Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/358566237

DEVELOPMENT OF CAMPUS AUTOMATED INTRUSION DETECTION SYSTEM (C-


AIDS)

Conference Paper · February 2022

CITATIONS READS

0 19

6 authors, including:

Akeem Otapo
Yaba College of Technology
19 PUBLICATIONS   3 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

clinical data normalization and standadization View project

Authentication and Access View project

All content following this page was uploaded by Akeem Otapo on 12 February 2022.

The user has requested enhancement of the downloaded file.


DEVELOPMENT OF CAMPUS AUTOMATED INTRUSION DETECTION SYSTEM
(C-AIDS)
Lateef A Saliu1Akeem T. Otapo2, , Kehinde G. Adekusibe3, Mary O. Tokunbo-Cole4, Otunubi
V.A5, Adeola, A.Adelakun

Department of Computer Engineering, Yaba College of Technology, Lagos State,


1,2,4,5

Nigeria
3,6
Ogun State Institute of Technology, Igbesa, Ogun State.

1. jomo_jasper@yahoo.com ; +234-8023901300
2. otapoakeem@gmail.com ; +234-8064054825
3. engr.kusibe@gmail.com ; +234-7069621269
4. jtokunbocole@gmil.com ; +234-8062339418
5. otunubiv@yahoo.com ; +234-08025934048
6. adeolaadelakun30@yahoo.com; +234-8051537070

ABSTRACT
Security is an essential part of humanity, it is the basic reason behind so many inventions and it
dates back to the Stone Age, it has always been amongst the few basic requirements of man. In our
modern day and time, the mode of security has been drastically increased, to match the various vices
in the society. In the educational system the issue of insecurity is a great lapse, as it hinders growth,
creativity, development, and stunts the society at large.This study therefore develop and explore the
capabilities of Campus Automated Intrusion Detection System (C-AIDS). This security system of
surveillance is targeted at actively monitoring human movement in a specific or restricted area, and
this is achieved by an internetworking of various individual components to achieve the single
purpose of surveillance and smart alert system. It is recommended that the main unit of the system
be connected to a standby power capable of keeping it running at all times, the various outdoor units
should be kept high enough to cover large area so as to increase the passive infrareds sensing
range.

Keywords: Campus Automated Intrusion Detection System (C-AIDS), CCTV, Security, Camera
Systems, Smart Alert System, Internet of Things (IOT).
1
1. Introduction
The internet opened up new ways to effectively utilize technology for better security systems, the
local area network revolutionized the field of the video surveillance (Essays, Uk, 2018), thanks to
the internet the traditional Closed Circuit Television(CCTV) can now be replaced by IP cameras,
which have the additional digital features of zooming, higher picture quality, get particular scenes of
events, and has a lot of add-on feature that can be used to get the best of video surveillance security,
and with the advent of machine learning, and artificial intelligence, IP cameras can now be armed
with facial recognition, and event detection, hence the need for human review of live video feed is
greatly reduced (Essays, Uk, 2018).

The IP camera equips the user with the ability to get real-time notifications on happenings in the area
under surveillance, most IP cameras are enabled with PIR sensors which enable them to detect
movements from humans and other living things, with the sophisticated IP cameras that are currently
at our disposal one can actively communicate with loved ones and family over the two way channel
audio, the advent of the Internet of Things (IOT). A microcontroller is a programmable Integrated
Circuit (IC), they come in different sizes and different specification in packaging or internal
architecture, with the rise of Integrated Circuit, the world of electronics took an exponential leap,
ushering us into this era of high technological devices, responsive hardware, automated houses and
the likes.C-AIDS makes use multiple interconnected IP cameras with built in human detection
system, which work collectively to monitor events and detect anomalies.

Presently in some of the campuses in Nigeria there have been cases of property vandalism and
break-ins and forceful entry into Offices. In some cases also , theft and burgled offices are
recorded.In a bid to tackle these cases,there is a little impact of security forces in times of
need due to little or no information i.e intelligence, some of the security men in the campuses
either do not have technical know-how of some sophisticated security technologies or lack
appropriate methods to use them, also there is little or no automation in essential daily
routines to secure the campus widely.This paper therefore present an Campus-Automated
2
Intrusion Security System (C-AIDS).The C-AIDS is a device that is designed to operate as an
in-house smart surveillance security system.

