0% found this document useful (0 votes)
8 views5 pages

Iot Based Anti Theft System For Home

The document presents an IoT-based anti-theft system designed to provide real-time notifications of unauthorized access to homes. It addresses the limitations of existing surveillance systems, such as delayed notifications and inability to distinguish between human and non-human intruders. The proposed system integrates various sensors and a microcontroller to detect intrusions and alert homeowners instantly, while also being cost-effective compared to traditional DVR solutions.

Uploaded by

FATHIMA E N
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views5 pages

Iot Based Anti Theft System For Home

The document presents an IoT-based anti-theft system designed to provide real-time notifications of unauthorized access to homes. It addresses the limitations of existing surveillance systems, such as delayed notifications and inability to distinguish between human and non-human intruders. The proposed system integrates various sensors and a microcontroller to detect intrusions and alert homeowners instantly, while also being cost-effective compared to traditional DVR solutions.

Uploaded by

FATHIMA E N
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 08 Issue: 10 | Oct 2021 www.irjet.net p-ISSN: 2395-0072

IOT BASED ANTI THEFT SYSTEM FOR HOME


Siddalingesha G. R.1 H. M. Shamita2
[1]M. Tech. Student, Dept. of Electronics and Communication Engineering, PDIT, Hospet, Karnataka, India
[2]Associate Professor, Dept. of Electronics and Communication Engineering, PDIT, Hospet, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The project aims to design a framework for Legacy systems cannot provide real-time theft
providing a house owner/member with the immediate notification to the house owner nor detect partially or fully
notification of an ongoing theft or unauthorized access to their obscured faces. It is also challenging for old systems to
premises. For this purpose, a rigorous analysis of existing detect the intruder in the dark using a CCTV camera without
systems was undertaken to identify research gaps. The night vision capability. The major flaw with this kind of
problems found with existing systems were that they can only arrangement is that it demands the 24/7 availability of a
identify the intruder after the theft, or cannot distinguish house owner or member, or manual video surveillance,
between human and non-human objects. which is almost impossible. In addition, it is a tedious task to
go through all the recorded video clips after a possible theft
Wireless Sensors Networks (WSNs) combined with the has become known. It might be that the storage server
use of Internet of Things (IoT) are expanding smart home contains a large amount of family member footage, which is
concepts and solutions, and their applications. This project of no use in identifying trespassers.
proposes a novel IOT based smart home anti-theft system that
can detect an intruder. The proposed approach can be applied to an IoT-
based smart home monitoring system in near real-time. A
The fundamental idea is to design a cost-effective and smart home designed and developed on an integrated
efficient system for an individual to be able to detect any kind framework of sensors, cameras, and customized hardware to
of theft in real-time and provide instant notification of the analyze unauthorized access. The system operates at two
theft to the house owner. The system also promises to different levels: through a hardware interface and through a
implement home security with large video data handling in software interface.
real-time.
2. LITERATURE SURVEY
Key Words: WSN, IOT, Security, Anti-Theft, Smart home
We have found different papers related to security system.
1. INTRODUCTION Different security systems used for different purposes.
Sushma .N. Nichal, Prof. J.K. Singh has done abstraction of
IOT is generally considered as “Infrastructure of Smart supervisor system using IOT based on embedded
information Society”, it enables us to obtain the data by each Linux O.S. with ARM11 architecture. In this Paper they have
and every type of mediums like animals, kitchen appliances, implemented real-time video monitoring system and
humans, vehicles. Without human intervention IOT connects acquired data. In this system they have also used PIR,
the physical objects that can exchange and communicate temperature, Humidity sensors the system first requires
information between them. authentication from user to activate the system if the system
detect human it will send that data to the server or user
In the modern era, security and surveillance are
smart phone.
important issues. Recent acts of theft/terrorism have
highlighted the urgent need for efficient video surveillance Yogita Vijay Narkhede,S. G. Khadkehave presented
and on-the-spot notification of ongoing thefts to house smart security system with Raspberry Pi and IR sensor if IR
owners and other household members. sensor detects the person camera will capture image as well
as video of the person, the data then encrypted first and then
A number of surveillance solutions are currently
decoded. User will get notification on his mobile device.
available on the market, such as CCTV cameras and digital
Authors discussed that user can also perform the live
video recorders (DVRs) that can record the unauthorized
streaming and provide security. Authors have concluded that
activities of a trespasser, but cannot distinguish between
this system is important for commercial places; they have
human and non-human objects. In recent times, the ratio of
discussed few advantages of the system.
theft has increased tremendously due to a lack of awareness
and low availability of smart-gadgets. The task of face Harikrishnan G.R. et al have implemented home
detection and the recognition of an intruder become very automation and security system in this system user can
difficult when the intruder hides their face partially or fully continuously monitor home from remote location if the
using some type of material, such as plastic, leather, or intruder detected system will generate alarm and captures
fabric. the image of the intruder and the captured image will be

© 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 509
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 08 Issue: 10 | Oct 2021 www.irjet.net p-ISSN: 2395-0072

send to owners mobile through SMS, WhatsApp, Call, E-mail.


