0% found this document useful (0 votes)
11 views21 pages

Seminar Report Format 2024aJIT

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views21 pages

Seminar Report Format 2024aJIT

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Low Cost Energy Efficient

Smart Security System using


IOT Network

A Technical Seminar Report


submitted in partial fulfillment of
the requirement for the B.Tech.
under Biju Patnaik University of Technology, Rourkela.

Submitted By

Ajit kumar Swain Regd No. # ETC 2101109314

MONTH - YEAR

Under the guidance of


Mr. Debasish Surya Narayan Das
Parala Maharaja Engineering College, Sitalapalli
Berhampur, Ganjam, Odisha - 761003
BONAFIED CERTIFICATE
ABSTRACT
A security system with CCTV and other network nodes in IoT deals with large
amount of data, so the need for devices with larger storage space comes into the
picture which is a bit costlier. Traditional security systems are more power consuming
as it has to record for 24x7 with more throughput but less efficient. Thus need human
in middle to upload into cloud is needed. In this work, we propose a low-cost energy
efficient smart security system for CCTV with other network nodes. Whenever
motion is detected by passive infrared (PIR) sensor, at that time only the camera and
all other security sensor nodes in network are activated (Switched on), the captured
video and information (sensor data) are stamped on the image using image processing
techniques on Python platform. It will be stored in a local storage device, after certain
threshold (based on sensitivity of the location) data will be uploaded into the cloud
along with data log created during processing stage by Python programming model.
In this way, we can reduce the amount of data to be stored (as no recording when
idle), consumed power (as device is switched off when idle), maintenance cost (as
fully programmed). No need for human in middle for uploading data into the cloud
(as program will upload data in to cloud). Because of time, date and information (data
from sensor nodes) stamping on each frame of video using python programming
model video access becomes easier, as data log will be created.

i
ACKNOWLEDGEMENT

I would like to express my immense sense of gratitude to my guide, Mr.Debasish


Narayan Das, for her valuable instructions, guidance and support throughout my
seminar.

I again owe my special thanks to name of technical seminar coordinator, Technical


Seminar Coordinator, Mr. Nawal Topno, Head of the Department for giving me an
opportunity to do this report

And finally thanks to Prof. Chitta Ranjan Mohanty, Principal, PMEC for his
continued efforts for enhancing the quality in everything that happens at PMEC. This
report is a dedicated contribution towards that greater goal.

AJIT KUMAR SWAIN


Regd No. # ETC 2101109314

ii
TABLE OF CONTENTS

1. INTRODUCTION
2. OBJECTIVES
3. ARCHITECTURE
4. PASSIVE INFRARED SENSOR
5. STORAGE PROCESS
6. SURVEILLANCE
7. CHALLENGES
8. CONCLUSION
9. REFERENCE

LIST OF FIGURES

1. Figure 1:Block diagram of proposed security system

2. Figure 2: A PIR Sensor

3. Figure 3: Implimentation of iot network

iii
iv
TOPIC NAME USED AS HEADER

1. INTRODUCTION

Internet of every Things is a network of connected “Things” like vehicles, buildings,


embedded systems, sensors, as well as people. IoT enables these things to collect,
store and exchange data of interest to complete various tasks like security of
buildings (CCTV), traffic control and monitoring, patient health monitoring,
environmental monitoring, system condition prognostics and prediction, smart grid,
smart buildings, smart cities, and so on as discussed in [1]. Specifically, IoT devices
allow physical objects to store data and exchange data without the intervention of
humans (Machine to Machine communication takes place) across the existing
network, cloud infrastructures and take intelligent decisions results in improving
accuracy, and economic benefit. Intel has estimated that the number of connected
devices across worldwide will rise from 20 billion in2017 to 200 billion by 2020. IoT
has a variety of applications in security, health, consumer, and military applications
[2]. Therefore, itis significant to effectively and efficiently store the data produced by
the IoT devices (sensor nodes). So that IoT devices can be adopted drastically
towards a connected future with making the products cheaper by utilizing less
storage space which in turn decreases the cost of device by the method discussed in
this paper for Security cameras.
In recent smart city applications there is a large scale deployment of cameras and
other sensors around the globe these cameras act like an eye of a sensory network
which includes smart transportation [4], lighting [5], health [6], environment [7], and
disaster management [8]. Internet of Things architecture is a fundamental requirement
in these applications, which prescribes a virtual platform for globally identifiable
objects (each object having a unique IPv6 address) that have sensing and
communication capability [9].Internet of Things architecture differs significantly from
a traditional Wireless Sensor Network (WSN) because an IoT sensor can efficiently
communicate to an IoT-cloud environment where the data can be acquired and
transmitted virtually anywhere and processed in the cloud, which can be at any
cognitive location. The IoT sensor networks use a different set of communication
techniques like NB-IoT, LoRA, Sigfox etc., with message protocols like AMQP,

