You are on page 1of 9

www.idosr.

org Edozie et al
©IDOSR Publication
International Digital Organization for Scientific Research ISSN: 2579-079X
IDOSR JOURNAL OF SCIENCE AND TECHNOLOGY 9(1):98-106, 2023.

Design and Implementation of a Smart Surveillance Security


System

Enerst, Edozie1; Eze Val Hyginus Udoka2; Musiimenta, Immaculate1;


Wantimba, Janat1
1
Department of Electrical Engineering, Kampala International University, Uganda.
2
Department of Publication and Extension, Kampala International University, Uganda.

ABSTRACT
Home security is essential for occupant’s conveniences and protection. This research
project designed and implemented a comparatively inexpensive smart surveillance
security system that automatically captures an intruder’s image through a raspberry pi
camera module and PIR sensor and sends mail to the user via Wi-Fi using the users
registered email address. This system operates by triggering the Pi Camera through
Raspberry Pi whenever an intruder comes in range using PIR sensor. The Pi camera will
capture the image, save it and send the image of the intruder via mail to the user through
the help of the command codes embedded in the Raspberry pi microcontroller. This
research project will enable home/supermarket and office owners to secure their
facilities and monitor the activities of their employers at any location at cheaper cost
which is the earnest desire of an Engineer. Proteus 2022 was used as the simulation tool.
Keywords: Security, Spy camera, Raspberry pi, IOT, smart security system.

INTRODUCTION
Security is the first attention everyone communicates through the internet [13,
wishes to have everywhere at every 14, 15]. The smart security system can
point in time in human life. The detect any object movement, take a
innovations in Technology have picture of the object and after sends a
increased/improved the safety and notification to the owner [16, 17, 18].
security of human lives and property [1, This application can be used in homes,
2, 3]. Home Security systems involved in shops, in hotels and in other places
the combination of both human and around the world and it’s the best
electronic devices mechanism to detect application for monitoring and
intrusions in our environments and controlling a home/shops or super
homes. The growth of Internet of Things markets from a distance [1, 19, 20, 21].
(IOT) is referred to as a daily The system in [2] provides two methods
technological innovation which involves to implement home security using IOT.
devices connecting to one other to One of using web cameras such that
create a pervasive computing [4, 5, 6]. whenever there is any motion detected
These devices exchange data and by the camera, it sounds an alarm and
information about the environment, sends a mail to the owner [22, 23, 24].
while reacting independently to This method of detecting intrusion is
different events [7, 8, 9]. They influence quite good but somehow expensive due
the surroundings hence creating to the cost of cameras involved in the
services with or without human process [3, 25, 26,]. The cameras to be
intervention. The IOT has potential used are to be of good quality which
applications in all areas of life. One of means they should have a wide range
the applications of IOT is smart security and the picture quality should be high
system [10, 11, 12]. The application uses enough to detect the movement of an
IOT to process its data and by using this intruder [4, 27, 28].
application, one will be able to monitor The result in [5] is the automatic smart
his households from a distance with the home security system that has the
help of interconnected devices that capability of controlling and automating

