International Journal of Pure and Applied Mathematics
Volume 119 No. 15 2018, 1863-1868
ISSN: 1314-3395 (on-line version)
url: http://www.acadpubl.eu/hub/
Special Issue
http://www.acadpubl.eu/hub/
HOME SECURITY SYSTEM USING IOT
Tanaya
K. Vadivukarasi* S. Krithiga**
Department of Electronics
Department of Electronics and Department of Electronics and
and Communication
Communication Engineering, Communication Engineering,
Engineering, SRM Institute os
SRM Institute os Science and SRM Institute os Science and
Science and
Technology, Technology,
Technology,
Chennai, India Chennai, India
Chennai, India
[email protected] [email protected] [email protected] Abstract–Now a days the technology is increasing internet as well as boost up the signals. This
rapidly, that leads to an upgradation in home framework mainly envelopes the home security
security system.Automation in security sector system from the sensor, networking, integrates real
makes it more authentic. There are many time data and data management. This proposed
electrical equipment’s are available in home system has high latency and low cost. The system is
which are in necessity of monitoring from a highly reliable and consumes very less power in
remote area all at a time. In this paper a home comparison with existing system. The home security
security system is proposed along with the face system based on some camera connected to the
detection technique. A stand alone system home and the output for this is in real time with the
through Internet of Things as a network of minimum delay in the operation.
communication is implemented. Raspberry Pi is
used as controlling unit codded in Pyhton The objective of this paper is home security
language. using Raspberry Pi through IoT. Images of
authorized person is stored in the data base and
Keywords: The internet of things; Raspberry- when some human encounter the camera, camera
Pi;Python Languages will capture the image and compare that with the
data base. When the image matches with the data
I. INTRODUCTION base the name pop us will come of that particular
The present scenario ensures the safety and authorized human.
security has become an inevitably essential. There is This paper is divided in to six sections.
a regressive progress in the security system as the Section I gives the basic idea about the system.
influence of modern technology is reaching its peak. Section II discuss about the existing systems.
When there is a modern home with minimum human Section III is proposed system. Section IV explains
effort, it’s well known as modern home. Since there the hardware used in this paper. The experimental
is an advent of wireless and digital technologies, all setup with the output results been discussed in the
together it introduces a automated intelligent Section V & VI respectively. Section VII concludes
security system. The automated home security and section VIII gives the overview for the future
system can be designed with the surveillance camera work.
and multiple sensors, and the use of these sensors
will be defining the features of these sensors. Faster II. EXISTING SYSTEM
data transmission is taking place using the Wi-Fi to
security systems which helps the user to control and Gill et al. (2009) explains network enabled
monitor the system globally. digital technology is rapidly introduced in the home
automation. For the purpose of home automation
The new IoT based products and services this technology introduces new and existing
will grow exponentially in next few years predicted opportunities to increase the connectivity of the
by the analysts. The IoT involves different link layer devices. The remote-control technology is rapidly
technologies and a huge range of devices. IoT synchronizing with the expansion of Internet.
provides open access to particular set of data.
Raspberry Pi is a compact minicomputer which is Upadhyay et. Al. (2016) proposed a Home
smart enough to give the good connectivity to the Indoor Positioning System (HIPS), provides location
1
International Journal of Pure and Applied Special
of mobile devices like smart phones and location
care of sensor actuator work. This requires robust
based IoT applications. This paper introduces home
networking infrastructure across the world. This
indoor positioning system using Wi-Fi signals. In
paper proposed an offline online asynchronous
proposed system an intelligentmobile robot
communication strategy for Internet of Things
automatically constructs radio maps for the system.
application where Message Queuing Telemetry
Shetel and Agarwal (2016) explains in their Transport (MQTT) protocol is used. This paper have
paper that IoT enables internet connectivity for all implemented a portable device system on Intel
kind of devices and physical objects in real time Galileo which demonstrate the feasibility of such an
system. The virtualization of this system enables to system without compromising the functionality.
perform activities without direct physical
III. PROPOSED SYSTEM
synchronization between the devices. The IoT
enables to manage multiple jobs without any In this paper we are proposing a Home Security
limitation of distances with the help of intelligent System where the input is taken from the live
devices and high-speed network. person. In this paper we are using Raspberry pi and
Internet of Things. In this project we are making a
Lee et al. (2017) explains in their paper the web
database for the family and we are taking 30 photos
of physical objects is Internet of Thing which
of each of them. As male do have change in
contains the embedded technology helping in
appearance in every few days, it will be easy for the
developing machine to machine or man to machine
algorithm to make sure whether the person is
communication. This paper provides a dynamic data
coming is authorized or not. For making this happen
sheet about the city environment parameters taken
we are using haar algorithm in open CV.
from the stand-alone system.