2. Review of Related Works


2.1 Security
The concept of home security is not new to man, from the early days of the cavemen, they needed
security for their offspring and themselves from wild animals and rival clans, even up till today the
society at large is in dire need of security from both internal and external threats to life and property
of the individuals in the community. The set of crimes that occurs within the society, calls for a
higher level of security measures. The first security system which kick started the current wave of
modernization in security system is credited to Augustus R. Pope which made use of an alarm,
utilizing electro-magnets (Reverse Time Page, n.d.). Pope worked with the likes of Edwin Holmes,
Alexander Graham Bell and Moses Farmer all working together to develop their various inventions.
Pope’s invention was patented in 1853, although he was unable to continue with it as he sold his
work to Holmes because of his failing health.. The system designed by Pope made use of magnetic
contacts installed on every entry point into the houses, when eventually the doors or windows were
opened the system would sound an alarm inside the house to alert the residents of the intrusion,
although this method was effective as of the time of invention, it is not farfetched to say that this
system is by far below the standards for a complete security system, as it does not have the
functionality to inform the police of a robbery or burglary in progress. The advancement in
technology also ushered in security systems which could inform the police, this additional function
was greatly beneficial to shops or stores that sold valuable merchandise and banks. (Alarm,2018)

In modern technology, a lot comes to play when security is involved, ranging from wireless
technology, to automated locks and doors, alarm system, personal notification system, surveillance
etc. This new system is capable of working autonomously, and keeping the owner up to date about
the events that has taken place in his absence. There are various systems capable of remote
surveillance, now home and offices can be remotely monitored from mobile phones and laptops
anywhere in the world. (homesecurity,n.d ; Alarm, 2018)

3. Methodology
3
This entails the modeling, simulation and construction of the C-AIDS concept. The hardware
components that make up the C-AIDS are the Atmega328p Microcontroller, passive infrared sensor,
ESP8266 WIFI module, industrial alarm, a desktop server system, all these are briefly discussed
below. Figure 1 shows the block diagram model of the C-AIDS. Figure 2 shows a simulation of the
C-AIDS design concept;

Transceiver Desktop Server


Unit Microcontroller
System

ALARM

Main Unit

Figure 1: Block Diagram Model of C-AIDS

4
Alarm

Passive Infrared Microcontroller IP camera unit


(PIR)

Wireless
Router
Transceiver

Individual networked units (Outdoor unit)

Figure 2: Components of C-AIDS

5
Figure 3: Simulation of C-AIDS

3.1 Microcontroller: The microcontroller that is used in this design is an Atmega328p


microcontroller, it is attached to a development board, which is known as Arduino. This
microcontroller would be used as a controller to the various external modules to connect the
different parts of the project. These are detailed specifications of the Atmega328P;

 Power supply: 5-20v(DC)


 Operating voltage: 5v(DC)
 Digital I/O pins: 14
 Analog input pins: 6
 Flash Memory: 32KB
 SRAM: 2KB
 EEPROM: 1KB
 Clock Speed: 16MHz
 Communication: ICSP, SPI, I2C and USART

The microcontroller adds the functionality of hardware control and programming. The little
operating power and the large Flash memory are the major reasons why this module was chosen to
achieve the purpose of interconnecting different aspects of the projects. The Atmega328P is a

6
suitable microcontroller, for electronic projects, in-house electronic designs, robotics and real-time
monitoring applications.

Figure 4: PIR (Drew Browning, n.d.)

3.2 Passive Infrared (PIR): This electronic device is responsible for detecting the presence of an
intruder in the protected space. This is made possible by the pyroelectric sensor that is capable of
detecting various levels of infrared radiation. This sensor is split into two halves. The two halves are
designed to cancel out each other.Whenever a portion detects more infrared radiation than the other
the output will change from high to low. There are other circuitry that are attached to the passive
sensor, this circuit comprises of resistors, capacitors, BISS0001, a jumper cable and voltage
regulator. The function of the BISS0001chip is to process the signal gotten from the output of the
sensor to determine the output signal that would be produced from it. Owing to the small circuitry
the PIR sensors are low power operated devices and they are inexpensive (economical).(PIR passive
infrared proximity motion sensor, n.d.) (Instructables, n.d.).
Specifications of the PIR sensor are as follows;

 Sensitivity range: 5-12meters, 110 x 70 degrees


 Power supply: 3.3v – 5v(DC)

