You are on page 1of 19

REAL-TIME

SURVEILLANCE AND
ALERT SECURITY
SYSTEM
Background of the Study
Security has been one of the major concerns of today’s daily living. Home and
business industry’s security issues become major concerns since everyone in home or
industry wants to protect their investments from any form of destruction or loss. In
terms of security, technology has its own contribution in developing equipment with a
better degree of providing security and monitoring a given area or establishment that
requires security.
In the past, security systems had to be monitored by a guard who was locked
away in a room all day watching the monitors to make sure that nothing would happen.
The other option was to come back and review the footage but damage could have
happened. Therefore, researchers had to come up with ways of overcoming that and
thus improving security at large.
The proponents came up with the project entitled “Real-Time Surveillance and
Alert Security System”, to enhance the level of security and protection. Real-Time
Surveillance and Alert Security System offers more functions than the normal security
system. It comprises of several sensors like PIR sensor, Door Sensors, and Fire and
Smoke Sensors.
It also has a Home automation system in it, in case the owner is
away from the house and want to keep updated about the information in
the house, the home automation is IoT based where the owner is notified
when there are suspicious changes or movements inside and outside the
house, it also has a control system linked on the phone or computer of
the owner where he can control the whole system, like the sensors the
door locks and the alarms. In order to make this whole system “Real-Time
Surveillance and Alert” Security system, the researchers propose to used
Pi camera and IP CCTV camera for the surveillance and monitoring and
with the Raspberry pi it will send alerts through email, to the nearest
police station and to the owner, upon the triggering of the sensors. The E-
mail consists of the IP address of the camera as well as the login
information for viewing the live feed; it also contains a sample photo
capture by the pi camera. These features and functions of the Real-Time
Surveillance and Alert Security System overcome the drawbacks of
different security system.
Statement of the Problem

Most of the security system being used nowadays is just for


monitoring and recording which is not enough for real time
security when an intrusion suddenly happen. This drawback of
most security system is very risky because it could lead to the
owner’s property to be damaged or lost.
Objectives
■ To Design and Build a Real-Time Surveillance and Alert Security
System that will improve the level of security and protection of
houses.
Specifically the study aims to have:
– A Security System that will alert the nearest Police Station and
the owner of the house in case of intrusion.
– A Security System that will send the live feed of CCTV to the
Police Station in case of intrusion.
– A Security System that will keep the owner updated and let
the owner control the Security System remotely.
Significance of the study

