0% found this document useful (0 votes)
48 views

Remote Intruder Detection System

Paper Title Remote Intruder Detection System Authors Ayan Mukherjee Abstract The proposed method discussed here secures a precious thing in a secure room and do the surveillance without any human intervention. Any motion around the secure object during a predefined restricted time period is identified instantly and notified to the security personal staying at a remote room via Wi-Fi. The personal at that room is alerted by an alarm and readily the person can view the image of the intruder in the screen of the computer in front of him or her. Keywords Surveillance; Raspberry Pi; PIR sensor; Motion Detection; IoT; WoWLAN.. Citation/Export MLA Ayan Mukherjee, “Remote Intruder Detection System”, December 17 Volume 3 Issue 12 , International Journal on Future Revolution in Computer Science & Communication Engineering (IJFRSCE), PP: 359 – 362 APA Ayan Mukherjee, December 17 Volume 3 Issue 12, “Remote Intruder Detection System”, International Journal on Future Revolution in Computer Science & Communication Engineering (IJFRSCE), PP: 359 – 362
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views

Remote Intruder Detection System

Paper Title Remote Intruder Detection System Authors Ayan Mukherjee Abstract The proposed method discussed here secures a precious thing in a secure room and do the surveillance without any human intervention. Any motion around the secure object during a predefined restricted time period is identified instantly and notified to the security personal staying at a remote room via Wi-Fi. The personal at that room is alerted by an alarm and readily the person can view the image of the intruder in the screen of the computer in front of him or her. Keywords Surveillance; Raspberry Pi; PIR sensor; Motion Detection; IoT; WoWLAN.. Citation/Export MLA Ayan Mukherjee, “Remote Intruder Detection System”, December 17 Volume 3 Issue 12 , International Journal on Future Revolution in Computer Science & Communication Engineering (IJFRSCE), PP: 359 – 362 APA Ayan Mukherjee, December 17 Volume 3 Issue 12, “Remote Intruder Detection System”, International Journal on Future Revolution in Computer Science & Communication Engineering (IJFRSCE), PP: 359 – 362
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248

Volume: 3 Issue: 12 359 – 362


_______________________________________________________________________________________________
Remote Intruder Detection System

Ayan Mukherjee
Department of Computer Science
Brainware University
Barasat, Kolkata, India
e-mail: [email protected]

Abstract—The proposed method discussed here secures a precious thing in a secure room and do the surveillance without any human
intervention. Any motion around the secure object during a predefined restricted time period is identified instantly and notified to the security
personal staying at a remote room via Wi-Fi. The personal at that room is alerted by an alarm and readily the person can view the image of the
intruder in the screen of the computer in front of him or her.
Keywords-Surveillance; Raspberry Pi; PIR sensor; Motion Detection; IoT; WoWLAN.

__________________________________________________*****_________________________________________________

until the security personal is notified, no human intervention is


I. INTRODUCTION
needed in-between.
Surveillance issue is the most vital issue for any
organization now-a-days. Each and every organization want to
safe guard their data, products, resources, machineries etc in
their own way.
This paper suggests a mechanism where the system is
basically detecting any person or object say Y in a secure room
where a precious or confidential object, say X, is been stored at
a restricted period of time (mainly at night). There is a PIR
Motion Sensor around the object X which senses the presence Figure 1. Raspberry Pi3 Model B.
of Intruder Y, at first. The camera is attached to a chip called
The camera does not take any picture and remains in
Raspberry PI, which takes the input from the camera and sends
standby mode in normal time. The PIR Motion Sensor [2] is
a signal, through the wireless media, to the computer that is
installed around the confidential object, X, and works like a
present in a room of security personal, at a remote distance.
trigger whenever it senses any movement [3] around X. The
A security personal is present at that room and he or she
PIR Sensor is attached with Raspberry Pi through the
need not to be even in alert state. Even the computer remains
appropriate General-purpose input/output (GPIO) pins on the
in standby power state. There is an Wireless connection
board. The Raspberry Pi Camera immediately captures the
between the server and client computer.
pictures of the moving object(s) until it senses movements
After getting the signal from the Raspberry Pi the computer
around and sends an activation signal to the remote PC, at the
is starting-up and two applications open automatically. The
security room. This thing is implemented through a Python
first application plays an alarming tone and the second
code. Here, RIDS uses the Wake on Wireless LAN (WoWLAN
application opens up the interface which shows the picture of
or WoW) [4] technology for activating the remote computer
the intruder, caught through the camera, installed at the secure
through a signal sent by the Raspberry Pi via Wi-Fi.
room. According to that the security personal takes the action.

