You are on page 1of 5

2017 IEEE International Conference on Technological Innovations in ICT For Agriculture and Rural Development

(TIAR 2017)

IoT Application Development: Home Security


System

Raj G Anvekar Dr. Rajeshwari M Banakar


School of Electronics and Communication Professor, Member IEEE
Engineering, School of Electronics and Communication Engineering,
KLE Technological University Hubli, India KLE Technological University Hubli, India
raj.anvekar123@gmail.com banakar@bvb.edu

Abstract—One of the prominent application segment of existing physical objects and embedding intelligence into our
Internet of Things framework is in the Security Sector. It is environment.
important to arrive at a unique low cost solution to prevent
theft and ensure security to members of the home. The Security has become a major issue everywhere and its
Internet of Things(IoT) Layered Architecture based design LPSRUWDQFHFDQ¶WEHGHQLHG in this crime ridden society. The
approach assists the system designer to conveniently role of IoT infrastructure in the development of home
differentiate the system component requirements distinctly at security system is significant. The security of home members
various layers. This papers highlights the model driven acts as a fore runner in the development of home security
development process for Home Security System. It remarks the systems. The primary aim is to develop feasible solution to
uses of customers end application such as Telegram to securely transform a traditional doorbell into an intelligent bell which
transmit information through layers of IoT architecture. This provides information of the stranger to home owner thereby
paper aims at providing a low-power, cost effective and enabling him to answer the door through smartphone with
unobtrusive IoT based home security system which assist in easy user interface. The design solution in IoT system is
presence detection, identification and authentication of multidisciplinary and is scattered through various domain
stranger. The proposed solution makes use of USB Webcam as specific challenges.
an image capturing unit, Electric Door Strike as an actuator
and Telegram which has an amazing feature as Telegram Bot In [2], Ovidiu and Peter discuss the growth and
which provide APIs to build solutions which is compatible with application of IoT based design systems in the near future.
Raspberry Pi IoT infrastructure. The authors give an IoT layered architecture illustration
which is useful for the IoT system designer. The networking
Keywords—Internet of Things, Telegram, Raspberry Pi, infrastructure and protocols requires special attention during
Home Security, Electric Door Strike, Doorbell. system level integration of IoT. The network infrastructure
demands [3] need of high quality data and failure free
I. INTRODUCTION wireless communication. There are many researches that
Internet of Things (IoT) is an interconnection of physical anticipate the failure of wireless network which is growing
objects and other devices embedded with electronics, as the use of technology evolves. The main factors are
software, network connectivity and application specific network topology, failure of network measurement and cost
sensors and actuators that enables the objects to collect and minimization which decides the efficiency of the network
exchange data. It is an important topic in technology industry and data delivery. The data delivered or exchanged over
and its applications has gained popularity in recent years and internet can be audio, video or an image file. Jayashri and
is predicted to have billions of smart objects connected Arvind [4] proposes the use GSM based security system to
together by 2020. IoT has become a major platform in the enhance the security. It illustrates two methods of home
field of Home Automation and Security, and foresee large security system, first one has a webcam which captures the
number of application possibilities in near future. Smart motion and sends a mail to the owner of house. Second uses
connectivity [1] with existing networks and context-aware GSM-GPS module to send SMS to the owner with the
computation using network resources is an indispensable part assistance of sensor and micro-controller. In [5] Arun and
of IoT. In today's world, Wi-Fi and 4G-LTE wireless Internet Doreen uses Bluetooth as a wireless standard to detect,
access is predominantly used, which justifies the evolution of identify and locate entities inside home. WLAN is setup to
ubiquitous information and communication networks. collate a server data at a centralized server. Uses 3 Bluetooth
However, for the Internet of Things vision to successfully beacon which provide the RSSI value and supports 3
emerge, the computing standard will need to go beyond decision model, they are peak RSSI decision model,
conventional mobile computing scenarios that use smart supervised and unsupervised learning model for detection,
phones and portables, and evolve into connecting everyday identification and localization of the entities. Exchange of
information in the form of video or image is the requirement

