Design and Development of a House-Mobile Security System

Abstract

The objective of this work is to design, develop and implement an alarm system that triggers the alarm and alerts the owner via a mobile text message if the house has been opened or an attempt has been made to open it illegally. The system will also feature two different forms of activation/deactivation and will automatically open or close the door for the user. The advantages of this house-mobile security system (HMSS) are its high security level, robustness, low cost and ease of use (uncomplicated) and that there is no distance limitation for contact. The system integrates different sensors via a microcontroller, which is the brain of the system, in order to avoid the problem of false alarms sent by other alarm monitoring systems to ‘Alarm Receiving Centers’ or Police departments. The HMSS is useful in homes, small businesses, offices, warehouses, etc.

Share and Cite:

Elfasakhany, A. , Hernández, J. , García, J. , Reyes, M. and Martell, F. (2011) Design and Development of a House-Mobile Security System. Engineering, 3, 1213-1224. doi: 10.4236/eng.2011.312151.

1. Introduction

The importance of home security has greatly increased in recent years. Let us consider the issue of security around our town of Ciudad Juarez, Mexico. Many houses are burgled mainly by means of illegal entry by force, such as breaking a window or slashing a screen or by entering through an unlocked door or an open window. Consequently, we have seen a trend in the increasing need for home security systems. Early studies have shown that burglaries seldom occur in places where an efficient, secure home security system has been installed [1].

Safety alarms are electronic alarms designed to alert the user of a specific danger. Sensors are connected to a control unit via low-voltage wiring or a narrowband radio frequency (RF) signal which is used to interact with a response device. The most common security sensors are used to indicate the opening of a door or window or to detect motion via passive infrared (PIR). Alarm systems often use wireless techniques for a faster and more economical installation. Some systems serve a single purpose of burglar or fire protection. Systems range from small, self-contained noisemakers, to complicated, multizoned systems with color-coded computer monitor outputs.

Today, home security system manufacturers and alarm monitoring services offer a variety of ways for users to monitor their home’s security system even when users are away from their home on vacation or simply away because of work. Modern alarm systems can notify owners of changes in their alarm system status by paging them. While these innovations are certainly useful and offer more peace of mind about home security, they are not the most exciting technologies used in many home security systems.

Many alarm monitoring services now allow users to access their home security system online via the Internet [2-4]. They can check the status of their system, and even view video in their home if they have installed surveillance cameras [5-7]. Very advanced alarm systems even allow users to change security codes, lockout security codes and arm or disarm the security system via a web interface. However, there is a new and very popular trend emerging in home security system monitoring mobile devices and telephones.

The integration of the mobile phone and a surveillance system becomes more meaningful so that people can monitor the security of their properties anytime, anywhere. People can access and manipulate uploaded pictures directly by Wireless Application Protocol (WAP) via a mobile phone [8]. They can use a gateway to enable the control of consumer electronics devices connected to the home network from a mobile phone; the gateway intermediates are wired between the home network and a wireless communication network using Home Audio Video interoperability (HAVi) and WAP specification, respectively [9]. Recently, a video clip system has developed a way to transfer the video stream to a mobile phone through Ethernet from PCs [10]. A new kind of wireless image system provides users with the image information by means of a multimedia message service (MMS) [11].

In this work, a practical house-mobile security system (HMSS) is designed and implemented. But why design a home security system when there are already a number of security systems widely available? While it is true that there are some high-quality security systems available, as mentioned earlier, a majority of homeowners, especially in Ciudad Juarez, simply cannot afford to pay for a professional security system. In addition, many homeowners may not feel the need to actually invest in those expensive security systems. On the other hand, most inexpensive home security devices and components are nothing more than cheap and ineffective noise makers. In such systems, false alarms are very frequent and many urbanites tend to ignore alarms rather than investigate, i.e., there may be no response at all. The aim of this work is to fill this gap by presenting a system with a high security level and a low cost. The HMSS solves the problem related to the false alarms found in other systems by integrating different sensors into one unique system. This system is planned to work at a high security level, and is robust, low-cost, uncomplicated, and has no distance limitation. The system is designed to avoid the entry of possible intruders into the house and to alert the owner via a mobile phone text message. It is inexpensive and useful in homes, small businesses, offices, warehouses, etc.

2. System Design

The House Mobile Security System (HMSS) consists of mechanical, electrical, and electronic compon-ents, which are integrated to complete the system design, as follows.