The significance of the study is to design and build a


Real-Time Surveillance and Alert Security System that
will improve the level of security and protection of
houses. This system will help the owner’s place to be
updated whatever happenings the place has, including
when there is an intrusion. It will also help on quickly
responding of the personnel on unwanted incidents
which may happen to the place.
Scope and Limitation
The study will focus only on updating the owner, and alerting
the nearest police station which send a live feed that detects
intruders, trespassers, and criminals. The system consists of
Motion and Fire and Smoke sensors with sending live feed to
home owner and to the government authorities (PNP). This
system will be activated by the authorized personnel only. THE
SYSTEM WILL BE ONLY LIMITED ON DETECTING DOOR
OPENING, SMOKE, HEAT, FIRE AND GAS. EVERYONE WILL
PASS THROUGH THE SENSOR WILL CONSIDER AS INTRUDERS
ONCE THE SYSTEM IS ACTIVATED.
REVIEW OF RELATED
LITERATURES
A. Central Controller Based Home
Security System
■ A Central Controller based home security system looks to improve the
security of the homes in a locality by combining many homes to form a
security network with a control node dedicated for each locality
depending on the number of users. These control nodes are controlled
by a few Central or Chief Control nodes with considerably high
processing power. The security system described by S. Tsai et al [5]
called Home Security System on Intelligent Network (HSSIN) uses
such a central controller based approach. The proposed system lacks
the modern security parameters.
■ The Central controller based security system has its challenges:
■ All or most homes in the neighbourhood have to join in for the
approach to be cost effective and successful.
■ The main question we have to consider here is; who controls or has
access to the central controller and its data? The Central controller
will be able to know about a home’s intimate and private information
like, if a home’s room heater is ON or if an inhabitant in a home is
taking a shower etc, from the data available at its disposal, this raises
serious privacy concerns. We already know how people feel about
government surveillance on the internet; the Central Controller based
security systems provides an opportunity to do even more privacy
violating surveillance on homes.
B. SMS (Short Messaging Service) Based
Home Automation System
■ 1. The work of A. Alheraish [6] proposes a Home Automation System
using SMS. The proposed system detects illegal intrusions at home
and allows legitimate users to change the passkey for the door and
control lights in the home. The illegal intrusion into the home is
identified by monitoring the state of the home door, which is done
using an LED (Light Emitting Diode) and IR (Infra-Red) sensors. The
passkey to the door can be any 4 digits which can be set either by
using the keypad or by using SMS from a registered user’s mobile
number. A user can control the lights in their home remotely using
SMS from their registered mobile number; by turning the lights ON at
different rooms at random intervals of time, one can give the
impression that the home is occupied even when it is not.
■ However, the 4 digit security passkey proposes security vulnerability. An attacker
could wait outside the home and peep through the window to learn the passkey;
we can’t expect the owner to be careful every time he/she enters the passkey.
The user punches in the passkey routinely so the probability of the user being
careless is high. The LED and IR sensors used by A. Alheraish [6] to identify
intrusions could easily be spoofed by a sophisticated attacker.
■ 2. The work of U. Saeed et al [8] proposes an SMS based Home Automation
System. The system has a Java application running on the phone, legitimate
users can login to the application using their username and password and can
select the building/floor/room/device that they wish to remotely control along
with an appropriate action from the list of available user actions. The Java
application will compose the appropriate SMS message and will sent it to the
home’s GSM modem. The GSM modem will receive the SMS message and
decodes it and passes it to the home network to perform the action specified.
The researchers use 4 digit passkey and facial recognition for security.
■ However, The passkey is different for each individual at home which improves
the odds for hacking the keypad. Moreover, these passkeys are chosen by users
who are vulnerable to ‘Social Engineering’ and other hacks.
C. Burglar Alarm System
■ Burglar (or intrusion), alarms are electronic alarms designed to alert the user to a
specific danger. Sensors are connected to a control unit via low-voltage wiring or a
narrowband RF signal which is used to interact with a response device. The most
common security sensors are used to indicate the opening of a door or window or
detect motion via passive infrared (PIR). New construction systems are
predominately hardwired for economy. Retrofit installations often use wireless
systems for a faster, more economical installation. Some systems serve a single
purpose of burglar or fire protection. Combination systems provide both fire and
intrusion protection. Systems range from small, self-contained noisemakers, to
complicated, multi-zoned systems with color-coded computer monitor outputs. Many
of these concepts also apply to portable alarms for protecting cars, trucks or other
vehicles and their contents (i.e., "car alarms").Burglar alarms (or perimeter security
systems, perimeter detection systems, Perimeter protection, intrusion detection
systems and many more terms for the same thing) are divided to two main fields:
home burglar alarms and industrial burglar and perimeter intrusion detection
METHODOLOGY
System Design
■ The Functional Block diagram of the system, the input devices are the ones on the
top, and these devices are the triggering points of the whole system, they detect
what they need to detect and then send it back to the MCU for processing. The PIR
sensor, detects motions of an intruder through the body temperature of the intruder.
The Door sensor, normally will set an alarm when the door is being opened by
someone, but in this case, the door sensor will trigger an alarm if the conditions on
the Fingerprint sensor has not been met, the fingerprint sensor will determine if the
person is an outsider or not. The Fire and Smoke detection will function normally but
having improved sensitivity so that false alarms will be avoided. The Pi camera and
Security Cameras (IP camera) are for the Surveillance of the system, as it is the
main focus of the researcher in this study, the Security Cameras are IP cameras so
when the Security System triggered an alarm, we will be able to send the Live Video
Feed of the Surveillance camera to the nearest police and also to the owner if
he/she is away from the house, after sending the live feed to the owner, the owner
now will be prompted to the Home Automation page where he can control the
sensors and locks of the house in order to assure safety and protection of the
house. With this design, the problem stated could be possible solve with this Real-
Time Surveillance and Alert Security System.
■ The Security System is being subdivided into three Sub-systems these are the
following:
■ Surveillance System
■ Detection System
■ Home Automation System
■ In Surveillance system, it includes the sensors, Pi Camera, IP CCTV Camera and the
Email Alert System, the e-mail contains important information like the IP address
and password of the CCTV cameras where the intrusion is detected, this system will
overcome the drawbacks of the other security system that are commonly used by
people.
■ In Detection system, it includes the sensors, sms/call alert system and alarms, in
this system it is the primary defense of the house as it will be the one triggering all
the alarms and alerts needed in case of intrusion.
■ In Home Automation System, it covers everything in the system, the sensors, the
cameras and the alarm and alert system, as this will be enabled when the owner is
away from the house and wants to be updated about what is happening on the
house and also be able to control the different functions of the system through
phone/computer and internet.
Hardware Components
No. Name Quantity

1 Arduino Uno 1

2 Raspberry Pi 1

3 Router with PoE Switch 1

4 IP Cameras 4

5 Pi Camera 1

6 PIR Sensor 2

7 Fire and Smoke Detectors 1 per level

8 Door sensor 1

9 Fingerprint sensor 1

10 GSM Module 1

11 Buzzer 1

12 Lights 2

You might also like