II. PROPOSED WORK


A. Motion Detection throuugh Raspberry Pi
The Remote Intruder Detection System (RIDS) proposed in
this paper uses a IoT tool called Raspberry Pi3B with two more
accessories – Pyroelectric Infrared (PIR) Motion Sensor and a
Raspberry Pi Camera Board, with the OS running behind as
Raspbian OS. The advantage of using these setup is mainly the
lower cost. Another option can be using a CCTV camera [1]
which costs higher. Moreover, as the system is fully automated
Figure 2. Raspberry Pi Camera and PIR Motion Sensor
359
IJFRCSCE | December 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 3 Issue: 12 359 – 362
_______________________________________________________________________________________________
B. Activating the Remote Computer through WoWLAN
We can send a special network message to turn on or awake
a computer by using Ethernet or token ring computer standard,
called Wake-on-LAN (WoL). The message is sent by a
network device to the target computer and both the devices
should be connected via LAN. The sender device uses a
program to send the special message, called Magic Packet. This
Magic Packet uses the MAC address of the target computer. On
receiving the packet, the target computer's Network Interface
Card (NIC) instructs the computer's power supply or
motherboard to initialize the wake-up. WoWLAN is the
supplementary standard of WoL, where the wake-up signal is
sent through Wi-Fi. Although, in functionality point of view
there are some differences between WoL and WoWLAN and Figure 4. Figure 4. Motion Detection
WoWLAN works with some limitations.
The NetworkManager snap allows its users to configure one The PIR sensor has three pins: ground, digital out and 3-5VDC
or more triggers to allow the device it operates on to be woken in. At idle stage, when there is no motion detected in front of
up remotely. The snap provides two configuration options the sensor, the digital out stays low, however whenever any
which will allow the users to enable or disable WoWLAN: motion is detected, the digital out pulses high (3.3V) and the
 wifi.wake-on-wlan Raspberry Pi senses this. The PIR sensor that is used here is
 wifi.wake-on-wlan-password having a range of approximately 7 meters, and a 110° x 70°
The NetworkManager snap uses the nmcli utility to detection range, so it is a great tool for monitoring a door or the
configure WoWLAN per connection. corner of a room.

III. PROJECT IMPLEMENTATION Figure 4 shows the output of of the above mentioned Python
The project works through the following modules : code. Normally when the PIR Sensor remains in idle state it
A. Set up Raspberry Pi sends “ Motion notDetected ! 0” signal to the user screen.
At first Raspbian OS is installed from New Out Of the Box Whenever it senses some object moving in front of it
Software (NOOBS) which is pre-installed in NOOBS SD card. immediately it sends “Motion Detected! 1” signal to the
Alternatively, it can be downloaded from the website of screen. Moreover, it activates the Raspberry Pi Camera
Raspberry Pi [5]. The power supply is provide to Raspberry Pi immediately to capture a snapshot of the moving object which
through Raspberry Pi Micro USB Power Cable and it is is controlled via the same Python script.
connected with the monitor through a HDMI cable. Keyboard Once the Python script is been written the Monitor is been
and Mouse is connected to it via the USB port. Finally, the detached from the Raspberry Pi and system works fine without
Camera (Figure 2) is connected with the appropriate port and it.
the PIR Sensor (Figure 2) is connected via GPIO pins.

Figure 3. Raspberry Pi GPIO pins

B. Motion Detection and Image Capture


A Python script runs behind the PIR Motion Sensor [6] to find
out any movement in front of it. Whenever it detects any
movement it triggers the Raspberry Camera [7] to capture the
image of that object.

Figure 5. Image Capturing

360
IJFRCSCE | December 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 3 Issue: 12 359 – 362
_______________________________________________________________________________________________
C. Woken up Remote Computer at Security Room
First of all, WoWLAN was configured in the remote
computer residing at the security room. A special message,
called 'Magic Packet' is sent to the remote computer via Wi-Fi,
after capturing the picture. This signal is converting the state of
the remote computer from standby power state to active turn on
state. All these can be achieved through using the technology
WoWLAN, discussed earlier. Moreover, it sends the picture of
the intruder through Wi-Fi network to the remote computer.