2.1. Vibration Sensor

An AK-CGQtype vibration detector alarm sensor is mounted on barriers and used to detect an attack on the structure itself (door/window). This vibration sensor works based on an unstable mechanical configuration that forms part of the electrical circuit. When movement or vibration occurs, the unstable portion of the circuit moves and breaks the current flow, which produces an alarm. The technology of the sensor varies and can be sensitive to different levels of vibration. The suitable sensitivity of the sensor must be correctly selected based on the working environment as they are best suited to different types of structures and configurations. Figure 1 shows the vibration sensor and its detailed characteristics are presented in Table 1.

2.2. Magnetic Sensor

The magnetic sensor includes two strips, one attached to the door and the other to the door frame. A relay switch, in the sensor, is connected to the strips within a wire, as shown in Figure 2. The relay switch is held down to show a “closed” circuit when the two magnetic metal strips touch each other. Once one strip moves away from the other, the circuit is opened and the switch pushes up into the signaling wire. That wire alerts the controller that the circuit is open and then the controller triggers an alarm. The magnetic sensor we used, type DS10A, selfchecks every 90 minutes and is capable of sending radio frequency (RF) signals to any home security system’s base receiver. The sensor uses standard AA batteries to provide up to 1 year of operation.

Figure 1. Vibration detector alarm sensor AK-CGQ.

Table 1. Characteristics of the vibration sensor (AK-CGQ).

2.3. DC Motor

The main function is to open and close the door/window/gates for the user. The DC motor, as shown in Figure 3, provides the conversion of microcontroller signals to mechanical actions. The full detailed characteristics of the DC motor are presented in Table 2 below. This motor was chosen because its speed and torque characteristics were best suited for our application.

Figure 2. Magnetic sensor.

Figure 3. DC motor.

Table 2. Characteristics of DC motor.

2.4. Numeric Keypad

Normally, alarm systems are deactivated or reconfigured when authorized personnel are present. Authorization may be indicated in a number of ways, often with keys or codes used at the control panel or a remote panel near an entry. High-security alarms may require multiple codes, or a fingerprint, badge, hand-geometry, retinal scan, encrypted response generator, and other means that are deemed sufficiently secure for the purpose. Failed authorizations result in an alarm and a timed lockout to prevent “experimenting” with possible codes. In this system, we used a numeric keypad with a USB host interface, as shown in Figure 4.

2.5. Relay Receiver Board

A relay receiver board, as shown in Figure 5, provides independently programmable control for each of the onboard relays. Relay outputs are used to automatically turn sensors and system devices On/Off. The software interface is compatible with Windows 7/Vista/XP/ME/ 2000/NT/9x and allows users to program and save an infinite number of On/Off sequences. Each relay output is capable of switching resistive loads of up to 1 Amp @ 45 Vac/70 Vdc max and has an LED to indicate its status. The detailed characteristics of the relay receiver board are presented in Table 3 and details of the work are shown in Figure 6.

2.6. Power Supply

A power supply with the following features, as shown in Figure 7, is needed for our system.

Figure 4. Numeric keypad lenovo group limited.

Figure 5. Relay receiver board with remote control.

Figure 6. Detailed characteristics of the relay receiver board with remote control.

Figure 7. Power supply with adapter transformer.

2.7. Motorola C168i Model Mobile Phone

The Motorola C168i mobile phone, as shown in Figure 8, is used for receiving the alarm message. There is a possibility of sending the alarm message to more than one mobile phone. The features of our mobile phone are presented in Table 4.

Table 3. Characteristics of the relay receiver board.

Table 4. Features of motorola c168i model.

Figure 8. Motorola c168i model mobile phone.

2.8. Microcontroller ATMEL 168

The microcontroller is the “brain” of the entire system and provides the calculations needed to control all the actions taken. Since this microcontroller is “open hardware”, there are no licensing or copyright issues [12].

The microcontroller used is an Atmega 368 which comes with a development/programming board named “Arduino”, as shown in Figure 9. The programming language is very similar to C but includes several libraryies that help in the control of the I/O ports, timers, and serial communication. This microcontroller was chosen because of its low price, ease of reprogramming and simple programming language, and, in addition, interrupts are available for this particular chip. Features of the microcontroller are shown in Table 5.

