Professional Documents
Culture Documents
145
COPYRIGHT TO IJETIE
2.1 Reduced installation costs: First and foremost, cost. Additionally, also protocols need to scale to
installation costs are significantly reduced since no high node count e.g., ensuring message delivery
cabling is necessary. Wired solutions require cabling,
where material as well as the professional laying of 2.9 Large area coverage: Another challenge lies in
cables (e.g. into walls) is expensive. the fact that devices of a building automation system
are dispersed over large areas. Since transceivers
2.2 Easy deployment, installation, and coverage: must not consume so much power, they cannot be
Wireless nodes can be mounted almost anywhere. In built with a transmission range sufficient for sensors
adjacent or remote places, where cabling may not be to reach associated controllers or actuators directly.
feasible at all, e.g., a garden house or the patio, Also, they may rely on an infrastructure of access
connection to the home network is accomplished points and a wired backbone network (or particularly
instantly by simply mounting nodes in the area. sensitive receivers).
Hence, wireless technology also helps to enlarge the
covered area. III. METHODOLOGY
2.3 System scalability and easy extension: 3.1 System design and implementation
Deploying a wireless network is especially As mentioned the proposed home automation system
advantageous when, due to new or changed consists of three main modules, the server, the
requirements, extension of the network is necessary. hardware interface module, and the software
In contrast to wired installations, additional nodes do package. The following figure (1), shows the
not require additional cabling which makes extension proposed system layout. Secure WiFi technology is
rather trivial. This makes wireless installations a used by server, and hardware interface module to
seminal investment. communicate with each other. User may use the same
2.4 Aesthetical benefits: As mentioned before, technology to login to the server web based
placement of wireless nodes is easy. Apart from application. if server is connected to the internet, so
covering a larger area, this attribute helps to full remote users can access server web based application
aesthetical requirements as well. Examples include through the internet using compatible web browser.
representative buildings with all-glass architecture The proposed home automation system has the
and historical buildings where design or conservatory capabilities to control the following components in
reasons do not allow laying of cables. users home and monitor the following alarms
2.5 Integration of mobile devices: With wireless
• Temperature and humidity
networks, associating mobile devices such as PDAs
• Motion detection
and Smartphones with the automation system
becomes possible everywhere and at any time, as a • Fire and smoke detection
device's exact physical location is no longer crucial • Door status x Light level x
for a connection (as long as the device is in reach of Video monitoring The proposed home automation
the network). Typical examples include an engineer system can control the following appliance
who connects to the network, performs a particular
management task, and disconnects after having • Serine
finished the task; or control of blinds using a remote • Lights on/off/dim
control. For all these reasons, wireless technology is • HVAC on/off
not only an attractive choice in renovation and • Door lock
refurbishment, but also for new installations.\ • Window shutdown
2.6 User friendly interface: User can easily manage • On/off different appliance
system locally or remotely home automation system, 3.2 User Classes and Characteristics
through easy web based interface.
The proposed home automation system is designed as
2.7 Security and authentication: Only authorized a tool for the casual user. A casual user; shall be
user can login to the system (locally, or remotely) in defined as one possessing general knowledge of the
order to manage, control, & monitor. If system Microsoft Windows operating system and general
detects intruders it should immediately alert the knowledge of using the Internet by employing a
system owner and lock login capability for a while. standard browser such as Microsoft Internet Explorer
2.8 Low cost per node / High node count: Thinking General user; who will have the most use of the
of building automation, hundreds of nodes may be system functionality. Administrator; who will control
needed to provide automation. However, the market the access and permissions policy of the system, and
requires competitive performance (compared to can add and delete user accounts, anything that a
wired networks) to be delivered at this low system general user can perform, the administrator can also
perform.
146
COPYRIGHT TO IJETIE
147
COPYRIGHT TO IJETIE
• Automation Time: Sets the time that the • The following are of the same functionality,
automation is supposed to be activated, in which is to get the latest status of the
hours, minutes, and seconds. The following specified sensor given in the function name:
are of the same functionality; which is to get Door, get Motion, get Temperature The
change the data of a specific attribute in the following are of the same functionality,
XML file given from the function name: which is to toggle the specified appliance
automation Motion, automation Door, given in the function name to a World
automation Temp, automation Appliance, Academy of Science, Engineering and
automation Duration, automation Security Technology 68 2012.