The image is taken from the live video
Chou et al. (2017) describes in their paper a
streaming and saved into the data base. For saving
home automated system has remote controlled
the memory we are converting each image into the
operation. This paper discusses about the problem
grey scale, using grey scale conversion. Each image
on their installation, finding out the various solutions
has width of 130 pixels and height of 100 pixels for
through different network technologies and trying to
taking the input image form the video streaming.
optimize the use of these system. The Home
Haar algorithm is basically having a cascaded
Automation System (HAS) requires heterogeneous,
version of many input for face parts to identify
an eternal and distributive computing environment’s
which part is which one. And with the particular
careful study to develop the suitable HAS.
calculations of each feature in face we can make a
Kamal et al. (2017) explains in their paper how perfect face detection algorithm.
this paper used Raspberry Pi as the network
If some unauthorized person is coming near the
gateway. This paper uses MQTT(Message Queuing
home the camera will capture their photo and
Telemetry Transport) protocol for sending and
convert it into grey scale and compare with the
receiving the data. All the sensors used in this paper
database. If the image is already stored in database
is been controlled by the web page implementing the
than then the pixels will be more accurate when the
Access Control List (ACL) for providing encryption
output is visible, where as when the input image is
method for the safe transaction of the data’s. This
not stored in database the pixel will match the least.
paper uses various sensors, wired and wireless, are
connected with the Raspberry Pi. Here we are showing how the computer is
connected to the RPI. We need Wi-Fi connection for
Sahadevan et al. (2017) explains in their paper
the connectivity of RPI through the system. And the
how the Internet of Things is amazingly impacting
main gateway for connecting the RPI is Internet of
the attention of consumers and the enterprise
Things. IoT helps in the transaction of the data
electronics market rapidly implementing in home
though one device to other, as the RPI is known as
automation, smart cities, automated industries, etc.
the machine to man and machine to machine
To build these applications many power efficient
transaction of the data.
and low cost sensors are available in the market for
the developers. The server side is taking care of The desktop is not potable and hence we cannot
computational work where as the client side is take it everyplace we go, we can share the screen
taking
2
International Journal of Pure and Applied Special
using same IP address. First we have to connect the
be a grey scale conversion of those images taken and
desktop with RPI and check the Wi-Fi connection,
saved as the data base. As saving the color images
since the Wi-Fi connection is done, we have to
will take more space we are doing grey scale
connect our laptop with the same Wi-Fi connection.
conversion. Maximum we are taking six people
Now just seeing which IP address the RPI is using
images for saving into the data base. When the
we have to give same IP address to the remote
laptop is connected with the RPI using same IP
desktop connection in laptop and wait for the login
address, the laptop’s camera automatically switches
screen. Once the login screen appears we have to
on and start making the data base. Since we are
write the correct credentials and login into the
using this camera for data base the output can also
remote desktop, now the screen which we are seeing
taken in the same camera and output window will
is as same the one on desktop. Now we can control it
come in the laptop screen. Hence we are using the
from the remote area location.
same IP address we can operate the RPI from
IV. HARDWARE USED desktop as well as laptop, as the share same screen.
Raspberry Pi: - The flow of the experiment is given below:
-
The raspberry pi is small a debit card size single
board computer.It has central processing unit with
1.2GH and 64/32-bit quad-core ARM Cortex-A53. It
has an internal memory of 1GB. This Raspberry Pi
consist of RAM, I/O, CPU/GPU, USB hub,
Ethernet, 2x USB, HDMI port, 3.5mm audio jack
and a memory card slot. In this paper we are
connecting the desktop using HDMI to VGA
converter cable. The connection of mouse and
keyboard is given from the USB connection. For this
project we are using open CV software for the face
detection technique. This version of Raspberry Pi is
suitable for this project as the specification matches
with requirement for this project.
Fig 2. Flow Chart
Algorithm of the given program is given below: -
1. The program will import all the files
from library.
