoT-Based Smart A smart bracelet equipped with May have sensor calibration
Wearable for Women’s
sensors to detect sudden movements, issues leading to false or
Safety abnormal heart rates, and voice missed alerts. Continuous
recognition for emergency monitoring may drain the
activation. Sends alerts with location battery quickly.
data.
9. GPS-Enabled Smart A discreet safety device in the form Limited functionality beyond
Pendant for Women’s of a pendant that includes an emergency alerts. Battery life
Safety emergency button, GPS tracking, constraints for continuous
and GSM module for real-time monitoring.
alerts.

22
A Smart Security Device for Women Safety and Surveillance

4. MODULES
4.1 Introduction to Project Modules
The ProtectHer system is designed as a modular IoT-based women’s safety and
surveillance solution, ensuring efficiency, scalability, and reliability. The system focuses on
real-time monitoring, emergency alert generation, and location tracking without the use of
Artificial Intelligence (AI) or Machine Learning (ML). Instead, it relies on sensor-based
detection, IoT-driven automation, and cloud-based monitoring to enhance personal security.
Women’s safety remains a critical concern globally, with rising incidents of
harassment, assault, and security threats. Traditional safety measures such as self-defense tools
and emergency helplines often lack real-time monitoring and automated response capabilities.
To address these gaps, ProtectHer introduces a smart security system embedded into a bag,
equipped with multiple sensors to detect distress conditions and trigger emergency alerts
automatically. The system provides real-time location tracking, biometric monitoring, and
emergency communication features, ensuring timely intervention during critical situations.

The ProtectHer system is divided into the following key modules:

 Sensor Module
 Detects biometric data (heart rate, SpO2), motion patterns, and environmental sound
levels.
 Includes GPS for real-time location tracking and an SOS button for instant
emergency activation.

 Data Processing & Alert Module

 Processes input from sensors using ESP32 microcontroller.

 Analyzes distress signals (elevated heart rate, abnormal motion, high noise levels).

 Triggers alerts via GSM module (SIM900A) to send SMS or call notifications to
registered contacts.

 IoT Connectivity & Real-Time Monitoring Module

 Sends real-time sensor data to a cloud-based database (Supabase) for remote


access.

 Enables parents or guardians to monitor the user’s health status, motion activity,
and location.

 Generates alerts when abnormal conditions are detected (e.g., heart rate exceeding

23
A Smart Security Device for Women Safety and Surveillance

150 BPM, distress sounds detected).

 IoT Connectivity & Real-Time Monitoring Module


 Provides a React Native-based mobile interface for both users and parents.
 User Interface:
o Displays real-time heart rate, SpO2, microphone level, motion detection,
and location tracking.
o Offers features like fake calls, emergency SOS activation, and video
recording.
 Parent Interface:
o Receives alerts and real-time location updates.Offers features like fake
calls, emergency SOS activation, and video recording.
o Accesses emergency videos and distress notifications for immediate
action.

Each module plays a vital role in ensuring women's safety while allowing individual
components to be upgraded or modified independently. This modular approach makes
ProtectHer highly adaptable for use in various settings, such as urban areas, universities,
workplaces, and public transport systems.

Unlike AI-based safety solutions, which require high computational resources and
complex data training, ProtectHer is a cost-effective, easy-to-deploy, and real-time IoT-based
solution, making it suitable for everyday use by individuals. The system enhances emergency
response time, reduces risks, and promotes women’s security in real-world scenarios.
This project aims to empower individuals with an automated personal safety system,

helping reduce manual intervention in distress situations and ensuring quick action when

required.

4.2 Implementation of Individual Modules

4.2.1 Sensor Module


The Sensor Module is a critical component of the ProtectHer system, responsible
for monitoring various safety parameters in real-time. This module collects and analyzes data to
detect potential threats and ensure the user's security. It consists of multiple sensors integrated
within a smart security bag, working together to provide accurate threat detection and alert

24
A Smart Security Device for Women Safety and Surveillance

mechanisms.

Components & Types

 Pulse Oximeter (For Heart Rate & SpO2 Monitoring)

Working Principle: The pulse oximeter uses photoplethysmography (PPG) to measure heart rate
and oxygen saturation levels by emitting light and detecting absorption variations in the user's blood
flow.

Application in Security:

 Continuously monitors the user's heart rate and SpO2 levels.

 If heart rate exceeds 150 bpm or SpO2 drops below a critical threshold, an alert is
triggered.

 Sends real-time updates to the parent’s app interface to ensure immediate intervention.

 Microphone (For Threat Detection via Sound Levels)

Working Principle: The microphone captures ambient noise and measures sound intensity
levels, detecting abnormal loud sounds such as distress calls or aggressive interactions.

Application in Security:

 If the sound intensity reaches a critical level (e.g., 100 dB), the system classifies it as a
potential threat.

 Triggers an automatic emergency alert and records audio for evidence.

 Enhances surveillance by enabling remote listening for parents through the app.

 Accelerometer (For Motions and Impact Detection)

Working Principle: The accelerometer measures acceleration forces, detecting sudden movements
or forceful impacts that may indicate physical assault or an emergency situation.

Application in Security:

 Detects rapid motion changes, such as abrupt falls or violent shakes.

 If a sudden impact is detected, an automatic SOS signal is sent to emergency contacts.

 Helps in identifying suspicious activity and possible threats.

 GPS (For Real-Time Location Tracking)

25
A Smart Security Device for Women Safety and Surveillance

Working Principle: The GPS module determines the user’s precise location by triangulating signals
from satellites.

Application in Security:

 Continuously tracks the user's location and updates it in the parent’s app.

 If an emergency is triggered, the live location is shared with emergency contacts.

 Enables geofencing to alert parents if the user exits a predefined safe zone.

 Button (For Emergency SOS Activation)

Working Principle: The SOS button functions as a manual trigger, sending an immediate
distress signal when pressed.

Application in Security:

 Allows the user to send an emergency alert to their parents or guardians.

 Simultaneously activates other safety features, such as video recording and location
sharing.

 Ensures quick response in high-risk situations.

 SIM900A GSM Module(For Communication and Alerts)

Working Principle: The GSM module enables the system to send SMS alerts and establish
calls via cellular networks.

Application in Security:

 Sends real-time SMS alerts with the user’s location in case of an emergency.

 Allows direct calling to emergency contacts via the app.

 Ensures communication even in areas with limited internet access.

Integration & Placement

The placement of each sensor is strategically designed to optimize detection and


classification.

 Pulse Oximeter: Integrated into the strap of the smart bag for continuous monitoring.

 Microphone: Embedded within the bag to capture surrounding noise.

 Accelerometer: Placed strategically to detect sudden movements or impact.

26
A Smart Security Device for Women Safety and Surveillance

 GPS Module: Secured inside the bag for precise tracking.

 Panic Button: Located in an easily accessible position for quick activation.

 GSM Module: Ensures seamless communication and connectivity.

4.2.2 Data Acquisition & Processing Module

The Data Acquisition & Processing Module serves as the core intelligence of the
ProtectHer system. This module collects sensor data, processes it using predefined security
algorithms, and triggers the necessary responses. It is powered by an ESP32 microcontroller,
ensuring efficient real-time monitoring and decision-making.

Central Microcontroller: The Core of Processing

The ESP32 microcontroller acts as the system's processing hub, interfacing with all
sensors and executing safety protocols in real-time.

Functions:

 Collects data from pulse oximeter, microphone, accelerometer, GPS, and other sensors.

 Processes sensor signals and applies classification logic to detect potential threats.

 Synchronizes multiple sensor readings to minimize false alerts.

 Implements error-handling mechanisms to detect sensor malfunctions and ensure


system reliability.

Decision Logic & Algorithms

For effective security monitoring, the system employs predefined threshold values and decision
algorithms.

Heart Rate & SpO2 Monitoring

 If heart rate > 150 bpm or SpO2 < 90%, the system triggers a health alert.

 Sends notifications to the parent's interface for immediate attention.

Sound-Based Threat Detection

 If microphone detects sound levels ≥ 100 dB, a potential threat is flagged.

 Initiates emergency recording and sends an alert.

Motion & Impact Detection

27
A Smart Security Device for Women Safety and Surveillance

 If accelerometer detects sudden impact or unusual motion, an SOS is triggered.

 Video recording and GPS location updates are automatically activated.

Real-Time Location Tracking & Alerts

 GPS updates the parent’s interface with live location data.

 If user leaves a predefined safe zone, an automatic alert is sent.

Emergency SOS Activation

 When the SOS button is pressed, an immediate distress signal is sent.

 Parent receives a notification with GPS location and real-time video.

System Optimization & Reliability

To improve performance, the system employs:

 Data filtering techniques to minimize false triggers.

 Low-power consumption algorithms to enhance battery efficiency.