• Automator: Responsible for all automation
processes, including the monitoring of the 4.3 Hardware Design
environment for conditions that matches the The second part of the proposed home automation
automation rules configured by the user system design was the choosing of a suitable micro-
• Status Initializer: set all the sensors and controller. The requirements for the micro-controller
actuators back to its initial values. Sensors are; a RS232 port, a fair amount of output Digital
will be set to 0, and the actuators will be set I/O, and a reasonable speed.
to the last update in the XML data files.
• Get Data From XML: Get data from XML Also a reasonable amount of EEPROM was needed
function to enables the system to store device status, and
• Process: check every one of the sensors and username and passwords related to login, so that data
appliance either it contains the key word is not lost in the case of power outages. Arduino is a
from the XML file dictionary or not. If it readymade and open source evaluation Kit based on a
contains the key word it sends the data to 8-bit Atmel microcontroller. Arduino Microcontroller
check dependency function. is the core of hardware interface module, which is
• Check Dependency: check if the responsible for exchanging data between home
automation of a specific sensor in an automation server from one side (through WiFi
automation is dependent on any other module), and sensors, and actuators from the other
sensor, appliance, or a specific time to be side. Arduino communicate with WiFly module
activated. through RS232 protocol. If sensors and actuators are
• Watcher: Watcher function acts like a directly connected to hardware interface module, an
guard; it keeps watching the timer and all isolating interface is needed to protect Arduino from
other sensors and actuators last updated interference caused by home automation components.
statuses from the XML file. When all Figure (5) shows the WIFI Arduino shield PCB
conditions of an automation becomes true. layout, Figure (6) shows the arduino shield PCB
Automation executed. layout of a three input alarms. Figure (7) shows the
• Process Sensor: checks sensors to see the arduino shield PCB layout of a three output actuators.
last updates, in case of any dependent 4.4 Hardware Layout
automation on one of the sensors.
• Activate Appliance: Activates any Hardware consists of four different PCBs, the
appliance that should be activated according Arduino PCB (ready-made), WiFi shield PCB, 3
to the running automation. input alarms PCB, and 3 output actuators PCB .By
• Manager: Responsible for maintaining the doing this system will increase system mobility,
whole system in general and initializing all configurable, and scalability. More intelligent should
that is needed for further operation when the be added to hardware modules to make them capable
system is first started to take decision according to triggered alarms.
• Processor: initializes and load all needed Without referring to server for each event and action.
data into the system and establish That will increase the response time of the system.
communication with the hardware module While hardware interface module reports server with
• Add Automator Object: load an events and actions on pre-programmed intervals.
automation entry into the system to be Replace the WiFly WiFi module with more reliable
watched and stable WiFi module, to increase system
• delete Automation: deletes an automation reliability.
from the system and XML file and also 4.5 Basic Model Structure:
stops the system from watching it anymore
• write To Socket: sends data to the specified
socket in the form of a string
• read From Socket: read data from socket
after sending it a variable to flag the type of
data that is needed to be received .
148
COPYRIGHT TO IJETIE
V. CIRCUIT DESIGN
149
COPYRIGHT TO IJETIE
previously existing systems. Hence we can conclude [13] Sivaram, M., B. DurgaDevi, and J. Anne Steffi.
that the required goals and objectives of home "Steganography of two lsb bits." International
automation system have been achieved. The system Journal of Communications and Engineering 1.1
design and architecture were discussed, and
(2012): 2231-2307.
prototype presents the basic level of home appliance
control and remote monitoring has been [14] Anne, M. Sivaram B. DurgaDevi J.
implemented. Finally, the proposed system is better "Steffi,“Steganography of two lsb
from the scalability and flexibility point of view than bits”." International Journal of Communications
the commercially available home automation and Engineering 1.1.
systems. [15] Manikandan, V., et al. "PRIVACY
REFERENCES: PRESERVING DATA MINING USING
THRESHOLD BASED FUZZY CMEANS
[1] Christian Reinisch ,“Wireless Communication in CLUSTERING." ICTACT Journal on Soft
Home and Building Automation”, Master thesis, Computing 9.1 (2018).
