You are on page 1of 22

THADOMAL SHAHANI ENGINEERING COLLEGE

DEPARTMENT OF INFORMATION TECHNOLOGY

MINI - PROJECT Report


on

TOUCH SENSITIVE SECURITY SYSTEM

Submitted in partial fulfillment of the requirements


of the degree of

THIRD YEAR OF ENGINEERING


in the subject
INTERNET OF THINGS (IoT)

by

28 Vighnesh Kolhatkar
29 Maitreyee Koli
32 Aayush Makharia
42 Jeet Parekh

_____________ ____________ _____________


Lab In-charge: HOD: External Examiner:
TABLE OF CONTENT

List of Figures
List of Tables
Chapter 1 Introduction
1.1 Introduction
1.2 Aim and Objectives

Chapter 2 Review of Literature

2.1Existing Solutions
2.2 H/W and S/W requirements

Chapter 3 Design and Implementation


3.1 Design Consideration
3.2 Design Details

Chapter 4 Result and Analysis


4.1 Implementation Details
4.2 Result and Evaluation

Chapter 5 Conclusion and Future Work

Appendix
References
LIST OF ILLUSTRATIONS
INTRODUCTION

Locks are one of the most important factors that are considered when the matter of
Security is discussed. Thefts and robberies are common these days and people don’t
have time to actually sit in front of their offices or homes on a lookout. People prefer
simple and easy systems which will save their time and also provide security at the
same time.

1.1 Introduction to Touch Sensitive Security System

Insecurity and crime constitute some of the major problems faced by the people in
our community and society. People live with fear of being attacked by burglars,
vandals and thieves. Despite all the effort, resources and time that has been devoted
to the development of tools that will reduce crime rates and make the world a safer
place to live, these problems are still on the increase. These gave rise to the need for
an increasing development in the technology of alarm systems which utilizes various
principles such as infrared motion detection, light (photo) sensitive electronic
devices and so on. Even with the introduction of these alarm systems which have
reduced greatly the level of insecurity, there is still a problem of false alarm which
needs to be minimized. In order to effectively reduce the level of insecurity and avoid
false alarms which can create unnecessary unrest, a touch activated security system
is required.
This system if properly designed will provide security and ensure the specific LEDs
will glow only when unauthorized person try to gain access to the protected area or
device by touching the entrance or any other part of the device. An LED will glow
indicating the color whether the person is a member of the organization or living
there or someone who’s just visiting. The authorized person will know the number
of taps to be made for the sensor to know the security system.
These kind of systems are hard to hack or tackle as the working of the system is only
known to the person or group of people who are the owners of the system. The owner
doesn’t have to worry about the system being hacked as there is no use of internet
or software which can lead to problems. Other systems based on other factors such
as fingerprint scanning or eye scanning security system have a database which can
be stolen or manipulated. As there is no database in our system it is much easier to
understand for people of all ages.
The technology these days is developing rapidly and thus most of the non-technical
people can’t relate or understand it so easily. Older people and small children who
live at home throughout the day with no one around will find it easy to know if
there’s a familiar person at the door or not. They won’t have to open the door every
time someone rings the doorbell. This increases the safety from thefts as there are
cases of robbers hurting residents as soon as they open the door.
With this project they would be able to know if the door is to be opened or not
according to which LED glows.

1.2 Aim and Objective

Aim
We aim to build a Touch Sensitive Security System using IoT which is able to detect
the person arriving at the door and it’ll reflect its results using LEDs.

Objective
To make a Touch Sensitive Security System that will detect the touch sensations of
the user and the detection of a stranger or familiar person. The visual impact of this
project will be the glowing of LEDs which will help the user in deciding whether to
open the door or not. With a better security system, which can be used by people of
all the age groups, this will lead to more secure homes and less robberies. Moreover,
this has an impact in the citizen satisfy level. This approach can be used in a
commercial manner while the construction of the homes or offices, this can be
installed while installing the doors.
REVIEW OF LITERATURE