 Auto-recovery mechanisms for system reboot in case of failures.

This module ensures that all collected sensor data is accurately processed, leading to timely
alerts and effective security interventions. By integrating intelligent decision-making with real-
time monitoring, ProtectHer enhances user safety and provides peace of mind to parents and
guardians.

4.2.3 IoT Connectivity & Real-Time Monitoring Module

The IoT Connectivity & Real-Time Monitoring Module is a crucial component


of the ProtectHer system, ensuring seamless communication and real-time monitoring of
security parameters. This module facilitates instant data transmission, enabling parents and
guardians to remotely monitor their child's safety and receive immediate alerts in case of
emergencies.

Reliable Communication Technologies for Real-Time Data Transmission

To enable real-time data transfer, the ProtectHer system uses Wi-Fi and GSM-based IoT
communication. These technologies ensure fast, secure, and cost-effective data transmission,
supporting continuous remote monitoring and instant alerts.

28
A Smart Security Device for Women Safety and Surveillance

 The system is equipped with an ESP32 Wi-Fi module to establish a stable connection
with a cloud server.

 A SIM900A GSM module is included to provide backup communication via SMS and
calls in case of Wi-Fi unavailability.

 Sensor data, such as heart rate, SpO2 levels, sound levels, motion detection, and
location, is continuously transmitted to a remote platform for processing and analysis.

 Historical safety data can be analyzed to identify potential risk patterns and enhance
preventive measures.

 The system presents security data through graphs, notifications, and a mobile
dashboard, making it easier for parents to assess safety conditions in real-time.

Automated Alerts and Notifications for Efficient Waste Management

A key feature of this module is the automated alert system, which ensures that
guardians receive immediate notifications when an abnormality is detected. This enhances
responsiveness and allows for prompt intervention in emergency situations.

 SOS Alerts: When the emergency button is pressed, the system instantly notifies
parents via SMS, app notifications, and automated calls, sharing real-time location and
security data.

 Heart Rate & SpO2 Alerts: If the heart rate exceeds 150 bpm or SpO2 falls below a
critical level, an alert is triggered, prompting immediate attention.

 Threat Detection Alerts: If the microphone detects a high noise level (≥100 dB) or the
accelerometer identifies sudden movement or impact, a potential threat is flagged, and
an emergency alert is sent.

 Location-Based Alerts: If the user moves beyond a predefined safe zone, an automatic
notification is triggered, allowing guardians to track their location in real-time.

 Sensor Malfunction Alerts: If any sensor fails or provides inconsistent data, an alert
is generated to ensure timely maintenance and prevent false triggers.

Remote Monitoring Capabilities


With ProtectHer, parents and guardians can remotely monitor security parameters
from anywhere using a mobile application. The app provides real-time access to:

29
A Smart Security Device for Women Safety and Surveillance

 Live heart rate, SpO2, and sound level data.

 Motion detection and emergency video recordings.

 GPS-based live location tracking.

 A history of alerts and notifications for trend analysis.

By integrating advanced IoT connectivity and real-time monitoring, ProtectHer ensures


proactive threat detection, timely interventions, and enhanced security, giving peace of mind to
both users and their guardians.

4.2.4 User Interface Module


The User Interface (UI) Module is a critical component of the ProtectHer system,
designed to provide a user-friendly dashboard for real-time security monitoring, system control,
and data visualization. This module allows users and guardians to track safety parameters,
configure security settings, analyze safety trends, and receive emergency alerts through a
seamless mobile and web application.

Dashboard & Data Visualization

The UI dashboard serves as the central hub for real-time security monitoring, offering live data
and historical insights. Key features include:

 Real-time Sensor Data: Displays live readings from heart rate, SpO2, microphone
sensitivity, motion detection, and GPS tracking.
 Graphical Security Trends & Analytics: Presents historical safety data through
graphs, heatmaps, and charts, enabling pattern analysis.
 Geolocation Tracking: A map-based interface allows real-time tracking of the user's
location and movement history.
 Security Alerts: The dashboard highlights critical security events, ensuring quick
response to emergencies.

Users can customize the dashboard by filtering data by time, event type, or location, as well as
export reports for analysis. The system also provides predictive analytics, enabling early
intervention based on detected trends.
Interactive Features & User Engagement

30
A Smart Security Device for Women Safety and Surveillance

The ProtectHer UI Module includes several interactive features to enhance safety awareness and
emergency preparedness:
1. Emergency Contact Management:
o Users can store and manage emergency contact details.
o Emergency contacts receive real-time SOS alerts and location updates.
2. Geofencing & Safe Zone Alerts:
o Users can set predefined safe zones.
o Alerts are triggered if the user moves outside the safe zone.
3. Threat Detection System:
o The app analyzes audio and motion data to detect threats.
o Instant alerts are generated for potential security threats.
4. Emergency Video Recording:
o Automatically records and saves video evidence during emergencies.
o Videos are securely stored for review by guardians and authorities.
5. Real-Time Notifications & Alerts:
o Alerts for sudden movements, loud noises, or biometric abnormalities.
o Notifications sent via app, SMS, or automated calls.
6. Help & Support Section:
o Provides access to safety tips and emergency guidelines.
o Includes a FAQs section for troubleshooting and guidance.
User Management & Security
To ensure secure access to ProtectHer, the UI module features role-based access
control (RBAC) and data protection mechanisms:
Role-Based Access Control:
 Admin Users (Guardians): Configure system settings, manage emergency contacts,
and receive full security reports.
 General Users: Access live data, configure alerts, and interact with safety features.
Data Encryption & Privacy:
 End-to-end encryption secures all transmitted data.
 Sensitive user data is protected from unauthorized access.
Audit Logs & Tracking:

 Maintains detailed logs of user activities and security events.


 Unauthorized login attempts and security breaches are flagged.

31
A Smart Security Device for Women Safety and Surveillance

5. SYSTEM DESIGN
5.1 Introduction

Women's safety is a significant concern in today's world, with increasing cases of


harassment and threats in public and private spaces. Traditional safety measures, such as
emergency helplines and mobile applications, often fall short in providing real-time assistance
during critical situations. To address this issue, ProtectHer, an IoT-based smart security
system, is designed to enhance women's safety through proactive monitoring and instant alerts.

This system integrates various sensors, including a pulse oximeter, microphone, GPS, and
accelerometer, to detect distress situations based on physiological and environmental
parameters. A button-triggered alert mechanism enables immediate communication with a
designated guardian, sending real-time location updates and critical health data. The device,
embedded within a bag, connects to a React Native mobile application, providing dual
interfaces for both the user and the guardian.

By leveraging IoT, cloud communication, and AI-driven anomaly detection, ProtectHer


aims to provide real-time monitoring, automated emergency alerts, and a secure tracking
system. This technology-driven approach ensures a quick response to emergencies,
empowering users with a smart, efficient, and reliable safety solution.

Fig : 5.1 System Design of IoT System

32
A Smart Security Device for Women Safety and Surveillance

5.2 Process Flow of the Project

1.1 Process Flow of the Project

The ProtectHer system follows a structured workflow to ensure real-time safety


monitoring, accurate distress detection, and instant emergency response. The process
starts when the user activates the system or when sensors detect a potential emergency.

Below is a detailed breakdown of each stage:

Step 1: Sensor Activation and Data Collection

The system continuously monitors various parameters through integrated sensors


embedded in the smart bag. These sensors detect any abnormalities indicating distress or
potential danger

 Pulse Oximeter Sensor: Tracks heart rate and SpO2 levels; abnormal readings (e.g., heart
rate >150 BPM) trigger alerts

 Microphone Sensor: Detects sudden spikes in noise levels (e.g., screaming or loud
disturbances).

 Accelerometer: Identifies sudden jerks, falls, or forceful movements indicating possible


physical assault.

 GPS Module: Provides real-time location tracking for immediate response.

 Manual SOS Button: Allows the user to trigger an alert manually in emergencies.

If any parameter crosses predefined safety thresholds, the system processes the data and
moves to the next step.

Step 2: Data Processing & Threat Assessment

The ESP32 microcontroller processes the collected sensor data and applies predefined
decision-making algorithms to determine the severity of the situation:

 Heart Rate & SpO2 Algorithm: If heart rate spikes or drops abnormally, the system
flags a possible distress situation.

 Noise Detection Algorithm: If the microphone detects high decibel levels for a
sustained period, it triggers an alert.

33
A Smart Security Device for Women Safety and Surveillance

 Motion Anomaly Detection: If the accelerometer registers a sudden impact, indicating


a fall or forceful movement, an alert is generated.

 Multi-Factor Analysis: The system cross-verifies multiple sensor readings to reduce


false alarms.

Once a distress situation is confirmed, ProtectHer moves to the alert phase.