Viennia univeristy of technlogy, Feb 2007. [16] Malathi, N., and M. Sivaram. "An Enhanced
[2] wiki.smarthome.com/index.php?title=Home Scheme to Pinpoint Malicious Behavior of Nodes
Automation
In Manet’s." (2015).
[3] A.J. Bernheim Brush, Bongshin Lee, Ratul
Mahajan, Sharad Agarwal, Stefan Saroiu, and [17] Mohammed, Amin Salih, et al. "DETECTION
Colin Dixon, "Home Automation in the Wild: AND REMOVAL OF BLACK HOLE ATTACK
Challenges and Opportunities", CHI 2011, May IN MOBILE AD HOC NETWORKS USING
7–12, 2011, Vancouver, BC, Canada GRP PROTOCOL." International Journal of
[4] N. Sriskanthan, F. Tan, A. Karande,” Bluetooth Advanced Research in Computer Science 10.6
based home automation system”, Microprocessors (2018).
and Microsystems journal, issue 26 (2002) pages
[18] Sivaram, M., et al. "Emergent News Event
281–289, Elsevier Science B.V., 2002
[5] Matthias Gauger,Daniel Minder,Arno Wacker, Detection from Facebook Using Clustering."
Andreas Lachenmann,"Prototyping Sensor- [19] Sivaram, M., et al. "The Real Problem Through a
Actuator Networks for Home Automation", Selection Making an Algorithm that Minimizes
REALWSN’08, April 1, 2008, Glasgow, United the Computational Complexity."
Kingdom. [20] Porkodi, V., et al. "Survey on White-Box Attacks
[6] Malik Sikandar Hayat Khiyal, Aihab Khan, and
and Solutions." Asian Journal of Computer
Erum Shehzadi, "SMS Based Wireless Home
Appliance Control System (HACS) for Science and Technology 7.3 (2018): 28-32.
Automating Appliances and Security", Issues in [21] Dhivakar, B., et al. "Statistical Score Calculation
Informing Science and Information Technology of Information Retrieval Systems using Data
Volume 6, 2009 Fusion Technique." Computer Science and
[7] D.Greaves, "Control Software for Home Engineering 2.5 (2012): 43-5.
Automation, Design Aspects and Position Paper", [22] Sivaram, M. "Odd and even point crossover based
The AutoHan project at the University of
Tabu ga for data fusion in Information retrieval."
Cambridge Computer Laboratory
[8] Sivaram, M., et al. "DETECTION OF (2014).
ACCURATE FACIAL DETECTION USING [23] Porkodi, V., et al. "Prolong the Network Lifespan
HYBRID DEEP CONVOLUTIONAL of Wireless Sensor Network by Using HPSM."
RECURRENT NEURAL NETWORK." (2018): 2034-2038.
[9] Mohammed, Amin Salih, Shahab Wahhab [24] Mohammed, Amin Salih, Shahab Wahhab
Kareem, and M. Sivaram. "Time Series Kareem, and M. Sivaram. "Time Series
Prediction Using SRE-NAR and SRE- Prediction Using SRE-NAR and SRE-
ADALINE." (2018): 1716-1726. ADALINE." (2018): 1716-1726.
[10] Sivaram, M., et al. "Exploiting the Local Optima [25] M, Sivaram, ENABLING ANONYMOUS
in Genetic Algorithm using Tabu Search." Indian ENDORSEMENT IN CLOUDS WITH
Journal of Science and Technology 12 (2019): 1. DECENTRALIZED ACCESS CONTROL
[11] Sivaram, M., et al. "Estimating the Secret (March 13, 2019). Available at
Message in the Digital Image." International SSRN: https://ssrn.com/abstract=3352128
Journal of Computer Applications 975: 8887. [26] M, Sivaram, Enhancing Vehicle Safety with
[12] Obulatha-II-ME-CSE, Miss O. "Position Privacy Drowsiness Detection and Collision Avoidance
Using LocX."
150
COPYRIGHT TO IJETIE
151
COPYRIGHT TO IJETIE