D. Alert Generation and Monitoring

Figure 6. Start-up Screen at Remote Computer


Logical Work Flow Diagram

On startup, the Remote Computer or Laptop first opens up V. CONCLUSION


the media player to run an alarm tone. This tone alerts the The Remote Intruder Detection System (RIDS) proposed in
security personal that some object is entered inside the secure this paper is a kind of surveillance system which has some
room. added features than the other common surveillance systems :
To do this a shell scrip was already written and named as
 First of all, intruders, in this model, are totally
startalarm.sh. Finally, the following command was executed :
unaware that their activities are being watched
remotely.
# update-rc.d startalarm.sh defaults 100
 As the system is based on Wireless Communication,
it nullifies the chances of disconnecting the network
This script runs each and every time whenever the Remote
as the primary goal of the intruders are to cut down
Computer boots up.
the communicating wire.
Now the image captured and sent through Wi-Fi by
 Generally a wired communication is a clumsy and
Raspberry-Pi is displayed on the desktop of the Remote
costly connectivity but this model uses wireless
System. If the security personal finds that the object is a
connectivity and in-turn it reduces the cost and
vulnerable intruder he or she takes the appropriate action,
complexity as well.
accordingly. All the above operations will be performed via the
 As the cost of Raspberry Pi and its accessories are
same script mentioned above.
very nominal it saves the cost of using a full-fledged
IV. BLOCK DIAGRAMS computer or laptop at the Intruder Detection room.
Moreover, using the Raspberry Pi Camera module
saves the cost of CCTV camera.
 Because the Remote Computer at the Security Room
stays in standby power state, it saves the power
consumption there.
 The security personal at the Remote Room need not
have to monitor the surveillance system, all the time.
Even he or she falls asleep the alarm system alerts
him or her about the intruder and even the intruder
does not get any hint about it.
 As the security personal stays at the Remote location
which is not visible by the intruder, the person
becomes safe from the hand of possible attack by the
intruder.
Figure 6. Connections to accessories with Raspberry Pi 3B
All the above features will provide an extra edge to this
modern security system over the conventional security systems.
This project can be implemented at different public
domains, such as in jewelery shops, post offices, banks,
autonomous bodies, etc.

361
IJFRCSCE | December 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 3 Issue: 12 359 – 362
_______________________________________________________________________________________________
In jewelery shops, we can implement this security-alert
model to prevent robbery or any other kind of breech-of-
security. In post offices, we can apply this model to protect the
vault with the help of Local Administration or Police. Public
sector banks and private sector banks as well, may utilize this
security-alert architecture for the safety of their vaults and
lockers with the help of Local Police. Different private and
public Insurance companies can protect their departments,
mainly those departments, who are directly related to monetary
(cash) transactions with the public, by using this remote
security-alert system.
Different Governmental organizations or departments, for
example, Income Tax, DRDO, and private companies may
utilize this architecture to protect and to maintain privacy of
their secret documents other than money.

REFERENCES
[1] V ictor Bautista Saiz, Hospitalet de Llobregat Barcelona “GPU:
Application for CCTV systems” International carnahan
conference on security technology (ICCST), pp, 1-4, Rome,
October 2014.
[2] Priya B. Patel, Viraj M. Choksi, Swapna Jadhav, M.B. Potdar
“Smart Motion Detection System using Raspberry Pi”
International Journal of Applied Information Systems (IJAIS).
[3] Aamir Nizam Ansari, Mohamed Sedkyl, Neelam Sharma,
Anurag Tyagi, Faculty of Computing, Engineering and Sciences,
Staffordshire University, Stoke -on-Trent, United Kingdom ”An
Internet of Things Approach for Motion Detection using
Raspberry Pi” presented at the International Conference on
Intelligent Computing and Internet of Things (IC1T),2015.
[4] Patrick Luberus, Alfandika Nyandoro “Implementing Wake-on-
LAN in Institutional Networks” Journal of Applied Business and
Economics vol. 16(1) 2014.
[5] “NOOBS – New Out Of the Box Software” retrieved from
https://www.raspberrypi.org/downloads/noobs/
[6] Nanyang Senba “PIR Motion Detector Module” retrieved from
http://akizukidenshi.com/download/ds/senba/SB612A-
Advanced.pdf
[7] “The Camera Module” The MagPi issue 14 Jul 2013 retrieved
from https://www.raspberrypi.org/magpi-issues/MagPi14.pdf

362
IJFRCSCE | December 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________

You might also like