0% found this document useful (0 votes)
158 views57 pages

Home Automation-Report

This document discusses the development of a home automation system using an ESP8266 Wi-Fi module and Arduino Uno microcontroller. The system allows users to control lights, fans, and other appliances in their home through a web browser on a PC or mobile device. Sensors detect movement and environmental conditions, while relays connected to the Arduino control appliances. Together the ESP8266 and Arduino act as a web server, allowing users to send control commands remotely. The system provides both home security functions by sending alerts when motion is detected, as well as home automation by allowing remote control of devices from anywhere using Wi-Fi and a web browser.

Uploaded by

Praveen Mathias
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
158 views57 pages

Home Automation-Report

This document discusses the development of a home automation system using an ESP8266 Wi-Fi module and Arduino Uno microcontroller. The system allows users to control lights, fans, and other appliances in their home through a web browser on a PC or mobile device. Sensors detect movement and environmental conditions, while relays connected to the Arduino control appliances. Together the ESP8266 and Arduino act as a web server, allowing users to send control commands remotely. The system provides both home security functions by sending alerts when motion is detected, as well as home automation by allowing remote control of devices from anywhere using Wi-Fi and a web browser.

Uploaded by

Praveen Mathias
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 57

ABSTRACT

Internet of Things (IoT) conceptualizes the idea of remotely connecting and

monitoring real world objects (things) through the Internet. When it comes to our

house, this concept can be aptly incorporated to make it smarter, safer and

automated. This IoT project focuses on building a smart wireless home security

system which sends alerts to the owner by using Internet in case of any trespass

and raises an alarm optionally. Besides, the same can also be utilized for home

automation by making use of the same set of sensors. The leverage obtained by

preferring this system over the similar kinds of existing systems is that the alerts

and the status sent by the Wi-Fi connected microcontroller managed system can be

received by the user on his phone from any distance irrespective of whether his

mobile phone is connected to the internet. In this project we are going to make a

home automation system using ESP8266 Wi-Fi module and Arduino Uno. Using

this we will be able to control lights, electric fan and other home appliances

through a web browser using your PC or mobile. These AC mains appliances will

be connected to relays which are controlled by the Arduino. ESP8266 and Arduino

together acts as a Web Server and we will send control commands through a Web

Browser like Google Chrome or Mozilla Firefox. ESP8266 is the one of the most

popular and low cost Wi-Fi module available in the market today. You can ready

more about it here, ESP8266 – Wi-Fi SoC.


CHAPTER 1

INTRODUCTION

1.1 OVERVIEW

Wireless Home security and Home automation are the dual aspects of this project.
The currently built prototype of the system sends alerts to the owner over voice calls
using the Internet if any sort of human movement is sensed near the entrance of his house
and raises an alarm optionally upon the user's discretion. The provision for sending alert
messages to concerned security personnel in case of critical situation is also built into the
system. On the other hand, if the owner identifies that the person entering his house is not
an intruder but an unexpected guest of his then instead of triggering the security alarm,
the user/owner can make arrangements such as opening the door, switching on various
appliances inside the house, which are also connected and controlled by the micro-
controller in the system to welcome his guest. The same can be done when the user
himself enters the room and by virtue of the system he can make arrangements from his
doorstep such that as soon as he enters his house he can make himself at full comfort
without manually having to switch on the electrical appliances or his favorite T.V.
channel for an example. Thus using the same set of sensors the dual problems of home
security and home automation can be solved on a complementary basis. Internet of
Things is the latest and emerging technology, which will enable physical objects used in
day to day life to connect to the internet and exchange data. In this paper, Smart home
control system using IoT is a system that uses computers or mobile devices to control
basic home functions and features automatically through internet from anywhere around
the world, an automated home is sometimes called a smart home. This system uses PIC
controller interfaced with ESP 8266 using AT COMMANDS and sensors that enables
wireless communication and remote control of various electrical appliances with in their
home.
1.2 HOME AUTOMATION

Homes of the 21st century will become more and more self-controlled and
automated due to the comfort it provides, especially when employed in a private home
and security currently become a very important issue in public or private institutions in
which various security systems have been proposed and developed for some crucial
processes. Security systems are vital for protection of information, property, and
prevention from theft or crime in home. A smart home is a network of various sensors
and controllers integrated together to provide the user with remote control of various
devices within their home using IoT. The sensors sense various changes, monitor them,
store the data and display them in order for analysis and control. This helps us customize
our home to fit every family’s way of life. This is a cost-effective system made from
locally available components like PIC controller, light sensors and PIR sensors which
allows us to control the appliances of our house. The Internet of Things is connecting
everyday objects intelligently to the Internet to enable communication between things
and people, and between things themselves. For the Objects to collect and exchange data
electronics, software, sensors and network connectivity are embedded into them. This
technology has endless possibilities and infinite applications. Everyday devices are made
smart and intuitive and by enabling them to share data intelligently they can be used to
improve people’s lives. IOT has made a huge impact in the way people live, work and
communicate. IoT mainly has the following three characteristics: comprehensive
perception, which means that entity's information can be obtained at anytime and
anywhere; reliable transmission, which means that entity's sensory information is
required to pass out accurately in real-time; intelligent processing, which means that the
mass of information can be analyzed and processed efficiently, then the entity's
intelligent control is realized. This paper describes a smart home where lighting system of
the house is monitored and controlled remotely by establishing a remote server.

1.3 HOME AUTOMATION USING INTERNET OF THINGS


This paper proposes home automation system (HAS) using Intel Galileo that
employs the integration of cloud networking, wireless communication, to give the user
with remote control of various light, fans and appliances with in their home and storing
the data in the cloud. The proposed systems consist of servers and sensors. Server
controls and monitors more hardware interface module(sensors). The Galileo
development board, with built in Wi-Fi card port which the card is inserted, act as web
server. This system can have accessed from web server of local PC or remotely from any
PC or mobile handheld device connected to the internet. The system will automatically
change on the basis of sensors data. This system is designed to be low cost and
expandable allowing a variety of devices to be controlled. This paper presents the design
and implementation of an interactive home applications security system using biometric
with IoT Server. IoT based monitoring and control of equipment is forming a trend in
automation field. The sensors send the signal to the processor during hazardous
situations. Buzzer will ring whenever sensors get activated or when unauthorized persons
try to open the door. Working of IoT based door locking system has two processes, at
system and at IoT Server. In order to open the door, the user must place finger on the
biometric scanner. It checks in the database whether the entered user finger prints is
already stored or not, if finger print does not match then again the user must place finger
for authentication. After 3 unsuccessful attempts buzzer will ring and send a message to
the already registered phone numbers. If user’s finger print is matched, then he/she has to
enter the password on the system, if password is correct then security question will be
entered. If finger print, password and security question are all correct then door will open
and the data will be send to the IoT Server.

1.3 INTERNET OF THINGS

The Internet of things (IoT) is the network of physical devices, vehicles, home
appliances and other items embedded with electronics, software, sensors, actuators, and
connectivity which enables these objects to connect and exchange data. Each thing is
uniquely identifiable through its embedded computing system but is able to inter-operate
within the existing Internet infrastructure. The figure of online capable devices increased
31% from 2016 to 8.4 billion in 2017. Experts estimate that the IoT will consist of about
30 billion objects by 2020. It is also estimated that the global market value of IoT will
reach $7.1 trillion by 2020.

The IoT allows objects to be sensed or controlled remotely across existing network
infrastructure, creating opportunities for more direct integration of the physical world into
computer-based systems, and resulting in improved efficiency, accuracy and economic
benefit in addition to reduced human intervention. When IoT is augmented with sensors
and actuators, the technology becomes an instance of the more general class of cyber-
physical systems, which also encompasses technologies such as smart grids, virtual
power plants, smart homes, intelligent transportation and smart cities.

Fig 1.1 IoT structure

"Things", in the IoT sense, can refer to a wide variety of devices such as heart
monitoring implants, biochip transponders on farm animals, cameras streaming live feeds
of wild animals in coastal waters, automobiles with built-in sensors, DNA analysis
devices for environmental/food/pathogen monitoring, or field operation devices that
assist firefighters in search and rescue operations. Legal scholars suggest regarding
"things" as an "inextricable mixture of hardware, software, data and service".

These devices collect useful data with the help of various existing technologies
and then autonomously flow the data between other devices.
The term "the Internet of things" was coined by Kevin Ashton of Procter &
Gamble, later MIT's Auto-ID Center, in 1999.