5
TOPIC NAME USED AS HEADER

COAP etc. Internet of Things treat each sensor as a “virtual object” with an abstracted
hardware layer.

OBJECTIVES
To store and record the data whenever an event occurs which reduces lot of
unnecessary data to be stored in ideal time and also to decrease power consumption
as system works. To uploads the data directly in to the cloud based on the threshold
limit set by us. Provide seamless interactions and personalized services to users.
Utilize data analytics to predict failures and schedule maintenance, reducing
downtime. Promote environmentally friendly practices through efficient resource
management A security camera records and stores data on 24X7 basis but most of
the data recorded by it during the ideal time (when the presence of human and
motion of any other living beings is not there) is not useful to us, this leads to a lot of
waste utilization of memory and is to be either manually deleted by the operator
repeatedly and has to be uploaded to cloud again and again, since this type of
classical system needs a lot of memory and manual work, as both of them are time
consuming and costlier (pay for manual labour and storage space).

If the thieves attack the secured area and destroy the local storage also then there
will be no evidence to catch thieves and the entire purpose of security system is not
fully utilized. Thus we propose an intelligent security system to solve this problem
with increased efficiency. The objective of this work is designing a novel system for
security cameras in IoT networks with event (presence of living being or motion of
thing) driven system to store and record the data whenever an event occurs which
reduces lot of unnecessary data to be stored in ideal time and also to decrease
power consumption as system works only when driven by an event. This system
uploads the data directly in to the cloud based on the threshold limit set by us. By
this way as data is already in cloud even thief’s destroy the local storage we can get
it from cloud with the event log and can be analysed to catch them.

6
TOPIC NAME USED AS HEADER

ARCHITECTURE

1.Actuators:

o Alarms: Sound alerts in case of a security breach.

o Smart Locks: Control entry points remotely.

o Lights: Can be programmed to illuminate when motion is detected.

 Control Unit:

o Microcontroller/Single Board Computer (e.g., Raspberry Pi,


Arduino): Acts as the central processing unit for data collection and
decision-making.

 Communication Module:

o Wi-Fi, Zigbee, LoRa, or Bluetooth: Facilitates communication


between devices and the central server or cloud.

2. Data Management

 Edge Computing:

o Processing data locally on the device to reduce latency and bandwidth


usage. For example, motion detection can be processed directly on
the camera.

 Cloud Storage:

o Store and analyze data from multiple devices for historical records,
analytics, and alert management.

3. User Interface

 Mobile App/Web Dashboard:

o Users can monitor real-time feeds, receive alerts, and control devices
remotely. The interface should be intuitive and accessible.

4. Security Features

 Data Encryption:

o Use SSL/TLS for data transmission to ensure privacy and security.

7
TOPIC NAME USED AS HEADER

5. Energy Efficiency Strategies

 Low-Power Components:

o Utilize energy-efficient sensors and communication modules (e.g., Zigbee)


that consume less power.

 Power Management:

o Implement sleep modes for devices when they’re not in use, reducing
energy consumption.

7. Connectivity and Integration

o Interoperability:

o Ensure compatibility with other smart home devices and platforms


(e.g., Amazon Alexa, Google Home).

8. Deployment and Maintenance

o Installation Guide:

o Provide clear instructions for users to install devices easily.

o Remote Diagnostics:

o Enable remote monitoring and troubleshooting capabilities to


minimize maintenance visits.

9. Potential Use Cases

o Home Security:

o Monitor homes for intrusions and alert homeowners in real-time.

o Business Security:

o Protect commercial properties with comprehensive monitoring


solutions.

