Solar Based Perimeter Intrusion Detection System with Integration of SMS and Alarm System

Authors

  • Odirichukwu J.C. Department of Computer Science, School of Information and Communication Technology, Federal University of Technology, Owerri, Imo State, Nigeria
  • Awurigwe A. J. Department of Computer Science, School of Information and Communication Technology, Federal University of Technology, Owerri, Imo State, Nigeria
  • Celestine J.I. Department of Computer Science, School of Information and Communication Technology, Federal University of Technology, Owerri, Imo State, Nigeria
  • Chigbo E.C. Department of Computer Science, School of Information and Communication Technology, Federal University of Technology, Owerri, Imo State, Nigeria
  • Chima U. G. Department of Computer Science, School of Information and Communication Technology, Federal University of Technology, Owerri, Imo State, Nigeria
  • Njoku O.A. Department of Computer Science, School of Information and Communication Technology, Federal University of Technology, Owerri, Imo State, Nigeria
  • Okolie S.A. Department of Computer Science, School of Information and Communication Technology, Federal University of Technology, Owerri, Imo State, Nigeria
  • Odirichukwu SP.C. IT Health Data Officer/Monitoring and Evaluation Officer, Imo State Primary Health Development Agency, Owerri, Nigeria
  • Onuoha G. IT Manager, Operation Smile Foundation, Wetheral Road, Owerri, Imo State, Nigeria
  • Ibegbulem A.U IT Consultant, Megastar Technical and Construction Company, 100 East/West Road, Rumuokoro, Port Harcourt, Rivers States, Nigeria
  • Igwe F. A. IT Officer, Mindas Petroleum Limited, Nigeria
  • Chinwe Ndigwe Senior Lecturer, Odumegwu Ojukwu University, Uli (OOU), Nigeria
  • Obasi E.C.M. Department of Computer Science, Federal University, Otuoke, Bayelsa State, Nigeria
  • Efedua E.E. Field Engineer, Access Solutions Limited, Nigeria

DOI:

https://doi.org/10.48001/jocevd.2023.1114-23

Keywords:

Alarm system, Embedded C, Intrusion sensors, Microcontroller, Perimeter intrusion detection system, Security system

Abstract

It is extremely important to address and prevent unwanted entry or breaches of defined perimeters, such as physical location or property, by quickly and reliably identifying and informing security personnel of impending intrusions. However, the lack of an efficient perimeter intrusion detection and alarm system threatens the security of buildings and exposes confidential information and resources to theft or unauthorized entry. In this paper, a solar-based perimeter intrusion detection and alarm system that utilizes a combination of technologies such as sensors, alarm systems, microcontrollers, buzzers, a 5V solar panel, a 4.2V lithium battery, a GSM module, a micro-SIM card, and an Atmega 328P controller was developed using embedded C. The proposed system was able to provide effective and efficient detection of intrusion; it provided immediate alert notification and prompt response capabilities. Also, with the addition of the alarm system, it could deter intruders, thereby contributing to a more robust and comprehensive security framework.

Downloads

Download data is not yet available.

References

Ada, DiCola, T. (2014). PIR Motion Sensor. https ://learn.adafruit.com/pir-passive-infrared-proximity-motion-sensor/overview.

Anandan, R. (2013). Wireless home and industrial automation security system using GSM. Journal of Global Research in Computer Science, 4(4), 126-132.

https://www.rroij.com/open-access/wireless-home-and-industrial-automation-security-system-using-gsm-126-132.php?aid=38347.

Bangali, J., & Shaligram, A. (2013). Design and implementation of security systems for smart home based on GSM technology. International Journal of Smart Home, 7(6), 201-208. http://dx.doi.org/10.14257/ijsh.2013.7.6.19.

Bhatkule, A. V., Shinde, U. B., & Zanwar, S. R. (2016). Home based security control system using raspberry pi and GSM. International Journal of Innovative Research in Computer and Communication Engineering, 4(9), 16259-16264. https://www. researchgate.net/publication/337030116_Home_Based_Security_Control_System_using_Raspberry_Pi_and_GSM#:~:text=The%20Raspberry%20pi%20is%20programmed,time%20monitoring%20of%20the%20home.

