You are on page 1of 36

DESISGN AND CONSTRUCTION OF PERIMETER BREACH

MITIGATION SYSTEM USING PIR SENSOR

BY

AYIBU JIBRIN
AFIT/HND/EEE/19/0015

A PROJECT SUBMITTED TO THE DEAPRTMENT OF ELECTRICAL AND

ELECTRONICS ENGINEERING, AIR FORCE INSTITUTE OF TECHNOLOGY,

KADUNA, IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE AWARD

OF HIGHER NATIONAL DIPLOMER IN ELECTRICAL AND ELECTRONICS

ENGINEERING TECHNOLOGY

JANUARY, 2022

i
DECLARATION

I hereby declare that this project was done by me AYIBU JIBRIN. Under the strict supervision
of Engr. Ajimah Nnabueze Edmund Department of Electrical Electronics Engineering, Air
Force Institute of Technology Kaduna. Authors whose work has been referred to in this project
are duly acknowledged.

---------------------------------------------------- Date-----------------------------

AYIBU JIBRIN (AFIT/HND/EEE/19/0015)


Student

The above declaration is confirmed.

--------------------------------------------------- Date------------------------------

Engr. Ajimah Nnabueze Edmund


Supervisor

ii
CERTIFICATION

I AYIBU JIBRIN certify that this project work titled “CONSTRUCTION OF

PERIMETER BREACH MITIGATION SYSTEM USING PIR SENSOR” meet the

regulations governing the award of Higher National Diploma in Electrical and Engineering at

the Air Force Institute of Technology and is approved for its contribution to knowledge and

literary presentation.

----------------------------------- Date---------------------------------------
Engr. Ajimah Nnabueze Edmund
Project Supervisor

------------------------------------
Date---------------------------------------
Engr. C. D. Bala
Project Coordinator

------------------------------------
Date---------------------------------------
Prof. V. O. Mathew
HOD, Department of Electrical
and Electronics Engineering

iii
ACKNOWLEDGEMENT

I would like to express the deepest of my gratitude and appreciations to all my lecturers in EEED
AFIT for their encouragement, support and tolerance, never to forget Engr. Ajima my supervisor
of this work, who has the attitude and substance of a genius, he continually and convincingly
conveyed spirit of adventure in regard to research and academics, and an excitement in regard to
support and teaching. Without his guidance and persistence supports, this dissertation would not
have been successful. The continuous emotionally rich home conditions I enjoy have greatly
propelled my motivation for the actualization of this project. I must sincerely thank my family,
especially my wife; Mrs. Ayibu Salamatu, not forgetting my friends like L/Cpl Dabo, course
mates and colleagues, to mention but few for their great encouragement, support and
contribution towards the success of this research.

iv
DEDICATION

I dedicate this project work to almighty God the creator, our strong pillar, source of wisdom,
inspiration. Knowledge and understanding,