The Internet of things (IoTs) can be characterized as interfacing the different sorts
of items like advanced mobile phones, PC and Tablets to web, which gets extremely
unique kind of correspondence amongst things and individuals and furthermore between
things. With the presentation of IoTs, the innovative work of home robotization are
getting to be plainly prominent in the current days. A large portion of the gadgets are
controlled and observed for helps the individual. Also different remote advancements
help in associating from remote spots to enhance the insight of home condition. A
propelled system of IoT is being shaped when a person need interfacing with different
things. IoTs innovation is utilized to come in with inventive thought and awesome
development for brilliant homes to enhance the expectations for everyday comforts of
life. The IoT-based design gives abnormal state adaptability at the correspondence and
data. It is an approach which is pertinent in a wide range of conditions, for example,
tolerant observing framework, security, activity flag control or controlling different
applications. The IoT extend means to draw out the different chances of utilizing IPv6
and other related guidelines to beat the inconveniences utilizing of the Internet of Things.
The IoT ventures demonstrates a predominant and exhaustive investigation of all sensible
functionalities, components and different conventions that can be utilized for building
IoT models however interconnections may happen between all entirely unexpected IoT
applications. As in the systems administration field, where a few arrangements risen at
his earliest stages to leave place to a typical model, the TCP/IP convention suite, the rise
of a typical reference display for the IoT space and the distinguishing proof of reference
structures can prompt a speedier, more engaged improvement and an exponential
increment of IoT-related arrangements. These arrangements can give a vital preferred
standpoint to develop economies, as new plans of action can use those mechanical
arrangements giving space to monetary advancement.
1.3.1 APPLICATIONS

The applications for internet connected devices are extensive. Multiple categorizations
have been suggested, most of which agree on a separation between consumer, enterprise
(business), and infrastructure applications. George Osborne, the former British
Chancellor of the Exchequer, posited that the Internet of things is the next stage of the
information revolution and referenced the inter-connectivity of everything from urban
transport to medical devices to household appliances. The ability to network embedded
devices with limited CPU, memory and power resources means that IoT finds
applications in nearly every field. Such systems could be in charge of collecting
information in settings ranging from natural ecosystems to buildings and factories,
thereby finding applications in fields of environmental sensing and urban planning.

Intelligent shopping systems, for example, could monitor specific users'


purchasing habits in a store by tracking their specific mobile phones. These users could
then be provided with special offers on their favorite products, or even location of items
that they need, which their fridge has automatically conveyed to the phone. Additional
examples of sensing and actuating are reflected in applications that deal with heat, water,
electricity and energy management, as well as cruise-assisting transportation systems.
Other applications that the Internet of things can provide is enabling extended home
security features and home automation. The concept of an "Internet of living things" has
been proposed to describe networks of biological sensors that could use cloud-based
analyses to allow users to study DNA or other molecules

1.3.2 CONSUMER APPLICATION

A growing portion of IoT devices are created for consumer use. Examples of
consumer applications include connected car, entertainment, home automation (also
known as smart home devices), wearable technology, quantified self, connected health,
and appliances such as washer/dryers, robotic vacuums, air purifiers, ovens, or
refrigerators/freezers that use Wi-Fi for remote monitoring. Consumer IoT provides new
opportunities for user experience and interfaces.

Some consumer applications have been criticized for their lack of redundancy and
their inconsistency, leading to a popular parody known as the “Internet of Shit.”
Companies have been criticized for their rush into IoT, creating devices of questionable
value, and not setting up stringent security standards.

1.4 SMART HOME

IoT devices are a part of the larger concept of home automation, also known as
demotics. Large smart home systems utilize a main hub or controller to provide users
with a central control for all of their devices. These devices can include lighting, heating
and air conditioning, media and security systems. Ease of usability is the most immediate
benefit to connecting these functionalities. Long term benefits can include the ability to
create a more environmentally friendly home by automating some functions such as
ensuring lights and electronics are turned off. One of the major obstacles to obtaining
smart home technology is the high initial cost. One key application of smart home is to
provide assistance for disabled and elderly individuals. These home systems utilize
assistive technology to accommodate an owner's specific disabilities. Voice control can
assist users with sight and mobility limitations while alert systems can be connected
directly to Cochlear implants worn by hearing impaired users. They can also be equipped
with additional safety features. These features can include sensors that monitor for
medical emergencies such as falls or seizures.

Smart home technology applied in this way can provide users with more freedom
and a higher quality of life. A second application of smart home is even more
sophisticated. One can guide his or her connected device at home even from far away. If
one for example leaves the office, it is possible to tell a connected air conditioner device
via smart phone to cool down the house to a certain temperature. Another example would
be using smart devices such as Amazon's Alexa to listen to news while cutting vegetables
for a meal. In general, Smart Home devices make life easier at home and give users the
ability to do several things at the same time.

1.4 INTELLIGENCE

Ambient intelligence and autonomous control are not part of the original concept
of the Internet of things. Ambient intelligence and autonomous control do not necessarily
require Internet structures, either. However, there is a shift in research to integrate the
concepts of the Internet of things and autonomous control, with initial outcomes towards
this direction considering objects as the driving force for autonomous IoT. In the future,
the Internet of things may be a non-deterministic and open network in which auto-
organized or intelligent entities (Web services, SOA components) and virtual objects
(avatars) will be interoperable and able to act independently (pursuing their own
objectives or shared ones) depending on the context, circumstances or environments.
Autonomous behavior through the collection and reasoning of context information as
well as the object's ability to detect changes in the environment (faults affecting sensors)
and introduce suitable mitigation measures constitutes a major research trend,[103]
clearly needed to provide credibility to the IoT technology. Modern IoT products and
solutions in the marketplace use a variety of different technologies to support such
context-aware automation but more sophisticated forms of intelligence are requested to
permit sensor units to be deployed in real environments.
Fig 1.2 Technology Roadmap

1.5 ARCHITECTURE

The system will likely be an example of event-driven architecture, bottom-up


made (based on the context of processes and operations, in real-time) and will consider
any subsidiary level. Therefore, model driven and functional approaches will coexist with
new ones able to treat exceptions and unusual evolution of processes (multi-agent
systems, B-ADSc, etc.). In an Internet of Things, the meaning of an event will not
necessarily be based on a deterministic or syntactic model but would instead be based on
the context of the event itself: this will also be a semantic web.[105] Consequently, it will
not necessarily need common standards that would not be able to address every context
or use: some actors (services, components, avatars) will accordingly be self-referenced
and, if ever needed, adaptive to existing common standards (predicting everything would
be no more than defining a "global finality" for everything that is just not possible with
any of the current top-down approaches and standardizations). Building on top of the
Internet of things, the web of things is an architecture for the application layer of the
Internet of things looking at the convergence of data from IoT devices into Web
applications to create innovative use-cases. In order to program and control the flow of
information in the Internet of things, a predicted architectural direction is being called
BPM Everywhere which is a blending of traditional process management with process
mining and special capabilities to automate the control of large numbers of coordinated
devices. The Internet of things requires huge scalability in the network space to handle
the surge of devices. IETF 6LoWPAN would be used to connect devices to IP networks.
With billions of device being added to the Internet space, IPv6 will play a major role in
handling the network layer scalability. IETF's Constrained Application Protocol,
ZeroMQ, and MQTT would provide lightweight data transport. "MQ" in "MQTT" came
from IBM's MQ Series message queuing product line. Fog computing is a viable
alternative to prevent such large burst of data flow through Internet. The edge devices'
computation power can be used to analyse and process data, thus providing easy real time
scalability.

1.5 IOT FRAMEWORK

IoT frameworks might help support the interaction between "things" and allow for more
complex structures like distributed computing and the development of distributed
applications. Currently, some IoT frameworks seem to focus on real-time data logging
solutions, offering some basis to work with many "things" and have them interact. Future
developments might lead to specific software-development environments to create the
software to work with the hardware used in the Internet of things. Companies are
developing technology platforms to provide this type of functionality for the Internet of
things. Newer platforms are being developed, which add more intelligence. RESET is a
scalable architecture that allows things to communicate over Hypertext Transfer Protocol
and is easily adopted for IoT applications to provide communication from a thing to a
central web server.

1.6 ENABLING TECHNOLOGIES FOR IOT

There are many technologies that enable IoT. Crucial to the field is the network
used to communicate between devices of an IoT installation, a role that several wireless
or wired technologies may fulfill.
1.6.1 ADDRESSABILITY

The original idea of the Auto-ID Center is based on RFID-tags and unique
identification through the Electronic Product Code, however, this has evolved into
objects having an IP address or URI. An alternative view, from the world of the Semantic
Web[121] focuses instead on making all things (not just those electronic, smart, or RFID-
enabled) addressable by the existing naming protocols, such as URI. The objects
themselves do not converse, but they may now be referred to by other agents, such as
powerful centralized servers acting for their human owners. Integration with the Internet
implies that devices will use an IP address as a unique identifier. Due to the limited
address space of IPv4 (which allows for 4.3 billion unique addresses), objects in the IoT
will have to use the next generation of the Internet protocol (IPv6) to scale to the
extremely large address space required. Internet-of-things devices additionally will
benefit from the stateless address auto-configuration present in IPv6, as it reduces the
configuration overhead on the hosts, and the IETF 6LoWPAN header compression. To a
large extent, the future of the Internet of things will not be possible without the support of
IPv6; and consequently, the global adoption of IPv6 in the coming years will be critical
for the successful development of the IoT in the future.

