Remote Intruder Detection System
Remote Intruder Detection System
Ayan Mukherjee
Department of Computer Science
Brainware University
Barasat, Kolkata, India
e-mail: [email protected]
Abstract—The proposed method discussed here secures a precious thing in a secure room and do the surveillance without any human
intervention. Any motion around the secure object during a predefined restricted time period is identified instantly and notified to the security
personal staying at a remote room via Wi-Fi. The personal at that room is alerted by an alarm and readily the person can view the image of the
intruder in the screen of the computer in front of him or her.
Keywords-Surveillance; Raspberry Pi; PIR sensor; Motion Detection; IoT; WoWLAN.
__________________________________________________*****_________________________________________________
III. PROJECT IMPLEMENTATION Figure 4 shows the output of of the above mentioned Python
The project works through the following modules : code. Normally when the PIR Sensor remains in idle state it
A. Set up Raspberry Pi sends “ Motion notDetected ! 0” signal to the user screen.
At first Raspbian OS is installed from New Out Of the Box Whenever it senses some object moving in front of it
Software (NOOBS) which is pre-installed in NOOBS SD card. immediately it sends “Motion Detected! 1” signal to the
Alternatively, it can be downloaded from the website of screen. Moreover, it activates the Raspberry Pi Camera
Raspberry Pi [5]. The power supply is provide to Raspberry Pi immediately to capture a snapshot of the moving object which
through Raspberry Pi Micro USB Power Cable and it is is controlled via the same Python script.
connected with the monitor through a HDMI cable. Keyboard Once the Python script is been written the Monitor is been
and Mouse is connected to it via the USB port. Finally, the detached from the Raspberry Pi and system works fine without
Camera (Figure 2) is connected with the appropriate port and it.
the PIR Sensor (Figure 2) is connected via GPIO pins.
360
IJFRCSCE | December 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 3 Issue: 12 359 – 362
_______________________________________________________________________________________________
C. Woken up Remote Computer at Security Room
First of all, WoWLAN was configured in the remote
computer residing at the security room. A special message,
called 'Magic Packet' is sent to the remote computer via Wi-Fi,
after capturing the picture. This signal is converting the state of
the remote computer from standby power state to active turn on
state. All these can be achieved through using the technology
WoWLAN, discussed earlier. Moreover, it sends the picture of
the intruder through Wi-Fi network to the remote computer.
361
IJFRCSCE | December 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 3 Issue: 12 359 – 362
_______________________________________________________________________________________________
In jewelery shops, we can implement this security-alert
model to prevent robbery or any other kind of breech-of-
security. In post offices, we can apply this model to protect the
vault with the help of Local Administration or Police. Public
sector banks and private sector banks as well, may utilize this
security-alert architecture for the safety of their vaults and
lockers with the help of Local Police. Different private and
public Insurance companies can protect their departments,
mainly those departments, who are directly related to monetary
(cash) transactions with the public, by using this remote
security-alert system.
Different Governmental organizations or departments, for
example, Income Tax, DRDO, and private companies may
utilize this architecture to protect and to maintain privacy of
their secret documents other than money.
REFERENCES
[1] V ictor Bautista Saiz, Hospitalet de Llobregat Barcelona “GPU:
Application for CCTV systems” International carnahan
conference on security technology (ICCST), pp, 1-4, Rome,
October 2014.
[2] Priya B. Patel, Viraj M. Choksi, Swapna Jadhav, M.B. Potdar
“Smart Motion Detection System using Raspberry Pi”
International Journal of Applied Information Systems (IJAIS).
[3] Aamir Nizam Ansari, Mohamed Sedkyl, Neelam Sharma,
Anurag Tyagi, Faculty of Computing, Engineering and Sciences,
Staffordshire University, Stoke -on-Trent, United Kingdom ”An
Internet of Things Approach for Motion Detection using
Raspberry Pi” presented at the International Conference on
Intelligent Computing and Internet of Things (IC1T),2015.
[4] Patrick Luberus, Alfandika Nyandoro “Implementing Wake-on-
LAN in Institutional Networks” Journal of Applied Business and
Economics vol. 16(1) 2014.
[5] “NOOBS – New Out Of the Box Software” retrieved from
https://www.raspberrypi.org/downloads/noobs/
[6] Nanyang Senba “PIR Motion Detector Module” retrieved from
http://akizukidenshi.com/download/ds/senba/SB612A-
Advanced.pdf
[7] “The Camera Module” The MagPi issue 14 Jul 2013 retrieved
from https://www.raspberrypi.org/magpi-issues/MagPi14.pdf
362
IJFRCSCE | December 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________