v
Table of Contents

DESISGN AND CONSTRUCTION OF PERIMETER BREACH MITIGATION SYSTEM USING PIR SENSOR.............i
DECLARATION..............................................................................................................................................ii
CERTIFICATION...........................................................................................................................................iii
ACKNOWLEDGEMENT.................................................................................................................................iv
DEDICATION.................................................................................................................................................v
ABSTRACT....................................................................................................................................................x
CHAPTER ONE..............................................................................................................................................1
1.0 INTRODUCTION............................................................................................................................1
1.1 Detection Principle......................................................................................................................1
1.2 Application...................................................................................................................................2
1.3 Disadvantages and advantages....................................................................................................2
1.4 Statement of Problem.................................................................................................................2
1.5 Motivation...................................................................................................................................2
1.6 Aims.............................................................................................................................................2
1.7 Objectives....................................................................................................................................2
1.8 Scope of the study.......................................................................................................................3
1.9 Justification of the study..............................................................................................................3
1.10 Significance of the study..............................................................................................................3
1.11 Limitation of the study.................................................................................................................4
1.12 Review of some related works.....................................................................................................4
CHAPTER TWO.............................................................................................................................................5
2.0 Introduction.................................................................................................................................5
2.1 General Theoretical Framework (Fundamental Concept)............................................................5
2.2 DESIGN APPROACH......................................................................................................................5
2.3 DESCRIPTION OF THE CIRCUIT.....................................................................................................6
2.4 CIRCUIT OPREATION....................................................................................................................7
2.5 REVIEW OF COMPONENTS USED.................................................................................................7
CHAPTER THREE..........................................................................................................................................8
CIRCUIT DESIGN AND CONSTRUCTION METHODOLOGY.............................................................................8
3.0 Introduction.................................................................................................................................8
3.1 The Research Design....................................................................................................................8
3.2 System Design Approach.............................................................................................................8
vi
3.3 Overall System Design.................................................................................................................8
3.4 LIST OF COMPONNTS...................................................................................................................9
3.4.1 ATMEGA328P.......................................................................................................................9
3.3.1 Cost analysis..........................................................................................................................10
3.4 PIR Motion Sensor.....................................................................................................................11
3.6 Some Basic Stats........................................................................................................................12
CHAPTER FOUR..........................................................................................................................................16
CONSTRUCTION AND OBSERVATION.........................................................................................................16
4.0 Physical Requirements...............................................................................................................16
4.3 Perimeter Intrusion Detection System Considerations....................................................19
4.5 4 BENEFITS OF A PERIMETER INTRUSION DETECTION SYSTEM...........................................................21
2. Property Value................................................................................................................................21
3. Safety At Work................................................................................................................................21
4. Flexibility & Control.........................................................................................................................21
4.1 Coding........................................................................................................................................22
4.3 Security Lighting........................................................................................................................22
CHAPTER FIVE............................................................................................................................................24
CONCLUSION AND RECOMMENDATIONS..................................................................................................24
5.1 CONCLUSION.............................................................................................................................24
5.2 RECONMENDADTIONS...............................................................................................................24
REFERENCES..............................................................................................................................................24
Intrusion detection sensors used by electronic security systems for critical facilities and infrastructures: a
review May 2015.......................................................................................................................................25

vii
LIST OF FIGURES

FIGURE 1:.....................................................................................................................................................................6
FIGURE 2:..................................................................................................................................................................6
FIGURE 3................................................................................................................................................................... 9
FIGURE 4................................................................................................................................................................. 10
FIGURE 5................................................................................................................................................................. 10
FIGURE 6................................................................................................................................................................. 11
FIGURE 7................................................................................................................................................................. 11
FIGURE 8: BC 547 TRANSISTOR (NPN)..........................................................................................................12
FIGURE 9: 12VDC RELAY....................................................................................................................................13
FIGURE 10...............................................................................................................................................................13
FIGURE 11: 2 PIN DIODE.....................................................................................................................................13
FIGURE 12...............................................................................................................................................................13
FIGURE 13: 1. 12V DC ADAPTER.......................................................................................................................14
FIGURE 14 SYSTEM FLOAT CHART FOR WORKFLOW..................................................................................14
FIGURE 15: BLOCK DIAGRAM OF INSTRUCTION ALARM SYSTEM.......................................14
FIGURE 16: SENSOR ARDUINO CONNECTION ON VERO BOARD...............................................................16

viii
LIST OF TABLES

TABLE 1: HARDWARE MODULE............................................................................................................................5


TABLE 2: COST OF MATERIALS USED.............................................................................................................16
TABLE 3...................................................................................................................................................................17

ix
ABSTRACT

This paper provides an introduction to Electronic Security Systems which is providing guidance
to architects and engineers on how to plan and design electronic security systems for critical
facilities and infrastructures. Then, this paper reviews the sensors, mainly the PIR Sensor, active
infrared, atmega 328p arduino UNO and fiber optic cable-sensors, that form the most frequently
used sensors by an intrusion detection subsystem of electronic security systems for critical
facilities and infrastructure protection. Lastly, this paper describes a generic perimeter electronic
security system application with an unattended wireless sensor network (UWSN) and draws a
conclusion by thoughts on other possible future sensor system developments.