Step 3: Emergency Alert & Communication

If the system detects a potential emergency, it automatically sends an alert to the


registered guardian through SMS and mobile notifications. The message includes:

 Real-time location (GPS coordinates).

 Detected emergency type (e.g., high heart rate, sudden motion, noise spike).

 Live microphone feed (if required for further analysis).

Additionally, the buzzer and LED indicator in the bag activate to attract attention and deter
potential threats.

Step 4: IOT & Mobile App Integration

The emergency data is transmitted to the ProtectHer mobile application ensuring


real-time monitoring via the user and guardian interfaces:

 User Interface: Allows the user to trigger an emergency alert manually, access fake
call features, and record videos for evidence.

 Guardian Interface: Displays the user's real-time location, emergency status, and
access to past alerts.

 Cloud Storage: Stores distress event logs and emergency videos for future reference

Step 5: Safety Actions & Incident Resolution

Once an alert is received, guardians can take immediate action:

 Call the User Directly: The guardian can initiate a call through the app.

 Track the User's Movement: Real-time location updates help in reaching the user quickly.

 Access Emergency Videos: If activated, the system records a short video to provide context
for the situation.

34
A Smart Security Device for Women Safety and Surveillance

If the situation escalates, the guardian can escalate the matter to local authorities or
emergency responders.

Step 5: Post-Incident Reporting & Data Analytics

The system logs emergency incidents for future reference, allowing users and guardians
to review past alerts. Authorities can also analyze the data for:

 Identifying high-risk areas based on reported incidents.

 Understanding patterns of distress situations to improve prevention strategies.

 Enhancing user safety awareness through data insights.

35
A Smart Security Device for Women Safety and Surveillance

5.3 Flowchart Diagram :


This flowchart represents the operational workflow of the PROTECTHER360: A Smart
Security Device for Women Safety and Surveillance system. It describes how the device
reacts during an emergency situation. Here's a step-by-step detailed explanation:
1. Start
The process begins when the device is powered on or initiated.

2. Initialize Sensors & Modules (Pulse, Mic, GPS, GSM)


 The system activates all the essential hardware components:
o Pulse Sensor: Monitors heart rate to detect stress or panic.
o Microphone: Listens for loud noises or distress signals.
o GPS Module: Used to fetch real-time location coordinates.
o GSM Module: Responsible for sending SMS and making calls.

3. Monitor Pulse & Sound (Continuous Monitoring Loop)


 The device starts monitoring the user’s pulse rate and surrounding sound levels
continuously.
 It checks if there's any abnormality:
o High heart rate (indicating panic)
o Sudden loud noise (screaming, shouting)

4. Emergency Triggered? (Button Pressed & Abnormal Data)


 The system checks for two emergency conditions:
o Manual Trigger: Panic button is pressed.
o Automatic Trigger: Pulse or sound crosses danger thresholds.
 If “No”: Go back to monitoring.
 If “Yes”: Proceed to next steps for emergency handling.

5. Fetch GPS Coordinates


 The device fetches the user’s current location via the GPS module.
 This is essential for accurately locating the victim.

36
A Smart Security Device for Women Safety and Surveillance

6. Generate Alert Message (GPS + User Info)


 The system creates an emergency alert message.
 This message typically contains:
o Live location coordinates
o User identification (name, ID, etc.)
o Brief context or tag indicating it’s an emergency

7. Send SMS & Call Via GSM


 The alert message is sent through SMS to emergency contacts.
 At the same time, an automated call is made via the GSM module to the primary
contact or emergency services.

8. Send Notification via App


 A real-time notification is pushed to the companion mobile application for caregivers
or authorities.

9. Update Supabase Database


 The event data (including time, GPS, status) is stored in Supabase (used as the
backend database).
 This helps in maintaining logs and further investigation.

10. Display on Web Dashboard


 The updated data is visualized on a web-based dashboard for real-time monitoring.
 Authorized personnel can see the user's location and emergency status.

11. End & Wait for Next Event


 Once the emergency workflow is executed, the system resets and returns to
monitoring mode waiting for the next trigger.

37
A Smart Security Device for Women Safety and Surveillance

Fig : 5.2 Flow Chart Of The Proposed System

38
A Smart Security Device for Women Safety and Surveillance

5.4 UML Diagrams :

Use Case Diagram

This diagram illustrates how the ESP32 Microcontroller-based IoT device communicates with
the guardian (emergency contact) and how it triggers safety mechanisms during emergency
situations.
Components and Use Cases:
1. ESP32 Microcontroller (IoT Core):
o The main controller that reads sensor data and performs programmed actions.
o Interacts with various alert mechanisms and communication modules.
2. Use Cases under “Alerts”:
o Send Emergency Message:
When a panic situation is detected (via button press or vital sign anomalies), the
device sends an emergency message (e.g., SMS or app push notification).
o Trigger Alert:
Sends out an immediate alert to the guardian through the connected system.
o Activate Buzzer:
A loud buzzer is activated to draw public attention to the victim’s location,
serving as a deterrent to attackers.
o Activate LED:
Useful for visibility in low-light situations or to indicate the device is in alert
mode.
3. Guardian (Emergency Contact):
o Acts as the receiver of emergency signals.
o This person has access to the Guardian Interface through a mobile or web
dashboard.
4. Guardian Interface Functionalities:
o Monitor Child's Vitals:
The guardian can view live health data such as pulse, SpO2, etc.
o Receive Emergency Notifications:
Real-time alerts received during panic or abnormal conditions.
o View Child’s Location:
Uses GPS data to pinpoint the wearer’s current position.
o Navigate to Child’s Location:

39
A Smart Security Device for Women Safety and Surveillance

Launches maps/navigation apps for real-time tracking to help the guardian reach
the person quickly.

Fig : 5.3 Use Case Diagram of IOT Device

Mobile Application Use Case Diagram

This diagram shows the interaction between the user (wearing the device) and the mobile app
interface that connects to the IoT device for monitoring and control.
Components and Use Cases:
1. Sensors and Modules: These are embedded in the IoT device and connected via the
ESP32 microcontroller.
o Monitor Vitals:
Collects data like heart rate, oxygen level (SpO2), and sends it to the app.
o Detect Motion:
Senses sudden movements or falls which could indicate a distress situation.
o Detect Loud Sound:
Identifies sudden loud noises (screams, shouts) possibly indicating danger.
2. User (Mobile App User - the woman):
o The person using or wearing the safety device.
3. User Interface Functionalities in the App:
o Press SOS Button:

40
A Smart Security Device for Women Safety and Surveillance

Manually sends an emergency alert when the user feels threatened.


o View Heart Rate & SpO2 Levels:
Displays real-time vitals data being collected from sensors.
o Fake Call Option:
An intelligent distraction or protective measure, simulates a call to help the user
escape awkward or risky situations.

o Video Recording:
Starts recording video/audio as evidence during an emergency or for
surveillance.
o Store Emergency Contacts:
Lets users set who should receive alerts when the panic button is pressed or vital
anomalies are detected.

Fig : 5.4 Use Case Diagram of Mobile Application

41
A Smart Security Device for Women Safety and Surveillance

Class Diagram
The UML Class Diagram defines the object-oriented structure of the PROTECTHER360
system by organizing key classes such as IoTDevice, GSMModule, GPSModule, MobileApp,
SupabaseDB, and WebDashboard, each responsible for specific functionalities. The IoTDevice
class serves as the central controller, collecting sensor data, analyzing vitals, and triggering
alerts. The GSMModule handles emergency communication by sending SOS messages and
making calls, while the GPSModule provides real-time location tracking. The MobileApp,
developed using React Native, notifies guardians with emergency alerts and displays real-time
tracking. The SupabaseDB ensures secure storage of sensor readings, location data, and
emergency logs, enabling data retrieval for future reference. The WebDashboard fetches and
visualizes real-time safety alerts, allowing authorities to monitor incidents efficiently. The
IoTDevice interacts with all modules, ensuring rapid emergency response, while SupabaseDB
provides data support for the WebDashboard, creating a seamless, real-time, and automated
women’s safety solution.

Fig : 5.5 Class Diagram of Proposed System

42
A Smart Security Device for Women Safety and Surveillance

Activity Diagram
The activity diagram illustrates the workflow of the IoT-based Women Safety and Security
System, from threat detection to emergency response. Sensors (Microphone, MAX30102,
MLX90614, MPU6050) continuously monitor voice, heart rate, body temperature, and motion
patterns. If a distress signal (scream, abnormal vitals, or sudden movement) is detected, the
ESP32 processes the data and triggers an alert.The system captures an image using the OV7640
camera and retrieves the user's GPS location via the Neo-6M module. This data is transmitted
via Wi-Fi/GSM (ESP32 & GSM 900) to designated contacts and nearby police stations. A
panic button provides manual emergency activation. Alerts, including live location and a short
video, are sent to a cloud database (Supabase) for real-time tracking.This automated response
loop ensures continuous safety monitoring, rapid emergency alerts, and enhanced protection
for women in distress.

