Professional Documents
Culture Documents
BY
AYIBU JIBRIN
AFIT/HND/EEE/19/0015
ENGINEERING TECHNOLOGY
JANUARY, 2022
i
DECLARATION
I hereby declare that this project was done by me AYIBU JIBRIN. Under the strict supervision
of Engr. Ajimah Nnabueze Edmund Department of Electrical Electronics Engineering, Air
Force Institute of Technology Kaduna. Authors whose work has been referred to in this project
are duly acknowledged.
---------------------------------------------------- Date-----------------------------
--------------------------------------------------- Date------------------------------
ii
CERTIFICATION
regulations governing the award of Higher National Diploma in Electrical and Engineering at
the Air Force Institute of Technology and is approved for its contribution to knowledge and
literary presentation.
----------------------------------- Date---------------------------------------
Engr. Ajimah Nnabueze Edmund
Project Supervisor
------------------------------------
Date---------------------------------------
Engr. C. D. Bala
Project Coordinator
------------------------------------
Date---------------------------------------
Prof. V. O. Mathew
HOD, Department of Electrical
and Electronics Engineering
iii
ACKNOWLEDGEMENT
I would like to express the deepest of my gratitude and appreciations to all my lecturers in EEED
AFIT for their encouragement, support and tolerance, never to forget Engr. Ajima my supervisor
of this work, who has the attitude and substance of a genius, he continually and convincingly
conveyed spirit of adventure in regard to research and academics, and an excitement in regard to
support and teaching. Without his guidance and persistence supports, this dissertation would not
have been successful. The continuous emotionally rich home conditions I enjoy have greatly
propelled my motivation for the actualization of this project. I must sincerely thank my family,
especially my wife; Mrs. Ayibu Salamatu, not forgetting my friends like L/Cpl Dabo, course
mates and colleagues, to mention but few for their great encouragement, support and
contribution towards the success of this research.
iv
DEDICATION
I dedicate this project work to almighty God the creator, our strong pillar, source of wisdom,
inspiration. Knowledge and understanding,
v
Table of Contents
DESISGN AND CONSTRUCTION OF PERIMETER BREACH MITIGATION SYSTEM USING PIR SENSOR.............i
DECLARATION..............................................................................................................................................ii
CERTIFICATION...........................................................................................................................................iii
ACKNOWLEDGEMENT.................................................................................................................................iv
DEDICATION.................................................................................................................................................v
ABSTRACT....................................................................................................................................................x
CHAPTER ONE..............................................................................................................................................1
1.0 INTRODUCTION............................................................................................................................1
1.1 Detection Principle......................................................................................................................1
1.2 Application...................................................................................................................................2
1.3 Disadvantages and advantages....................................................................................................2
1.4 Statement of Problem.................................................................................................................2
1.5 Motivation...................................................................................................................................2
1.6 Aims.............................................................................................................................................2
1.7 Objectives....................................................................................................................................2
1.8 Scope of the study.......................................................................................................................3
1.9 Justification of the study..............................................................................................................3
1.10 Significance of the study..............................................................................................................3
1.11 Limitation of the study.................................................................................................................4
1.12 Review of some related works.....................................................................................................4
CHAPTER TWO.............................................................................................................................................5
2.0 Introduction.................................................................................................................................5
2.1 General Theoretical Framework (Fundamental Concept)............................................................5
2.2 DESIGN APPROACH......................................................................................................................5
2.3 DESCRIPTION OF THE CIRCUIT.....................................................................................................6
2.4 CIRCUIT OPREATION....................................................................................................................7
2.5 REVIEW OF COMPONENTS USED.................................................................................................7
CHAPTER THREE..........................................................................................................................................8
CIRCUIT DESIGN AND CONSTRUCTION METHODOLOGY.............................................................................8
3.0 Introduction.................................................................................................................................8
3.1 The Research Design....................................................................................................................8
3.2 System Design Approach.............................................................................................................8
vi
3.3 Overall System Design.................................................................................................................8
3.4 LIST OF COMPONNTS...................................................................................................................9
3.4.1 ATMEGA328P.......................................................................................................................9
3.3.1 Cost analysis..........................................................................................................................10
3.4 PIR Motion Sensor.....................................................................................................................11
3.6 Some Basic Stats........................................................................................................................12