Blumenscheid B. (2021). 10 Real Life Examples of Embedded Systems. https://www.digi.com/blog/post/examples-of-embedded-systems.

Buch, N., & Velastin, S. A. (2008). Human intrusion detection using texture classification in real-time. Tracking Humans for the Evaluation of their Motion in Image Sequences, 1. https://shorturl.at/lDLR5.

Cameron, K. (2020). How do alarm systems work? https://www.fourwallssecurity.com.au/blog/how-do-alarm-systems-work.

Cermeno, E., Perez, A., Siguenza, J.A.(2018). Intelligent video surveillance beyond robust background modeling. Expert Systems with Applications, 91, 138-149. https://doi.org/10.1016/j.eswa.2017.08.052.

Debar, H. (2000). An introduction to intrusion-detection systems. Proceedings of Connect, 2000. https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=ab05fb6fd3b942af839aa2d7ed7e1cc30a3fbb42.

Frejlichowski, D., Gosciewska, K., Forczmanski, P., & Hofman, R. (2014). “Smartmonitor”-An intelligent security system for the protection of individuals and small properties with the possibility of home automation. Sensors, 14(6), 9922-9948. https://doi.org/10.3390/s140609922.

Hutabarat, D. P., Budijono, S., & Saleh, R. (2018, December). Development of home security system using ESP8266 and android smartphone as the monitoring tool. In IOP Conference Series: Earth and Environmental Science (Vol. 195, No. 1, p. 012065). IOP Publishing. https://doi.org/10.1088/1755-1315/195/1/012065.

Indumathi, J., Asha, N., & Gitanjali, J. (2020). Smart security system using IoT and mobile assistance. In Emerging Research in Data Engineering Systems and Computer Communications: Proceedings of CCODE 2019 (pp. 441-453). Springer Singapore. https://doi.org/10.1007/978-981-15-0135-7_41.

Iyapo, K., Fasunla, O. M., Egbuwalo, S. A., Akinbobola, A. J., & Oni, O. T. (2018). Design and implementation of motion detection alarm and Security system. International Journal of Engineering and Advanced Technology Studies, 6(1), 26-38. http://www.eajournals.org/wp-content/uploads/Design-and-Implementation-of-Motion-Detection-Alarm-and-Security-System.pdf.

Jones, M.(2012). Power Supplies. Science Direct, 333-434. https://doi.org/10.1016/B978-0-08-096640-3.00005-8.

Joseph, G. M., Nwankwo, E. L., Eniola, O. M., & Eneh, C. D. (2015). Design of a real-time microcontroller-based GSM-embedded intrusion security system. International Journal of Scientific & Engineering Research, 6(12), 232-241. https://www.ijser.org/researchpaper/DESIGN-OF-A-REAL-TIME-MICROCONTROLLER-BASED-GSM-EMBEDDED-INTRUSION-SECURITY-SYSTEM.pdf.

Kim, S. H., & Lim, S. C. (2018). Intelligent intrusion detection system featuring a virtual fence, active intruder detection, classification, tracking, and action recognition. Annals of Nuclear Energy, 112, 845-855. https://doi.org/10.1016/j.anucene.2017.11.026.

Kour, G., & Dhiman, J. (2013). Importance of home alarm system based on LABVIEW software. Journal of Intrumentation Technology, 1(1), 1-5. https://doi.org/10.12691/jit-1-1-1.

Kumar, A. (2022). How to Interface the GSM Module with Arduino-Send and Receive SMS.

https://www.circuitstoday.com/interface-gsm-module-with-arduino.

Kumar, R., & Mittal, P. (2019). A novel design and implementation of smart home security system: Future perspective. International Journal of Applied Engineering Research, 14(2), 363-368. https://www.ripublication.com/ijaer19/ijaerv14n2_03.pdf.

Kumar, S., Raju, Sekhara, T.C., Raju, P., Ratnakar, M., Baba, S.D., & Sudhakar, N. (2013). Intrusion detection system - Types and prevention. International Journal of Computer Science and Information Technologies, 4(1), 77-82. https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=af6d5855d64cc0c6b2f45afe7e0c5943d07a0a5b.