98
www.idosr.org Edozie et al
most of the home appliances. In this the presence of the intruder and any
system embedded features like gas unauthorized entry. There is a Blynk
leakage alerts to user by sending simple application on the device that is used as
text message and immediate signals to the main switch which can activate the
the server of the personal computer (PC) device whenever necessary. The home
[29, 30, 31, 32, 33, 34]. Server sends security system based on the Internet of
message to user android mobile things (IOTs) can help the users to
application connected with server of the monitor the house even when they are
pc through Wi-Fi. User can take absent and a favorite platform helps the
immediate action on receiving SMS from users to receive alerts as soon as
server by automatically turning off the possible [13,14,15].
cylinder valve and opening windows. In [9], the researcher developed a smart
The system also has fire alarm home security system using object
embedded to sense increase recognition and PIR sensors which is
temperature above threshold value. capable for human detection. The IOT
Server will take proper action by sending system is used to monitor the presence
message through android application to of an intruder in the house by the
the user [33, 34, 35]. combination of motion detection and
The study in [6] is the IOT ruler which object recognition. The motion
sends alerts to the owner over voice calls detection is performed using the PIR
using the internet. If any sort of intruder sensor, the web camera takes the picture
or human movement is sensed near the of the suspicious spot. The system
entrance of his house and raises alarm performs the object recognition by using
upon the user’s discretion whereby the the histogram of gradient (HOG) and
provision of sending alert messages to support vector machine (SVM) methods.
concerned security personnel in case of The system recognizes the appearance
critical situation is also built into the of an intruder and warn the house owner
system and vice versa. The advantage of via alarm. The system is implemented on
this smart security system is that when raspberry pi [16, 17, 18].
operating it the owner doesn’t need to Smart security system with wireless
have data on his phone, the system just camera is a system normal use in various
runs fine with the launch pad connected homes to secure lives and environments
to Wi-Fi at home or office [7, 8, 9, 36, 37]. through remote monitoring techniques
The researcher in [7] researched on like Internet of Things (IOT).
home automation and security together From the review above, many draw backs
with its major objective to help were discovered such as (a) nonchalant
handicapped and aged people to control attitudes or misbehaviors/maltreatment
home appliances and alert them in by home caretakers of vulnerable age
critical conditions. In this system, a groups like toddlers, children and elders
sensor senses the status of appliances especially in Uganda. (b) The avoidable
and updates the webserver. If the user mistakes and stealing in the stores and
is far away from home, he/she can super markets. This research work will
access and change status of the address the problems of intrusions from
appliances for example switching a unknown individuals or home burglars
certain appliance on/off [10, 11, 12, by designing and implementing a smart
38,39,40]. surveillance security system using
The researcher in [8], researched on a internet of things technology that will
home security system based on internet create and send a notification email
of things via favorite platform. In this together with the happening image to
project the device is equipped with the user’s email address using
passive infrared sensor that monitors Raspberry Pi.
MATERIAL AND METHODS
This design and implementation of pi microcontroller. The system
smart surveillance security system is comprises of hardware and software
basically designed to provide security application program for the raspberry pi
for households using the spy camera which was developed using python
and SMTP server which are all embedded script code as a programming language.
in the system by the use of a raspberry The hardware units compose of DC fan,

99
www.idosr.org Edozie et al
Ip Spy camera, raspberry pi and power the raspberry pi microcontroller cool to
units (voltage regulator, battery etc.) avoid overheating. The fan is plugged
components. directly into Raspberry Pi's 5V+GND
Materials GPIO power pin [19][20].
1.Power Supply: This is an electrical
charger that supplies a rated power to an
electrical load. The system uses a
smartphone charger with a green/red
indicator which when blinks showed that
the charger is passing on electrical
energy.

Figure 4: DC cooling fan


4. Passive Infrared (PIR) Sensor: PIR
sensor is an essential for emitting
infrared (IR) radiation through its
movement. PIR is an electronic sensor
that used to detect the object motion by
Figure 2: Smartphone Charger receiving the infrared (IR) as light
2. Voltage Regulator: This is a system radiates from the external
designed to automatically maintain a environments. The sensor compares the
constant voltage level, depending on the intensity of the infrared radiation from
design and specifications of the voltage time to time. If there is an object
regulator to be used (DC or AC). 5V DC movement in the room, the intensity
regulator was used for this design changes and detecting the object
[10][11]. movement takes place. The PIR Sensor is
small in size, inexpensive in price, uses
low power, easy in use and connectivity
[21][22]

Figure 3: voltage regulator

3. Dc cooling Fan: The direct current


fans are powered with potential fixed
values of voltage such as voltage of
battery. Typical voltages for dc fans are Figure 5: Passive Infrared (PIR) Sensor
5v, 12v, 24v and 48v. It is used to keep
5. Raspberry Pi-3: The raspberry pi is a server for interfacing and
low-cost credit card sized computer that communication between the devices and
plugs into a computer monitor or TV and the programming codes [4][23].
uses a standard keyboard and mouse. a
raspberry pi microcontroller is used in
embedding the spy camera and SMTP

100
www.idosr.org Edozie et al

Figure 5: Raspberry Pi3 Model B.

6. Ip Spy Camera /raspberry pi camera for Raspberry Pi model A and B. The


module camera module connects to Raspberry
This is a type of digital video camera Pi 3 by Camera Serial Interface (CSI)
that receives control data and sends connector using a 15cm ribbon cable to
image data via an IP network commonly the 15 pin CSI connector. Some Specific
used for surveillance camera. The configuration settings were done to
Camera Module Rev 1.3 is a type of initialize the camera and accepts Python
camera that was specifically designed scripts to enable it take pictures.