1.6.2 SHORT-RANGE WIRELESS

 Bluetooth mesh networking – Specification providing a mesh networking variant


to Bluetooth low energy (BLE) with increased number of nodes and standardized
application layer (Models).
 Light-Fidelity (Li-Fi) – Wireless communication technology similar to the Wi-Fi
standard, but using visible light communication for increased bandwidth.
 Near-field communication (NFC) – Communication protocols enabling two
electronic devices to communicate within a 4 cm range.
 QR codes and barcodes – Machine-readable optical tags that store information
about the item to which they are attached.
 Radio-frequency identification (RFID) – Technology using electromagnetic fields
to read data stored in tags embedded in other items.
 Thread – Network protocol based on the IEEE 802.15.4 standard, similar to
ZigBee, providing IPv6 addressing.
 Transport Layer Security – Network security protocol.
 Wi-Fi – Widely used technology for local area networking based on the IEEE
802.11 standard, where devices may communicate through a shared access point.
 Wi-Fi Direct – Variant of the Wi-Fi standard for peer-to-peer communication,
eliminating the need for an access point.
 Z-Wave – Communication protocol providing short-range, low-latency data
transfer at rates and power consumption lower than Wi-Fi. Used primarily for
home automation.
 ZigBee – Communication protocols for personal area networking based on the
IEEE 802.15.4 standard, providing low power consumption, low data rate, low
cost, and high throughput.

1.6.3 MEDIUM-RANGE WIRELESS

 HaLow – Variant of the Wi-Fi standard providing extended range for low-power
communication at a lower data rate.
 LTE-Advanced – High-speed communication specification for mobile networks.
Provides enhancements to the LTE standard with extended coverage, higher
throughput, and lower latency

1.6.4 Long-range wireless

 Low-power wide-area networking (LPWAN) – Wireless networks designed to


allow long-range communication at a low data rate, reducing power and cost for
transmission. Available LPWAN technologies and protocols: LoRaWan, Sigfox,
NB-IoT, Weightless.
 Very small aperture terminal (VSAT) – Satellite communication technology using
small dish antennas for narrowband and broadband data.
 Long-range Wi-Fi connectivity

1.7 IOT AS A NETWORK OF NETWORKS

Currently, IoT is made up of a loose collection of disparate, purpose-built


networks. Today’s cars, for example, have multiple networks to control engine function,
safety features, communications systems, and so on. Commercial and residential
buildings also have various control systems for heating, venting, and air conditioning

(HVAC); telephone service; security; and lighting. As IoT evolves, these networks,
and many others, will be connected with added security, analytics, and management
capabilities. This will allow IoT to become even more powerful in what it can help
people achieve.

Fig 1.3 Internet as a network of networks

1.7.1 Why Is IoT Important?

Before we can begin to see the importance of IoT, it is first necessary to


understand the differences between the Internet and the World Wide Web (or web)—
terms that are often used interchangeably. The Internet is the physical layer or network
made up of switches, routers, and other equipment. Its primary function is to transport
information from one point to another quickly, reliably, and securely. The web, on the
other hand, is an application layer that operates on top of the Internet. Its primary role is
to provide an interface that makes the information flowing across the Internet usable.

1.8 CLOUD COMPUTING

Cloud computing is the use of computing resources (hardware and software) that
are delivered as a service over a network (typically the Internet). The name comes from
the common use of a cloud-shaped symbol as an abstraction for the complex
infrastructure it contains in system diagrams. Cloud computing entrusts remote services
with a user's data, software and computation. Cloud computing consists of hardware and
software resources made available on the Internet as managed third-party services. These
services typically provide access to advanced software applications and high-end
networks of server computers.

Figure 1.3 Structure of cloud computing


The goal of cloud computing is to apply traditional supercomputing, or high-
performance computing power, normally used by military and research facilities, to
perform tens of trillions of computations per second, in consumer-oriented applications
such as financial portfolios, to deliver personalized information, to provide data storage
or to power large, immersive computer games.

The cloud computing uses networks of large groups of servers typically running
low-cost consumer PC technology with specialized connections to spread data-processing
chores across them. This shared IT infrastructure contains large pools of systems that are
linked together. Often, virtualization techniques are used to maximize the power of cloud
computing.

Cloud networking (and Cloud based networking) is a term describing the access of
networking resources from a centralized third-party provider using Wide Area
Networking (WAN) or Internet-based access technologies. Cloud networking is related
the concept of cloud computing, in which centralized computing resources are shared for
customers or clients. In cloud networking, the network can be shared as well as the
computing resources. It has spurred a trend of pushing more network management
functions into the cloud, so that fewer customer devices are needed to manage the
network.

CLOUD computing is being intensively referred to as one of the most influential


innovations in information technology in recent years. With resource virtualization, cloud
can deliver computing resources and services in a pay-as-you-go mode, which is
envisioned to become as convenient to use similar to daily-life utilities such as electricity,
gas, water and telephone in the near future. These computing services can be categorized
into Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-
Service (SaaS). Many international IT corporations now offer powerful public cloud
services to users on a scale from individual to enterprise all over the world; examples are
Amazon AWS, Microsoft Azure, and IBM Smart Cloud. Although current development
and proliferation of cloud computing is rapid, debates and hesitations on the usage of
cloud still exist. Data security/privacy is one of the major concerns in the adoption of
cloud computing. Compared to conventional systems, users will lose their direct control
over their data. In this paper, we will investigate the problem of integrity verification for
big data storage in cloud. This problem can also be called data auditing when the
verification is conducted by a trusted third party. From cloud users’ perspective, it may
also be called ‘auditing-as-a-service’. To date, extensive research is carried out to
address this problem. In a remote verification scheme, the cloud storage server (CSS)
cannot provide a valid integrity proof of a given proportion of data to a verifier unless all
this data is intact. To ensure integrity of user data stored on cloud service provider, this
support is of no less importance than any data protection mechanism deployed by the
cloud service provider (CSP), no matter how secure they seem to be, in that it will
provide the verifier a piece of direct, trustworthy and real-timed intelligence of the
integrity of the cloud user’s data through a challenge request.

It is especially recommended that data auditing is to be conducted on a regular


basis for the users who have high-level security demands over their data. Although
existing data auditing schemes already have various properties (see Section 2), potential
risks and inefficiency such as security risks in unauthorized auditing requests and
inefficiency in processing small updates still exist. In this paper, we will focus on better
support for small dynamic updates, which benefits the scalability and efficiency of a
cloud storage server. To achieve this, our scheme utilizes a flexible data segmentation
strategy and a ranked Merkle hash tree (RMHT).
CHAPTER 2

LITERATURE REVIEW

2.1 Luo Ke.The Design of Home Control System Based on Embedded System and
GSM[D].Southwest Jiatong University 2009

This paper introduces a smart home system which could supervise household
appliances remotely and realize real-time monitoring of home security status through
mobile phone. The paper also describes the realization of system hardware and software
in detail. This System combined embedded technique with GSM. Design adopted the
Liod platform for master control system which core processor is PXA270 Xscale and
singlechip expansion module to realize the information collection, analysis and
processing. GSM module communicated to transmit all the information gathered by this
system. Design also realized the video data acquisition, which can be transmitted via
wireless or cable network to monitoring center to remotely understand the house
condition. On the whole, through this system we can remotely and real-time monitor
house status. As people living standard and security consciousness improvement, people
pay more and more attention to the safe and comfortable living environment, so smart
home has become a hot spot. How to use portable terminal devices which have
commonly used, such as mobile phones, handheld PDA etc, and through the GSM/GPRS
wireless network, WLAN etc to realize communication have become a hot spot again of
the intelligent monitoring. Therefore, a smart home with remote monitoring function
became necessary today. This system in embedded system basis can control home
appliances, monitor smog, gas parameters of house, and collect video information of
house. At the same time, it also has many advantages for instance stability, reliability,
real-time, long distance, compatibility etc. An additional element that improves the aspect
of security from chimney mischances is its ability of sleuthing the smoke all together that
inside the occasion of any chimney, relates a cautioning message and a picture is sent to
Smartphone. The server will be interfaced with transfer equipment circuits that control
the apparatuses running at home. The correspondence with server enables the client to
choose the suitable gadget. The correspondence with server allows the client to select the
satisfactory gadget. The server speaks with the relating transfers. In the event that the
web association is down or the server isn't up, the installed framework board still will
oversee and work the machines locally. By this we give a climbable and cost compelling
Home Automation framework.

2.2 Pavithra.D.Ranjith Balakrishnan “IoT based monitoring and control system for
home automation”, Proceedings of 2015 Global Conference on Communication
Technologies 2015

The project proposes an efficient implementation for IoT (Internet of Things) used
for monitoring and controlling the home appliances via World Wide Web. Home
automation system uses the portable devices as a user interface. They can communicate
with home automation network through an Internet gateway, by means of low power
communication protocols like Zigbee, Wi-Fi etc. This project aims at controlling home
appliances via Smartphone using Wi-Fi as communication protocol and raspberry pi as
server system. The user here will move directly with the system through a web-based
interface over the web, whereas home appliances like lights, fan and door lock are
remotely controlled through easy website. An extra feature that enhances the facet of
protection from fireplace accidents is its capability of sleuthing the smoke in order that
within the event of any fireplace, associates an alerting message and an image is sent to
Smartphone. The server will be interfaced with relay hardware circuits that control the
appliances running at home. The communication with server allows the user to select the
appropriate device. The communication with server permits the user to pick out the
acceptable device. The server communicates with the corresponding relays. If the web
affiliation is down or the server isn't up, the embedded system board still will manage and
operate the appliances domestically. By this we provide a climbable and price effective
Home Automation system. The venture proposes a proficient usage for IoT (Internet of
Things) utilized for observing and controlling the home machines through World Wide
Web. Home computerization framework utilizes the convenient gadgets as a UI. They
can speak with home robotization arrange through an Internet portal, by methods for low
power correspondence conventions like Wi-Fi and so forth. This venture goes for
controlling home apparatuses by means of Smartphone utilizing Wi-Fi as correspondence
convention and Aurduino as server framework. The client here will move
straightforwardly with the framework through an online interface over the web, though
home apparatuses like lights, fan and entryway bolt are remotely controlled through
simple site.Prediction algorithms to bring about next event recognition. Further, an
Episode Discovery helps in finding the frequency of occurrence of these events and
targeting the particular events for automation. The effectiveness of the Prediction
algorithms used is demonstrated; making it clear how they prove to be a key component
in the efficient implementation of a Smart Home architecture.