Fig : 5.6 Activity Diagram of the Proposed System

43
A Smart Security Device for Women Safety and Surveillance

State Chart Diagram


The Statechart Diagram for the IoT-Based Women Safety and Security System outlines the
sequential states ensuring real-time threat detection and emergency response. The system starts
in the Idle State, continuously monitoring biometric and environmental data using sensors like
a microphone, heart rate monitor, temperature sensor, and motion detector. If an abnormality
is detected, it transitions to the Threat Detection State, analyzing data to confirm distress
signals.Upon confirmation, the system moves to the Emergency Alert State, where the OV7640
camera captures an image, and the GPS module retrieves real-time location coordinates. In the
Data Transmission State, alerts containing the image, location, and sensor readings are sent to
designated emergency contacts and police via Wi-Fi and GSM. The Monitoring & Response
State allows authorities and contacts to track the victim’s location and status through a cloud-
based platform.The User Interaction State enables users to configure emergency contacts,
adjust sensitivity settings, and review past alerts. This system ensures automated threat
detection, rapid alerts, real-time tracking, and continuous monitoring, providing enhanced
safety and security for women in distress through IoT technology.

Fig : 5.7 State Chart Diagram of the Proposed System

44
A Smart Security Device for Women Safety and Surveillance

6.SYSTEM IMPLEMENTATION
6.1 Introduction to Implementation

The implementation of ProtectHer integrates IoT technology, sensor-based monitoring,


and real-time alert mechanisms to create an intelligent security system for women's safety. This
system is designed to detect distress situations by continuously monitoring heart rate, motion,
noise levels, and location using sensors embedded in a wearable smart bag.
ProtectHer integrates IoT sensors, cloud computing, and mobile connectivity to provide
real-time safety monitoring. The system analyzes sensor data, detects distress situations, and
triggers instant alerts to guardians via SMS and a React Native app. It also activates a buzzer
and LED for local deterrence. The mobile app enables location tracking, emergency
notifications, and video recording, ensuring a proactive and automated security solution for
women's safety.
At the core of the system, the ESP32 microcontroller processes data from multiple
sensors, including a pulse oximeter, microphone, accelerometer, and GPS module, applying
predefined algorithms to identify potential threats. If abnormal activity is detected—such as a
sudden spike in heart rate, loud noise, or rapid movement—the system automatically triggers
an SOS alert. The alert, along with the user’s real-time location, is transmitted via Wi-Fi or
GSM (SIM900A) to a registered guardian through SMS notifications and a React Native
mobile app.
The mobile application provides an intuitive interface for both users and guardians,
enabling real-time monitoring, emergency response, and historical data analysis. Additionally,
a buzzer and LED indicator in the smart bag activate during emergencies to attract attention
and deter potential threats. By leveraging cloud storage, IoT connectivity, and automated
decision-making, ProtectHer ensures proactive threat detection, immediate intervention, and
enhanced security, making it an innovative and reliable personal safety solution.

6.2 Selection of Software and Hardware Technologies

For the successful implementation of ProtectHer, selecting the right hardware and
software components is crucial. The hardware components ensure accurate data collection
from sensors, while the software components enable real-time processing, cloud integration,
and mobile application functionality. The proper selection and integration of these

45
A Smart Security Device for Women Safety and Surveillance

technologies enhance the system’s efficiency, ensuring automated safety monitoring, rapid
alerts, and reliable communication between the user, guardian, and emergency responders.

6.2.1 Hardware Components

The hardware plays a key role in real-time distress detection, location tracking, and
emergency alert activation.
 Pulse Oximeter Sensor (Heart Rate & SpO2 Monitoring)

 Detects sudden spikes or drops in heart rate and oxygen levels to identify distress
situations.

 Helps determine panic, anxiety, or medical emergencies.

 Microphone Sensor (Sound Detection)

 Captures loud noises, screams, or distress sounds, triggering emergency alerts.

 Ensures audio-based threat detection for enhanced security.

 Accelerometer (Motion & Impact Detection)

 Detects sudden jerks, falls, or forced movements, indicating possible danger.

 Helps analyze abnormal activity based on motion patterns.

 GPS Module (Location Tracking)

 Provides real-time location of the user for immediate response.

 Ensures accurate tracking and location sharing with guardians.

 SOS Button (Manual Emergency Trigger)

 Allows users to instantly activate an emergency alert if they feel unsafe.

 Sends live location updates and distress notifications to registered contacts.

 Buzzer & LED Indicators (Emergency Deterrence)

 Activates an alarm in distress situations to attract attention.

 Works as a deterrent against potential threats.

 ESP32 Microcontroller (System Controller & Data Processing)

 Processes sensor inputs and applies decision-making algorithms.

46
A Smart Security Device for Women Safety and Surveillance

 Transmits data via Wi-Fi/GSM to the cloud and mobile application.

6.2.2. Software Components

The software components handle sensor data processing, cloud integration, and mobile
application functionalities to provide real-time security monitoring.

6.2.2.1 Programming Languages and Firmware Development

 Embedded C (Microcontroller Programming)

 Controls sensor operations and data transmission between components.

 Implements decision-making logic for distress detection.

6.2.2.2 Cloud Storage and Database Management

 Supabase (User Authentication and Cloud Storage)

 Provides user authentication, allowing secure access to system functionalities.

 Stores user credentials, roles, and permissions, ensuring controlled access to data.

 Enables secure API integration with the mobile application.

 MongoDB (Real-time Data Storage & Analysis)

 Stores real-time data about:

o User location and movement patterns.

o Heart rate and motion logs for anomaly detection.

o Emergency alert records and notifications.

o Provides fast querying and retrieval of historical of collection data for analysis.

6.2.3 Mobile Application for User Interaction

React Native (Mobile App Development)

A cross-platform framework used to develop the mobile application, providing real-


time security monitoring and alerts.

Key Features:

 Live Sensor Data – Displays real-time heart rate, SpO2, and motion activity.

 SOS Alerts & Location Tracking – Sends distress signals with live location updates.

47
A Smart Security Device for Women Safety and Surveillance

 Emergency Video Recording – Captures and stores video footage during emergencies.

 Guardian Notifications – Alerts guardians about unusual sensor activity.

 Security Analytics – Provides insights into past alerts and activity patterns.

6.2.4 Communication and Data Processing Technologies

IoT Protocols (MQTT/HTTP for Data Transmission)


 Enables seamless data transfer between sensors, cloud storage, and the mobile app.

 Uses MQTT for lightweight, real-time communication with minimal power


consumption.

6.3 Steps Involved in Implementation of Waste Segregation System

The implementation of ProtectHer involves a structured approach to ensure real-time


safety monitoring, emergency alerts, and secure data processing. The process includes hardware
integration, firmware development, cloud setup, mobile application deployment, and system
testing. These steps ensure that the system functions efficiently, providing automated distress
detection, live tracking, and rapid emergency response.

6.3.1 Hardware Assembly and Sensor Integration

The first step is assembling the required hardware components and integrating them with
the ESP32 microcontroller.
 Installing Sensors for Waste Detection:
 Pulse Oximeter Sensor – Monitors heart rate and SpO2 to detect stress or panic.
 Microphone Sensor – Captures high-intensity sound levels (e.g., distress calls).
 Accelerometer – Detects sudden movement, falls, or forced motion.
 GPS Module – Tracks the real-time location of the user.
 SOS Button – Enables the user to trigger an emergency alert manually.
 Buzzer & LED – Activates alarms for deterrence in emergency situations.
 Microcontroller Selection and Configuration:
 Choosing a Arduino as the core processing unit.
 Connecting sensors to the microcontroller and calibrating their sensitivity for accurate
readings.
 Programming sensor logic to detect emergencies and trigger alerts.

48
A Smart Security Device for Women Safety and Surveillance

This ensures that the hardware is properly configured to capture real-time security data.

6.3.2 Firmware Development and Sensor Calibration

Once the hardware is set up, the firmware is developed to process sensor data and send
alerts to the cloud.

 Writing Sensor Code:


 Using Embedded C to program the microcontroller.
 Implementing emergency detection algorithms based on sensor input.
 Setting up threshold values for heart rate spikes, loud noise, and sudden movement
 Data Transmission to Cloud:
 Configuring MQTT/HTTP to send real-time alerts to the mobile app.
 Ensuring low-latency data transfer for instant emergency responses.
 Testing and Calibrating Sensors:
 Running trials to detect distress situations based on sensor data.
 Adjusting sensitivity to prevent false alarms.
 Verifying seamless communication between sensors, ESP32, and cloud storage.