2.9. Housing

The last part of the design is the housing for the system. After all the mechanical, electrical, and electronic equipments were defined, the device was assembled in a firm housing to guarantee the security system and its functionality. The housing design comprises a high-resistance structure that holds the components well. The housing with the complete prototype of the integrated system is shown in Figure 10.

Figure 9. Arduino microcontroller board.

Table 5. Features of microcontroller ATMEL 168.

2.10. Software Design

As system consists of a hard ware and software, the detailed code of software code is presented in appendix. However, software of different components is presented within system operation and development section in this paper.

3. Testing and Validation

We considered testing to be a very important part of this work and placed emphasis on conducting it meticulously. Several tests were carried out to validate the HMSS and its components. The tests covered both the particular elements and the overall system. Firstly all components were tested individually to demonstrate their capability of working properly. After words, the overall system is tested. Since we have three working modules, as described in the next section, we tested these modules using the black-box testing methodology, which involved sending inputs into the module, measuring the outputs and comparing them with the expected outputs. We are not concerned with what happens inside the module.

After each module was completely tested and debugged, the vibration sensor position was tested by placing it in different positions on the door. This test was carried out to determine the best sensing position for detecting vibrations or blows in the event of someone trying to open the door. We placed the sensor in three different locations, top, next to lock and center, and tested the vibration results in each case, as shown in

Figure 10. HMSS housing.

Figure 11. The sensitivity to vibration was low when the sensor was in the next to door position. However, it was high when the sensor was in the top of door position. In the center of door position, the sensitivity was medium, as shown in Table 6. We decided to place the vibration sensor in the center position so that the sensor will detect when someone is trying to open the door and avoid the false alarm in the top position, e.g., a visitor knocking on the door or windy days, or the lower sensitivity in the next to lock position. Figure 12 shows the final positions of the vibration and magnetic sensors attached to the door.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Cognigen Networks, Inc., “Cognigen Completes Acquisition of Commission River,” 2007. http://cognigen.net.
[2] K. Y. Kong, C. Y. Ng and K. Ong, “Web-Based Moni- toring of Real-Time ECG Data,” Computers in Cardiology 2000, Cambridge, 2000, pp. 189-192.
[3] A. I. Hernandez, F. Mora, M. Villegas, G. Passariello and G. Carrault, “Real-Time ECG Transmission via Internet for Nonclinical Applications,” IEEE Transactions on Information Technology in Biomedicine, Vol. 5, No. 3, September 2001, pp. 253-257.
[4] F. Lamberti and C. Demartini, “Low-Cost Home Monitor- ing Using a Java-Based Embedded Computer,” IEEE EMBS Conference on Information Technology Applications in Biomedicine, Lamberti, 24-26 April 2003, pp. 342-345.
[5] Y. Shirai, J. Miuar, Y Mae, M. Shiohara, H. Egawa and S. Sasaki, “Moving Object Perception and Tracking by Use of DSP,” Proceedings of Computer Architectures for Machine Perception, Roma, 3-5 November 1993, pp. 251- 256.
[6] P. Mahonen, “Wireless Video Surveillance: System Con- cepts,” Proceedings of International Conference on Image Analysis and Processing, Venice, 29 September 1999, pp. 1090-1095. doi:10.1109/ICIAP.1999.797745
[7] K. Sato, B. L. Evans and J. K. Aggarwal, “Designing an Embedded Video Processing Camera Using a 16-Bit Micro- processor for Surveillance System,” Proceedings of DCV Work on Digital and Computational Video, Clearwater, 14-15 November 2002, pp. 151-158.
[8] P. M. Corcoran, P. Bigioi and E. Steinberg, “Wireless Transfer of Image from a Standard GSM Mobile Phone,” IEEE Transactions on Consumer Electronics, Vol. 47, No. 3, 2001, pp. 542-547. doi:10.1109/30.964144
[9] M. Nikolova, F. Meijs and P. Voorwinden, “Remote Mobile Control of Home Appliances,” IEEE Transactions on Consumer Electronics, Vol. 49, No. 1, 2003, pp. 123-127. doi:10.1109/TCE.2003.1205464
[10] “Ugolive,” 2011. http://www.ugolive.com/Browser/default.asp
[11] “NOKIA,” 2011. http://www.nokia.com/research/observation_camera_demo/index.html
[12] “Arduino,” 2011. http://www.arduino.cc

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.