2.3 Zong-Liang Wiu,Nobuo Saito,”The Smart Home”, Proceedings


IEEE,Vol.101,No.11,November 2013

This thesis report describes the development of a smart home environment based
on an accurate wireless sensors network using ZigBee communication protocol. In order
to recognize the states/state changes of everyday objects, we used 81 sensors to sense the
42 everyday objects we selected in a realistic home environment. Knowing the states of
the everyday objects is essential to perform further advanced computation for instance
activity recognition. The promising results we obtained consequently provide a good base
for such developments. The system has been evaluated in a realistic home environment
with background noise (ambient light variations, WI-FI network with same frequency,
etc). The sensing nodes have shown some interesting results with a precision value of
91.2% and a recall value of 98.8% concerning the recognition of the everyday objects’
state changes. The experimentation has been accomplished by four individual users
during one week. They were all wearing the same equipment for collecting data: a
wearable camera and digital video recorder in order to obtain the ground truth, and an
ultra-portable laptop (the personal server) connected to the receiving node. The ground
truth obtained from the video recording is compared with the state changes information
recorded in the personal server to evaluate the performance of the system. Many related
works can be found concerning the development of a smart environment or a wireless
sensor networking. A literature survey is presented to compare the different technologies
used, the components used, etc. , to understand the advantages and limitations of the
existing works and to see the improvements that are required for our current design.

2.4 Dae-Man Han,Jae-Hyun Lim,”Design and Implementation of Smart home


energy management system based on Zigbee”, IEEE Transaction on Consumer
Electronics,vol.56,No.3,August 2013

Today, organizations use IEEE802.15.4 and ZigBee to effectively deliver


solutions for a variety of areas including consumer electronic device control, energy
management and efficiency home and commercial building automation as well as
industrial plant management. The Smart home energy network has gained widespread
attentions due to its flexible integration into everyday life. This next generation green
home system transparently unifies various home appliances, smart sensors and wireless
communication technologies. The green home energy network gradually forms a
complex system to process various tasks. Developing this trend, we suggest a new Smart
Home Energy Management System (SHEMS) based on an IEEE802.15.4 and ZigBee
(we call it as a "ZigBee sensor network"). The proposed smart home energy management
system divides and assigns various home network tasks to appropriate components. It can
integrate diversified physical sensing information and control various consumer home
devices, with the support of active sensor networks having both sensor and actuator
components. We develop a new routing protocol DMPR (Disjoint Multi Path based
Routing) to improve the performance of our ZigBee sensor networks. This paper
introduces the proposed home energy control system's design that provides intelligent
services for users. We demonstrate its implementation using a real environment. Moving
towards the smart energy management will require changes not only in the way energy is
supplied, but in the way it is used, and reducing the amount of energy required to deliver
various goods or services is essential. The smart energy market requires two types of
ZigBee networks for device control and energy management. These include
neighborhood area networks for energy, using ZigBee for subenergy within a home or
apartment, and using ZigBee to communicate to devices within the home. To ensure that
we publish the highest quality articles, we seek to publish only original material that has
not been published elsewhere. In particular, we do not want to publish a paper if the
essential results have been published in an archival conference that can be accessed
electronically. We rarely publish an article without independent validation, with
experimental verification preferred. There is a very good reason for requiring
experimental validation of theoretical results. Experimental validation both provides
independent verification of theoretical results and is a demonstration that the system
being investigated can be built. It also limits the minimal publishable

2.5 Basma M.Mohammed Ei-Basioni, Sherine M. AbdEl-Kader2 and Mahmoud


Abdelmonium Fakhreldin 3 “Smart Home Design using Wireless Sensor Network
And Biometric Technologies” at Volume 2, Issue 3 March 2016Wearable Flexible
Lightweight Modular RFID Tag With Integrated Energy Harvester. (2016).

This paper proposes a new design for the smart home using the wireless sensor
network and the biometric technologies. The proposed system employs the biometric in
the authentication for home entrance which enhances home security as well as easiness of
home entering process. The proposed smart home Wireless Biometric Smart Home (WB-
SH) design is one of the few designs or it is the only design that addresses the integration
between the wireless sensor network and biometric in building smart homes. The
structure of the system is described and the incorporated communications are analyzed,
also an estimation for the whole system cost is given which is something lacking in a lot
of other smart home designs offers. The cost of the whole WB-SH system is determined
to be approximately $6000, which is a suitable cost with respect to the costs of existing
systems and with respect to its offered services. WB-SH is designed to be capable of
incorporating in a building automation system and it can be applied to offices, clinics,
and other places. The paper ends with an imagination for the future of the smart home
when employs the biometric technology in a larger and more comprehensive form. The
sensing board should resist certain hostile environmental conditions in order to be
efficient, robust and scalable. The prototype to be developed should be easy for future
developers to be able to modify the board and to extend it. The sensing modules should
allow for background noise, real environment constraints, etc, while providing state/state
changes information with reliable accuracy. Cost is an important factor to consider and
the sensors to be used should be cheap, durable and easy to use. Some sensors have to be
set up inside the fridge, inside the freezer, on a microwave oven, on a stove, on a dish
washer, etc. , which produce some perturbation.

2.6 IEEE Transactions on Microwave Theory and Techniques, Microwave Theory


and Techniques, IEEE Transactions on, IEEE Trans. Microwave Theory Techn, (7),
2304. doi:10.1109/TMTT.2016.2573274

The flagship publication of the MTT-S is IEEE Transactions on Microwave


Theory and Techniques. As the premier journal in the microwave field, it seek to capture
and disseminate knowledge of RF, microwave, guided-wave, and wireless technologies.
Provide a service to many of members who want to publish their contributions, and
provide a service to readers by presenting the best, rigorously reviewed papers in the
microwave field. Also provide essential fundamentals - continuing education - that enable
readers to develop core understanding from which new concepts and products can be
developed. The flagship publication of the MTT-S is IEEE Transactions on Microwave
Theory and Techniques. As the premier journal in the microwave field, we seek to
capture and disseminate knowledge of RF, microwave, guided-wave, and wireless
technologies. We provide a service to many of our members who want to publish their
contributions, and we provide a service to our readers by presenting the best, rigorously
reviewed papers in the microwave field. We also provide essential
fundamentals―continuing education―that enable readers to develop core understanding
from which new concepts and products can be developed. What is published in the
Transactions is governed by the following field of interest of the Society: The field of
interest of the Society shall be “Microwave Theory, Techniques and Applications” of RF,
microwave, guided wave, and wireless technologies, as they relate to components,
devices, circuits, transmission lines, and systems involving the generation, modulation,
demodulation, control, transmission, detection, and effects of electromagnetic signals. It
shall include scientific, technical, and industrial, activities, subject to timely
modifications approved by IEEE TAB. Microwave Theory and Techniques applies
physical and mathematical principles to analyze structures with dimensions representing
a significant fraction of a wavelength or when propagation effects need to be considered.
By all measures, we are performing our mission well and have become the second most
widely read journal in electrotechnology. This is measured by electronic downloads with
our measure being downloads through the IEEE Xplore. Even five years ago, there was
little indication of the readership of technical papers. However, with IEEE Xplore, we
have some statistics. There are over 1 million downloads of transactions articles each
year. Most of the downloaded papers are published within a year of the download, but
articles going back to the inaugural publication of the transactions in 1953 are still read.
We can expect that each copy of an article that is downloaded is at least scanned quickly,
and many are read in depth. So, roughly on average, a paper is downloaded and read 200
times and perhaps read many more times. Over 5,000 copies of the transactions are
mailed to members each month, and the Society distributes an annual CD-ROM-based
digital archive that captures the Society's publications on CD-ROM. Presumably, many
articles are read this way. So the old wisecrack that a paper was read by the authors and
the reviewers alone is certainly not true. A large spike in downloads occurs within days
of an issue being released, so there are many people who use electronic access as the
primary means for reading the transactions.
2.7 Lee, J. S., Su, Y. W., & Shen, C. C. (2007). A Comparative Study of Wireless
Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi. In IECON 2007 - 33rd Annual
Conference of the IEEE Industrial Electronics Society (pp. 46–51).
https://doi.org/10.1109/IECON.2007.4460126

Bluetooth (over IEEE 802.15.1), ultra-wideband (UWB, over IEEE 802.15.3),


ZigBee (over IEEE 802.15.4), and Wi-Fi (over IEEE 802.11) are four protocol standards
for shortrange wireless communications with low power consumption. From an
application point of view, Bluetooth is intended for a cordless mouse, keyboard, and
hands-free headset, UWB is oriented to high-bandwidth multimedia links, ZigBee is
designed for reliable wirelessly networked monitoring and control networks, while Wi-Fi
is directed at computer-to-computer connections as an extension or substitution of cabled
networks. In this paper, we provide a study of these popular wireless communication
standards, evaluating their main features and behaviors in terms of various metrics,
including the transmission time, data coding efficiency, complexity, and power
consumption. It is believed that the comparison presented in this paper would benefit
application engineers in selecting an appropriate protocol. In the past decades, factory
automation has been developed worldwide into a very attractive research area. It
incorporates different modern disciplines including communication, information,
computer, control, sensor, and actuator engineering in an integrated way, leading to new
solutions, better performance and complete systems. One of the increasingly important
components in factory automation is the industrial communication. For interconnection
purposes, a factory automation system can be combined with various sensors, controllers,
and heterogeneous machines using a common message specification. Many different
network types have been promoted for use on a shop floor, including control area
network (CAN), Process fieldbus (Profibus), Modbus, and so on.