2. Giving input image for the comparison
with the data base.
3. Grey scale conversion of each image.
4. The image comparison is done in
haar algorithm.
5. Decision taking after comparison whether
authorized or unauthorized.
Fig 1.Raspberry Pi 6. End of flow.
V. EXPERIMENATL SETUP The haar algorithm is predefined software,
The experimental setup consists of Raspberry Pi where the face detection and rest of the
programming’s are already available. The one which
and a desktop connection through HDMI to VGA
is in need can be downloaded and with some
cable converter. The camera is been connected to the
adjustments it can be calibrated as the user wants it
RPI with the USB port. When we run the program for the use. In this project we have taken 100*130
the camera automatically captures nearly 30 images pixels as the input of the face detection image. The
according to the clarity of the image taken. There haar algorithm is cascaded form of the inputs, where
will each and every features is taken and given as the
input for their specific portion of the face. In this a
face consists of
3
International Journal of Pure and Applied Special
two eyes, a nose, a mouth, forehead, chin, etc. All
Fig 5. Shows the training algorithm for identifying
these features are taken as the input and calculated
the input images stored as the data base. While the
distance for it for future use.
training is coming on the top left of the square box,
VI. OUTPUT RESULTS showing it is comparing the live image with the
database, where the input images are saved.
The below output Fig 3. is showing the first step
of this experiment, where there is a comparison of
the already taken still images and comparing them.
The below output shows the result comparing from
1000 pixels. The image which is close to the input
image we will get the highest pixel value for it. For
example in the below output screen when the image
1 is been compared with the image 4 we got the
highest pixel value of 888.
Fig 5. Training Output
VII. CONCLUSION
In this paper, we have designed and developed a
wireless Home Security System through Internet of
Things module and Raspberry Pi version 3. It is an
active system which will show whether the person is
authorized for home or unauthorized. It is a friendly
user interface system. It is easily installable and can
be used anywhere as this is a wireless system. This
Fig 3. Output Screen for Image system is easily operable, low power consumption
Comparison and low cost. This is developed for remotely
controlled and uses the Wi-Fi for transmission of the
At this stage of project, we are taking live data’s. It is easily installed at any place and can be
input images Fig 4 and those images are saved as the controlled from any remote area.
database after grey scale conversion. Here according
to the program, name is given with the input images. VIII. FUTURE WORK
The home security system has a long way to go.
As the technologies improving every second, with
time we may have many ways for home security
with more light protocol and less delay in the output.
With upcoming technologies there will be good
enhancement in the computer board as well as the
communication protocols, which will make it
simpler as well as more light and secure.
REFERENCE
[1] K. Gill, S. H. Yang, F. Yao, and X. Lu. A zigbee-based home
automationsystem.IEEE Transactions on Consumer
Electronics,55(2):422–430,May 2009.
[2] Y.Upadhyay, A.Borole, and D. Dileepan. Mqtt based
secured homeautomation system. In2016 Symposium on Colossal
Fig 4. Making Live Database Data Analysis andNetworking (CDAN), pages 1–4, March 2016.
4
International Journal of Pure and Applied Special
[3] N.Singh, Shambhu Shankar Bharti, R. Singh, andDushyant
KumarSingh. Remotely controlled home automation system. [20] V.Ghule and S. Sakhare.Smart organization.In2017 IEEE
In2014 Inter-national Conference on Advances in Engineering 7thInternational Advance Computing Conference (IACC), pages
Technology Research(ICAETR - 2014), pages 1–5, Aug 2014. 826–830,Jan 2017.
[21] G. Indrajith and K.Vijayakumar, “Automatic Mathematical
[4] R.Shete and S. Agrawal. Iot based urban climate
and Chronological Prediction in Smartphone Keyboard”
monitoring usingraspberry pi. In2016 International Conference on
International Journal of Engineering and Computer Science ISSN:
Communication andSignal Processing (ICCSP), pages 2008–2012,
2319-7242Volume 5 Issue 5 May 2016, Page No. 16714-16718.
April 2016.