They have discussed few advantages of this system. Authors
have concluded that this system is useful for securing
commercial places.

R.Chandana et al have implemented monitoring and


home security system using think and speak with the help of
raspberry Pi, they have used Gyro sensor to detect the
movements of person if the movements is detected camera
will be captured image and the image will be send to the
owners mail id with captured image. They have also stated
some importance of this system. Authors have concluded
that this system is important for security purpose.

K Saravana Kumar et al have developed the security


system with proximity sensor, Raspberry Pi, and Camera,
proximity sensor detect the person after detecting the
person camera will be initiated and capture the image and
image will be uploaded to drop box and user gets the Fig.2: Microcontroller Unit
notification about the intruder in the form of SMS. They have
discussed few advantages like cost effective, portable. 4. HARDWARE REQUIREMENTS
Authors concluded that this security system is useful for
security of homes. ESP 32: ESP 32 is the chip, which has high
application potential in the future, for connection oriented
3. PROPOSED SYSTEM projects we build. ESP 32 can be used for building
connected things projects, alternative to microcontroller and
The proposed system consists of two units. 1. Wi-Fi add-on Wi-Fi, Bluetooth modules.
module 2. Microcontroller unit with sensors. Connection
established between ADC and output of all the sensors. ESP32-CAM: The ESP32-CAM is referred as
Sensed data from the sensors are spontaneously processed development board, which consist an OV2640 camera, a chip
by the microcontroller and if something is sensed above the of ESP32-S chip and a slot of micro SD card and various
limit it sends an alert message to the owner of the house. GPIO’s to connect peripherals.

Fig.1: Mobile Unit

Fig 3:ESP 32 Cam Module

ELECTROMAGNETI RELAY AND INTERFACING


CIRCUIT: Relay is utilized to control the external devices
along with the isolation and it is defined as an
electromagnetic switch.

© 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 510
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 08 Issue: 10 | Oct 2021 www.irjet.net p-ISSN: 2395-0072

would switch the current through the stator and this way
opposite the attractive field. This way the rotor can continue
to turn. See the picture on the appropriate for a schematic
showcase of how the dc motor functions.

Fig 4: Internal contacts of the relay

Internal contacts of the relay is shown in the figure


above. Off state of the relay is represented in the figure
above. The relay shown in the figure is in off state. Common
is in NC (Normally closed) contact When the relay is in off
state and common is open for normally open contact.

IR Proximity Sensor: For various purposes Fig 6: Dc Motor


technology of IR utilized in everyday life and industries. For Pressure Switch: A pressure switch is a form of
instances, TVs, to understand the signals from the remote switch that operates an electrical contact when a certain set
control it utilizes IR sensors. Convenient characteristics, easy fluid pressure has been reached on its input. The switch may
design and minimum power usage these are the major be designed to make contact either on pressure rise or on
advantages of the IR sensors. In electromagnetic spectrum pressure fall.
in the region of visible and microwave IR signals are found.
Generally, these waves wavelength are in range from 0.7 µm
to 1000 µm. IR spectrum classified into 3 regions such as far-
infrared, mid infrared and near infrared. The wavelength
range of far infrared radiation is more than 6 µm,the
wavelength range of mid infrared radiation ranges from 3 to
6 µm and the wavelength range of near infrared radiation
ranges from 0.75 – 3 µm.

Fig 7: Pressure Switch

5. SOFTWARE REQUIREMENTS

BLYNK: Assume a prototyping board on your


android which consists of sliders, displays, graphs, drag and
drop buttons and other operational widgets. And it controls
the arduino and collects the data from it. BLYNK operates
over the internet. Hence it is necessary that your hardware
can communicate with internet. You can select any kind of
Fig 5: IR Proximity sensor connection like Wi-Fi, Ethernet or ESP8266. Example
sketches and BLYNK libraries will connect you to online and
DC Motor: A Direct Current (DC) motor is a motor pair up with your android.
that diverts energy from an immediate current and
transforms this into mechanical energy. The rotor is
normally present within the motor, but stator is present
outwardly. It has loop windings which are fuelled through
DC current and the stator has lasting magnets or electro-
magnetic windings. At the point when the motor is fuelled by
DC current, an attractive field is made inside the stator,
drawn in, repulsing magnets on it. Now rotor starts to turn.
To keep the rotor pivoting, the motor has a commutator. It
would quit turning, yet for this situation the commutator