Figure 6: Ip Spy Camera /Raspberry Pi Camera Module

7. Simple Mail Transfer Protocol receive and or replies an outgoing mail


(SMTP) Server: This is a communication between senders and receivers. SMTP is
protocol for electronic mail mainly designed to send email or SMS
transmission. SMTP Server is an notifications to a user.
application server that primarily send,
RESULTS AND DISCUSSION
The block diagram and the circuit diagram consists of the major
diagram of this security smart components that make up the system as
surveillance design are presented as in figure 7.
shown in figure 7 and figure 8. The block

101
www.idosr.org Edozie et al

Figure 7: Block diagram of smart surveillance security system

The step-by-step block connections of other blocks takes place. It is from the
the smart surveillance security system Raspberry pi that the decision to take
that details how the block diagrams picture if there is intruder and sent
where connected. Power supply block email to was initiated. The fan cools the
supplies energy to the Raspberry pi system when it heats and the IP spy
where the codes were embedded and at camera takes picture whereas the SMTP
the same time were interactions between server sends mail to the user.

Figure 8: Circuit Diagram of Smart Surveillance Security System

This circuit diagram showed the email. The system can be monitored by
interconnections between different the user form anywhere in the world.
components that constituted the circuit. This is achieved by the combination of
This focused on developing a some hardware and a python written
surveillance system that detects motion software program script to accomplish
and as well respond to it immediately by a real time surveillance system as
capturing the image and administering it designed in this research.
to the device administrator through

102
www.idosr.org Edozie et al

Camera position

Figure 9: Camera Space and charging chord

Figure 9 is the circuit set up for camera written program that supports the OS to
positioning and USB charging slot. It send email to the user through the
shows the implementation procedures raspberry PI microcontroller was
and how it was achieved sequentially. A used for efficiency and accuracy.

Figure 10: Intruder Notification image

The intruder image was captured by intruder together with notification mail
raspberry pi camera embedded in the was sent to the user to notify him/her on
microcontroller which was fully that an intruder was detected. The
developed to capture the images of an captured images will be sent to the user
intruder and notify the user with the via mail within five seconds of
happenings in the environment as shown discovery for the user to take immediate
in figure 10. Figure 10, showed the security action either by calling the
captured image of an intruder when an external security agency for immediate
unusual motion was detected by the interventions or by taking every other
developed smart surveillance security necessary action to ensure that the
system. The detected image of the environment is secured.
CONCLUSION
This developed smart security system achieved using the SMTP server and the
monitors any movement in the premises python script code program in raspberry
effectively which was efficiently PI. This developed smart security system

103
www.idosr.org Edozie et al
consists of a raspberry pi, camera the image and sends it to the owner
module, server and a sensor. The server (user) via email. The smart surveillance
controls and monitors the various security system was developed
sensors and can be easily configured to effectively at a very low cost and when
handle hardware interface modules commercialized will help in reducing
(sensors). The system perfectly detects crimes and encourages security in
the movement of any intruder, captures Africa.
REFERENCES
[1]. Kumar, U., Manda, R., Sai, S. and internet of things via favoriot
Pammi, A. (2014). Implementation platform. International Journal of
of Low -cost Wireless Image Applied Engineering
Acquisition and Transfer to Web Research, 13(2), 1253-1260.
Client Using Raspberry Pi for [9]. Surantha, N. and Wicaksono, W. R.
Remote Monitoring. International (2018). Design of smart home
Journal of Computer Networking, security system using object
Wireless and Mobile recognition and PIR
Communications. 4(3), 17–20, sensor. Procedia computer
[2]. Bangali, J. and Shaligram, A. (2013). science, 135, 465-472.
Design and Implementation of [10]. Eze, V. H. U., Olisa, S. C., Eze, M. C.,
Security Systems for Smart Home Ibokette, B. O. and Ugwu, S. A.
based on GSM (2016). Effect of Input Current and
technology. International Journal The Receiver-Transmitter Distance
of Smart Home, 7(6), 201-208. on the Voltage Detected by
[3]. Ravipati, V. K. C. and Thonduri, V. Infrared Receiver. International
(2017). An IOT Approach for Journal of Scientific & Engineering
Motion Detection Using Raspberry Research, vol. 7, no. 10, pp. 642–
PI. International Journal of 645.
Innovative Science and Research [11]. Eze, M. C., Eze, H. U., Chidebelu, N.
Technology, 2(7), 225-228. O., Ugwu, S. A., Odo, J. I. and Odi,
[4]. Hamernik, P., Tanuska, P. and J. I. (2017). Novel Passive Negative
Mudroncik, D. (2012). and Positive Clamper Circuits
Classification of functions in smart Design for Electronic Systems.
home. International Journal of International Journal of Scientific
Information and Education & Engineering Research, vol. 8, no.
Technology, 2(2), 149-155. 5, pp. 856–867.
[5]. Gunge, V. S. and Yalagi, P. S. (2016). [12]. Ajiji, Y. M. (2020). Internet of thing
Smart home automation: a (IOT): data and information (gadget
literature review. International protection). Journal of Applied
Journal of Computer Science, Engineering, Technology,
Applications, 975(8887-8891). and Education, 2(2), 194-203.
[6]. Feng, X., Li, Q., Wang, H. and Sun, [13]. Nwankwo, W., Olayinka, D. and
L. (2018). Acquisitional rule-based Umezuruike, C. (2019). Boosting
engine for discovering internet-of- self-sufficiency in maize crop
things devices. In 27th {USENIX} production in Osisioma Ngwa Local
Security Symposium ({USENIX} Government with internet of things
Security 18) (pp. 327-341). (IOT)-climate messaging: A
[7]. Jabbar, W. A., Alsibai, M. H., Amran, model. Available at SSRN:
N. S. S. and Mahayadin, S. K. (2018). https://ssrn.com/abstract=334161
Design and implementation of IoT- 9orhttp://dx.doi.org/10.2139/ssrn
based automation system for smart .3341619
home. In 2018 International [14]. Edozie, E. and Vilaka, K. (2020).
Symposium on Networks, Design and Implementation of a
Computers and Communications Smart Sensor and RFID Door Lock
(ISNCC) (pp. 1-6). IEEE. Security System with Email
[8]. Abu, M. A., Nordin, S. F., Suboh, M. Notification. International Journal
Z., Yid, M. S. M. and Ramli, A. F. of Engineering and Information
(2018). Design and development of Systems (IJEAIS), 4(7), 25-28.
home security systems based on