6.3.3 Cloud Storage and Database Integration

The next step is setting up cloud storage and databases for storing and managing the
emergency logs , user data and system analytics.
 Choosing a Secure Database:
 Using MongoDB to store waste bin data, user details, and sensor data records.
 Implementing efficient indexing and querying for fast data retrieval.
 User Authentication Setup:
 Implementing Supa base for authentication and securing user access.
 Restricting data modification to authorized users (parents, guardians)
 Cloud Connectivity & Data Handling:
 Configuring API endpoints to send sensor data to MongoDB in real-time.
 Implementing data validation checks to prevent incorrect readings.

6.3.4 Mobile Application Development & User Interface Design

To enable users and waste collection teams to monitoring real time sensor readings, a
React Native mobile application is developed. The app includes:

49
A Smart Security Device for Women Safety and Surveillance

 User Interface (UI) Development:


 Designing a simple and interactive UI for users.
 Creating dashboard views for monitoring sensor readings.
 Key Features Implementation:
 Live Heart Rate & SpO2 Monitoring – Tracks physiological responses
 SOS Button & Emergency Alerts – Allows users to trigger immediate help.
 Live Location Tracking – Enables guardians to monitor the user’s location.
 Emergency Video Recording – Captures footage during distress situations.
 Guardian Notifications – Alerts registered contacts of an emergency.
 Security Analytics & Reports – Displays activity history and alerts.
 Connecting the App with Cloud Storage:
 Implementing APIs to fetch real time alerts and sensor data from MongoDB.
 Ensuring seamless user authentication via Supabase.

At this stage, the system enables users to monitor safety conditions and respond to emergencies
efficiently.

6.3.5 System Testing, Deployment, and Optimization

Before deployment, the system undergoes comprehensive testing to ensure reliability.


 Functional Testing:
 Verifying accuracy of heart rate and SpO2 monitoring.
 Ensuring correct detection of high-intensity sound and motion anomalies.
 Testing GPS tracking for real-time location accuracy.
 Checking app notifications for instant emergency alerts.
 Performance Optimization:
 Reducing data transmission latency for real-time alerting.
 Optimizing battery efficiency for long-term IoT sensor operation.
 Enhancing data processing to prevent system overload.

50
A Smart Security Device for Women Safety and Surveillance

6.4 Sample Implementation Code :


Code For Microcontroller
#include <Wire.h>
#include "MAX30100_PulseOximeter.h"
#include <WiFi.h>
#include <HTTPClient.h>
#include <ArduinoJson.h>
#include <TinyGPSPlus.h>
#include <HardwareSerial.h>
// WiFi Credentials
const char* ssid = "Shyam_2.4G";
const char* password = "shyam191";
const char* serverUrl = "http://192.168.29.149/api/sensor-data";
// Mobile number for SMS alert
const char* emergencyNumber = "+919703439780";
// Pulse Oximeter & Sensor Variables
PulseOximeter pox;
#define MIC_PIN 34
#define BUZZER_PIN 27
#define BUTTON_PIN 26
#define LED_PIN 25
#define REPORTING_INTERVAL_MS 1000
uint32_t lastReportTime = 0;
bool panicActivated = false;
// GPS Module
static const int RXPin = 16, TXPin = 17;
static const uint32_t GPSBaud = 9600;
TinyGPSPlus gps;
HardwareSerial gpsSerial(2);
// SIM900A (GSM Module)
HardwareSerial simSerial(1);
// WiFi Connection
void setupWiFi() {

51
A Smart Security Device for Women Safety and Surveillance

WiFi.begin(ssid, password);
Serial.print("\U0001F310 Connecting to WiFi...");
while (WiFi.status() != WL_CONNECTED) {
delay(500);
Serial.print(".");
}
Serial.println("\n WiFi Connected!");
}
// Send Data to API
void sendData(float heartRate, float spo2, int micValue, bool panic, double lat, double lng,
double altitude) {
if (WiFi.status() != WL_CONNECTED) {
Serial.println("⚠ No WiFi! Reconnecting...");
setupWiFi();
return;
}
HTTPClient http;
http.begin(serverUrl);
http.addHeader("Content-Type", "application/json");
StaticJsonDocument<300> jsonDoc;
jsonDoc["heartRate"] = heartRate;
jsonDoc["spo2"] = spo2;
jsonDoc["micValue"] = micValue;
jsonDoc["panic"] = panic;
jsonDoc["latitude"] = lat;
jsonDoc["longitude"] = lng;
jsonDoc["altitude"] = altitude;
String jsonString;
serializeJson(jsonDoc, jsonString);
int httpResponseCode = http.POST(jsonString);
Serial.println(" Sent: " + jsonString);
if (httpResponseCode > 0) Serial.println(" Data Sent!");
else Serial.println(" Failed to Send Data!");

52
A Smart Security Device for Women Safety and Surveillance

http.end();
}
// Heartbeat Callback
void onBeatDetected() {
Serial.println(" Heartbeat detected!");
}
// Panic Button Interrupt
void IRAM_ATTR panicButtonPressed() {
panicActivated = true;
}
// Function to Send SMS via SIM900A
void sendSMS(String message) {
Serial.println(" Sending SMS...");
simSerial.println("AT+CMGF=1"); // Set SMS mode to text
delay(500);
simSerial.print("AT+CMGS=\"");
simSerial.print(emergencyNumber);
simSerial.println("\"");
delay(500);
simSerial.print(message);
delay(500);
simSerial.write(26); // End SMS with Ctrl+Z
delay(5000);
Serial.println(" SMS Sent!");
}
void activatePanicMode() {
Serial.println(" Panic Mode Activated! Sending Emergency Signal...");
digitalWrite(BUZZER_PIN, HIGH);
digitalWrite(LED_PIN, HIGH);

String smsMessage = "Emergency Alert! Panic button pressed.\n";


// smsMessage += "Location: https://maps.google.com/?q=";

53
A Smart Security Device for Women Safety and Surveillance

// smsMessage += String(gps.location.lat(), 6) + "," + String(gps.location.lng(), 6);


sendSMS(smsMessage); // Send SMS alert
delay(5000);
digitalWrite(BUZZER_PIN, LOW);
digitalWrite(LED_PIN, LOW);
panicActivated = false;
}
void setup() {
Serial.begin(115200);
Wire.begin(21,22);
gpsSerial.begin(GPSBaud, SERIAL_8N1, RXPin, TXPin);
simSerial.begin(9600, SERIAL_8N1, 12, 14);
if (!pox.begin()) {
Serial.println(" MAX30100 not found! Check wiring.");
while (1);
}
pox.setOnBeatDetectedCallback(onBeatDetected);
pinMode(BUZZER_PIN, OUTPUT);
pinMode(LED_PIN, OUTPUT);
pinMode(BUTTON_PIN, INPUT_PULLUP);
attachInterrupt(digitalPinToInterrupt(BUTTON_PIN), panicButtonPressed, FALLING);
setupWiFi();
}
void loop() {
pox.update();
int micValue = constrain(analogRead(MIC_PIN), 0, 4095);
float heartRate = pox.getHeartRate();
float spo2 = pox.getSpO2();
double latitude = 0.0, longitude = 0.0, altitude = 0.0;
while (gpsSerial.available() > 0) {
gps.encode(gpsSerial.read());
if (gps.location.isUpdated()) {
latitude = gps.location.lat();

54
A Smart Security Device for Women Safety and Surveillance

longitude = gps.location.lng();
altitude = gps.altitude.meters();
}
}
// Condition to trigger panic mode automatically
if (heartRate > 200 && micValue == 4095) {
Serial.println("⚠ High Heart Rate & Loud Sound Detected! Triggering Panic Mode...");
panicActivated = true;
}
if (panicActivated) {
activatePanicMode();
}
if (millis() - lastReportTime > REPORTING_INTERVAL_MS) {
Serial.printf("❤ HR: %.1f BPM | SpO2: %.1f%% | Mic: %d | Lat: %.6f,
Lng: %.6f\n",
heartRate, spo2, micValue, latitude, longitude);
lastReportTime = millis();

if (heartRate > 0 && spo2 > 0) {


sendData(heartRate, spo2, micValue, panicActivated, latitude, longitude, altitude);
}
}
}