7
Figure 5: Surveillance Display unit

3.3 Display Unit: There is a wide variety of display units that can be used in the design of the C-
AIDS, as it is used to view live streamed video of the surrounding being monitored, the display is
essential for;

 Password verification
 Information about the state of the system.
 For the system to display error codes for troubleshooting.
 For guide on how to use the system.
 Image viewing
 Data gathering

Figure 5: IP Camera (Petr Novak, 2011)

3.4 Camera Unit: The design makes use of series of online camera, the online camera are electronic
devices capable of transmitting live-stream videos over the internet, therefore giving users the

8
capability of viewing this videos remotely. One of their common implementation is in video
surveillance, another recommendable addition to this devices is that they do not necessarily need a
recording device, hence the owners do not need to worry of any overhead cost on purchasing
additional equipment to store the videos. More advanced system of IP cameras come with inbuilt
motion sensors, which enable them to only transmit when a motion is sensed, hence capturing only
the important events. (IP camera, 2019).

Figure 6: Industrial Buzzer Alarm (uxcell Continuous decibel buzzer speaker, n.d.)

3.5 The Alarm: The buzzer alarm is the unit used to disperse crowd or control the crowd, a buzzer
can be made up of a mechanical, electromechanical, magnetic, electromagnetic, electro-acoustic or
piezoelectric audio signaling device. A piezoelectric buzzer can be controlled by an oscillating
circuit. It is mainly used as a signal device to inform people of events such as a successful input,
progress or even impending danger. C-AIDS makes use of both an industrial alarm and a software
alert through the online application in the android application.

Figure 6. Router Device

9
3.6 Routers :This is used as a trans receiver to create an internet connection to connect all the
separate individual models and the main control unit, which forms the internet of things (IOT)
amongst the various modules that needs to work hand in hand for communication. The C-AIDS
works with routers and repeaters, to transmit information on the same network for a larger distance
and to ensure low latency.

3.7 ESP8266: This is a standalone unit, which is connected to the microcontroller unit, it is a WIFI
module, that can act as a mini server/client side module, it is capable of both sending and receiving
transmitted data at speeds of up to 2.5Ghz. It is used to interconnect the microcontrollers, and send
transmitted data between the sub units and the main control unit. (Sarah Ali, 2018) (Harsh
Mangukiya, 2018)

4 System Testing and Capability


The C-AIDS has the following features: remote activation of alarm system, detection of humans in
an open area, image recognition, image classification, SMS alert system, uploading of profiled
picture to an online database.

The C-AIDS is a collection of independent outdoor camera units, to a central transceiver. The design
is capable of classifying images/frames from live streaming video gotten from the outdoor
surveillance units, the system only activates the image classification when a person is detected, so as
to reduce data consumption and cloud services in use. The image that is profiled is uploaded to an
online database, SMS notifications are sent to security guards patrolling that area with a link to the
image on the database. In case of a riot or fight, the remote activated alarm can be initiated to bring
orderliness to such area. With the afore mentioned features of a C-AID system, the device can be
applied as an efficient wide range surveillance and responsive security system.

The concept of CCTV surveillance is not new, but the C-AIDS makes use of embedded systems
programming, cloud computing, machine learning and artificial intelligence, to create a responsive
system capable of running without human interference.

10
4.1 ADVANTAGES OF C-AIDS
i. Highly Precision Automated Surveillance Systems: The system is designed with a well-
trained machine learning model, with a low error rate. This results in a very precise image
detection system.
ii. Easy to Integrate into Already Existing Network of Surveillance Systems: The buildup of
the C-AIDS allows it to be easily integrated into already existing campus CCTV systems.
The major requirement is that the main control unit is connected to the CCTV network,
which enables it to have full control over the network and the nodes on the network.
iii. Quick Alert System: The notification is an online system that is designed to inform the
security personnel of the flagged illegal acts, by activating an alarm on their android phones
and integrating the link to the images, which would alert all the security personnel to be on
the lookout, the images would contain the location were the image was taken, which would
make it easier to narrow down the location of the person or persons in question.
iv. Data Gathering: The intelligent use of the C-AIDS can lead to accurate data gathering on
the personalities of criminals, or even people in the society, which would lead to better
applied solutions and innovations. There is a saying that “Data is the new gold”, this saying
is due to the large number of applications that rely heavily on data mining and data
manipulation. To understand a society better accurate data must be gathered to clearly
classify both people and situations.
v. Improvement to the Already Existing CCTV Technology: The concept of C-AIDS is built
on the already functioning technology of CCTV (IP cameras/LAN camera), the concept of
CCTV has proven to be effective in deterring criminal actions at a certain rate, and has
greatly improved the quality of break-in cases, as the narrative has moved from hearsay or a
guess, to actual facts that can turn the tides of a case. Although this method has been applied
and proven functional, but in the bid to design better and more optimal solutions, the concept
of C-AIDS was born, this concept integrates high level and precise software solution like
machine learning (ML), and internet of things (IOT) to derive a high precision, low human
interference, cross platform solution. That not only records events but provides a means to
stop the culprit in his tracks, thereby creating a safer environment for everyone.
vi. Low Cost of Hardware Maintenance: The C-AIDS is comprised of cost friendly hardware,
it is built to ensure that it requires little maintenance as it comprises of an ATMEGA328P