2.8 Yuan Zhuang; Jun Yang; You Li; Longning Qi; Naser El-Sheimy (May 2016).
"Smartphone-based indoor localization with Bluetooth low energy beacons."
Sensors (14248220), 16 (5), 1-20.
Indoor wireless localization using Bluetooth Low Energy (BLE) beacons has attracted
considerable attention after the release of the BLE protocol. In this paper, we propose an
algorithm that uses the combination of channel-separate polynomial regression model
(PRM), channel-separate fingerprinting (FP), outlier detection and extended Kalman
filtering (EKF) for smartphone-based indoor localization with BLE beacons. The
proposed algorithm uses FP and PRM to estimate the target's location and the distances
between the target and BLE beacons respectively. We compare the performance of
distance estimation that uses separate PRM for three advertisement channels (i.e., the
separate strategy) with that use an aggregate PRM generated through the combination of
information from all channels (i.e., the aggregate strategy). The performance of FP-based
location estimation results of the separate strategy and the aggregate strategy are also
compared. It was found that the separate strategy can provide higher accuracy; thus, it is
preferred to adopt PRM and FP for each BLE advertisement channel separately.
Furthermore, to enhance the robustness of the algorithm, a two-level outlier detection
mechanism is designed. Distance and location estimates obtained from PRM and FP are
passed to the first outlier detection to generate improved distance estimates for the EKF.
After the EKF process, the second outlier detection algorithm based on statistical testing
is further performed to remove the outliers. The proposed algorithm was evaluated by
various field experiments. Results show that the proposed algorithm achieved the
accuracy of <2.56 m at 90% of the time with dense deployment of BLE beacons (1
beacon per 9 m), which performs 35.82% better than <3.99 m from the Propagation
Model (PM) + EKF algorithm and 15.77% more accurate than <3.04 m from the FP +
EKF algorithm. With sparse deployment (1 beacon per 18 m), the proposed algorithm
achieves the accuracies of <3.88 m at 90% of the time, which performs 49.58% more
accurate than <8.00 m from the PM + EKF algorithm and 21.41% better than <4.94 m
from the FP + EKF algorithm. Therefore, the proposed algorithm is especially useful to
improve the localization accuracy in environments with sparse beacon deployment.
2.9 Kelly, Sean Dieter Tebje, Nagender Kumar Suryadevara, and Subhas Chandra
Mukhopadhyay. "Towards the execution of IoT for natural condition checking in
homes." Sensors Journal, IEEE 13.10 (2013): 3846-3853.

In 21st century the people wants the world on their hands. It outlets the revolutions
of computing and smart environment. Some technologies like Ubiquitous/pervasive and
ambient intelligence satisfy the maximum need of smart world but these technologies are
not tightly coupled with internet, so the people needs another technology extension.
Internet of Things (IoT) is an ideal emerging technology to influence the internet and
communication technologies. Simply “Internet of Things” connects „living and non
living things‟ through „internet‟. Traditionally in the object oriented paradigm
everything in the world is considered as an object, but in the IoT paradigm everything in
the world is considered as a smart object, and allows them to communicate each other
through the internet technologies by physically or virtually. IoT allows people and things
to be connected Anytime, Anyplace, with Anything and Anyone, by using ideally in Any
path/network and Any service. This paper proposes architecture to enable the users to
control and monitor smart devices through internet. It creates an interface between users
and smart home by using GSM and internet technologies, or it simply creates GSM based
wireless communication from the web server into the smart home. In this architecture the
users give commands through web then the users inputs are converted into GSM-SMS
commands. These commands are sent to embedded system module (embedded system
directly connect with devices) through GSM network, and finally the user commands are
parsed and executed by microcontroller to control any electronic objects like home
appliances, lights, etc and it sends the acknowledgement. The embedded system module
can place anywhere in the world and it will controlled by IoT Agent through GSM
network. The architecture designs are imposed on these three functionalities. The user
can control or check the status of any resources or enable/disable security options of the
smart home. This paper introduces a IoT agent which is brain of this architecture and it
controls web server and remote embedded system module. At very short period of time
the IoT agent reads the user data from the webserver, createa a SMS command and it will
be sent to remote embedded system module through GSM-SMS. This command will be
received by GSM receiving module which is connected with embedded system placed in
a remote home. The home appliances and other devices are directly connected and
controlled by this embedded system module. The GSM module is inbuilt with IoT agent
and embedded system module. After executing the commands the acknowledgement will
be sent to user.

2.10 Jain, Sarthak, Anant Vaibhav, and Lovely Goyal. "Raspberry Pi based
intelligent home computerization framework through E-mail. Optimization,
Reliabilty, and Information Technology (ICROIT), 2014 International Meeting on.
IEEE, 2014.

This paper deals with the design and implementation of Raspberry pi based IOT
concept it means internet of things. In this present generation everything is going on
internet itself. So in this project we concentrate totally on the present generation life how
they can get security to their home or office and control the devices by using android app
just by using internet in there smart phones. The main security is provided by camera
module which captures the images and uploads into the internet and also stores the same
images in Raspberry pi module SD card. Raspberry pi acts like a small minicomputer it is
totally a Linux platform. By just connecting mouse and keyboard we can operate it as
minicomputer where we can play games, play videos etc just like our personal laptop
work. And also the WI-FI module is used in this project to control the devices from
remote location also by getting the status of the devices into smart phone android app
everything is going on internet itself our day to day life. Future generation will work on
internet itself by sitting in one place we can do anything on internet. An embedded
system is a special-purpose system in which the computer is completely encapsulated by
or dedicated to the device or system it controls. Unlike a general purpose computer, such
as a personal computer, an embedded system performs one or a few predefined tasks,
usually with very specific requirements. Since the system is dedicated to specific tasks,
design engineers can optimize it, reducing the size and cost of the product. Embedded
systems are often mass-produced, benefiting from economies of scale. Personal digital
assistants (PDAs) or handheld computers are generally considered embedded devices
because of the nature of their hardware design, even though they are more expandable in
software terms. This line of definition continues to blur as devices expand. With the
introduction of the OQO Model 2 with the Windows XP operating system and ports such
as a USB port — both features usually belong to "general purpose computers", — the line
of nomenclature blurs even more. Physically, embedded systems ranges from portable
devices such as digital watches and MP3 players, to large stationary installations like
traffic lights, factory controllers, or the systems controlling nuclear power plants.
CHAPTER 3

EXISTING SYSTEM

The Internet of Things (IoT) is a rapidly expanding industry that is continuing to


grow. In fact, “every day 5.5 million new things get connected to the Internet of Things”
and it is projected that by 2020 there will be 30 billion connected devices, a huge increase
from the current 6.4 billion devices. Smart home technology falls within this field. While
the idea of a smart home is not a new one, the growing IoT space and emerging
technologies are making new applications possible. To meet the criteria for an accurate,
passive, non-intrusive system with a long battery life, multiple options were considered.
The main options for location devices were RFID, facial recognition, and smartphones.
Both RFID and facial recognition software were ruled out because they do not meet the
non-intrusive objective. RFID requires the user to wear an additional piece of technology
and facial recognition software is invasive to the user’s privacy. There are currently
projected 4.77 billion smartphones in use today. The use of smartphones is so widespread
now that seventy-nine percent of people ages 18-44 have their smartphones with them 22
hours a day. This supports the viability of using the smartphone as a non-intrusive
method to locate a person within their home. In addition to a location device, a wireless
personal area network (WPAN) is a central part of an indoor location system. There are
many choices available when trying to select the best WPAN such as ZigBee, traditional
Bluetooth, and Wi-Fi. Bluetooth Low Energy stands out for a variety of reasons. ZigBee
is not found in iPhones and therefore is not conducive to smartphone localization. Wi-Fi
is designed for computer-to-computer, communication and consumes a large amount of
power; so while Wi-Fi is compatible with mobile devices, it is not the best solution [6].
While traditional Bluetooth has all of the functionality to successfully implement this
project the standard was designed to transmit large quantities of data, resulting in an
excessive power draw unnecessary for this application.