104
www.idosr.org Edozie et al
[15]. Mark, E., Adabara, I., Mathias, K., Ggaba. IDOSR Journal of Computer
Masisani, W. M., Otiang, O. G. and and Applied Sciences 7(1):95-108.
Yusuf, O. F. (2020). Electrical Smart [24]. Masisani William Mufana and
Grid Resilience Based on GSM Adabara Ibrahim (2022). Overview
Technology. International Journal of Smart Grid: A Review. IDOSR
of Academic Engineering Research, Journal Of Computer and Applied
Volume 4, Issue 4, Pages 36-49 Sciences 7(1):33-44. 10. Masisani
[16]. Mufana, M. W. and Ibrahim, A. William Mufana and Adabara
(2022). Monitoring with Ibrahim (2022). Monitoring with
Communication Technologies of Communication Technologies of
the Smart Grid. IDOSR Journal of the Smart Grid. IDOSR Journal Of
Applied Sciences, 7(1), 102-112. Applied Sciences 7(1) 102-112.
[17]. Ogbonna, C.C., Eze, V.H.U., Ezichi, [25]. Abdulfatah A Yusuf, Hadijah
I.S., Okafor, W.O., Onyeke, A.C., Yahyah, Atiku A Farooq, Kasumba A
Ogbonna, U.O. (2023). A Buyondo, Peter W Olupot, Sharif S
Comprehensive Review of Artificial Nura, Tajuddeen Sanni,
Neural Network Techniques Used Twinomuhwezi Hannington,
for Smart Meter-Embedded Zubeda Ukundimana,
forecasting System. IDOSR Journal Abdurrahman S Hassan, Mustafa M
of Applied Science, 8 (1), 13-24 Mundu, Sibuso S Samede, Yakubu A
[18]. Okafor, W. O., Edeagu, S. O., Makeri, Milon D Selvam (2021).
Chijindu, V. C., Iloanusi, O. N. and Characteristics of ultrafine particle
Eze, V. H. U. (2023). A emission from light-vehicle engine
Comprehensive Review on Smart at city transport-speed using after-
Grid Ecosystem. IDOSR Journal of treatment device fueled with n-
Applied Science, 8(1), 25-63. butanol-hydrogen blend. Case
[19]. Salami, A. F., Adedokun, E. A., Studies in Chemical and
Bello-Salau, H. and Sadiq, B. O. Environmental Engineering,
(2022). Fault-tolerant backup 3:100085.
clustering algorithm for smart [26]. Furaha Kasali Jean-Rostand, Mundu
connected underwater sensor M Mustapha, Ibrahim Adabara,
networks. International Journal of Abdurrahman S Hassan (2019).
Software Engineering and Design of an automatic transfer
Computer Systems, 8(1), 29-44. switch for households solar PV
[20]. Yakubu, A. M. (2020). Information system. European Journal of
Security Risks Vulnerability and Advances in Engineering and
Threat in Smart City Development Technology, 6(2): 54-65.
in Africa. Ras Engineering & [27]. Nnamchi SN, MM Mundu, JD
Technology, 1(1): 1-7. Busingye, JU Ezenwankwo (2019).
[21]. Eze, V. H. U., Ugwu, C. N. and Extrinsic modeling and simulation
Ugwuanyi, I. C. (2017). A Study of of helio-photovoltaic system: a
Cyber Security Threats, Challenges case of single diode model.
in Different Fields and its International journal of green
Prospective Solutions: A Review. energy 16(6): 450-467.
INOSR Journal Scientific Research, [28]. Stephen Ndubuisi Nnamchi,
9(1), 13-24. Muhamad Mustafa Mundu,
[22]. Makeri, Y. A. (2020). The strategy Onyinyechi Adanma Nnamchi,
detection on information security Uche Onochie, Zaid Oluwadurotimi
in corporate organizations on Jagun (2022). Modeling Earth
crucial asset. JOIV: International Systems and Environment, 8(2):
Journal on Informatics 2383-2400.
Visualization, 4(1), 35-39. [29]. Stephen Ndubuisi Nnamchi,
[23]. Sekiti, H. and Ibrahim, A. (2022). Mustafa Muhamad Mundu (2022).
Security Analysis for Virtual Private Development of solar isodose
Network Based on Site-to-Site lines: Mercatorian and spatial
Circuit Switching (Vpns2scs) Case guides for mapping solar
Study: Liquid Telecommunication installation areas. Heliyon, 8(10):
e11045.