11
and its basic components, it connects to three modules which are the PIR sensor, industrial
Alarm, ESP8266 wireless module and a CCTV camera unit.
vii. Highly Scalable: The design and construction of the C-AIDS gives a lot of room for addition
of extensive feature as the Microcontroller can be reprogrammed with more functionalities,
and the software which categorizes images can always be retrained to accept new categories
of image.
viii. Little or no Human Interference: The C-AIDS is designed to work with information it
gathers from the real world, with or without any human interference, the SMS notification
are automated, and the alert systems are automated.
ix. Profiling Defaulters: With the images of defaulters saved in an online database, it becomes
extremely easy to narrow down defaulters history, hence providing good evidence and basis
for judgment.

5. Conclusion and Recommendation


The proper application of the C-AIDS can halt if not totally eradicate multitude of social-vices
that is recorded on a daily basis on campus and public schools, this shows that machine learning,
artificial intelligence and embedded systems, can be used to solve various issues facing our
community and humanity at large.

It is recommended that the main unit be connected to a standby power capable of keeping it
running at all times, the various outdoor units should be kept high enough to cover large area so
as to increase the passive infrareds sensing range. The CCTV camera to be installed outdoors
must be high definition cameras, so as to provide high quality shots of the pictures to be scanned
by the model. The SMS system can be advanced to a bulk SMS messaging platform so as to
solve the issue of having to recharge the mobile line that is installed on the GSM module. For
more detailed profiling of defaulters, the database of the students and staffs, should be integrated
to the cloud platform, to enable the model identify defaulters who are students/staffs of the
school by their name and details.

12
Reference

Adafruit (n.d.).PIR passive infrared proximity motion sensor [image]. Retrieved from https://learn-
adafruit.com/pir-passive-infrared-proximity-motion-sensor/how-pirs-work&hl=en-NG

Afrank (2005) LEDs in different casings [image]. Retrieved from


https://en.m.wikipedia.org/wiki/File:Verschiedene_LEDs.jpg

Alarm (2018).The history of home security.Retrieved from https://www.alarm.org/the-history-of-


home-security

Amazon.(n.d.).Uxcell Continuous Decibel Buzzer Speaker [image]. Retrieved from


https://www.amazon.com/uxcell-Continuous-Decibel-Buzzer-Speaker/dp/B00HR6P9QU

Arduino.(n.d.).Arduino Mega 2560 r3 [image]. Retrieved from


https://googleweblight.com/i?u=https://store.arduino.cc/usa/mega-2560-r3&hl=en-NG

Arduino.(n.d.).Arduinouno rev3 [image]. Retrieved from


https://googleweblight.com/i?u=https://store.arduino.cc/usa/arduino-uno-rev3&hl=en-NG

Arnold Reinhold (2007).Switches electrical [image]. Retrieved from


https://en.m.wikipedia.org/wiki/File.Switches-electrical.agr.jpg&hl=en-NG&tg=93&pt=8

Arun Jose & Reza Malekian. (2015).Smart Home Automation Security: A Literature Review.
DOI:10.6029/smartcr.2015.04.004

Bob Mesnik (2016). The History of Video Surveillance.Retrieved from https://kintronics.com/the-


history-of-video-surveillance/

Components101. (n.d.).SIM900A GSM Module [image]. Retrieved from


https://components101.com/wireless/sim900a-gsm-module

Drew Browning. (n.d.).Passive Infrared Sensor (PIR) [image]. Retrieved from


https://www.evl.uic.edu/drew/courses/AD405/PassiveRsensor.htm&hl=en-NG

Essays, Uk. (2018). A Report On IP Video Surveillance. Retrieved from


https://www.ukessays.com/essays/information-technology/a-report-on-ip-video-surveillance-
information-technology-essay.php?vref=1