8
TOPIC NAME USED AS HEADER

Fig. 1. Block
diagram of
proposed
security
system

In this block air sensor is used to detect the activity surrounding (focal area of) the
camera [14], similar type of work is adopted by us to detect the presence of living
beings in the camera focal area and is used to trigger the camera and other sensor
nodes in network which saves a lot of energy during ideal time (i.e. system is
switched on only when needed) and also decreases the length of video by which we
can decrease the storage space needed as less recording time, because of time
stamping video is easily accessible. PIR sensors are more complicated than many of
the other sensors explained in these tutorials (like photocells, FSRs and tilt switches)
because there are multiple variables that affect the sensors input and output. The
PIR sensor itself has two slots in it, each slot is made of a special material that is

9
TOPIC NAME USED AS HEADER

PIR SENSOR
PIR sensor housed in a hermetically sealed metal can to improve
noise/temperature/humidity- immunity. There is a window made of PIR transmissive
material (typically coated silicon since that is very easy to come by) that protects the
sensing element. Behind the window are the two balanced sensors [15]. This sensor
produces an output voltage of 3.3v which is used to drive the load (the security
system).
1.
1.Detection Mechanism:

PIR sensors work by detecting changes in infrared radiation levels. All objects emit
infrared radiation, and the PIR sensor senses these emissions.
o When a warm body (like a human) moves across the sensor's field of
view, it changes the infrared radiation levels detected by the sensor.
The PIR sensor has two zones of detection (typically called “fresnel
lenses”) that allow it to detect the movement of warm objects within
its range.
2. Components:
o Pyroelectric Sensors: Detect the changes in infrared radiation.
o Fresnel Lens: Focuses the infrared signals onto the pyroelectric
sensors, enhancing sensitivity and range.
o Amplifier Circuitry: Amplifies the sensor signals to trigger an output

.
3. Specifications

 Detection Range: Typically ranges from 5 to 12 meters, depending on the


specific model and lens design.
 Field of View: Usually around 110 to 180 degrees.
 Output: Digital (on/off) or analog, depending on the sensor design.

3. Applications
 Security Systems: Commonly used in alarm systems to detect intruders.
 Lighting Control: Automatically turn on lights when motion is detected.
 Home Automation: Integrated into smart home systems for automation
based on occupancy.
 Energy Efficiency: Used in HVAC systems to optimize heating and cooling
based on occupancy.

10
TOPIC NAME USED AS HEADER

Figure 2: A
PIR Sensor

The lens used here is not really doing much and so we see that the two slots can
'see' out past some distance (basically the sensitivity of the sensor). When the sensor
is idle, both slots detect the same amount of PIR, the ambient amount radiated from
the room or walls or outdoors. When a warm body like a human or animal passes by,
it first intercepts one half of the PIR sensor, which causes a positive differential
change between the two halves.

The part of PIR sensor and triggering circuit is as shown in Figure 4. The PIR led in
Figure 4 once detects the thermal waves of a certain threshold (i.e. living being) it
will switch on the BC547 transistor. The voltage will be transferred to the NO (open
of relay) and this diode will trigger the positive voltage and load is connected to the
AC mains thus camera recorder and the sensory network will be switched on, the
recording starts and the data is stored. If PIR sensor has sensed null (below threshold
i.e. no human being) it will stop giving sufficient voltage at Op pin and thus transistor
BC547 is switched off NO will get to negative supply voltage thus the relay open and
since no closed connection mains will be switched off. So the camera stops recording
and all sensory network will also be switched off

11
TOPIC NAME USED AS HEADER

Storage Process

Design procedure and implementation are depicted by the flowchart as shown in


Figure3. As already stated in the system architecture of this paper a PIR sensor is
used to trigger the recording in the camera and activate any other sensor networks
associated with it. The camera once activated circuit is powered up, recording
continues until the activity of living being is there and once the activity of living being
is null the trigger circuit starts discharging and after reaching certain value camera
pauses/stops recording.

pecifically designed to handle time-stamped data from IoT devices (e.g., InfluxDB,
TimescaleDB). These databases are optimized for querying and storing time-series
data efficiently.

NoSQL Databases:

Flexible schema design makes them suitable for unstructured or semi-structured IoT
data (e.g., MongoDB, Cassandra).

Relational Databases:

Traditional SQL databases can be used for structured data but may face scalability
challenges for massive IoT datasets.

Data Access and Retrieval

APIs:

Application Programming Interfaces (APIs) facilitate data access for applications and
users, enabling retrieval and analysis of stored data.

Data Querying:

Use query languages suitable for the chosen storage solution (e.g., SQL for relational
databases, query builders for NoSQL) to fetch specific datasets.