x
CHAPTER ONE

1.0 INTRODUCTION
*Intrusion Detection* system (IDS) IDS is a subsystem of ESS as described in this
document. The function of an IDS is to detect threatful/adversary intrusions. The detection of an
intruder starts the “clock” on the detect, delay, respond timeline. Societal crimes are very
common in the modern century. Everybody needs to feel secure when they are at work/home
either while sleeping at night or during day time. So, many security alarm systems are available
in the market. These systems are very efficient but costly. A burglar alarm or an intruder alarm
is basically an electronic device that sounds an alarm when it detects an intruder in the Premises
or Home.  We can make an intruder alarm circuit which will be almost equally efficient for a
specific range of distance and will be very low in cost. This Research is about making an intruder
alarm using Arduino and PIR sensor. When the PIR sensor will detect an intruder, it will send a
signal to Arduino and the Arduino will sound an alarm. This circuit is very simple and will be
designed on a Vero board. The main components of an intrusion detection system are the
following: Sensors detecting intrusion through sensing voice, vibration, motion, temperature and
other physical and environmental events. A bidirectional data transmission media to transmit the
signal of detection to a local and/or remote operational control and command center and for
transmitting commands of operators to the field devices. Processors for automatic evaluation of
the data received from sensors. Workstations with a user interface software for operators to
monitor alarms actuated by the sensors. In this section the applied sensor type used by intrusion
detection systems is presented. Passive infrared motion (PIR) detector

1.1 Detection Principle


Infrared electromagnetic radiation is outside of the visible light spectrum and is emitted
by all living beings and surrounding objects which can also be thought as radiated heat. The term
passive for these kind of detectors refers to the fact that PIR devices are not generating any
energy for detection purposes. Instead, they are only detecting the reflected heat from objects
which are moving in their detection range. Mirror or Fresnel lenses pool the rays of heat for
maximum reception and transfer them onto a sensor made of pyroelectric (or thermoelectric)
sensing materials. This sensing device generates a temporary electric potential when it detects a
certain temperature difference which is caused by the object being warmer or colder than its
environment and activates an alarm.

1
1.2 Application
Depending on the optics installed, PIR motion detectors are suitable for exterior
(outdoor) and interior (indoor) surveillance.

1.3 Disadvantages and advantages


Structural elements inside detection area which are causing shadows are preventing
detection or give rise to false alarms. The sensor is sensitive to weather. When body temperature
and ambient temperature are the same, the sensor cannot differentiate and detect. Sudden
temperature changes such as air turbulences or exhaust air from devices can create a moving
object response which can activate false alarm

1.4 Statement of Problem


The security situation today has necessitated all round monitoring. Because it is not
always possible to be physically monitoring all environment and surroundings or at the various
areas that are vulnerable to adversary. Electronic Security Systems are employed.

The major problems with this project are;

 The sensor is sensitive to weather.

 Structural elements inside detection area which are causing shadows are preventing
detection or give rise to false alarms.

 Testing the efficiency and accuracy of the system.

1.5 Motivation
This research work is focused on the design and construction of Electronic Security
Systems (ESS) to detect and gives early warning of threatful/adversary intrusions with better cost
effectiveness and efficiency/accuracy of performance.

1.6 Aims
The aim of this project is to design and construct AN Electronic Security Systems
monitoring critical facilities and infrastructures using PIR Sensor for continuous monitoring.

1.7 Objectives
To develop a perimeter electronic security system application with an unattended
wireless sensor network (UWSN) and draws a conclusion by thoughts on other possible future
sensor system developments.
2
This document has been prepared to provide users with guidance on the specification,
installation, operation and maintenance of PIDS. Before attempting to write a performance
specification for a PIDS, it is important to ensure that a detailed operational requirement (OR)
has been produced

1.8 Scope of the study


This project of construction OF Construction of perimeter breach mitigation system
extended to Electronic Security Systems which is providing guidance to architects and engineers
on how to plan and design electronic security systems for critical facilities and infrastructures.
Then, this paper reviews the sensors, mainly the PIR Sensor, active infrared-, active ultrasonic-,
microwave and fiber optic cable-sensors, that form the most frequently used sensors by an
intrusion detection subsystem of electronic security systems for critical facilities and
infrastructure protection. The steps below show the recommended stages for selecting and
installing a PIDS.

Problem (e.g. security upgrade required) Define Operational Requirement (level 1 + 2)


Produce specification Tender and award contract Installation Commissioning and handover
Operate system and implement maintenance schedule

1.9 Justification of the study


 *Intrusion detection* system (IDS) became imperative because of threatful/adversary
intrusions and the inability to physically monitor areas consistently on continuum bases.
 This was the problem that leads to the development of an Intrusion detection* system
(IDS).
 The traditional use of CCTV for monitoring does not give warnings and use of other
devices with transmitter and receiver as well as complementary gadgets such as computer
are more expensive compare to this project.