[5] E.Ahmed, I.Yaqoob, A.Gani, M.Imran, and M. Guizani. [22] K. Vijayakumar, N. Divya Sri, M. Vijayashree, “An Effective
Internet-of-things-based smart environments: state of the art, User Revocation and Anti Collusion System for Dynamic Groups
taxonomy, andopen research challenges.IEEE Wireless in Cloud”, International Journal for Research in Applied Science &
Communications, 23(5):10–16, October 2016. Engineering Technology, ISSN: 2321-9653, Volume 4 Issue V,
[6] Y.Upadhyay, A.Borole, and D. Dileepan. Mqtt based May 2016
secured homeautomation system. In2016 Symposium on Colossal [23] Vijayakumar .K, Aravind S, Ullas Kumar S “Preventing data
Data Analysis andNetworking (CDAN), pages 1–4, March 2016. loss and increasing data security using file instance sharing”,
[7] S.Lee, N.Lee, J.Ahn, J.Kim, B.Moon, S. h. Jung, and D. International Journal Of Advanced Research in Biology,
Han.Construction of an indoor positioning system for home iot Engineering, Science and Technology (IJARBEST), volume 2,
applications.In2017 IEEE International Conference on special issue 10, May 2016, Page No. 144-151
Communications (ICC),pages 1–7, May 2017.
[8] P. H. Chou, Y. L. Hsu, W. L. Lee, Y. C. Kuo, C. C. Chang, Y.
S. Cheng,H. C. Chang, S. L. Lin, S. C. Yang, and H. H.
Lee. Development ofa smart home system based on multi-sensor
data fusion technology. In2017 International Conference on
Applied System Innovation (ICASI),pages 690–693, May 2017.
[9] M. S. Kamal, S. Parvin, K. Saleem, H. Al-Hamadi, and A.
Gawanmeh.Efficient low cost supervisory system for internet of
things enabled smarthome. In2017 IEEE International
Conference on CommunicationsWorkshops (ICC Workshops),
pages 864–869, May 2017.
[10] A.Sahadevan, D.Mathew, J.Mookathana, and B. A. Jose.
An offlineonline strategy for iot using mqtt. In2017 IEEE
4th InternationalConference on Cyber Security and Cloud
Computing (CSCloud), pages369–373, June 2017.
[11] R. K. Kodali and S. Soratkal. Mqtt based home automation
system usingesp8266. In2016 IEEE Region 10 Humanitarian
Technology Conference(R10-HTC), pages 1–5, Dec 2016.
[12] A.Sahadevan, D.Mathew, J.Mookathana, and B. A. Jose.
An offlineonline strategy for iot using mqtt. In2017 IEEE
4th InternationalConference on Cyber Security and Cloud
Computing (CSCloud), pages369–373, June 2017.
[13] Y.Upadhyay, A.Borole, and D. Dileepan. Mqtt based
secured homeautomation system. In2016 Symposium on Colossal
Data Analysis andNetworking (CDAN), pages 1–4, March 2016.
[14] M. H. Asghar and N. Mohammadzadeh. Design and
simulation of energyefficiency in node based on mqtt protocol in
internet of things. In2015International Conference on Green
Computing and Internet of Things(ICGCIoT), pages 1413–1417,
Oct 2015.
[15] A.Sinha, S.Sharma, P.Goswami, V. K. Verma, and M.
Manas.Design of an energy efficient iot enabled smart system
based on dalinetwork over mqtt protocol. In2017 3rd
International Conference onComputational Intelligence
Communication Technology (CICT), pages1–5, Feb 2017.
[16] V.Patchava, H. B. Kandala, and P. R. Babu. A smart home
automationtechnique with raspberry pi using iot. In2015
International Conferenceon Smart Sensors and Systems (IC-SSS),
pages 1–4, Dec 2015.
[17] I. Aydin and N. A. Othman. A new iot combined face
detection of peopleby using computer vision for security
application. In2017 InternationalArtificial Intelligence and Data
Processing Symposium (IDAP), pages1–6, Sept 2017.
[18] D.Pavithra and R. Balakrishnan. Iot based monitoring
and controlsystem for home automation. In2015 Global
Conference on Communication Technologies (GCCT), pages 169–
173, April 2015.
[19] S. L. S. S. Harsha, S. C. Reddy, and S. P. Mary.
Enhanced homeautomation system using internet of
things.In2017 InternationalConference on I-SMAC (IoT in
Social, Mobile, Analytics and Cloud)(I-SMAC), pages 89–93,
Feb 2017.
5
1868