CHAPTER 4

PROPOSED SYSTEM

4.1 PROPOSED IOT ARCHITECTURE

The physical layer comprises of the gadgets which are to be controlled. The
information interface layer comprises of IoT passage switch, gadget supervisor and
different correspondence conventions. The gadget director will be the piece of raspberry
pi. The Arduino is utilized as the IoT entryway which conveys to PC or advanced cell by
implies web in the system and transport layer. The application and introduction layer
comprise of online interface which is only outlining a site page by which we can control
the different machines. The apparatuses can likewise be controlled by making an
application in cell phone which is like online interface. Advanced mobile phones can be
utilized to make the quick move if there is a crisis and it will naturally interface with
close-by flame station if there should arise an occurrence of any fire mischances.

4.2 WEB SERVER

Different applications situated at home can be remotely controlled or checked by


embedding the gadgets with the web server. The static and dynamic data are put away in
inserted framework and it satisfies the requests on web programs. Such kind of web
servers are called implanted web server. It's not exclusively that we will utilize the
Arduino to instigate the data from servers by means of the web; in any case it likewise
can go about as a server itself. There are numerous option web servers that might be
introducing on the Arduino. Antiquated web servers, similar to Apache, serve the records
from Arduino board to buyers. Arduino additionally can serve sound, video, workable
projects, and far a considerable measure. Notwithstanding, there's another type of
instruments that achieve programming dialects like Python, Ruby, and JavaScript to
make net servers that progressively produce the hypertext increase dialect once they get
interchanges convention demands from an online program.

4.3 METHODOLOGY

The venture proposes a productive usage for IoT (Internet of Things) utilized for
checking and controlling the home machines through World Wide Web. Home
robotization framework utilizes the convenient gadgets as a UI. They can speak with
home computerization arrange through an Internet entryway, by methods for low power
correspondence conventions like Wi-Fi and so on. This venture goes for controlling home
machines through Smartphone utilizing Wi-Fi as correspondence convention and
Arduino as server framework. The client here will move specifically with the framework
through an online interface over the web, while home apparatuses like lights, fan and
entryway bolt are remotely controlled through simple site. Expectation calculations to
realize next occasion acknowledgment. Further, an Episode Discovery helps in finding
the recurrence of event of these occasions and focusing on the specific occasions for
mechanization. The adequacy of the Prediction calculations utilized is illustrated; making
it clear how they end up being a key part in the productive usage of a Smart Home
design. An additional element that improves the feature of assurance from chimney
mishaps is its ability of sleuthing the smoke all together that inside the occasion of any
chimney, relates an alarming message and a picture is sent to Smartphone. The server
will be interfaced with transfer equipment circuits that control the machines running at
home. The correspondence with server enables the client to choose the suitable gadget.
The correspondence with server allows the client to choose the adequate gadget. The
server speaks with the comparing transfers. In the event that the web association is down
or the server isn't up, the inserted framework board still will oversee and work the
apparatuses locally. By this we give a climbable and cost viable Home Automation
framework. Consider that, at 7:00 am, the caution goes off, which flags the room night
light to turn off and all the while the espresso producer in the kitchen to switch on. Ann
heads to the restroom, the news and climate figure is shown on the washroom reflect. At
the point when Ann gets done with prepping and heads towards the kitchen to make them
morning espresso, the lavatory light goes off, the news. Program moves to the kitchen
divider. At the point when Ann leaves for work, the Smart Home secures the home and
later that it puts in a basic supply request for drain and bread. At the point when Ann
lands from work, the basic supply arrange has arrived. The Smart Home is speedy in
recording minute subtle elements of connection of Ann with her home each and every
moment.

Today, innovation has turned into a coordinated piece of individuals' lives. It has,
and keeps on impacting numerous parts of everyday life and has permitted better social
collaboration, simplicity of transportation, the capacity to enjoy diversion and media and
has helped in the advancement in medication. The formation of numerous gadgets, for
example, cell phones and PCs have made many individuals depend on innovation to
speak with their companions, store data, for example, pictures, films, reports, and music.
The web has turned into a typical interface that numerous gadgets use keeping in mind
the end goal to disentangle the day by day life of many individuals. Web causes us to get
with prompt answer for some issues and furthermore ready to interface from any of the
remote spots which adds to general cost lessening and vitality utilization.

Home computerization or sensible home might be outlined as presentation of


innovation inside the home climate to give straightforwardness and assurance to its
tenants. By utilizing the innovation of the Internet of Things, the examination and
execution of home robotization have extra normal. Different remote advancements which
can bolster some kind of remote learning exchange, detecting and administration like
Bluetooth, Wi-Fi and cell systems are utilized to enter bounteous levels of sharpness
inside the home. Home mechanization for the more seasoned and incapacitated will offer
raised personal satisfaction for people. It might give an interface to home apparatuses or
the robotization framework itself, by means of phone line or the web, to supply
administration and recognition through an advanced cell or PC. Utilizing these forecasts,
the home can precisely course messages and sight and sound data, and can mechanize
exercises that would some way or another be physically performed by the occupants. The
Smart Home carries on as a sound operator, seeing the condition of the home through
sensors and following up on the earth through effectors. The objective of the Smart
Homes is to boost solace and wellbeing, upgrade vitality utilization and take out
strenuous redundant exercises. Forecast Algorithm helps in expectation of next likely
condition of the tenant and is a key segment in building up a dynamic Smart Home.

4.4 BLOCK DIAGRAM

Fig 4.1 Block Diagram


4.5 CIRCUIT DIAGRAM

Fig 4.1 Circuit Diagram

First we can connect ESP8266 with the Arduino Uno. The ESP8266 runs on 3.3V,
it may damage if you connect it directly to 5V from Arduino. Connect the VCC and
CH_PD of the ESP8266 to the 3.3V output pin of Arduino. CH_PD is Chip Power Down
pin, which is active low. So we will give 3.3V to it, which will enable the chip. Then
connect the TXD pin of the ESP8266 with the digital pin 2 of the Arduino. Then make a
voltage divider to make 3.3V for the RXD of the ESP8266 which is connected to the pin
3 of Arduino. Here we are using software UART through digital pins 2 & 3 of Arduino.
Lastly, connect the ground of the ESP8266 with the ground of the Arduino. Now we can
connect relays to Arduino. Connect three relays to pins 11, 12 and 13 of the Arduino.
Also connect 5V and ground from the Arduino to power the relay. Note that here I am
using relay modules which having built in transistor driver. So don’t forget to add driver
when you are using bare relays. We can connect AC devices to the output terminals of
those relays. First connect one wire (Phase) of the AC source with the common terminal
(COM) of all relays and the second wire (Neutral) of AC source to one terminal of AC
devices. Then connect the other terminal of AC devices to the NO (Normally Open)
terminal of relays.
CHAPTER 5

HARDWARE USED

5.1 ARDUINO UNO

The Arduino Uno is a microcontroller board based on the ATmega328 (datasheet).


It has 14 digital input/output pins (of which 6 can be used as PWM outputs), 6 analog
inputs, a 16 MHz ceramic resonator, a USB connection, a power jack, an ICSP header,
and a reset button. It contains everything needed to support the microcontroller; simply
connect it to a computer with a USB cable or power it with a AC-to-DC adapter or battery
to get started.

Fig 6.1 Arduino Uno


5.1.1 PIN DESCRIPTION

Each of the 14 digital pins on the Uno can be used as an input or output, using
pinMode(), digitalWrite(), and digitalRead() functions. They operate at 5 volts. Each pin
can provide or receive a maximum of 40 mA and has an internal pull-up resistor
(disconnected by default) of 20-50 kOhms. In addition, some pins have specialized
functions:

Input and Output

Each of the 14 digital pins on the Arduino Uno can be used as an input or output, using
pinMode(), digitalWrite(), and digitalRead() functions. They operate at 5 volts. Each pin
can provide or receive a maximum of 40 mA and has an internal pull-up resistor
(disconnected by default) of 20-50 kOhms.

In addition, some pins have specialized functions:

Serial: pins 0 (RX) and 1 (TX). Used to receive (RX) and transmit (TX) TTL serial data.
These pins are connected to the corresponding pins of the ATmega8U2 USB-to-TTL
Serial chip.

External interrupt: pins 2 and 3. These pins can be configured to trigger an interrupt on
a low value, a rising or falling edge, or a change in value. See the attach Interrupt()
function for details.

PWM: 3 , 5, 6, 9, 10, and 11. Provide 8-bit PWM output with the analogWrite()
function.

SPI: 10 (SS), 11 (MOSI), 12 (MISO), 13 (SCK). These pins support SPI communication
using the SPI library.

LED: 13. There is a built-in LED connected to digital pin 13. When the pin is HIGH
value, the LED is on, when the pin is LOW, it’s off.
The Uno has 6 analog inputs, labelled A0 through A5, each of which provide 10 bits of
resolutio n (i.e. 1024 different values). By default they measure from ground to 5 volts,
though is it possible to change the upper end of their range using the AREF pin and the
analogReference() functio n.

Additionally, some pins have specialized functionality:

TWI: A4 or SDA pin and A5 or SCL pin. Support TWI communication using the Wire
library.

There are a couple of other pins on the board:

AREF. Reference voltage for the analog inputs. Used with analogReference().

Reset. Bring this line LOW to reset the microcontroller. Typically used to add a reset
button to shields which block the one on the board.