1.10 Significance of the study


This unlike other intrusion system have I wide coverage and a wireless detection system.
It’s automated in detection process and alarming indication

In this work;

 The environment is secured


 Quick response is achieved

3
 Design is efficient and low cost
 Easy to maintain

1.11 Limitation of the study


The various limitations or defects of the *Intrusion detection* system (IDS) includes;

 The Structural elements inside detection area which are causing shadows are preventing
detection or give rise to false alarms
 The sensor is sensitive to weather. When body temperature and ambient temperature are
the same, the sensor cannot differentiate and detect
 Sudden temperature changes such as air turbulences or exhaust air from devices can
create a moving object response which can activate false alarm

1.12 Review of some related works

4
CHAPTER TWO

2.0 Introduction
This chapter consist basically incisive review of relevant literature in the project aspect.
The paper is tailored towards justifying the defined objectives of the project and establishing the
theoretical framework for the research work. It will also identify gaps in the literature in which
the study intend to fulfill.

2.1 General Theoretical Framework (Fundamental Concept)


Recent advances in micro-electro-mechanical systems (MEMS) technology, wireless
communications, and digital electronics have enabled the development of low-cost, low-power,
multifunctional sensor nodes that are small in size and communicate untethered in short
distances

2.2 DESIGN APPROACH


The best approach to start any project is to make a list of components and going through
a brief study of these components. Let’s make a list of components, purchase them and get
started with the project. The Vero Board is preferred for assembling the circuit on hardware
because if we assemble the components on breadboard they may detach from it and the circuit
will become short hence, Veroboard is preferred.

Table 1: Hardware Module

S/N Name Description

1 Arduino Atmega 328p Arduino (Uno)

2 PIR Sensor Motion detection Sensor (PIR)

3 Transistor BC547 Transistor

4 12vdc adapter AC –DC 12VAdapter

5 Alarm Passive buzzer

6 Vero board Circuit house

5
2.3 DESCRIPTION OF THE CIRCUIT

Figure 1:

Figure 2:

6
2.4 CIRCUIT OPREATION
The working of this circuit is very simple. At first, the state of the PIR sensor is set to
LOW. it means that no motion is detected. When a motion will be detected by the PIR sensor, it
will send a signal to the microcontroller. The microcontroller will then switch the buzzer and
LED on. If no motion is detected, the LED and buzzer will remain in the off state. Therefore the
sensitivity of the sensor was adjusted.

2.5 REVIEW OF COMPONENTS USED

7
CHAPTER THREE

CIRCUIT DESIGN AND CONSTRUCTION METHODOLOGY

3.0 Introduction
In this method information on method used to design and construct the system circuit,
working principle and the application/functionality of the whole project will be provided.

3.1 The Research Design


The project design adopted here is exploratory type of research, and as the name implies,
it intend to explore the research problems and questions and not to offer final and conclusive
solutions to the existing problems. The research do not aimed at providing conclusive evidence,
but to helps better the study and understanding of the existing menace. In carrying out this
research, the researcher ought to be willing to change his/her direction as a result of revelation of
new and new ideas

3.2 System Design Approach


Base on the security challenges, I proposed a system with additional capability to detect,
warn and send sms to registered number if GSM modem is incorporated. The system is
implemented on vero board and atmega 328p arduino module. The vero board and Arduino is
used to integrate all the components in one environment, to detect the motion the PIR sensor is
utilized. In this section we discuss the system approach for the proposed construction of
perimeter breach mitigation system using PIR sensor

3.3 Overall System Design


In designing a system the first step is to develop the system architecture, firstly, I need to
consider a scenario of possible intruder entry and the scenario of how the warning is informed
from a possible intruder scenario. In this research I assumed the intruder to premises from
rear/vulnerable points, PIR sensor will focus this location and detect and motion within it range
and the system will activate the alarm for warning while SMS will be sending to registered GSM
If incorporated. The PIR sensor read every movement that passes through the detection range i.e.
approximately 7-10 meters. In the process of motion detection, the system will read continuously
until a movement is detected.

8
If there is movement then the system will activate the alarm, if there is no human
presence, then the system will re-read the movement or return to the initial process. The
complete the work flow defined in the float chart.