2.1 Existing Solutions


The existing solutions for door locking systems are following systems which have
been developing since the past few years.
 Electric door lock - An electronic lock (or electric lock) is a locking device
which operates by means of electric current. Electric locks are sometimes
stand-alone with an electronic control assembly mounted directly to the lock.
Electric locks may be connected to an access control system, the advantages
of which include: key control, where keys can be added and removed
without re-keying the lock cylinder; fine access control, where time and
place are factors; and transaction logging, where activity is recorded.
Electronic locks can also be remotely monitored and controlled, both to lock
and to unlock.
 Electromagnetic lock - The most basic type of electronic lock is a magnetic
lock (informally called a "mag lock"). A large electro-magnet is mounted on
the door frame and a corresponding armature is mounted on the door. When
the magnet is powered and the door is closed, the armature is held fast to the
magnet. Mag locks are simple to install and are very attack-resistant. One
drawback is that improperly installed or maintained mag locks can fall on
people, and also that one must unlock the mag lock to both enter and to
leave. This has caused fire marshals to impose strict rules on the use of mag
locks and access control practice in general.
 Electronic deadbolts and latches - Electric mortise and cylindrical locks are
drop-in replacements for door-mounted mechanical locks. An additional
hole must be drilled in the door for electric power wires. Also, a power
transfer hinge is often used to get the power from the door frame to the door.
Electric mortise and cylindrical locks allow mechanical free egress, and can
be either fail unlocked or fail locked. In the US, UL rated doors must retain
their rating: in new construction doors are cored and then rated. but in
retrofits, the doors must be re-rated.
A feature of electronic locks is that the locks can deactivated or opened by
authentication, without the use of a traditional physical key:
 Numerical codes, passwords, and passphrases
Perhaps the most common form of electronic lock uses a keypad to enter a
numerical code or password for authentication. Such locks typically provide,
and some feature an audible response to each press. Combination lengths are
usually between 4 and 6 digits long.

 Security tokens
Another means of authenticating users is to require them to scan or "swipe"
a security token such as a smart card or similar, or to interact a token with
the lock. For example, some locks can access stored credentials on a
personal digital assistant (PDA) or smartphone, by using infrared, Bluetooth,
or NFC data transfer methods.

 Biometrics
As biometrics become more and more prominent as a recognized means of
positive identification, their use in security systems increases. Some
electronic locks take advantage of technologies such as fingerprint scanning,
retinal scanning, iris scanning and voice print identification to authenticate
users.

 RFID
Radio-frequency identification (RFID) is the use of an object (typically
referred to as an "RFID tag") applied to or incorporated into a product,
animal, or person for the purpose of identification and tracking using radio
waves. Some tags can be read from several meters away and beyond the line
of sight of the reader. This technology is also used in some modern
electronic locks.
2.2 H/W and S/W Requirements
Hardware
The following are the components needed to make Touch Sensitive Security
System:
Raspberry Pi 3 Model B
The Raspberry Pi is a series of small single-board computers developed in
the United Kingdom by the Raspberry Pi Foundation to promote the teaching of
basic computer science in schools and in developing countries. The original model
became far more popular than anticipated,[8] selling outside its target market for
uses such as robotics. It does not include peripherals (such as keyboards and mice)
and cases. However, some accessories have been included in several official and
unofficial bundles.

RASPBERRY PI3

RASPBERRY PI LOGO
Raspberry Pi 3 was released in February 2016 with a 64 bit quad core processor,
on-board WiFi, Bluetooth and USB boot capabilities.[19] On Pi
Day 2018 model 3B+ appeared with a faster 1.4 GHz processor and a three times
faster network based on gigabit Ethernet (300 Mbit / s) or 2.4 / 5 GHz dual-
band Wi-Fi (100 Mbit / s).[1] Other options are: Power over Ethernet (PoE), USB
boot and network boot (an SD card is no longer required).It also contains a 1.2
GHz ARM Cortex-A53 CPU and hence is the first version of the RaspberryPi to
support the arm64 architecture.

Various components of Raspberry Pi are:-


 ARM CPU/GPU -This is a Broadcom BCM2835 System on a Chip (SoC)
that's made up of an ARM central processing unit (CPU) and a Videocore 4
graphics processing unit (GPU).

 GPIO-These are exposed general-purpose input/output connection points


that will allow the real hardware hobbyists the opportunity to tinker.

 RCA-An RCA jack allows connection of analog TVs and other similar
output devices.

 Audio out-This is a standard 3.55-millimeter jack for connection of audio


output devices such as headphones or speakers. There is no audio in.

 LEDs-Light-emitting diodes, for all of your indicator light needs.

 USB-This is a common connection port for peripheral devices of all types


(including your mouse and keyboard).

 HDMI -This connector allows you to hook up a high-definition television or


other compatible device using an HDMI cable.

 Power-This is a 5V Micro USB power connector into which you can plug
your compatible power supply.