© 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 511
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 08 Issue: 10 | Oct 2021 www.irjet.net p-ISSN: 2395-0072

Fig 8:BLYNK connections

6. EXPERIMENTAL RESULTS

The following screenshots shows the results of the


proposed system. Figure1 shows the blynk app with camera
on, figure 2 shows the detection of intruder and figure 3
shows the image captured and sent to the owner,s computer
through IOT.
Fig 9: BLYNK App with Intruder Detection

Fig 9: BLYNK App with Camera View Fig 10: Owners Laptop with Intruder Picture

7. CONCLUSIONS

This project presents an innovative method to


prevent smart home theft by providing spontaneous
notification of ongoing intrusion. The research has provided
a novel wireless sensing system for the surveillance and
detection of a human intruder as well as instant notification
of the intrusion to prevent theft.

It eliminates the use of DVR for recording as well as


the use of large amounts of memory for storage. The system
can effectively identify a human intruder and prevent false
alarms when the intruder is a non-human, by distinguishing
between human and non-human objects. All of these
processes lead to the instant notification of intrusion by
providing real-time notification about the potential theft.

© 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 512
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 08 Issue: 10 | Oct 2021 www.irjet.net p-ISSN: 2395-0072

The main advantage of the proposed system is that [9] V. V. Jog, D. Jain, R. Arora, and B. Bhat, “Theft prevention
it is cheaper than the DVR and other surveillance-based ATM model using dormant monitoring for transactions,”
solutions available on the market. If an intruder disables 2013 IEEE Conference On Information And Communication
WiFi connection using DoS attack then the proposed system Technologies, 2013.
will not be able to notify the house members about the
ongoing theft. However, the proposed system is equipped [10] H. Li, “Design for home security video monitoring
with Bluetooth network, which can still record the ongoing system based on SOPC,” null JOURNAL OF ELECTRONIC
theft but cannot send the notification to the house owner due MEASUREMENT AND INSTRUMENT, vol. 24, no. 3, pp. 294–
to the lack of WiFi/Internet connections. 300, Sep. 2010.

New research challenges of security and privacy


have arisen due to an increase in products that connect the
cyber and physical worlds. It is expected that these research
problems will be further resolved in the upcoming future.

REFERENCES

[1] Z. Zhang, D. Yi, Z. Lei, and S. Z. Li, “Regularized Transfer


Boosting for Face Detection Across Spectrum,” IEEE Signal
Processing Letters, vol. 19, no. 3, pp. 131–134, 2012.

[2] W. H. Alobaidi, I. T. Aziz, T. Jawad, F. M. F. Flaih and A. T.


Azeez, "Face detection based on probability of amplitude
distribution of local binary patterns algorithm," 2018 6th
International Symposium on Digital Forensic and Security
(ISDFS), Antalya, Turkey, 2018, pp. 1-5.

[3] Z. Jian, Z. Chao, Z. Shunli, L. Tingting, S. Weiwen and J.


Jian, "Pre-detection and dual-dictionary sparse
representation based face recognition algorithm in non-
sufficient training samples," in Journal of Systems
Engineering and Electronics, vol. 29, no. 1, pp. 196-202, Feb.
2018.

[4] T. Ahmed, S. Ahmed, S. Ahmed, and M. Motiwala, “Real-


Time Intruder Detection in Surveillance Networks Using
Adaptive Kernel Methods,” 2010 IEEE International
Conference on Communications, 2010.

[5] A. Sepas-Moghaddam, F. Pereira and P. L. Correia, "Light


Field-Based Face Presentation Attack Detection: Reviewing,
Benchmarking and One Step Further," in IEEE Transactions
on Information Forensics and Security, vol. 13, no. 7, pp.
1696-1709, July 2018.

[6] H. Zhang, Q. Li, Z. Sun and Y. Liu, "Combining Data-Driven


and Model-Driven Methods for Robust Facial Landmark
Detection," in IEEE Transactions on Information Forensics
and Security, vol. 13, no. 10, pp. 2409-2422, October 2018.

[7] “Identity Theft Research,” Detection, Prevention, and


Security Identity Theft Handbook, pp. 263–276, 2015.

[8] J. S. Kim, D. H. Yeom, Y. H. Joo, and J. B. Park, “Intelligent


Unmanned anti-theft system using network camera,”
International Journal of Control, Automation and Systems
Int. J. Control Autom. Syst., vol. 8, no. 5, pp. 967–974, 2010.

© 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 513

You might also like