3.4 LIST OF COMPONNTS


1. Atmega 328p arduino board

2. Motion detection Sensor(PIR)

3. 12v dc relay

4. 2 pin diode

5. BC547 Transistor

6. 12v dc adapter

7. 1k/10k resistor

8. Vero board

9. Switch

10. Lamp holder

11. Double and Single path rest casings

3.4.1 ATMEGA328P 
Is high performance, low power controller from Microchip. ATMEGA328P is an 8-bit
microcontroller based on AVR RISC(Reduced Instruction Set Computer) architecture. It
is the most popular of all AVR controllers as it is used in ARDUINO boards.

9
Figure 3

Figure 4

10
Figure 5
3.3.1 Cost analysis
The estimated cost of the design and construction of this project is about thirty thousand
naira only. This is relatively low compare to those foreign made in the market

Table 2: Cost of Materials Used


S/N Items Quantity Unit price Price

1 Arduino module 1 N7500 N7500

2 Alarm module 1 N4500 N4500

3 Power adapter 1 N2500 N2500

4 Vero board 1 N250 N250

5 PIR Sensor 1 N1000 N1000

6 Transistor 2 N200 N400

7 Diode 3 N10 N30

8 Resistor 3 N10 N30

11
9 Relay 1 N1000 N1000

10 Others 7 N5000 N15000

Total N32,210

3.4 PIR Motion Sensor


PIR sensors allow you to sense motion, almost always used to detect whether a human has
moved in or out of the sensors range. They are small, inexpensive, low-power, easy to use and
don't wear out. For that reason they are commonly found in appliances and gadgets used in
homes or businesses. They are often referred to as PIR, "Passive Infrared", "Pyroelectric", or "IR
motion" sensors.

Figure 6

12
Figure 7

3.6 Some Basic Stats


These stats are for the PIR sensor in the Adafruit shop which is very much like the Parallax
one . Nearly all PIRs will have slightly different specifications, although they all pretty much
work the same.

 Size: Rectangular
 Output: Digital pulse high (3V) when triggered (motion detected) digital low when idle
(no motion detected). Pulse lengths are determined by resistors and capacitors on the
PCB and differ from sensor to sensor.

 Sensitivity range: up to 20 feet (6 meters) 110° x 70° detection range

 Power supply: 5V-12V input voltage for most modules (they have a 3.3V regulator), but
5V is ideal in case the regulator has different specs

 BIS0001 Datasheet (the decoder chip used)

 RE200B datasheet (most likely the PIR sensing element used)

 NL11NH datasheet (equivalent lens used)


13
 Parallax Datasheet on their version of the sensor

Figure 8: BC 547 Transistor (NPN)

Figure 9: 12vdc relay

Figure 10

14
Figure 11: 2 pin Diode

Figure 12

Figure 13: 1. 12v dc adapter


No
Start

NO Movement Detection

Any movement?
15
Any person?
People Detection People detection

Stop

Yes

Yes

Figure 14 System Float Chart for workflow

PIR SENSOR MODULE MICROCONTROLLER MODULE ALARM MODULE

POWER SUPPLY MODULE

Figure 15: BLOCK DIAGRAM OF INSTRUCTION ALARM SYSTEM

16
CHAPTER FOUR

CONSTRUCTION AND OBSERVATION

The construction of this project was done with the following components and materials;
the atmega 328 arduino , motion detection sensor module(PIR),BC547 transistor, 12v dc relay, 2
pin diode, 1k/10k resistors, 12v adapter, vero board, double and single path rest casings and siren
alarm.

4.0 Physical Requirements


It is important not to over-specify the system by including too many physical constraints
this might unwittingly compromise performance. However, the following factors can have a
substantial impact on the suitability of a PIDS solution and should be included in the
specification where relevant: Ground surface/mounting position/burial medium – Will a free-
standing system operate over gravel, concrete, tarmac, grass, sand, bodies of water or a
combination of different media along its length? Will a ground-based system be buried in sand or
clay-based soil? The performance of a PIDS can vary considerably, depending on how well
suited the particular technology is to the operating environment. The full specification (build)
and condition of any fence in the case of barrier-mounted systems is important to note.. Local
topography – Are there any undulations in the ground surface? Undulations occurring over the
distance of a metre - up to several tens of metres - can shield the presence of an intruder from
some detection technologies, particularly in the case of microwave systems, or active or passive
infrared. Are there any surface objects (roads, fences, lighting columns etc.) to be negotiated?
Conducting bodies – Microwave and other active electromagnetic systems can be affected by
metal or other conducting bodies close to their detection zones both above and below ground.
This includes metallic fences, vehicle access and also flowing water. The presence of such
bodies in proximity to the planned route of the PIDS must be declared in the specification. Zone
lengths – Long zone lengths can make it difficult for operators to identify the cause of an alarm
and/or locate an intrusion. Some PIDS provide positional information on intrusion location.
PIDS zones should be matched with the field of view of one or two CCTV cameras where video
verification of alarms is required. It is, however, important to perform tests at all zone ends to
ensure that camera footprints overlap sufficiently and detection capability is not compromised.
Mounting of sensors, processors, junction boxes – These system elements should be mounted
such that detection is expected before any components