 SD Card Slot-his is a full-sized SD card slot. An SD card with an operating


system (OS) installed is required for booting the device.
 Ethernet-This connector allows for wired network access.

RASPBERRY PI COMPONENTS

Touch Sensor

A touch switch is a type of switch that only has to be touched by an object to


operate. It is a type of equipment that captures and records physical touch or
embrace on a device and/or object. It enables a device or object to detecT touch,
typically by a human user or operator. A touch sensor may also be called a touch
detector.
HUMAN TACTILITY SENDS A SIGNAL TO THE DEVICE SENSING
TOUCH ACTION

THE TOUCH SENSOR USED BY US HAS 3 PINS


NAMELY GROUND, VCC AND OUTPUT

LED
A light-emitting diode (LED) is a two-lead semiconductorlight source. It is a p–n
junction diode that emits light when activated. When a suitable current is applied
to the leads, electrons are able to recombine with electron holes within the device,
releasing energy in the form of photons.
Light Emitting Diode

Symbolic Representation of LED

Resistor
A resistor is a passive two-terminal electrical component that
implements electrical resistance as a circuit element. In electronic circuits, resistors
are used to reduce current flow, adjust signal levels, to divide voltages, bias active
elements, and terminate transmission lines.
They are a simple way to stabilize the LED current.
Jump Wires
A jump wire is an electrical wire, or group of them in a cable, with a connector or
pin at each end , which is normally used to interconnect the components of
a breadboard or other prototype or test circuit, internally or with other equipment
or components, without soldering.
They are of 3 types:
 Male to Male
 Male to Female
 Female to Male
Software
The software used in this project is the programming language, Python. Python is
the most compatible language with Raspberry Pi. Raspberry Pi interface has a pre-
installed Python IDE which can be used to implement the codes and functions. It
also includes the required Python libraries for interfacing the Raspberry Pi module.
Python IDE and Libraries
Python is an interpreted high-level programming language for general-purpose
programming. Created by Guido van Rossum and first released in 1991, Python
has a design philosophy that emphasizes code readability, notably using significant
whitespace. It provides constructs that enable clear programming on both small
and large scales. [27] In July 2018, Van Rossum stepped down as the leader in the
language community after 30 years.[28][29]
Python features a dynamic type system and automatic memory management. It
supports multiple programming paradigms, including object-oriented, imperative,
functional and procedural, and has a large and comprehensive standard library.[30]
Python interpreters are available for many operating systems. CPython, the
reference implementation of Python, is open source software[31] and has a
community-based development model, as do nearly all of Python's other
implementations. Python and CPython are managed by the non-profit Python
Software Foundation.
Python's large standard library, commonly cited as one of its greatest strengths,[93]
provides tools suited to many tasks. For Internet-facing applications, many
standard formats and protocols such as MIME and HTTP are supported. It includes
modules for creating graphical user interfaces, connecting to relational databases,
generating pseudorandom numbers, arithmetic with arbitrary precision
decimals,[94] manipulating regular expressions, and unit testing.
Some parts of the standard library are covered by specifications (for example, the
Web Server Gateway Interface (WSGI) implementation wsgiref follows PEP
333[95]), but most modules are not. They are specified by their code, internal
documentation, and test suites (if supplied). However, because most of the
standard library is cross-platform Python code, only a few modules need altering or
rewriting for variant implementations.
As of March 2018, the Python Package Index (PyPI), the official repository for
third-party Python software, contains over 130,000[96] packages with a wide range
of functionality, including:

 Graphical user interfaces


 Web frameworks
 Multimedia
 Databases
 Networking
 Test frameworks
 Automation
 Web scraping[97]
 Documentation
 System administration
 Scientific computing
 Text processing
 Image processing
Most Python implementations (including CPython) include a read–eval–print loop
(REPL), permitting them to function as a command line interpreter for which the
user enters statements sequentially and receives results immediately.
Other shells, including IDLE and IPython, add further abilities such as auto-
completion, session state retention and syntax highlighting.
As well as standard desktop integrated development environments, there are Web
browser-based IDEs; SageMath (intended for developing science and math-related
Python programs); PythonAnywhere, a browser-based IDE and hosting
environment; and Canopy IDE, a commercial Python IDE emphasizing scientific
computing.
RESULT AND ANALYSIS
The following is the implementation of the project:

4.1 Implementation Details


Implementation is the realization of an application, or execution of a plan, idea,
model, design, specification, standard, algorithm, or policy.