Lohani, D., Crispim-Junior, C., Barthelemy, Q., Bertrand, S., Robinault, L., & Tougne Rodet, L. (2022). Perimeter intrusion detection by video surveillance: A survey. Sensors, 22(9), 3601. https://doi.org/10.3390/s22093601.

Lohani, D., Crispim-Junior, C., Barthelemy, Q., Bertrand, S., Robinault, L., & Rodet, L. T. (2022, October). Unsupervised and adaptive perimeter intrusion detector. In 2022 IEEE International Conference on Image Processing (ICIP) (pp. 3621-3625). IEEE. https://doi.org/10.1109/ICIP46576.2022.9897472.

Naing, T., Khaing, K. K., & Nwet, T. T. (2019). Perimeter instrusion detective system using arduino (Doctoral dissertation, MERAL Portal). https://doi.org/10.11591/APTIKOM.J.CSIT.154.

Nayak, R., Behera, M. M., Pati, U. C., & Das, S. K. (2019, December). Video-based real-time intrusion detection system using deep-learning for smart city applications. In 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) (pp. 1-6). IEEE. https://doi.org/10.1109/ANTS47819.2019.9117960.

Nwalozie, G. C., Aniedu, A. N., Nwokoye, C. S., & Abazuonu, I. E. (2015). Enhancing home security using SMS-based intruder detection system. International Journal of Computer Science and Mobile Computing, 4(6), 1177-1184. https://shorturl.at/xOR59.

Oloyede, O.A., Akinwole, A., Yekini, N.A., & Akindade, A.O. (2022). Overview of embedded system & its application. A Paper Presented at the 3red international Academic Conference Organized by Academic Union of Polytechnique Iree Chapter, 1-7. https://www.researchgate.net/publication/361562662_OVERVIEW_OF_EMBEDDED_SYSTEM_ITS_APPLICATION.

Rouse, M. (2022). Mobile Phone. https://www.techopedia.com/definition/2955/mobile-phone.

Slansky, D. (2019). Embedded systems trends and technologies. https://shorturl.at/nKS09.

Tasie, N.N., Risi, I., & Robert, J.A. (2020). Design and implementation of intruder detector system with SMS alert. American Journal of Engineering Research, 9(11), 128-132. ajer.org/papers/Vol-9-issue-11/T0911128132.pdf.

Thakur S. (2015). Embedded Systems Seminar and PPT with PDF Report. Study Mafia. https://studymafia.org/wp-content/uploads/2015/01/CSE-embedded-systems-report.pdf.

Thompson, J. (2017). What is a Magnetic Switch? https://sciencing.com/magnetic-switch-7331060.html.

Vijverberg, J. A., Janssen, R. T., de Zwart, R., & de With, P. H. (2014, October). Perimeter-intrusion event classification for on-line detection using multiple instance learning solving temporal ambiguities. In 2014 IEEE International Conference on Image Processing (ICIP) (pp. 2408-2412). IEEE. https://doi.org/10.1109/ICIP.2014.7025487.

Win, S. Z. Z., Htun, Z. M., & Tun, H. (2016). Smart security system for home appliances control based on internet of things. International Journal of Scientific & Technology Research, 5(06), 102-107. https://shorturl.at/insP7.

Wolf, W., & Madsen, J. (2000). Embedded systems education for the future. Proceedings of the IEEE, 88(1), 23-30. https://doi.org/10.1109/5.811598.

Yadav, A., Thaker, N., Makwana, D., Waingankar, N., & Upadhyay, P. (2021, May). Intruder Detection System: A Literature Review. In Proceedings of the 4th International Conference on Advances in Science & Technology (ICAST2021).

http://dx.doi.org/10.2139/ssrn.38667777.

Published

2023-06-30

How to Cite

Odirichukwu J.C., Awurigwe A. J., Celestine J.I., Chigbo E.C., Chima U. G., Njoku O.A., … Efedua E.E. (2023). Solar Based Perimeter Intrusion Detection System with Integration of SMS and Alarm System. Journal of Communication Engineering and VLSI Design, 1(1), 14–23. https://doi.org/10.48001/jocevd.2023.1114-23

Issue

Section

Articles