105
www.idosr.org Edozie et al
[30]. Stephen Ndubuisi Nnamchi, Implementation of Smart Grid
Onyinyechi Adanma Nnamchi, Decision Support Systems. IDOSR
Oluwatosin Dorcas Sanya, Mustafa Journal of Scientific Research 7(1)
Muhamad Mundu, Vincent Gabriel 50-57.
(2020). Dynamic analysis of [39]. Natumanya Akimu (2022). Design
performance of photovoltaic and Construction of an Automatic
generators under moving cloud Load Monitoring System on a
conditions. Journal of Solar Energy Transformer in Power Distribution
Research,5(2): 453-468. Networks. IDOSR Journal of
[31]. Kizito BW (2023). An SMS-Based Scientific Research 7(1) 58-76.
Examination Relaying System: A [40]. Kisakye Rebecca (2022).Simulation
Case Study of Kampala and Analysis of Dipole Transmitter
International University Main Antenna (KIU Laboratory) IDOSR
Campus. IDOSR Journal of Science Journal of Computer and Applied
and Technology 9 (1), 1-26. Sciences 7(1):119-135.
[32]. Ogbonna Chibuzo C., U. Eze Val
Hyginus, S. Ikechuwu Ezichi, O.
Okafor Wisdom, C. Anichebe
Onyeke, U. Oparaku Ogbonna
(2023). A Comprehensive Review of
Artificial Neural Network
Techniques Used for Smart Meter-
Embedded forecasting System.
IDOSR Journal of Applied
Sciences,8(1): 13-24.
[33]. Patience Nabiryo, Anthony Ejeh
Itodo (2022) Design and
Implementation of Base Station
Temperature Monitoring System
Using Raspberry Pi, IDOSR Journal
of Science and Technology, 7(1): 53-
66.
[34]. Hamisi Sekiti and Adabara Ibrahim
(2022). Security Analysis for
Virtual Private Network Based on
Site to Site Circuit Switching
(Vpns2scs) Case Study: Liquid
Telecommunication Ggaba. IDOSR
Journal of Computer and Applied
Sciences 7(1):95-108.
[35]. Kalulu Mathias (2022). The Smart
Grid and Its Security Challenges,
INOSR Applied Sciences 9(1):9-12.
[36]. Kalulu Mathias and Adabara
Ibrahim (2022). Developing of a
Smart Fraud Detection System in
Advanced Metering Infrastructure
Using Deep Learning. INOSR
Applied Sciences 9(1):1-8.
[37]. Nabiryo Patience and Itodo
Anthony Ejeh (2022). Design and
Implementation of Base Station
Temperature Monitoring System
Using Raspberry Pi. IDOSR Journal
of Science and Technology 7(1):53-
66.
[38]. Masisani William Mufana and
Adabara Ibrahim (2022).

106

You might also like