17
4.1 RESULT AND ANALYSIS

In this section, the implementation of the security system is discuss and result evaluation.
Firstly, the integration and implementation of the system as done as shown bellow.

Connections between Arduino and vero board and others components such as the alarm siren,
relay etc.the scenario of yhr evaluation is given as follow bellow;

1. Firstly, the system was activated and an intruder pass by


2. The system detected the intruder movement
3. The system analyze the existence of the intruder and activate the siren alarm
The scenario is repeated for several times with various conditions of intruder. Fast
passing by, moving closer to sensor, going fsr from the sensor, covering face and
backing the sensor. There are two parameters that is being measured here in this
evaluation. First parameter is about the processing time of the intruder detection. Second
parameter is the accuracy of the intruder detection.

Table 4.1: Example of breach events and delay time

S/N Delay options Delay time Detection options


18
1 Climb fence 8–10 sec Perimeter fence detection system

2 Cross open ground (for example 10 feet/sec Microwave sensors

600 feet)

3 Breaching building windows, 1–2 min. Door contacts or glass


doors or wall

4 Breach interior hardened door 2–4 min. Door contacts


5 work time in breached space 3 min. Motion sensor

19
4.2 INTRUSION SCENARIOS

Detect intruders at the perimeter — before they get


inside!

20
4.3 Perimeter Intrusion Detection System
Considerations
Detection of a potential or confirmed breach of the property perimeter
provides time for police or guard forces to intercept a threat before the loss of
property or harm to staff.  Facilities with perimeter detection in place range
from remote petrochemical or cellular sites to vehicle processing or storage
facilities to critical infrastructure.

There are many things to consider when evaluating your current or new
perimeter detection strategy.

 Early warning detection and assessment


 Continuous line of detection
 Delaying intruder access
 Response force reaction time
 Threat analysis
 Risk assessment
 Single layer protection
 Dual layer protection
 Multi-layer protection

4.4 KEY PRINCIPLES OF AN EFFECTIVE PERIMETER SECURITY


PROGRAM

Deter: A fortified site is the optimal deterrent to attackers. Commonly,


perimeter fences / barriers, plus other visible mechanisms such as perimeter
intrusion detection systems (PIDS), lighting and cameras serve as deterrents
to a would-be attacker.

Detect: Implementation of detection sensors enhance the ability to identify


intruders and stave off an attack. It is recommended to introduce at
minimum a single layer of PIDS technology to detect intruders at the outer
perimeter. Often, a dual-layer approach is called for to protect a facility with
higher security requirements (i.e. potential theft or damage to higher value
assets). Layering complementary technologies, such as fence sensors plus
video analytics, allows reinforcement of the perimeter layer. For the highest
security applications (i.e. where threat to critical infrastructure or human life is
present), a multi-layered system incorporating a range of technologies further
adds to the level of protection.

21
Delay: It’s critical to maximize the time span from ingress to attackable asset,
to allow the security team time to respond. Physical barriers at the perimeter,
PIDS on and inside the perimeter fence, internal barriers (ideally with PIDS),
and the distance between barriers and attackable asset are all delay
mechanisms that slow an attacker.

Assess: Introduce an integrated system that includes alarm


communication and CCTV/Video assessment of intrusions. Operators need to
see what the system has detected.

Respond: Design scenarios and deployment of your response force to stop a


threat / attack or intruder. 

4.5 4 BENEFITS OF A PERIMETER INTRUSION DETECTION SYSTEM

1.Smart Safety; Thieves do not discriminate. Every business is vulnerable and keeping
people out is the best way of keeping valuables safe.
As the statistics show, walls and fences are no barrier. Alarmed perimeter fences work,
both as a deterrent and as a solution if there is an attempted intrusion.