5.2 ETHERNET SHIELD

Fig 6.2 Arduino Ethernet Shield

Fig 5.2 Ethernet

The Arduino Ethernet Shield connects your Arduino to the internet in mere minutes. Just
plug this module onto your Arduino Board, connect it to your network with an RJ45
cable (not included) and follow a few simple steps to start controlling your world through
the internet. As always with Arduino, every element of the platform – hardware, software
and documentation – is freely available and open-source. This means you can learn
exactly how it's made and use its design as the starting point for your own circuits.
Hundreds of thousands of Arduino Boards are already fueling people’s creativity all over
the world, everyday .The transistor is the fundamental building block of modern
electronic devices, and its presence is ubiquitous in modern electronic systems.

Working

The shield must be assigned a MAC address and a fixed IP address using the
Ethernet.begin() function. A MAC address is a globally unique identifier for a particular
device. Current Ethernet shields come with a sticker indicating the MAC address you
should use with them. For older shields without a dedicated MAC address, inventing a
random one should work, but don't use the same one for multiple boards. Valid IP
addresses depend on the configuration of your network. It is possible to use DHCP to
dynamically assign an IP to the shield. Optionally, you can also specify a network
gateway and subnet modern clocked analog circuits, voltage regulators, amplifiers, power
transmitters, motor drivers, etc.

In order for any device to connect to the Internet, the device must acquire a unique
identity on the network: the IP address. The IP address (IP stands for Internet Protocol) of
a device is a unique identifier composed, in the IPv4 version of the standard, the most
commonly used, of four bytes, each of which can have a value between 0 and 255. Few
of them are reserved internationally and, in particular, subnetworks whose first two bytes
are 192 and 168 are non-routable, i.e. packets sent over such a network cannot go beyond
an Internet switch. In other words they can only reach those devices on the same physical
network. That’s why devices in a home network usually have IP addresses like
192.168.x.y. The IP address of a device can be statically or dynamically assigned to it. In
the first case, the device administrator tells the device its IP address: in this case the
address is going to remains the same with time forever. A device not having a static IP
address can ask for an IP address to any computer on the same network running as a
DHCP server (Dynamic Host Configuration Protocol). Depending on the configuration of
the server, available IP addresses can be assigned to the device randomly or based on the
device identity.
When Arduino Uno and Ethernet shield is combined it is used to find ip address
and connect to the internet by using the following excerpt of Arduino sketch:

#include <Ethernet.h>

#include <SPI.h>

void setup() {

Ethernet.begin(mac, arduinoIP, dnsIP, gatewayIP, subnetIP);

Including Ethernet.h and SPI.h is mandatory: the files contain the definition of the
classes used in the sketch. The MAC address is defined as an array of bytes, each of
which is represented as a pair of hexadecimal digits (thanks to the 0x preceding each
number). The IP addresses of the shield , the DNS and the gateway is given as an object
of class IPAddress, as well as the subnet mask. The object constructor takes four
arguments that represent the four bytes of the address. Our Arduino will acquire the IP
address 192.168.1.67, in a network whose gateway’s address is 192.168.1.254; the
gateway works also as the DNS in this case, while the subnetwork is restricted to those
devices having an IP address like 192.168.1.x.

The Ethernet.begin(mac, arduinoIP, dnsIP, gatewayIP, subnetIP) call does the job: it
configures the Ethernet shield as above (and, of course, it does that in the setup() method.

5.3 RELAY

A relay is defined as an electrically controlled device that opens and closes


electrical contacts, or activates and deactivates operation of other devices in the same or
another electrical circuit. Two types of relay technology are available, mechanical and
solid state. A mechanical relay is essentially a combination of an inductor and a switch,
where the electromagnetic force of the inductor causes a switch to change position. A
solid state relay accomplishes the same function with semiconductor devices changing
impedance to effectively activate or deactivate a circuit open or closed. This document is
intended to be a general guide to aid the designer in the appropriate selection of a relay
for the intended application. Detailed information on the selection and use of relays can
be found in MIL-STD-1346.

5.3.1 Packaging:

Relays are available in a variety of unique package styles. The size and mass of
the package are dependent on the electrical characteristics, power dissipation and
environmental requirements. Relays are generally the larger size components of a system,
where increased attention must be paid to clearances and mounting, especially in high
vibration level environments. Many package styles initially developed for unique
applications have since gained wide acceptance.

5.3.2 Design and Material:

The construction methods and materials of each type of relay differ. Considerable
differences exist between the materials and processes The construction methods and
materials of each type of relay differ. Considerable differences exist between the
materials and processes used to manufacture relays. A relay, in its most basic form, is a
combination of a switch and an inductive element. In solid state relays, the inductor is
replaced by a semiconductor element. The military specifications and standards are listed
in Table 1, and other information can be found in MIL-STD-1346. The following lists the
major categories available:

a. A reed relay is operated by an electromagnetic coil or solenoid which, when


energized, causes two flat magnetic strips to move laterally to each other. The magnetic
reeds serve both as magnetic circuit paths and as contacts. Because of the critical spacing
and the frailty of the arrangement, the reeds are usually sealed in a glass tube.

b. A solid state relay incorporates semiconductor or passive circuit devices. As the


name implies, it contains no moving parts, and therefore has low switching noise and
essentially no bounce or chatter. Solid state relays also have long life and fast response
times. Their main disadvantage is a limited number of applications for which they can be
used.

c. A latching or magnetic latching relay is a bi-stable polarized relay having


contacts that latch in either position. A signal of the correct polarity and magnitude will
reset or transfer the contacts from one position to the other.

Figure 5.3 Relay

A relay is an electrically operated device. It has a control system and (also called
input circuit or input contactor) and controlled system (also called output circuit or output
cont. actor). It is frequently used in automatic control circuit. To put it simply, it is an
automatic switch to controlling a high-current circuit with a low-current signal.

The advantages of a relay lie in its lower inertia of the moving, stability, long-term
reliability and small volume. It is widely adopted in devices of power protection,
automation technology, sport, remote control, reconnaissance and communication, as
well as in devices of electro mechanics and power electronics. Generally speaking, a
relay contains an induction part which can reflect input variable like current, voltage,
power, resistance, frequency, temperature, pressure, speed and light etc. It also contains
an actuator module (output) which can energize or de-energize the connection of
controlled circuit. There is an intermediary part between input part and output part that is
used to coupling and isolate input current, as well as actuate the output. When the rated
value of input (voltage, current and temperature etc.) is above the critical value, the
controlled output circuit of relay will be energized or de-energized.

Special Feature

 Good in safety. In power system and high voltage system, the lower current can
control the higher one.
 1-channel high voltage system output, meeting the needs of single channel control
 Wide range of controllable voltage.
 Being able to control high load current, which can reach 240V, 10A
 With a normally-open (NO) contact and a normally-closed (NC) contacts

Interface Specification

The output contacts of a relay (including NO, NC, and the common port) works as a
SPDT– Single Pole Double Throw switch.

Its operating principle is as follow:

 VC-5V
 GND-FOR GROUND
 IN 1 – Connect to the control valve with output 3-5V
 OUTPUT CONTACTS-Connect to application

5.4 ESP8266 MODULE

ESP-01 is the one of the most popular ESP8266 module available in the market.
ESP8266 is a self-contained SoC with integrated TCP/IP stack which helps any
microcontroller having UART to access a Wi-Fi network. It can act as both WiFi access
point as well as a WiFi client. It is pre-programmed with AT commands, so we can easily
access and configure it using a microcontroller. ESP8266 runs on 3.3V and its input pins
are not 5V tolerant. So we need to reduce the 5V output of the Arduino Tx pin to 3.3V by
using voltage dividing resistors to connect to Rx pin of ESP8266 module. Arduino TTL
input pins will detect 3.3V as logic high, so we can directly connect 3.3V output of
ESP8266 Tx to Arduino Rx pin.

Fig 54 ESP 8266

5.5. LIQUID CRYSTAL DISPLAY (LCD)

LCD Modules can present textual information to user. It’s like a cheap “monitor”
that you can hook in all of your gadgets. They come in various types. The most popular
one is 16x2 LCD Module. It has 2 rows and 16 columns.

Fig 5.5: A 16X2 LCD MODULE

In order to connect LCD to the MCU, you have to first make physical connections
between the pins of LCD and MCU. In order to connect the LCD, you have to use one
PORT of the MCU completely for this purpose. Suppose you chose a particular PORT.

Select your chip and clock frequency. Then click on LCD tab. Select the PORT at
which you want to make LCD connections.
Set chars/line text box to 16, because you will be using 16*2 LCD. All the
connections of the LCD other than power connections will be displayed in the wizard.
Make other settings and then select generate save, save and exit from file menu. To save
the file, give the file name.

Once this is done, you are ready to use LCD display form your program. You can
now use inbuilt functions to write to the LCD screen.
CHAPTER 6

SOFTWARE USED

In this system, following software’s are used,

1.ARDUINO IDE

2.LIBRARIES

3.EMBEDDED C

4.HOSTING WEBSITE –Ubidot.com

6.1 ARDUINO IDE

Arduino is a prototype platform (open-source) based on an easy-to-use hardware


and software. It consists of a circuit board, which can be programed (referred to as a
microcontroller) and a ready-made software called Arduino IDE (Integrated Development
Environment), which is used to write and upload the computer code to the physical board.
Arduino provides a standard form factor that breaks the functions of the micro-controller
into a more accessible package.