55
A Smart Security Device for Women Safety and Surveillance

7. TESTING
7.1 Introduction
Testing is a critical phase in the ProtectHer360: A Smart Security Device for Women Safety
and Surveillance project. It ensures that the hardware (ESP32, sensors, SIM900A) and software
(React Native mobile app, Supabase integration) function correctly and efficiently. The system
consists of multiple sensors for detecting emergencies, a microcontroller for data processing,
and a mobile application for real-time monitoring and notifications. Each component must be
rigorously tested to ensure accurate emergency detection, stable communication, and seamless
user experience.
The testing strategies for this project include functional, integration, system, and non-
functional testing to verify the correctness, reliability, and efficiency of the entire system.
Proper testing ensures that ProtectHer360 accurately detects distress events, transmits alerts
instantly, and provides parents with real-time tracking and monitoring capabilities.
The functional testing strategy focuses on verifying whether each sensor and module
performs its designated task accurately. The heart rate sensor should detect abnormal spikes in
heart rate, the microphone should recognize high-intensity sounds like screams, and the
accelerometer must correctly identify sudden falls or violent movements. The GPS module
should provide precise location tracking, while the SIM900A module must send SMS alerts
instantly when triggered.
In addition to hardware testing, the mobile application’s core functionalities—including
real-time monitoring, SOS alerts, emergency video recording, and location tracking—must be
tested to ensure they work as intended. Unit testing will be performed on both hardware and
software components to confirm their individual functionalities before system-wide
integration.
Integration testing ensures seamless communication between hardware (ESP32 and
sensors), cloud services (Supabase), and the mobile application (React Native app). The sensors
collect real-time data, which is processed by the ESP32 microcontroller and transmitted to the
cloud or directly to the mobile app. This phase tests whether the data transmission is accurate,
timely, and free from data loss or delays.
System testing assesses the overall functionality of ProtectHer360 under real-world
conditions. The complete system, including sensors, microcontroller, and mobile app, will be
tested together to ensure a cohesive, error-free operation. The system will be tested in various
environmental conditions, such as different light and sound levels, to check for consistent

56
A Smart Security Device for Women Safety and Surveillance

performance.
Beyond core functionalities, non-functional testing is essential for assessing security,
usability, and scalability. Security testing will ensure that data transmission between the IoT
system and the mobile app is encrypted and protected against cyber threats. This is crucial for
safeguarding user privacy, especially for sensitive location data and emergency alerts.
Usability testing will focus on user experience, ensuring that parents can easily access and
navigate the mobile app’s features, such as real-time monitoring, SOS alerts, and emergency
contacts. The app’s interface must be simple, efficient, and accessible to users of different
technical backgrounds.
Scalability testing will determine whether the system can support an increased number of users
or additional IoT devices without performance degradation. This is important for future
expansion, allowing ProtectHer360 to be used by more families or integrated into larger
security networks.

7.2 Test Cases :


1. Sensor Functionality Test Cases
Table: 7.1 Sensor Functionality Testcases
Test
Test Scenario Test Steps Expected Result Status
Case ID
Heart Rate 1. Simulate a normal heart rate
The system correctly
Abnormality (60–100 bpm). 2. Simulate an
detects abnormal
TC_01 Detection abnormal heart rate (>150 Pass
heart rate and
(Pulse bpm). 3. Check if the system
triggers an alert.
Oximeter) detects and sends an alert.
1. Expose the microphone to
Loud Noise normal ambient noise. 2. The system
Detection Generate a loud scream or accurately detects
TC_02 Pass
(Microphone distress sound (>100 dB). 3. loud noise and
Sensor) Check if the system detects triggers an alert.
and sends an alert.
Sudden Motion 1. Keep the device stationary. The system correctly
TC_03 or Fall 2. Simulate a sudden identifies sudden pass
Detection movement or fall. 3. Verify if movements and

57
A Smart Security Device for Women Safety and Surveillance

(Accelerometer) the system detects abnormal sends an alert.


movement and alerts the app.
1. Enable GPS and verify real-
time location updates. 2.
Location The system correctly
Simulate movement to a
TC_04 Tracking (GPS updates and tracks Pass
different location. 3. Check if
Module) real-time location.
the system updates location
accurately in the app.

The system
1. Press the SOS button. 2.
Emergency successfully sends
Check if an SMS alert with
TC_05 Alert (SOS an SOS alert with Pass
GPS coordinates is sent to the
Button) accurate location
parent’s registered number.
data.

2.Mobile Application Test Cases


Table: 7.2 Moblile Application Testcases
Test
Expected
Case Test Scenario Test Steps Status
Result
ID

User is
User Login 1. Enter valid credentials.
TC_1 successfully Pass
Functionality 2. Click "Login."
logged in.
System
1. Enter incorrect
Invalid Login displays error
TC_2 username/password. Pass
Handling message and
2. Click "Login."
denies access.
1. . Enter new user details System
User (name, email, phone, successfully
TC_3 Pass
Registration password). registers a new
2. Click "Register." user.

58
A Smart Security Device for Women Safety and Surveillance

Password reset
1. Click on "Forgot
Forgot instructions are
TC_4 Password." Pass
Password sent to the
2. Enter registered email.
email.
1. Trigger an emergency
App sends an
event (e.g., abnormal
Push emergency
heart rate,loud noise, SOS
TC_5 Notification alert Pass
button press).
Accuracy notification to
2. Wait for app
the parent.
notification.
1. Open the map interface.
Real-Time GPS location
2. Check if the user’s
TC_6 Location updates in real- Pass
current location updates
Tracking time.
correctly.
SOS alert is
1. Press the SOS button
successfully
on the app. 2. Check if an
SOS Button sent with
TC_7 alert message with GPS Pass
Functionality accurate
coordinates is sent to
location
emergency contacts.
details.
1. Navigate to the health
App displays
status section. 2. Check if
View Health real-time
the heart rate, SpO2, and Pass
TC_08 Metrics health sensor
motion data are displayed
data accurately.
correctly.
The system
1. Press the emergency
successfully
Emergency video recording button. 2.
records and
TC_09 Video Verify if the app starts Pass
saves
Recording recording and stores the
emergency
footage.
footage.

59
A Smart Security Device for Women Safety and Surveillance

1. Trigger an emergency
Parent Parent app
event from the user’s successfully
Interface -
TC_10 device. 2. Check if the receives Pass
Emergency emergency
parent app receives a alert
Alerts
notification. notifications.

3.System Integration & Performance Test Cases


Table: 7.3 System Integration & Performance Testcases
Test
Test Scenario Test Steps Expected Result Status
Case ID
1. Trigger an event (e.g.,
App and Sensor abnormal heart rate, loud Data should be
TC_01 Data noise, SOS button press). reflected in the app Pass
Synchronization 2. Check if the app updates immediately.
in real-time.
1. Simulate multiple users
Load Handling App should not slow
TC_02 accessing the app Pass
(High Traffic) down or crash.
simultaneously.
1. Store user emergency System correctly
Data Storage alerts and past location stores and retrieves
TC_03 Pass
and Retrieval data. 2. Retrieve historical past alerts and
emergency logs. location history.
1. Navigate to "Live
GPS-based Location" section. 2. System should show
TC_04 Location Verify if the user's real- accurate location Pass
Tracking time location is displayed updates.
correctly.
1. Simulate an SOS trigger Parent app should
Parent-Child from the child’s device. receive immediate
TC_05 Pass
Connectivity 2. Check if the parent SOS alerts with
receives the alert location details.

60
A Smart Security Device for Women Safety and Surveillance

Emergency 1. Start emergency video


Emergency video is
Video recording. 2. Check if the
TC_06 recorded and stored Pass
Streaming & footage is saved and
correctly.
Storage accessible later.

4.Security and Usability Test Cases


Table: 7.4 Security and Usuability Testcases
Test Case Expected
Test Scenario Test Steps Status
ID Result
User should
successfully log
Secure Login & 1. Enter valid credentials.
TC_01 in with Pass
Authentication 2. Click "Login."
encrypted
credentials.
System should
Unauthorized 1. Enter incorrect
display an error
TC_02 Access username/password. 2. Pass
message and
Prevention Click "Login."
deny access.
The SOS alert
should be
Secure SOS 1. Press the SOS button. 2.
securely
TC_03 Alert Monitor data encryption Pass
transmitted to
Transmission during alert transmission.
emergency
contacts.
1. Check whether only Unauthorized
Parent-Child authorized parents can users should not
TC_04 Pass
Data Privacy view child location and access location
alerts. or alerts.
1. Trigger an SOS alert, All features
Usability of fake call, and emergency should be
TC_05 Emergency video recording. 2. accessible and Pass
Features Evaluate ease of use and function
response time. correctly.