Evan Amos. (2018). An array of axial-lead resistors of varying resistance. [image]. Retrieved from
https://en.m.wikipedia.org/wiki/File:Electronic-Axial-Lead-Resistors-Array.jpg&hl=en-
NG&tg=82&pt=9

Fereshteh Falah Chamasemani & Lilly Suriani Affendey.(2013). Systematic Review and
Classification on Video Surveillance Systems.Modern Education and Computer Science

13
PRESS, 1, 87-102
DOI: 10.5815/ijitcs.2013.07.11

Future electronics.(n.d.).Micro SD Card Module. Retrieved from https://store.fut-


electronics.com/products/micro-sd-card-module&hl=en-NG

Harsh Mangukiya. (2018) Create Esp8266 Web Server. Retrieved from


https://create.arduino.cc/projecthub/harshmangukiya/create-esp8266-web-server-9c32ac

Hobbypep.(n.d.).16X2 1602 LCD display for arduino and DIY project [image]. Retrieved from
http://hobbypep.com/shop/electronic-components/16x2-1602-lcd-display-for-arduino-and-
diy-project/

Instructables.(n.d.).How to use OV7670 Camera Module with Arduino. [image]. Retrieved from
https://www.instructables.com/id/How-to-use-OV7670-Camera-Module-with-Arduino

IP camera. (2019). Retrieved May 30, 2019, from Wikipedia:


http://en.wikipedia.org/wiki/IP_camera

Krishna Pattabiraman.(n.d.).HOW TO SET UP A KEYPAD ON AN ARDUINO [image]. Retrieved


from http://www.circuitbasics.com/how-to-set-up-a-keypad-on-an-arduino/&hl=en-NG

Linksys, (2019) Wireless Routers. [image]. Retrieved from https://www.linksys.com/gb/c/wireless-


routers/

Lyon, D. (2001) Surveillance Society: Monitoring Everyday Life, Buckingham: Open University
Press

Machine learning definition, (2017). Retrieved from https://expertsystem.com/machine-learning-


definition/

MAKERLAB.(n.d.).Micro SD Card Module. [image]. Retrieved fromhttps://www.makerlab-


electronics.com/product/micro-sd-card-module/

Norris, C. and G. Armstrong (1997). The Unforgiving Eye: CCTV Surveillance in Public Space.
Mimeo. Hull, UK: Centre for Criminology and Criminal Justice, University of Hull.

Ray Surette,(2005). The thinking eye: Pros and cons of second generation CCTV surveillance
systems. Policing: An international Journal, Vol. 28 Issue: 1, pp.152-173
https://doi.org/10.1108/13639510510581039.2005.

Reverse Time Page. (n.d.)The Holmes Electric Protective Company. Retrieved from
https://uv201.com/Misc_Pages/holmes_history.htm

Sarah Ali. (2018)How To Use Esp8266 Wifi Modes: Station And Access Point. Retrieved from
http://onlineshouter.com/use-esp8266-wifi-modes-station-access-point/

14
View publication stats

Sennett, R. (1990) The Conscience of the Eye: The Design and Social Life of Cities, New York:
W.W. Norton

Sean Wilkins. (2011) Basic Intrusion Prevention System (IPS) Concepts and Configuration.
Retrieved from http://www.ciscopress.com/articles/article.asp?p=1722559

Sunfounder.(n.d.).3D 4x4 matrix keypad module [image].Retrieved from


http://wiki.sunfounder.cc/index.php?title%3D4X4_Matrix_Keypad_Module&hl=en-NG

Video Surveillance.(n.d.). Retrieved March 21, 2011, from http://www.videosurveillance.com

W2000. (2004) Solid State Contactor [image]. Retrieved from


https://en.m.wikipedia.org/wiki/File:Solid-state-contactor.jpg&hl=en-NG&tg=779&pt=103

Xdgx. (2005) Arcade Button [image]. Retrieved from


https://en.m.wikipedia.org/wiki/File:Arcade_video_game_buttons.jpg&hl=en-
NG&tg=53&pt=2

15

You might also like