978-1- 5090-4437- 5/17/$31.00 ©2017 IEEE 

Authorized licensed use limited to: Corporacion Universitaria de la Costa. Downloaded on March 19,2021 at 05:46:35 UTC from IEEE Xplore. Restrictions apply.
2017 IEEE International Conference on Technological Innovations in ICT For Agriculture and Rural Development

(TIAR 2017)
of varied application, including smart transportation, smart the Raspberry Pi, Webcam acts as an intermittent node. The
health care and smart structures. Umar Albalawi and Prabha APIs of webcam are installed in order to take a picture of
Sundaravadivel [6] presents a modular and extensible VWUDQJHUDWRZQHU¶VGRRU7KHQHWZRUNLQJLQIUDVWUXFWXUHDFWV
quadrotor architecture and its specific prototyping for as a source of communication between source node and
automatic tracking applications. To demonstrate the power target node. It includes Ethernet LAN cable, USB Wi-Fi
and flexibility of proposed design, a target tracking and Adapter, which connects Raspberry Pi to Internet. The
acquisition applications is presented here. The designed Information Service Layer uses SaaS to reach customer end
module implements the basic proportional integral derivative using Internet. It sends and receives the information in the
control and a custom target acquisition algorithm. form of data packets. The social networking application such
Importance of the sliding-window-based algorithm is also as WhatsApp, Gmail and Telegram acts as SaaS for
presented. customer end applications. The Application Layer is
customer specific design feature. It supports various
II. IOT LAYERED ARCHITECTURE: HOME SECURITY SYSTEM application in field of security, home automation, energy,
transportation and automobiles. It can receive and retransmit
The IoT layered architecture consist of four major layers. information through the layers on IoT architecture. Fig. 2
They are Application Layer, Information Service Layer, illustrates IoT Layered Architecture in Home Security
Networking Infrastructure Layer and Smart Object Layer. System.
The Smart Object Layer mainly consist of sensors for data
acquisition and actuators for data deployment. It is the base
layer of IoT Layered Architecture.

Fig. 2. IoT Layered Architecture for Home Security System

III. IOT APPLICATION DEVELOPMENT: CONCEPTUAL MODEL


With the increased availability of consumer sensing
Fig. 1. IoT Layered Architecture
devices including modern smartphones, the domain of
networked sensing has evolved into the Internet of Things,
where application exhibit traditional Wireless Sensor and
The sensors of Smart Object Layer interact with real time Actuator Network (WSAN) features and such large number
parameter and enables data collection which can be used by of sensing and actuation device are coupled with increased
the upper layers. Fig. 1 illustrates the IoT Layered device heterogeneity and integration with database server,
Architecture. Choice of the sensors and actuators in an IoT etc. As IoT has gained wide acceptance the need for sound
based system design makes them Smart Objects. These software engineering approaches to adequately manage the
Smart Objects can be used in distinct application as they can development of complex application arises. Based on roles
be programmed using appropriate Internet modules. As they
are programmable they can be used to provide user services.
In the IoT layered architecture, Information Services Layer
mainly deals with end user applications. It has Software as a
Service (SaaS) as its important design attribute. SaaS allows
user to connect and use cloud based application over
Internet. The customer specification governs the designer's
model approach. The salient features of SaaS is that user can
gain access to sophisticated applications, access applications
data from anywhere and its ability to automatically update to
the latest version. The Networking infrastructure Layer acts
as a bridge between Smart Object and Information Service
Layer. For the data transmission between the door bell and

Fig. 3. Conceptual Model of Home Security System

978-1- 5090-4437- 5/17/$31.00 ©2017 IEEE 

Authorized licensed use limited to: Corporacion Universitaria de la Costa. Downloaded on March 19,2021 at 05:46:35 UTC from IEEE Xplore. Restrictions apply.
2017 IEEE International Conference on Technological Innovations in ICT For Agriculture and Rural Development