12
TOPIC NAME USED AS HEADER

Figure 3: Implementation of proposed Security System

It stores the recorded data and we have used the method [3] which is a motion
estimation hardware model that is suitable to implement the circuit and cloud
uploading.

13
TOPIC NAME USED AS HEADER

Surveillance

Cameras:

IP Cameras: Connect via the internet, offering high-resolution video feeds and
remote access.

PTZ Cameras (Pan-Tilt-Zoom): Allow users to control the camera's direction and
zoom remotely for a detailed view.

Thermal Cameras: Detect heat signatures, useful in low-light or obscured conditions.

 Sensors:

Motion Sensors: Detect movement within a specified area.

Environmental Sensors: Monitor factors like temperature, humidity, or smoke,


triggering alerts if anomalies are detected.

Data Transmission and Communication

Protocols:

Various communication protocols (e.g., Wi-Fi, Zigbee, LoRa) are used to transmit
data from devices to a central server or cloud storage.

Real-Time Streaming:

14
TOPIC NAME USED AS HEADER

Surveillance footage is streamed live to users, enabling immediate response to


incidents.
 Dashboards:

 Users can access a centralized interface (web or mobile app) to monitor


feeds, receive alerts, and control devices.

 Role-Based Access:

 Implement role-based access control (RBAC) to ensure only authorized


personnel can view or manage surveillance feeds.

 Figure 4:Pre-
processed
video frame

15
TOPIC NAME USED AS HEADER

Challenges

The implementation of the interface for Raspy-Berry pi with a smart camera and web
server for data collection and data storage in the cloud can be done by python
programming script as the python script is easier and widely available for all
platforms with Inter-portability across different devices and platforms

Major problem faced by a security camera in IoT networks like more power
consuming, data storing, need for storing long length videos, uneasy access of video
data.

Data Security: Protecting stored data from unauthorized access is critical, especially
in applications involving personal spaces or sensitive environments.

Figure:5 Activity vs. Average Power Consumption per Hour


in mille Watt with respect to time for different systems

16
TOPIC NAME USED AS HEADER

5. CONCLUSION

The recording length decrease which in turn decreases the required space for the
video storage, decreases the length of video, power consumption.
his paper a special PIR motion detection sensor has been used to trigger security
system, camera recorder and sensor network during the presence of living beings and
any movement of other activity. So the recording length decrease which in turn
decreases the required space for the video storage, decreases the length of video,
power consumption and also due to time stamping on each frame during pre-
processing makes the video more accessible to the user, saves lot of power, storage
space and also automatic uploading of data into cloud storage makes the system more
efficient. As the IoT era is being run only M2M (Machine to Machine)
Communication occurs this type of system can be put in living being restricted areas
for both safety and security by adding a piezo electric buzzer with Wi-Fi to the system
as an alarming sound for detection of activity of living being in living being restricted
areas.

17
TOPIC NAME USED AS HEADER

REFERENCE

[1] A. Whitmore et. al. “The Internet of Things—A survey of topics and trends” in
Information Systems Frontiers, Volume 17, Issue 2, pp 261– 274, April 2015.

[2] S. Madakam et. al. “Internet of Things (IoT): A Literature Review” in Journal of Computer
and Communications, Volume 3, pp 164-173, 2015

[3] Martin Strohbac et. al. “Towards a Big Data Analytics Framework for IoT and Smart City
Applications” in Modelling and Processing for NextGe

[4] . Calabrese, M. Colonna, P. Lovisolo, D. Parata, and C. Ratti, “RealTime Urban Monitoring
Using Cell Phones: A Case Study in Rome,” IEEE Trans. on Intelligent Transportation Systems,
vol. 12, no. 1, pp.141– 151, March 2011.

[5] A. Sevincer, A. Bhattarai, M. Bilgi, M. Yuksel, and N. Pala, “Lightnets: smart lighting and
mobile optical wireless networks –A Survey,” IEEE Communications Surveys & Tutorials, vol.
15, no. 4, pp.1620–1641, 2013

[6] R. Khatoun and S. Zeadally, “Smart Cities: Concepts, Architectures, Research


Opportunities,” Communications of the ACM, vol. 59, no. 8, pp. 46–57, Jul. 2016

18
TOPIC NAME USED AS HEADER

19

You might also like