CIRCUIT REPRESENTATION OF THE PROJECT


Initially all the sensors are interfaced with the Raspberry Board. The sensor is
connected to various assigned pins and resistors. The LEDs are connected to their
assigned pins which are interfaced in the code used. The code runs on infinite
loop, hence the sensor are active all the time.

The following is the code used for the project:


padPin = 21
GPIO.setup(padPin, GPIO.IN)
while True:
padPressed = GPIO.input(padPin)
padPressed1 = GPIO.input(padPin)
if padPressed:
GPIO.setup(12,GPIO.OUT)
GPIO.output(12,GPIO.HIGH)
print(‘pressed’)
time.sleep(5)
GPIO.output(12,GPIO.LOW)
continue
if padPressed1:
GPIO.setup(5,GPIO.OUT)
GPIO.output(5,GPIO.HIGH)
print(‘pressed2’)
time.sleep(5)
GPIO.output(5,GPIO.LOW)
The code is run on the Python IDE.

4.2 Result and Evaluation


After its execution if the touch sensor is pressed once, the red LED glows. If in
the certain interval of time as in 5ms if the touch sensor is pressed or tapped
twice, the green LED glows. This allows the user to know that the glowing of Red
LED means stranger and the glowing of Yellow LED means a familiar person
who is aware of the security system.
If the sensor is pressed or tapped slowly twice it won’t be considered as the
continuous pressing of the sensor and each press will be counted separately hence
giving the resultant output.
This system is also useful for deaf people as they can see the LEDs glowing and
will be alerted that someone is at the door.
CONCLUSION AND FUTURE WORK
Currently the Security System gives the results using LED blinking. But, what if
the user isn’t at home to observe these changes and a burglar is trying to break in?
How will the owner know the people who have visited them when they were out?
Hence, in order to eliminate these limitations, we have planned a list of
advancements for the project.
Web Camera and LCD Display:
A webcam is a video camera that feeds or streams its image in real time to or
through a computer to a computer network. When "captured" by the computer, the
video stream may be saved, viewed or sent on to other networks travelling
through systems such as the internet, and e-mailed as an attachment. When sent to
a remote location, the video stream may be saved, viewed or on sent there. Unlike
an IP camera (which connects using Ethernet or Wi-Fi), a webcam is generally
connected by a USB cable, or similar cable, or built into computer hardware, such
as laptops.
A liquid-crystal display (LCD) is a flat-panel display or other electronically
modulated optical device that uses the light-modulating properties of liquid
crystals. Liquid crystals do not emit light directly, instead using a backlight or
reflector to produce images in colour or monochrome. [1] LCDs are available to
display arbitrary images (as in a general-purpose computer display) or fixed
images with low information content, which can be displayed or hidden, such as
pre-set words, digits, and seven-segment displays, as in a digital clock. They use
the same basic technology, except that arbitrary images are made up of a large
number of small pixels, while other displays have larger elements.
The Webcam and LCD Display will help us do the following improvements:
 Webcam will capture the image of the visitor and send it to the Raspberry
Pi to be stored in the database.
 The user can later on check these images on the LCD Display.
 The Webcam will also record 24/7 for a particular range which it captures
and this can be later replayed on the LCD display.
APPENDIX
a device which detects or
Sensors measures physical

Integrated development
IDE environment
is a software suite that consolidates
basic
tools required to write and test
software.

Open Source Software


a type of computer software whose
source code is
released
c under a license in which
theo copyright holder grants users the
rights
d to
study,
e change, and distribute the
software
i to anyone and for any
purpose.
s
t
h
e
c
o
p
y
r
i
g
h
t
h
o
l
d
e
r
g
r
a
n
t
s
u
s
e
r
s
t
h
e
r
i
g
h
t
s
t
o
REFERENCES

[1] https://computer.howstuffworks.com/raspberry-pi2.htm
[2]https://en.wikipedia.org/wiki/Raspberry_Pi
[3] https://en.wikipedia.org/wiki/Touch_switch
[4] https://en.wikipedia.org/wiki/Resistor
[5] https://en.wikipedia.org/wiki/LED_circuit
[6]https://learn.adafruit.com/capacitive-touch-sensors-on-the-raspberry-
pi/overview
[7] https://en.wikipedia.org/wiki/Python
[8] https://en.wikipedia.org/wiki/Electriclocks

You might also like