(TIAR 2017)
defined in Fig. 2 we propose the following model driven produces an output. An output could be command or a data
message that is consumed by others or data message that
development process that consists of following steps as triggers an action of an actuator. A computational service is a
shown in Fig. 3. representation of the processing element in an application.
A. Domain Specific Concept A software component communicates with other
The concepts that fall into this category are specific to a software components to exchange data or control. These
target application domain. For example, the Security System interactions occurs based on different modes such as request-
domain is reasoned in terms of rooms and doors. An entity of response and command. This is in principle as an instance of
interest (EoI) is an object (e.g., room, book, door), including the component-port-connector architecture used in software
attributes that describe it, and its state that is relevant from a engineering.
user or an application perspective. The entity of interest has
an observable property called phenomenon. Typical C. Deployment Specific Concept
examples are the sensing range of motion detector of a door All the devices employed for an application falls in this
and a tag ID. The conceptual representation of an actuator, a category. Each device hosts zero or more resources. For
sensor, a storage or a kind of user interface is a resource. example, a device could host resources such as a PIR sensor
These are the following types of resources: WR GHWHFW YLVLWRU¶V SUHVHQFH D 5DVSEHUU\ 3L WR SURFHVV WKH
input data and give output data to actuators, a smartphone to
x A sensor has the ability to detect changes in the display information of stranger, a door strike to unlock the
environment. PIR and Webcam acts as a sensing door and a storage to store the information of stranger.
device. The sensor observes a phenomenon of an
EoI. For instance, the PIR sensor detects the
D. Platform Specific Concept
presence of a stranger in front of a door.
The computer programs mainly the device drivers which
x An actuator makes changes in the environment acts as a translator between a hardware and an application
through an action. Electric door strike and alarming falls in this category. We identify the following platform
systems are examples of actuators. The actuator specific concepts:
affects a phenomenon of an EoI by performing
x For efficient functioning of a sensor, sensor driver
actions. For instance, the electric door strike
controlled by smartphone allows the owner to enter is required. It accesses data observed by the sensor
the home. and generates the meaningful data that can be used
by other software components. For instance, PIR
x A storage has the ability of storing data in a sensor generates a value on detecting the presence
persistent manner. The storage stores information of visitor and precedes this value to Raspberry Pi
about a phenomenon of an EoI. For instance, a for further calculation.
database server stores information in the form of x An actuator driver is required to allow the actuator
picture captured using webcam about the people to function appropriately. It translates a command
YLVLWLQJRZQHU¶VKRPH from other software components and actuates the
x A user interface represents tasks available to users actuator appropriately. For instance,
to interact with entities of interest. For home locking/unlocking mechanism of electric door
security system, it sends a notification to home strike when triggered by a user application.
owner indicating the presence of stranger at his x In order to provide read and write access to storage
door. On authenticating the identity, the owner device, a storage service is required. A storage
unlocks the door using his smartphone. service provides access to the storage. Other
software components uses this storage service to
B. Functionality Specific Concept access data from the storage. For instance, MySQL
The computational element of an application mainly the storage service provides access to a database
software component and any interaction among them falls in server.
this category. A computational element is basically a type of x An end-user application is a basically a type of
software component that encloses a part systems software component that is required to help a user
functionality and data, and restricts access to that part via to perform tasks (e.g., receiving notifications,
explicitly defined interfaces. We use the term application submitting information). It provides access to
logic to refer a functionality of a software component. The available tasks. For instance, in the home security
application logic to send information of visitor to owner on application a user can authenticate the identity of
pressing the doorbell, to unlock the door using smartphone visitor and allow access to home using an
etc. This concept includes a software component with
application installed on his phone.
specific functionality, a computational service related to it,
which is a type of software component that consumes one or
more parameter information as inputs, processes it, and

978-1- 5090-4437- 5/17/$31.00 ©2017 IEEE 

Authorized licensed use limited to: Corporacion Universitaria de la Costa. Downloaded on March 19,2021 at 05:46:35 UTC from IEEE Xplore. Restrictions apply.
2017 IEEE International Conference on Technological Innovations in ICT For Agriculture and Rural Development