61
A Smart Security Device for Women Safety and Surveillance

5. Unit Testing Table


Table: 7.5 Unit Testing
Test Expected
Test Scenario Test Steps Status
Case ID Result
System detects
Microphone sound level
UT_1 Speak near the microphone Pass
Sensitivity changes and
logs data
Correct heart
Pulse Sensor rate and SpO2
UT_2 Place finger on the sensor Pass
Accuracy readings
displayed
SOS alert is
Button Press
UT_3 Press the emergency button triggered and Pass
SOS Alert
sent
Mobile App Connect the app to the The app syncs
UT_4 Pass
Connectivity ESP32 successfully
Data is saved
UT_5 Data Logging Store SOS and health data Pass
and accessible

6. Integration Testing Table


Table: 7.6 Integration Testing
Test Expected
Test Scenario Test Steps Status
Case ID Result
ESP32 receives
Sensors → Trigger sensors (pulse,
IT_1 and processes Pass
ESP32 mic, accelerometer)
sensor data
GSM module
ESP32 → GSM
IT_2 Trigger an SOS alert sends SMS Pass
Module
successfully
Correct data is
ESP32 → View live sensor readings
IT_3 displayed in real Pass
Mobile App in the app
time

62
A Smart Security Device for Women Safety and Surveillance

The location
GPS → Mobile updates
IT_4 Move the device Pass
App accurately in the
app
Video is
Video
Start emergency video recorded and
IT_5 Recording → Pass
recording uploaded
Cloud Storage
successfully

7. User Interface Testing Table


Table: 7.7 User interface testing

Test Expected
Test Scenario Test Steps Status
Case ID Result

App Home App loads


UI_1 Open the app Pass
Screen Load within 3 seconds

App redirects to
Navigation
UI_2 Click on "Live Tracking" GPS tracking Pass
Menu Test
page
Correct real-
Sensor Data View heart rate, SpO2, and
UI_3 time data is Pass
Display motion levels
displayed

Fake call is
Fake Call
UI_4 Trigger a fake call activated Pass
Feature
successfully

Notification Receive an emergency Notification


UT_5 Pass
Alerts alert appears instantly

63
A Smart Security Device for Women Safety and Surveillance

8. Performance Testing Table


Table: 7.8 Performance Testing
Test Expected
Test Scenario Test Steps Status
Case ID Result
Detection
Sensor Trigger a sensor (mic,
PT_1 occurs within 1 Pass
Response Time pulse, accelerometer)
second
App opens
Mobile App Open app on a low RAM
PT_2 within 5 Pass
Load Speed device
seconds
API Response Fetch location data for Response time
PT_3 Pass
Time 1000 users < 5s
Battery Run the IoT device for 12 Battery lasts as
PT_4 Pass
Consumption hours expected

9. Additional Testing Table


Table: 7.9 Additional Testing
Test Expected
Test Scenario Test Steps Status
Case ID Result
Unauthorized Try logging in without System denies
AT_1 Pass
Access credentials access
Data updates
Multi-User Multiple parents track a
AT_2 correctly for all Pass
Handling single device
users
Mobile App No personal
AT_3 Check stored user data Pass
Privacy data is leaked
Request is
Attempt unauthorized API
AT_4 API Security blocked Pass
request

64
A Smart Security Device for Women Safety and Surveillance

8.SCREENS & REPORTS


8.1 Introduction to System Interfaces
The PROTECTHER360 system integrates multiple interfaces to enable seamless
communication between hardware and software components. At the hardware level, the IoT
device interfaces with various sensors and modules such as the pulse sensor, microphone, GPS,
and GSM through analog and serial communication protocols like UART and I2C. These
interfaces allow the system to monitor vital signs and environmental cues in real time. In case
of an emergency, the GSM module interface is triggered to send SMS alerts and make phone
calls using AT commands. Simultaneously, the GPS module provides the user’s live location
through standard NMEA data. On the software side, the system interfaces with a mobile
application and a cloud database. The mobile app interface enables real-time notifications and
alert displays using push notification services and REST APIs, keeping guardians or authorities
instantly informed. The Supabase cloud database acts as the central data store, receiving alert
data from the IoT device and supplying it to both the mobile app and a web-based dashboard.
The dashboard interface allows administrators or family members to monitor live data, such as
user vitals and GPS location, through API calls and real-time data fetching. Together, these
interfaces ensure that all components of PROTECTHER360 function cohesively to provide a
smart, responsive, and reliable safety system for women in distress.

System Interfaces – Overview


The PROTECTHER360 system relies on a combination of hardware and software interfaces
to achieve smooth and reliable communication between its components. These interfaces are
critical in enabling real-time data flow, emergency alert generation, and monitoring.
1. Sensor Interface
This connects various sensors (pulse sensor, microphone) to the IoT microcontroller. These
sensors provide real-time physiological and environmental data. Communication is typically
analog or digital, and data is processed continuously to detect abnormal conditions.
2. GSM Communication Interface
The IoT device interfaces with the GSM module using AT commands over a UART
connection. This interface allows the system to send SMS alerts and make emergency calls
automatically to predefined contacts when a threat is detected.
3. GPS Interface
The GPS module shares real-time location data with the IoT device via serial communication.

65
A Smart Security Device for Women Safety and Surveillance

This location is embedded in the alert message to help responders track the user accurately.
4. Mobile App Interface
The system uses a RESTful API and push notification service to interface with the mobile
application. This interface ensures that alerts are sent instantly to the user’s guardians or
emergency contacts, with detailed information such as the location and timestamp.
5. Cloud Database Interface (Supabase)
The IoT device sends alert and sensor data to a cloud-based Supabase database using HTTPS
requests. This interface allows for data storage, retrieval, and integration with other systems
like the web dashboard.
6. Web Dashboard Interface
The web interface communicates with the Supabase database to fetch and display real-time
information. It enables authorities or family members to track the device’s activity and location
from a remote browser.

8.2 Screenshots and Output Reports

Fig:8.1 Security Bag Womey Safety and Surveillance Prototype

66
A Smart Security Device for Women Safety and Surveillance

Fig:8.2 Integration of pulse oximeter and microphone

Fig:8.3 Connections of ESP32 with sensors

67
A Smart Security Device for Women Safety and Surveillance

Fig:8.4 Login Page of the application Fig:8.5 Home Page of the User

Fig:8.6 Fake Call option in User View Fig:8.7 Record option in the User view

68
A Smart Security Device for Women Safety and Surveillance

Fig:8.8 contact page in the user view Fig:8.9 Profile Page of the User

8.10 Home Page of the parent Interface

69
A Smart Security Device for Women Safety and Surveillance

Fig:8.6 Home page of the application

Fig 8.11 Users Emergency Videos Fig: 8.12 Notification Dashboard

` Fig 8.13 Sign Up Pages of User and Parent

70
A Smart Security Device for Women Safety and Surveillance

Fig 8.14 Delete Functionality of notifications

` Fig 8.15 Profile Page of Parent

71
A Smart Security Device for Women Safety and Surveillance

8.3 Functional Overview of the ProtectHer App


1. SOS Alert System

The SOS Alert System is designed to provide instant emergency assistance to users in
distress. When the SOS button is activated, the app immediately sends an alert message to pre-
registered emergency contacts, including the user's real-time location. This feature ensures
rapid response during emergencies, increasing personal safety and reducing potential threats.

Additionally, the system integrates with the device's SIM900A module to send SMS alerts
when the user is in danger, even without internet connectivity. The alerts contain vital
information such as GPS coordinates, heart rate, and microphone activity levels, allowing
responders to assess the situation quickly.

2. Live Health Monitoring

The Live Health Monitoring module continuously tracks the user's heart rate and SpO2
levels using a pulse oximeter sensor. This real-time data is displayed in the app, allowing users
and their emergency contacts to monitor their well-being. If abnormal readings (e.g., heart rate
exceeding 150 BPM) are detected, the app triggers an alert to notify the parent or guardian.

This module is crucial in detecting signs of distress, medical emergencies, or anxiety attacks,
ensuring timely intervention. The continuous monitoring enhances user safety by providing an
additional layer of protection beyond physical security measures.

3. Motion Detection & Fall Alert

The Motion Detection & Fall Alert module utilizes the accelerometer sensor to detect
sudden movements or falls. If an unusual motion pattern, such as a violent shake or a sudden
impact, is detected, the system sends an automatic alert to the parent interface with the user's
location.

This feature is particularly useful in situations where the user is unable to manually trigger the
SOS alert. It enhances overall security by detecting possible incidents of physical assault,
accidents, or unconsciousness, prompting immediate assistance.

4. GPS Tracking & Location Sharing

The GPS Tracking & Location Sharing module ensures that parents or guardians can
monitor the user's real-time location. This feature provides a live map interface displaying the

72
A Smart Security Device for Women Safety and Surveillance

user's exact coordinates, movement history, and a navigation route for the guardian to reach
the user's location quickly.

The module also allows users to share their live location with trusted contacts during an
emergency, ensuring that help arrives as soon as possible. This continuous tracking feature is
key in improving situational awareness and enhancing overall user security.

5. Fake Call Feature

The Fake Call module allows users to trigger a fake incoming call to create an excuse
to leave uncomfortable or dangerous situations. The user can set a predefined name and call
schedule, making the fake call appear as real as possible.

This feature acts as a preventive measure against potential threats by providing a non-
confrontational way to exit unsafe scenarios. It is especially beneficial in cases of harassment,
uncomfortable encounters, or social distress.