CHAPTER FOUR..........................................................................................................................................16
CONSTRUCTION AND OBSERVATION.........................................................................................................16
4.0 Physical Requirements...............................................................................................................16
4.3 Perimeter Intrusion Detection System Considerations....................................................19
4.5 4 BENEFITS OF A PERIMETER INTRUSION DETECTION SYSTEM...........................................................21
2. Property Value................................................................................................................................21
3. Safety At Work................................................................................................................................21
4. Flexibility & Control.........................................................................................................................21
4.1 Coding........................................................................................................................................22
4.3 Security Lighting........................................................................................................................22
CHAPTER FIVE............................................................................................................................................24
CONCLUSION AND RECOMMENDATIONS..................................................................................................24
5.1 CONCLUSION.............................................................................................................................24
5.2 RECONMENDADTIONS...............................................................................................................24
REFERENCES..............................................................................................................................................24
Intrusion detection sensors used by electronic security systems for critical facilities and infrastructures: a
review May 2015.......................................................................................................................................25
vii
LIST OF FIGURES
FIGURE 1:.....................................................................................................................................................................6
FIGURE 2:..................................................................................................................................................................6
FIGURE 3................................................................................................................................................................... 9
FIGURE 4................................................................................................................................................................. 10
FIGURE 5................................................................................................................................................................. 10
FIGURE 6................................................................................................................................................................. 11
FIGURE 7................................................................................................................................................................. 11
FIGURE 8: BC 547 TRANSISTOR (NPN)..........................................................................................................12
FIGURE 9: 12VDC RELAY....................................................................................................................................13
FIGURE 10...............................................................................................................................................................13
FIGURE 11: 2 PIN DIODE.....................................................................................................................................13
FIGURE 12...............................................................................................................................................................13
FIGURE 13: 1. 12V DC ADAPTER.......................................................................................................................14
FIGURE 14 SYSTEM FLOAT CHART FOR WORKFLOW..................................................................................14
FIGURE 15: BLOCK DIAGRAM OF INSTRUCTION ALARM SYSTEM.......................................14
FIGURE 16: SENSOR ARDUINO CONNECTION ON VERO BOARD...............................................................16
viii
LIST OF TABLES
ix
ABSTRACT
This paper provides an introduction to Electronic Security Systems which is providing guidance
to architects and engineers on how to plan and design electronic security systems for critical
facilities and infrastructures. Then, this paper reviews the sensors, mainly the PIR Sensor, active
infrared, atmega 328p arduino UNO and fiber optic cable-sensors, that form the most frequently
used sensors by an intrusion detection subsystem of electronic security systems for critical
facilities and infrastructure protection. Lastly, this paper describes a generic perimeter electronic
security system application with an unattended wireless sensor network (UWSN) and draws a
conclusion by thoughts on other possible future sensor system developments.
x
CHAPTER ONE
1.0 INTRODUCTION
*Intrusion Detection* system (IDS) IDS is a subsystem of ESS as described in this
document. The function of an IDS is to detect threatful/adversary intrusions. The detection of an
intruder starts the “clock” on the detect, delay, respond timeline. Societal crimes are very
common in the modern century. Everybody needs to feel secure when they are at work/home
either while sleeping at night or during day time. So, many security alarm systems are available
in the market. These systems are very efficient but costly. A burglar alarm or an intruder alarm
is basically an electronic device that sounds an alarm when it detects an intruder in the Premises
or Home. We can make an intruder alarm circuit which will be almost equally efficient for a
specific range of distance and will be very low in cost. This Research is about making an intruder
alarm using Arduino and PIR sensor. When the PIR sensor will detect an intruder, it will send a
signal to Arduino and the Arduino will sound an alarm. This circuit is very simple and will be
designed on a Vero board. The main components of an intrusion detection system are the
following: Sensors detecting intrusion through sensing voice, vibration, motion, temperature and
other physical and environmental events. A bidirectional data transmission media to transmit the
signal of detection to a local and/or remote operational control and command center and for
transmitting commands of operators to the field devices. Processors for automatic evaluation of
the data received from sensors. Workstations with a user interface software for operators to
monitor alarms actuated by the sensors. In this section the applied sensor type used by intrusion
detection systems is presented. Passive infrared motion (PIR) detector
1
1.2 Application
Depending on the optics installed, PIR motion detectors are suitable for exterior
(outdoor) and interior (indoor) surveillance.
Structural elements inside detection area which are causing shadows are preventing
detection or give rise to false alarms.
1.5 Motivation
This research work is focused on the design and construction of Electronic Security
Systems (ESS) to detect and gives early warning of threatful/adversary intrusions with better cost
effectiveness and efficiency/accuracy of performance.
1.6 Aims
The aim of this project is to design and construct AN Electronic Security Systems
monitoring critical facilities and infrastructures using PIR Sensor for continuous monitoring.
1.7 Objectives
To develop a perimeter electronic security system application with an unattended
wireless sensor network (UWSN) and draws a conclusion by thoughts on other possible future
sensor system developments.
2
This document has been prepared to provide users with guidance on the specification,
installation, operation and maintenance of PIDS. Before attempting to write a performance
specification for a PIDS, it is important to ensure that a detailed operational requirement (OR)
has been produced
In this work;
3
Design is efficient and low cost
Easy to maintain
The Structural elements inside detection area which are causing shadows are preventing
detection or give rise to false alarms
The sensor is sensitive to weather. When body temperature and ambient temperature are
the same, the sensor cannot differentiate and detect
Sudden temperature changes such as air turbulences or exhaust air from devices can
create a moving object response which can activate false alarm
4
CHAPTER TWO
2.0 Introduction
This chapter consist basically incisive review of relevant literature in the project aspect.
The paper is tailored towards justifying the defined objectives of the project and establishing the
theoretical framework for the research work. It will also identify gaps in the literature in which
the study intend to fulfill.
5
2.3 DESCRIPTION OF THE CIRCUIT
Figure 1:
Figure 2:
6
2.4 CIRCUIT OPREATION
The working of this circuit is very simple. At first, the state of the PIR sensor is set to
LOW. it means that no motion is detected. When a motion will be detected by the PIR sensor, it
will send a signal to the microcontroller. The microcontroller will then switch the buzzer and
LED on. If no motion is detected, the LED and buzzer will remain in the off state. Therefore the
sensitivity of the sensor was adjusted.
7
CHAPTER THREE
3.0 Introduction
In this method information on method used to design and construct the system circuit,
working principle and the application/functionality of the whole project will be provided.
8
If there is movement then the system will activate the alarm, if there is no human
presence, then the system will re-read the movement or return to the initial process. The
complete the work flow defined in the float chart.
3. 12v dc relay
4. 2 pin diode
5. BC547 Transistor
6. 12v dc adapter
7. 1k/10k resistor
8. Vero board
9. Switch
3.4.1 ATMEGA328P
Is high performance, low power controller from Microchip. ATMEGA328P is an 8-bit
microcontroller based on AVR RISC(Reduced Instruction Set Computer) architecture. It
is the most popular of all AVR controllers as it is used in ARDUINO boards.
9
Figure 3
Figure 4
10
Figure 5
3.3.1 Cost analysis
The estimated cost of the design and construction of this project is about thirty thousand
naira only. This is relatively low compare to those foreign made in the market
11
9 Relay 1 N1000 N1000
Total N32,210
Figure 6
12
Figure 7
Size: Rectangular
Output: Digital pulse high (3V) when triggered (motion detected) digital low when idle
(no motion detected). Pulse lengths are determined by resistors and capacitors on the
PCB and differ from sensor to sensor.
Power supply: 5V-12V input voltage for most modules (they have a 3.3V regulator), but
5V is ideal in case the regulator has different specs
Figure 10
14
Figure 11: 2 pin Diode
Figure 12
NO Movement Detection
Any movement?
15
Any person?
People Detection People detection
Stop
Yes
Yes
16
CHAPTER FOUR
The construction of this project was done with the following components and materials;
the atmega 328 arduino , motion detection sensor module(PIR),BC547 transistor, 12v dc relay, 2
pin diode, 1k/10k resistors, 12v adapter, vero board, double and single path rest casings and siren
alarm.
17
4.1 RESULT AND ANALYSIS
In this section, the implementation of the security system is discuss and result evaluation.
Firstly, the integration and implementation of the system as done as shown bellow.
Connections between Arduino and vero board and others components such as the alarm siren,
relay etc.the scenario of yhr evaluation is given as follow bellow;
600 feet)
19
4.2 INTRUSION SCENARIOS
20
4.3 Perimeter Intrusion Detection System
Considerations
Detection of a potential or confirmed breach of the property perimeter
provides time for police or guard forces to intercept a threat before the loss of
property or harm to staff. Facilities with perimeter detection in place range
from remote petrochemical or cellular sites to vehicle processing or storage
facilities to critical infrastructure.
There are many things to consider when evaluating your current or new
perimeter detection strategy.
21
Delay: It’s critical to maximize the time span from ingress to attackable asset,
to allow the security team time to respond. Physical barriers at the perimeter,
PIDS on and inside the perimeter fence, internal barriers (ideally with PIDS),
and the distance between barriers and attackable asset are all delay
mechanisms that slow an attacker.
1.Smart Safety; Thieves do not discriminate. Every business is vulnerable and keeping
people out is the best way of keeping valuables safe.
As the statistics show, walls and fences are no barrier. Alarmed perimeter fences work,
both as a deterrent and as a solution if there is an attempted intrusion.
2. Property Value
3. Safety At Work
There is a strong statistical association between intruders and violent crime. The more
lucrative the asset, the more likely it is that force will be involved. Not all intruders are
caught, and police reporting has inconsistencies and inadequacies. However, around 1
in 4 intruders are thought to be armed in one way or another, with firearms numbers
slowly creeping up. Your staff are most likely to find themselves facing a handgun, but
an unlucky 10% will be on the wrong end of a shotgun.
To protect site staff a perimeter intrusion detection system can make a real difference.
22
4. Flexibility & Control
High-profile sites have different areas of risk, and these require different levels of
perimeter control. For rural sites, footpaths are a regular hazard that are difficult to
secure against. For urban sites, noise and foot traffic can make perimeter monitoring
problematic. Advanced systems are designed to respond to the main issues that each
area of industry is likely to experience, resulting in a tailored solution that meets the
unique needs of each site.
7 Entrances 0.1
Standards for the amount of lighting required for emergency and security lighting.
24
CHAPTER FIVE
5.1 CONCLUSION
Site operators need perimeter security solutions that are reliable, minimize nuisance
alarms, are cost-effective, and that easily integrate into their existing security systems
and networks as Valuable asset and properties suffer a lot of attacks by intruders and criminals,
hence all-round monitoring could be provided efficiently and effectively with minimal cost using
electronic security system (ESS) for early warning and recording of evidence.
5.2 RECONMENDADTIONS
These sensor network systems can be tailored to the optimum security
systems required, by selecting the suitable sensors and other subsystem
components according to the environmental, field and other conditions for the
area to be protected. Important design criteria for electronic security systems are
described by guiding standard documents like UFC 4-021-02.
Besides being used in security applications, it is foreseen that smart sensor
systems will be placed everywhere in daily life in the near future. This system can also be in
cooperated with webcam, SIM Module for wireless reporting and storage.
REFERENCES
Smart Home security system using object recognition and PIR sensor. Jan 14 2018 by
Nico Surantha
(DARPA) & The National Institute of Justice (NIJ), pp. 2 12 to 2 55, 1998
25
Guide to Perimeter Intrusion Detection Systems (PIDS) Publication No. 05/12 In
partnership with CPNI (Centre for Protection of the National Infrastructures).
0575-Arata-2006-Perimeter-Security
26