(TIAR 2017)

Fig. 4. Flowchart of Home Security System

The flowchart in Fig. 4, illustrates the initialization


Fig. 5. Picture of Visitor
process to invoke the webcam and sets it to active mode.
The steps followed by IoT infrastructure to reflect the output
B. Restrict/Allow access to home
response are also shown. When a visitor presses the
doorbell, it sends an analog signal to Raspberry Pi which To take control action we have used an amazing feature
triggers the Webcam to take the picture of visitor. Pi of Telegram which is known as Telegram bot. Bots are
connects to Internet and sends the data to Telegram server. answer machines that takes the proper action for questions
The server responds to the request and sends the data to asked or commands sent.
Telegram user. The user authenticates the identity and On the Raspberry Pi Telegram bot libraries must be
allows access to visitor by unlocking the door remotely installed and upgraded to the new version. The controlling
using his smartphone. The above algorithm is repeated action is implemented by writing python script. In this
every time the bell is pressed or motion is detected. experiment, when user sends commands to control the
Raspberry Pi from his Telegram account to the bot, python
IV. DESIGN METHODOLOGY script will get called. Function bot.notifyOnMessage(handle)
The methodology used for making the system operate is will intimate the bot that some command has been received.
divided into two important phases. To check which command has been sent, a series of else-if
conditions are written inside the handle(msg) function.
A. Human Detection and Authentication Hence the Telegram bot calls this function and when the
command sent by the user matches with the options written
When a visitor approaches a home and presses the inside the handle(msg) function it will execute the
doorbell, an analog signal is fed to Raspberry Pi. If the commands which are under the else-if keywords. Inserting
visitor does not presses the doorbell, the PIR sensor detects the token of Telegram Bot in python script is very important.
his presence and sends signal to Pi which triggers the In Telegram bot, messages can be sent by using function
webcam to take the picture of visitor. The algorithm is bot.sendMessage(chat id, msg). To execute the OS
deployed on Pi to process the data. Pi connects to internet commands we can use sub process python module or OS
and sends the data to Telegram server. Telegram is highly system module. In order to control the door lock, home
secure as it supports AES (Advanced Encryption Standard) RZQHU VHQGV µ/unlock¶ RU µ/lock¶ commands to the bot. The
and Triple Data Encryption standards. IoT device and smartphone need not be connected to the
In this part we have installed Telegram libraries in the same network.
Raspberry Pi to make use of Telegram application and
created a new Telegram account for the Raspberry Pi by V. EXPERIMENTAL RESULTS
registering a mobile sim card number. Once we register the
We have performed the experiment by interfacing
mobile number, a Telegram code will be sent to that
Webcam and Electric Door Strike with the Raspberry Pi. The
respective mobile number for activation. The captured image
use of Telegram application to receive the messages and
as shown in Fig. 5 is sent using Send_Photo command of
send the commands makes the whole system user friendly
Telegram. Along with the photo, a notification message is
and effective. When the home owner receives the pictorial
also sent using command Send_Message. Thus, at the sender
information of stranger/visitor, he authenticates the identity
end, it is the Raspberry Pi which does the main work, but
and takes action by sending commands to Raspberry Pi from
data has been sent through Telegram. The user authenticates
his Telegram account using his smartphone connected to
the identity and take necessary actions.
Internet. The door locking mechanism is implemented using
Electric door strike. When the Raspberry Pi receives

978-1- 5090-4437- 5/17/$31.00 ©2017 IEEE 

Authorized licensed use limited to: Corporacion Universitaria de la Costa. Downloaded on March 19,2021 at 05:46:35 UTC from IEEE Xplore. Restrictions apply.
2017 IEEE International Conference on Technological Innovations in ICT For Agriculture and Rural Development