Arduino is a prototype platform (open-source) based on an easy-to-use hardware


and software. It consists of a circuit board, which can be programed (referred to as a
microcontroller) and a ready-made software called Arduino IDE (Integrated Development
Environment), which is used to write and upload the computer code to the physical board.
The key features are:
 Arduino boards are able to read analog or digital input signals from different
sensors and turn it into an output such as activating a motor, turning LED on/off, connect
to the cloud and many other actions.

 You can control your board functions by sending a set of instructions to the
microcontroller on the board via Arduino IDE (referred to as uploading software).

 Unlike most previous programmable circuit boards, Arduino does not need an
extra piece of hardware (called a programmer) in order to load a new code onto the board.
You can simply use a USB cable.

 Additionally, the Arduino IDE uses a simplified version of C++, making it easier
to learn to program.

 Finally, Arduino provides a standard form factor that breaks the functions of the
micro-controller into a more accessible package.

Various kinds of Arduino boards are available depending on different


microcontrollers used. However, all Arduino boards have one thing in common: they are
programed through the Arduino IDE. The differences are based on the number of inputs
and outputs (the number of sensors, LEDs, and buttons you can use on a single board),
speed, operating voltage, form factor etc. Some boards are designed to be embedded and
have no programming interface (hardware), which you would need to buy separately.
Some can run directly from a 3.7V battery, others need at least 5V.
Arduino consists of both a physical programmable circuit board (often referred to as a
microcontroller) and a piece of software, or IDE (Integrated Development Environment)
that runs on your computer, used to write and upload computer code to the physical
board. Arduino is an open source computer hardware and software company, project, and
user community that designs and manufactures single-board microcontrollers and
microcontroller kits for building digital devices and interactive objects that can sense and
control objects in the physical world. The project's products are distributed as open-
source hardware and software, which are licensed under the GNU Lesser General Public
License (LGPL) or the GNU General Public License (GPL) permitting the manufacture
of Arduino boards and software distribution by anyone. Arduino boards are available
commercially in preassembled form, or as do-it-yourself (DIY) kits. Arduino board
designs use a variety of microprocessors and controllers. The boards are equipped with
sets of digital and analog input/output (I/O) pins that may be interfaced to various
expansion boards (shields) and other circuits. The boards feature serial communications
interfaces, includ ing Universal Serial Bus (USB) on some models, which are also used
for loading programs from personal computers. The microcontrollers are typically
programmed using a dialect of features from the programming languages C and C++. In
addition to using traditional compiler toolcha ins, the Arduino project provides an
integrated development environment (IDE) based on the Processing language project.

6.2 LIBRARIES

The Arduino environment can be extended through the use of libraries, just like most
programming platforms. Libraries provide extra functionality for use in sketches, e.g.
working with hardware or manipulating data. To use a library in a sketch, select it from
Sketch > Import Library. A number of libraries come installed with the IDE, but you can
also download or create your own. See these instructions for details on installing
libraries.

Standard Libraries Used


 Ethernet-for connecting to the internet using the Arduino Ethernet Shield,
Arduino Ethernet Shield 2 and Arduino Leonardo ETH.
 PCD8544 - for controlling or to communicate with Nokia 5110 lcd.
 Wi-Fi - for connecting to the internet using the Arduino Wi-Fi shield.
 Ubidot Library- to connect with ubidot.com.

6.3 EMBEDDED C

Embedded C is a set of language extensions for the C programming language by


the C Standards Committee to address commonality issues that exist between C
extensions for different embedded systems. Historically, embedded C programming
requires nonstandard extensions to the C language in order to support exotic features
such as fixed-point arithmetic, multiple distinct memory banks, and basic I/O operations.

Embedded Programming

Embedded refers to the combination of hardware and software. Embedded systems


programming is the programming of an embedded system in some device using the
permitted programming interfaces provided by that system. EmbeddedJava is an example
of a development environme nt for programming embedded systems that will execute
Java programs. Arduino is a very minute part of embedded systems, in fact we can call it
as an application product of embedded system. Arduino is just any other microcontroller
board, with a specifically designed API and software which makes programming it very
easy. Arduino is just a drop of water in Embedded System Ocean.

6.4 UBIDOTS.COM (HOSTING WEBSITE)

Ubidots was first born as an engineering services firm, specializing in hardware


and software development for IoT projects in Latin America. Between 2012 and 2014,
we accomplished hundreds of Internet of Things projects across industries like
Healthcare, Oil & Gas, Energy, Manufacturing, Transportation and Retail, learning the
nuts and bolts of IOT. After going through the Boston Mass Challenge Accelerator -with
a purpose of turning ourselves into a global product-based startup- the idea of an IOT
cloud was born; specially one that understood the real needs of hardware engineer. Since
its launch in 2014, the ubidots Cloud has grown into one of the top IoT Platforms in the
market, supporting thousands of IOT initiatives in more than 40 countries.

CHAPTER 7

RESULTS AND DISSCUSION

The total system is based on Arduino UNO. Wi-Fi module connecting the
system with the internet server. The data from the server is received after
successful connection. Then the data is processed into Arduino for the future
operation. The simulation model of the system architecture. The full simulation is
done by using Fritzing simulation software.
For monitoring the room temperature and humidity the system is connected
with the temperature and humidity sensor. By using I2C data protocol the sensor
data is decoded into Arduino and future process is being done. Also, for safety
purpose of the house a gas sensor relates to the system. If a predefined threshold
level of gas sensor value is crossed than the Arduino will provide an emergency
massage into the web server
And for testing purpose the prototype is being developed with only two light
loads. Both the loads have been connected with two relay modules with the system.
This prototype system can control up to 10 loads and user can connect any load
with this system which can be controlled by the relay module. The system is
running on 5V and 2A current.
CHAPTER 8

CONCLUSION

In this paper, we have presented the occasion of a home administration and


security framework misuse utilizing Arduino and Internet of Things innovation. The
framework is reasonable for ongoing home security checking and for remotely
controlling the home machines and assurance from flame mishaps with quick
arrangements. The framework might be utilized in many spots like banks, healing
facilities, labs and so forth that significantly reduced the danger of unapproved section.
Verification might be given to the security office if any burglary issue happens. the idea
of a Smart Home and important ventures in actualizing its rationale is examined. Also,
the utilization of a Prediction Algorithm to anticipate the in all probability next state or
occupant activity. This progression encourages basic leadership for mechanization of
essential activities; is the most pivotal stride and spine of the whole Smart Home system.
The scene disclosure finds huge examples in occasion history and decide the recurrence
of its event. It distinguishes which examples can be computerized effortlessly with
slightest blame event. In conclusion, we comprehend the parameters that impact the
choice of a Prediction Algorithm.

CHAPTER 8

REFERENCES

[1]. Luo Ke.The Design of Home Control System Based on Embedded System and
GSM[D].Southwest Jiatong University 2009

[2] Pavithra.D.Ranjith Balakrishnan “IoT based monitoring and control system for home
automation”, Proceedings of 2015 Global Conference on Communication Technologies
2015

[3] Zong-Liang Wiu,Nobuo Saito,”The Smart Home”, Proceedings


IEEE,Vol.101,No.11,November 2013
[4] Dae-Man Han,Jae-Hyun Lim,”Design and Implementation of Smart home energy
management system based on Zigbee”, IEEE Transaction on Consumer
Electronics,vol.56,No.3,August 2013

[5] Basma M.Mohammed Ei-Basioni, Sherine M. AbdEl-Kader2 and Mahmoud


Abdelmonium Fakhreldin 3 “Smart Home Design using Wireless Sensor Network And
Biometric Technologies” at Volume 2, Issue 3 March 2016Wearable Flexible
Lightweight Modular RFID Tag With Integrated Energy Harvester. (2016).

[6] IEEE Transactions on Microwave Theory and Techniques, Microwave Theory and
Techniques, IEEE Transactions on, IEEE Trans. Microwave Theory Techn, (7), 2304.
doi:10.1109/TMTT.2016.2573274

[7] Lee, J. S., Su, Y. W., & Shen, C. C. (2007). A Comparative Study of Wireless
Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi. In IECON 2007 - 33rd Annual
Conference of the IEEE Industrial Electronics Society (pp. 46–51).
https://doi.org/10.1109/IECON.2007.4460126

[8] Yuan Zhuang; Jun Yang; You Li; Longning Qi; Naser El-Sheimy (May 2016).
"Smartphone-based indoor localization with Bluetooth low energy beacons." Sensors
(14248220), 16 (5), 1-20.

[9] Kelly, Sean Dieter Tebje, Nagender Kumar Suryadevara, and Subhas Chandra
Mukhopadhyay. "Towards the execution of IoT for natural condition checking in homes."
Sensors Journal, IEEE 13.10 (2013): 3846-3853.

[10] Jain, Sarthak, Anant Vaibhav, and Lovely Goyal. "Raspberry Pi based intelligent
home computerization framework through E-mail. Optimization, Reliabilty, and
Information Technology (ICROIT), 2014 International Meeting on. IEEE, 2014.

You might also like