2. Property Value

When it comes to increasing property value, being able to demonstrate the


effectiveness of the system makes a difference. In Detection Technologies,the solutions
undergo rigorous testing over many months, which gives any investor guarantees and
peace of mind regarding quality, reliability, and integrity. When Everything inside the
perimeter is secured, so is easier to insure.

3. Safety At Work

There is a strong statistical association between intruders and violent crime. The more
lucrative the asset, the more likely it is that force will be involved. Not all intruders are
caught, and police reporting has inconsistencies and inadequacies. However, around 1
in 4 intruders are thought to be armed in one way or another, with firearms numbers
slowly creeping up. Your staff are most likely to find themselves facing a handgun, but
an unlucky 10% will be on the wrong end of a shotgun.
To protect site staff a perimeter intrusion detection system can make a real difference.

22
4. Flexibility & Control

High-profile sites have different areas of risk, and these require different levels of
perimeter control. For rural sites, footpaths are a regular hazard that are difficult to
secure against. For urban sites, noise and foot traffic can make perimeter monitoring
problematic. Advanced systems are designed to respond to the main issues that each
area of industry is likely to experience, resulting in a tailored solution that meets the
unique needs of each site.

Figure 16: Sensor Arduino connection on Vero board


4.1 Coding
The code of this project is quite well commented and very easy to understand. But still, it
is briefly explained below. At the start, Pins of the Arduino are initialized which will be later
connected to the LED and the buzzer. A variable is also declared that will store some values
during run time. Then the initial state of the PIR is set to LOW, which means that it is told that
no motion is detected initially.

4.3 Security Lighting


Security lighting is an important part of the perimeter security plan. On most projects,
however, little consideration is given to the security design and layout. Usually, lights are
installed, and that is far as it goes. Then the owners, property managers, security directors,
managers, etc., wonder why the images from the CCTV system along the perimeter of the
property are not very good and usually are of poor quality. This has necessitated the inclusion of
lighting gadget for better capturing.
23
Table 3
S/N LOCATION FOOT-CANDLES ON HORIZONTAL PLANE AT
GROUND LEVEL

1 Perimeter of outer area 0.15

2 15 Perimeter of restricted area 0.4

3 Vehicular entrances 1.0

4 Pedestrian entrances 2.0

5 Sensitive inner areas 0.15

6 Sensitive inner structure 1.0

7 Entrances 0.1

8 Open yards 0.2

Standards for the amount of lighting required for emergency and security lighting.

24
CHAPTER FIVE

CONCLUSION AND RECOMMENDATIONS

5.1 CONCLUSION
Site operators need perimeter security solutions that are reliable, minimize nuisance
alarms, are cost-effective, and that easily integrate into their existing security systems
and networks as Valuable asset and properties suffer a lot of attacks by intruders and criminals,
hence all-round monitoring could be provided efficiently and effectively with minimal cost using
electronic security system (ESS) for early warning and recording of evidence.

5.2 RECONMENDADTIONS
These sensor network systems can be tailored to the optimum security
systems required, by selecting the suitable sensors and other subsystem
components according to the environmental, field and other conditions for the
area to be protected. Important design criteria for electronic security systems are
described by guiding standard documents like UFC 4-021-02.
Besides being used in security applications, it is foreseen that smart sensor
systems will be placed everywhere in daily life in the near future. This system can also be in
cooperated with webcam, SIM Module for wireless reporting and storage.

REFERENCES

 Web search (Google.com) sciencedirect etc

 Smart Home security system using object recognition and PIR sensor. Jan 14 2018 by
Nico Surantha

 National Criminal Justice Reference Service, Perimeter Security Sensor

Technologies Handbook, Defense Advanced Research Projects Agency

(DARPA) & The National Institute of Justice (NIJ), pp. 2 12 to 2 55, 1998

1. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, Wireless sensor networks: a


survey, Elsevier, Computer Networks 38, pp. 393–422, 2002

25
 Guide to Perimeter Intrusion Detection Systems (PIDS) Publication No. 05/12 In
partnership with CPNI (Centre for Protection of the National Infrastructures).

 How To Make A Security Alarm Using PIR Sensor And Arduino?

By Hamza Iqbal October 30, 2019

 0575-Arata-2006-Perimeter-Security

Intrusion detection sensors used by electronic security systems for


critical facilities and infrastructures: a review May 2015

26

You might also like