(TIAR 2017)
µ/unlock¶ command from user/home owner, it runs python [3] Elisha Colmenar, Fadi Al-Turjman, Mohammad Biglarbegian,
code which makes respective GPIO pins high, triggers the ³'DWD 'HOLYHU\ DQG *DWKHULQJ LQ ,R7 $SSOLFDWLRQV$Q
2YHUYLHZ´ WK $QQXDO ,((( :RUNVKRS RQ :LUHOHVV /RFDO
relay and unlocks the door. Networks, WLN 2014, Edmonton, Canada.
[4] -D\DVKUL %DQJDOL DQG $UYLQG 6KDOLJUDP ³ 'HVLJQ DQG
Implementation of Security Systems for Smart Home based on
*60WHFKQRORJ\´ ,QWHUQDWLRQDO-RXUQDORI6PDUW+RPH9RO
No.6 (2013), pp.201-208.
[5] Alaa Alhamoud, Arun Asokan Nairy, Christian Gottron, Doreen
%RKQVWHGW DQG 5DOI 6WHLQPHW] ³ 3UHVHQFH 'HWHFWLRQ
Identification and Tracking in Smart Homes Utilizing Bluetooth
(QDEOHG 6PDUWSKRQHV´ WK $QQXDO ,((( :RUNVKRS RQ
Wireless Local Networks, WLN 2014, Edmonton, Canada.
[6] ELIAS KOUGIANOS, SARAJU P. MOHANTY, GAVIN
COELHO, UMAR ALBALAWI AND PRABHA
SUNDARAVADIVEL, " Design of a High-Performance
System for Secure Image Communication in the Internet of
Things", SPECIAL SECTION ON SECURITY AND
RELIABILITY AWARE SYSTEM DESIGN FOR MOBILE
COMPUTING DEVICES, Date of current version April 6,
2016.
Fig. 6. System Implementation

In the same way ZKHQ LW UHFHLYHV WKH FRPPDQG µORFN¶


the door will get locked by making respective GPIO pins
low. Fig. 6 represents the system implementation in real
time. Thus by sending commands to the bot we can control
any actuators that are connected to IoT device. Also this
action can be taken from any remote place. Once the door
gets unlocked a notification PHVVDJH ³The door has been
ORFNHG´LVVHQWWRWKHKRPHRZQHUDVDFNQRZOHGJHPHQW7KH
system is highly responsive and robust.

VI. CONCLUSION
An IoT enabled design framework is presented for
security sector. The conceptual model developed for the IoT
based Home Security System has been built using the
fundamentals of IoT Layered Architecture feature. The
successful implementation of the proposed design solution
for IoT Home Security System, with the projection of 21
billion Smart Objects by 2020 advances the knowledge
during system integration. In this paper, we have
conceptualized and implemented a low-power, cheap and
unobtrusive IoT based Home Security System which assist
in presence detection, identification and authentication of
stranger. The system requires extremely low maintenance
and can be employed in smart homes of tomorrow. Future
work is on, a similar approach in developing a prototype for
face detection and identification using the concept of
machine learning and artificial intelligence.

REFERENCES
[1] Jayavardhana Gubbia, Rajkumar Buyyab, Slaven Marusic,
0DULPXWKX 3DODQLVZDPL ³,QWHUQHW RI 7KLQJV ,R7  $ YLVLRQ
DUFKLWHFWXUDO HOHPHQWV DQG IXWXUH GLUHFWLRQV´ ,QWHUQDWLRQDO
journal on Future Generation Computer Systems 29 (2013)
1645±1660.
[2] 2YLGLX 9HUPHVDQ 3HWHU )ULHVV ³,QWHUQHW RI 7KLQJV ±
Converging Technology for Smart Environments and Integrated
Eco-6\VWHPV´ 5LYHU 3XEOLVKHUV 6HULHV LQ &RPPXQLFDWLRQV
Aalborg 2013, Denmark.

978-1- 5090-4437- 5/17/$31.00 ©2017 IEEE 

Authorized licensed use limited to: Corporacion Universitaria de la Costa. Downloaded on March 19,2021 at 05:46:35 UTC from IEEE Xplore. Restrictions apply.

You might also like