6. Emergency Video Recording

The Emergency Video Recording module automatically starts recording a video when
the SOS button is pressed or when high-risk situations are detected. The recorded footage is
securely stored in the app and can be accessed by the user or their emergency contacts.

This feature provides crucial evidence in cases of assault or harassment, aiding in law
enforcement investigations. The automatic nature of the recording ensures that incidents are
captured without the need for manual intervention, increasing its effectiveness during
emergencies.

7. Notification & Alert Logs

The Notification & Alert Logs module maintains a record of all SOS activations,
abnormal health readings, motion alerts, and emergency video recordings. This log allows users
and their guardians to review past incidents and analyze potential threats.

Having a well-documented history of alerts enhances accountability and provides valuable


insights into security patterns. This module supports law enforcement and emergency
responders in assessing repeated threats and taking appropriate preventive actions.

73
A Smart Security Device for Women Safety and Surveillance

8. Parental Interface

The Parental Interface provides a comprehensive dashboard where guardians can


monitor the user’s health vitals, location, and emergency alerts in real time. The dashboard
includes:
 Live location tracking
 Health monitoring statistics (heart rate, SpO2 levels)
 Motion detection alerts
 Emergency notifications and SOS logs
The seamless integration of this interface ensures that guardians remain informed about
their child's safety at all times. By offering real-time insights, this module enhances the app’s
effectiveness in providing remote monitoring and quick response capabilities.
9. Contact & Support

The Contact & Support module serves as a direct communication channel for users seeking
assistance. It provides essential contact details, including email addresses and customer support
numbers, ensuring users can report issues or ask questions whenever needed.

74
A Smart Security Device for Women Safety and Surveillance

9.CONCLUSION AND FUTURE SCOPE

9.1 Conclusion
The PROTECTHER360 project offers a comprehensive and intelligent solution to
enhance women’s safety using IoT technology and mobile applications. By integrating real-
time GPS tracking, emergency alert mechanisms (SMS, calls, push notifications), and
continuous monitoring, the system ensures quick response during distress situations. The
wearable device, supported by a React Native mobile application and a Supabase-powered web
dashboard, provides a reliable, user-friendly, and scalable solution for personal security.
Throughout its design, development, and testing phases, PROTECTHER360 has
demonstrated high efficiency in emergency communication, accurate real-time tracking, and
seamless user accessibility. Rigorous testing methodologies—unit, integration, system, and
field testing—have validated its robust performance, data accuracy, and reliability under
diverse real-world conditions. The system’s ability to minimize response times and provide
immediate alerts makes it a powerful tool for enhancing women’s security in both urban and
rural environments.
The rising concerns around women’s safety require proactive, technology-driven
solutions that go beyond traditional safety measures. PROTECTHER360 addresses this need
by combining IoT sensors, smart wearable technology, and cloud-based connectivity to create
a holistic safety ecosystem. Its seamless integration of GPS, heart rate and SpO2 sensors,
microphone, and emergency buzzer ensures instant distress alerts, while the mobile and web
platforms provide real-time monitoring for parents, guardians, and law enforcement agencies.
Moreover, the system’s user-friendly interface, efficient data transmission, and strong
backend architecture validate its stability and effectiveness during testing. Every stage of
testing, from sensor accuracy validation to security and performance testing, confirms the
system’s ability to function reliably in critical situations.
Beyond its current capabilities, PROTECTHER360 lays the foundation for future
innovations in smart security and personal safety. It showcases how IoT, cloud computing, and
mobile technology can be leveraged to address social challenges and improve lives. Compared
to existing safety devices, PROTECTHER360 stands out with its modern IoT capabilities, real-
time response, and intuitive user experience.
PROTECTHER360 is more than just a technological innovation—it’s a transformative
step toward creating a safer environment for women. With its ability to function autonomously,

75
A Smart Security Device for Women Safety and Surveillance

send immediate alerts, and support multi-platform monitoring, the system ensures that help is
always within reach. By harnessing the power of IoT and real-time communication,
PROTECTHER360 not only enhances personal security but also empowers individuals to take
control of their safety like never before.

9.2 Future Scope

While PROTECTHER360 already provides a robust IoT-based framework for women's safety,
future iterations can enhance intelligence, adaptability, and scalability by leveraging emerging
technologies. AI-powered threat detection can analyze behavioral patterns, detect anomalies,
and predict danger by monitoring sudden changes in voice tone or movement. Voice command
activation using wake words like “Help Me” would enable hands-free SOS triggering in
emergencies. Expanding to smartwatch integration (Apple Watch, Wear OS) can enhance
accessibility without requiring a separate device. Geofencing and safe zone automation could
alert users when they exit predefined safe areas or enter high-risk zones based on real-time
crime data. A crowdsourced emergency response network could notify nearby verified
responders (volunteers, police, medics) for immediate assistance. Battery optimization and
solar charging would enhance reliability, especially in outdoor and remote areas with limited
power access. Global deployment with localization—including multi-language support, local
emergency contacts, and law enforcement integration—would make PROTECTHER360
accessible worldwide. Additionally, health monitoring integration with pulse oximeters and
temperature sensors would transform the device into a comprehensive safety and health tracker,
benefiting elderly women and individuals with medical conditions. By incorporating these
advancements, PROTECTHER360 can evolve into an even more intelligent, responsive, and
universally accessible safety solution.

76
A Smart Security Device for Women Safety and Surveillance

10. BIBLIOGRAPHY
10.1 References

1. Review Paper on Women Safety System Shubhankar Gupta, Sudhanshu Ranjan, Mr.
Asim Ahmad CSE Department, SRMCEM, Mau, India CSE Department, SRMCEM,
Sonbhadra, India CSE Department, SRMCEM, Lucknow, India , 2024 .
2. “Protection for women by using a portable smart security device” D. Swathi Assistant
Professor Dept of Electronic & Communication Engineering TKR College of Engineering
and Technology, Meerpet Guggilla Akshitha, Konni Phaninder Reddy, Kammampati
SaiSri , 2023 .
3. J. Satpathy, D. Bhatt, "Smart Wearable Device for Women Safety Using IoT,"
International Journal of Innovative Research in Science, Engineering and Technology,
2021.
4. "The Internet of Things: A Literature Review," Journal of Computer Networks and
Communications, Hindawi, 2020.
5. H. S. Nandan, A. Kulkarni, "Smart Glove for Women’s Safety using IoT," International
Conference on Emerging Trends in Communication Technologies, 2020.
6. Design of a Smart Safety Device for Women using IOT Wasim Akram Mohit Jain, C.
Sweetlin Hemalatha , 2019.
7. A. Sharma, S. Sood, "A Smart Safety Device for Women Security Using Arduino and
GPS Module," International Journal of Engineering Research & Technology (IJERT),
Vol. 8, Issue 07, 2019.
8. Smart Security Device for Women Safety Rishika K K Division of Computer
Engineering, School of Engineering, Cochin University of Science nad Technology,
Kochi-682022, Kerala, India , 2019.
9. Smart Security Device for Women Safety Manasa K.C, SubbaLakshmi SV, Sneha G,
Sowmya SM, Shilpashreeyadav GC Electronics and Communication, RYMEC,
Cantonment Bellary, Karnataka, India , 2018.
10. P. K. Meena, N. Sharma, "Women Security System Using GPS and GSM Module,"
International Journal of Advanced Research in Electrical, Electronics and Instrumentation
Engineering, Vol. 5, Issue 4, 2016.
11. Women Safety Device and Application-FEMME , By D. G. Monisha, M. Monisha,
G. Pavithra and R. Subhashini , 2016.

77
A Smart Security Device for Women Safety and Surveillance

12. R. Piyare, M. Tazil, "Bluetooth Based Home Automation System using Cell Phone,"
IEEE 15th International Symposium on Consumer Electronics, 2011.
13. Arduino Official Documentation – https://www.arduino.cc/en/Guide
14. Supabase Documentation – https://supabase.com/docs
15. Twilio SMS API Guide – https://www.twilio.com/docs/sms
16. OWASP Testing Guide – https://owasp.org/www-project-web-security-testing-guide/

10.2 Web Links

 https://www.who.int/news-room/fact-sheets/detail/violence-against-women
 https://www.geeksforgeeks.org/iot-in-womens-safety
 https://www.iotforall.com/iot-applications-public-safety
 https://www.womensafety.in/technology-enabled-women-security
 https://supabase.com/docs
 https://www.academia.edu/42249274/Smart_Security_Device_for_Women_Safety
 https://developer.android.com/guide
 https://reactnative.dev/docs/getting-started
 https://www.twilio.com/docs/sms/send-messages
 https://www.researchgate.net/publication/339244915_IoT_based_smart_security_and_
tracking_system_for_women
 https://www.tinkercad.com/

78

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy