Professional Documents
Culture Documents
Report (Security For Home)
Report (Security For Home)
BACHELOR OF ENGINEERING
IN
COMPUTER SCIENCE WITH SPECIALIZATION IN
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Submitted by:
Koushik Somala 21BCS10462
Vishal Dirisanapu 21BCS9806
Tanuj Sagar 21BCS6383
Vishnu K 21BCS6369
1
Abstract
The concept of a home security system has transcended traditional locks and
alarms, embracing technological advancements to offer comprehensive protection
and peace of mind to homeowners. This abstract aims to highlight the fundamental
components, features, and benefits of modern home security systems. The
evolution of home security systems from basic deterrents to interconnected, smart
solutions is explored. Components such as surveillance cameras, intrusion sensors,
alarms, and smart locks constitute the backbone of these systems, empowering
homeowners with real-time monitoring and control. Integration with smart home
technology enables remote access and automation, allowing users to manage and
secure their homes from anywhere.
The benefits of implementing a robust home security system are multifaceted. Not
only do these systems act as a deterrent against intruders, but they also offer
protection against fire, carbon monoxide poisoning, and other emergencies.
Additionally, the availability of professional monitoring services ensures prompt
response and assistance during critical situations. Furthermore, the abstract
emphasizes the psychological impact of a secure home environment, fostering
peace of mind and a sense of safety for occupants, whether they are present or
away. Potential insurance discounts and the potential increase in property value
due to enhanced security measures further underscore the value of investing in a
home security system.
2
In conclusion, this abstract highlights the pivotal role of modern home security
systems in safeguarding properties, mitigating risks, and providing homeowners
with comprehensive and adaptable solutions to protect their homes and loved ones
in an ever-evolving security landscape.
Keywords
▪ Types of security systems:
▪ DIY (do-it-yourself) security systems
▪ Professionally monitored security systems
▪ Wireless security systems
▪ Wired security systems
▪ Home automation systems
▪ Security system components:
▪ Control panels
▪ Sensors (door and window sensors, motion sensors, glass break sensors)
▪ Alarms
▪ Cameras
▪ Smart locks
▪ Video doorbells
▪ Security system features:
▪ Remote access and monitoring
▪ Mobile app control
▪ Smart home integration
▪ Voice control
▪ Professional monitoring
▪ Geofencing
3
Table of Contents
Title Page i
Abstract ii
1. Introduction
2. Literature Survey
3. Problem Formulation
4. Research Objective
5. Methodologies
6. Experimental Setup
7. Conclusion
9. Reference
4
1. INTRODUCTION
In today's world, ensuring the safety and security of one's home is of paramount
importance. With advancements in technology, home security systems have evolved
significantly, offering a wide range of solutions to protect homes from intruders,
accidents, and emergencies. A home security system comprises various components
that work together to create a secure environment for homeowners and their families.
These systems are designed not only to detect and prevent unauthorized entry but
also to provide monitoring, alerts, and automation features for comprehensive
protection.
1
Components of a Home Security System: Explain the various components that
constitute a modern home security system. This includes:
• Smart Locks: Discuss how smart locks offer enhanced control over access
to the home, allowing remote locking and unlocking capabilities through
mobile devices.
2
1.1 Problem Definition
In recent years, the increasing concerns over home security have highlighted a
critical challenge that homeowners face in safeguarding their properties and
loved ones. Traditional security measures, such as locks and alarms, are no
longer sufficient to combat the evolving tactics of intruders and the growing
range of security threats. The problem at hand centers around the need for a
modern, integrated, and effective home security system that can provide
comprehensive protection against unauthorized access, intrusions,
and emergencies.
3
▪ Technology and System Integration: Explore the available technologies
and their compatibility with the home's infrastructure. This includes
evaluating wireless or wired systems, smart devices that can be integrated
with existing home automation systems, and their ease of use for
homeowners.
▪ Response and Monitoring: Define protocols for how the security system
will respond to incidents. This could involve alarm triggers, notifications
to homeowners or authorities, and the availability of remote monitoring
options.
1. Introduction:
4
2. Objectives:
▪ Monitoring and Control Hub: - Centralized control panel or smart device app
for system management. - Remote access for monitoring and controlling the
security system.
4. Implementation Plan:
5
▪ Testing phase to ensure all components work seamlessly together.
5. System Operation:
8. Conclusion:
6
2. LITERATURE SURVEY
6. Mobile Apps: Most modern systems come with dedicated mobile apps
that allow you to monitor your home's security remotely, receive alerts,
and control various aspects of the system.
7. Panic Buttons: Some systems include panic buttons that can be pressed
in case of emergency to quickly alert authorities.
8. Flood and Water Leak Sensors: These sensors can detect water leaks or
flooding, helping to prevent water damage.
7
10. CCTV Surveillance: Closed-circuit television systems are widely used
for monitoring and recording activities in and around homes. They
provide visual evidence but may not prevent intrusions.
11. Smart Locks and Access Control: These systems enable remote locking
and unlocking of doors, often through smartphones. They can also
provide access codes and track entry.
12. Security Cameras with AI: Advanced cameras integrated with artificial
intelligence can recognize faces, detect unusual activities, and send real-
time alerts.
When selecting a security system for your home, consider factors such as the size of
your property, your specific security needs, budget, and whether you want
professional monitoring or prefer a DIY setup. It's also a good idea to choose a
system that can be easily expanded or customized as your needs change.
8
5. Blockchain for Security: Implementing blockchain technology for secure
access control and data protection within home security systems.
9. Smart Locks: Install smart locks on main entry points for convenient and
secure access .Use features like remote locking/unlocking and temporary
access codes. Integrate with the security system to automatically lock when
the alarm is armed.
10. Environmental Sensors: Include smoke and carbon monoxide detectors for
early fire and gas leak detection. Integrate water leak sensors to prevent
damage from leaks or flooding.
9
2.3 Literature Review Summary (Minimum 7 articles should refer)
Year
and Tools/ Evaluation
Article/ Author Technique Source
Citatio Software Parameter
n
Cost:
Consider
your budget
for both the
initial
GPS Location installation
Tracking: The and ongoing
application will track
academia.edu monitoring
the user's location
using GPS and store fees.
(Review On Home it on the server. Different
Security System) security
Pro.Mrs.S.S. Internet of Things
systems
Sankpal, Ms. Vijaya (IoT), Raspberry
Praksah Phalle Pi, Wireless Door have varying
2018
Control, PIR Sens pricing
or. structures.
Monitoring
Options:
Decide
whether you
(A Literature Access Control,
want
Survey on Smart Data Security,
professional
Home Automation Smart homes,
SMS Alerts: The monitoring,
Security) Intrusion ijariit.com
application will self-
Rohit Ragmahale Detection.
send SMS alerts monitoring,
2018 to the emergency ora
contacts with the combination
user's location of both.
10
Door Lock Equipment:
Security, GSM, Assess the
Research Gate
RFID, SMS, types of
(Literature Review
buzzer, Security security
on Stay off Stealers
Biometrics, Measures: The equipment
Home Security
Password application will also offered by
System)
provide security the system
Harshal Bhagwat,
measures such as locks.
Kaustubh Akhade
2017 tips for self-defense
and emergency
contact number.
Arduino UNO
R3 LCD
GSM Module
(Portable Security GPS Privacy Settings: IEE Explore
Systemfor Women) Shock generator The application will Privacy
Rahul Paknikar have privacy Protection,
Shrey Shah settings where users Safety
Prachi Gharpure can choose to keep alerts,
2019 their location and Location
personal Tracking
information private.
Providing a
sense of
(Safety Assisant App
security,
And Harassment Development IEEE Explore
GPS Emergency
Prevention for
Kotlin Assistance,
Women) Regular Updates:
Md. Raseduzzaman GMS Module Real-time
The application will
Ruman ,Joybrota location
receive regular
Kumar updates to ensure tracking,
Badhon, Saikat Saha that it is secure and
2019
up-to-date with the
latest features.
(A Safety and Feedback and Education
Security Android App Support: The and
Based Application Development application will Awareness,
2022 for Women) Kotlin provide a feedback Science PG Providing a
Quazi Maliha GSM Module and support system sense of
Masud, Java where users can security,
11
M. Mesbahuddin provide feedback Emergency
Sarker and report any assitance
issues they may
face.
GPS, SMS,
Android, Ionic,
IJCRT.ORG
(One Touch Alarm PHP, Bootstrap,
Registration and
for Women Safety) Angular JS,
Profile Creation: Privacy
Arpana Wassan, Cordova
Users will need to Protection,
Suman,Mr.Ravi register with the Safety
shanker application by alerts,
2020
providing basic Customizati
information on
.
12
3. PROBLEM FORMULATION
Problem Formulation: Designing a Comprehensive Home Security System
**Key Challenges:**
**Objectives:**
14
**Conclusion:**
Problem Statement:
**Project Aim:**
The goal of this project is to design and implement a comprehensive home
security system that addresses the identified challenges, bridging existing
security gaps. By focusing on adaptability, intelligence, user-centric design,
smart home integration, privacy, and rapid emergency response, the project
aims to provide homeowners with a holistic and reliable solution, redefining
the standard for modern home protection.
16
Problem Description:
The Problem Description delves deeper into the specifics of the issue, outlining its
context, key components, constraints, and objectives.
Context:
1. **Limited Adaptability:**
- *Description:* Existing home security solutions struggle to adapt to the diverse
architectural layouts and security requirements of different homes. One-size-fits-all
models fail to provide effective surveillance in residences with unique layouts or
specialized security needs.
- *Consequence:* Homeowners with non-conventional housing structures or specific
security concerns are left with security systems that inadequately address their
vulnerabilities.
**Project Objective:**
This project aims to address the described problems by developing a comprehensive
home security system that is adaptable, intelligent, user-friendly, seamlessly integrated
with smart home ecosystems, respects user privacy, and ensures rapid emergency
response. By tackling these challenges head-on, the project seeks to redefine home
security, providing homeowners with a reliable, advanced, and holistic solution to
safeguard their homes and loved ones.
18
Key Components:
To build a robust and effective comprehensive home security system, various key
components are essential. These components work in tandem to provide a
seamless, intelligent, and adaptable security solution. The following are the core
elements of the proposed system:
1. **Surveillance Cameras:**
- **Description:** High-resolution cameras strategically placed to cover key
areas both inside and outside the home.
- **Functionality:** Real-time video monitoring for intrusion detection and
surveillance.
2. **Motion Sensors:**
- **Description:** Infrared motion sensors capable of detecting movement
within designated areas.
- **Functionality:** Triggering alarms and activating cameras for further
scrutiny when motion is detected.
4. **Smart Locks:**
- **Description:** Electronic locks with remote control capabilities.
- **Functionality:** Integration with the security system for automated
locking, unlocking, and access control.
6. **Mobile Application:**
- **Description:** User-friendly mobile app compatible with smartphones and
tablets.
19
- **Functionality:** Enables remote monitoring, control of the security system,
and receiving instant alerts.
20
Constraints:
1. **Budgetary Limitations:**
- **Description:** The system must be designed within a specified budget to ensure
affordability for a broad range of homeowners.
- **Impact:** The inclusion of cost-effective components and technologies without
compromising the system's functionality.
2. **Power Consumption:**
- **Description:** The security system should operate efficiently to minimize power
consumption.
- **Impact:** Ensuring that the system can function on standard power sources and
includes power-saving features to prolong battery life in case of power outages.
21
- **Impact:** Implementing backup systems, fail-safes, and regular maintenance to
enhance overall system reliability.
6. **Scalability:**
- **Description:** Designing the system to be scalable, allowing for the addition of
new features or devices in the future.
- **Impact:** Ensuring that the system can evolve with technological advancements
and changing user needs without requiring a complete overhaul.
8. **Environmental Considerations:**
- **Description:** Taking into account environmental factors such as weather
conditions for outdoor components.
- **Impact:** Ensuring the system's durability and functionality under varying
environmental conditions.
22
Objectives:
The objectives of the comprehensive home security system revolve around addressing
the identified problems and constraints, aiming to create a robust, intelligent, and user-
friendly solution. The following objectives guide the development and implementation
of the system:
3. **User-Centric Design:**
- **Objective:** Develop an intuitive and user-friendly interface for both in-home
control panels and mobile applications, ensuring that homeowners can easily monitor,
control, and customize security settings.
5. **Privacy by Design:**
- **Objective:** Implement privacy-centric features, including robust encryption,
secure communication protocols, and user-controlled access permissions, to address
privacy concerns and comply with data protection regulations.
7. **Budget-Friendly Implementation:**
23
- **Objective:** Design the system within a specified budget, ensuring affordability
for a wide range of homeowners without compromising the quality and effectiveness of
the security solution.
24
Key Objectives:
Certainly! Here are key objectives for a comprehensive home security system:
1. **Intrusion Detection:**
- **Objective:** Develop a system capable of intelligently detecting and
differentiating between routine activities and potential security threats to minimize false
alarms.
3. **User-Friendly Interface:**
- **Objective:** Design an intuitive and user-friendly interface for both in-home
control panels and mobile applications, allowing homeowners to easily monitor,
control, and customize security settings.
5. **Privacy Protection:**
- **Objective:** Implement robust privacy features, such as encryption and secure
data handling, to protect user privacy and address concerns related to unauthorized
access to personal information.
25
8. **Cost-Effective Implementation:**
- **Objective:** Develop the system within a specified budget, ensuring affordability
for a broad range of homeowners without compromising on security features and
functionality.
12. **Scalability:**
- **Objective:** Design the system to be scalable, allowing for the integration of
additional features or devices in the future to accommodate evolving technological
advancements and user requirements.
By achieving these objectives, a home security system can offer a comprehensive and
user-centric solution that addresses the diverse needs and concerns of homeowners.
Challenges:
1. False Alarms: Ensuring the system distinguishes between real threats and false
alarms caused by pets, environmental factors, or technical glitches.
26
4. User-Friendliness: Making the system easy to use and navigate for all household
members, including older adults or children.
7. Maintenance and Upkeep: Regular maintenance and updates to ensure the system
remains operational and up-to-date with evolving security standards.
8.**Integration Complexity:**
- **Challenge:** Integrating various security components and ensuring they
work seamlessly together can be complex. Different devices and technologies
may have compatibility issues.
- **Solution:** Thorough testing, standardization of communication protocols,
and collaboration with manufacturers can help address integration challenges.
9. **False Alarms:**
- **Challenge:** Balancing sensitivity to detect real threats while minimizing
false alarms is challenging. External factors like pets, weather, or temporary
obstructions can trigger false alarms.
- **Solution:** Implement advanced algorithms, machine learning, and user-
configurable settings to reduce false positives and improve system accuracy.
27
11. **Cybersecurity Risks:**
- **Challenge:** With increased connectivity, the security system becomes
vulnerable to cyber threats. Unauthorized access to the system could compromise
user data and the overall security of the home.
- **Solution:** Employ robust cybersecurity measures, including secure
authentication, regular software updates, and encryption to protect against cyber
threats.
28
16. **Emergency Response Coordination:**
- **Challenge:** Coordinating with emergency services and ensuring a swift
response can be challenging due to variations in response times and
communication protocols.
- **Solution:** Establish direct connections with local emergency services,
implement automated alert systems, and provide accurate information to facilitate
rapid responses.
Stakeholders:
1. **Homeowners:**
- **Role:** End-users who deploy and benefit from the security system.
- **Interest:** Ensuring the system effectively protects their property, loved ones,
and valuables. Interest in ease of use, affordability, and privacy features.
29
3. **Installers and Technicians:**
- **Role:** Professionals responsible for installing and maintaining the security
system in homes.
- **Interest:** Ensuring proper installation, functionality, and providing support for
ongoing maintenance and troubleshooting.
4. **Emergency Services:**
- **Role:** Entities such as police, fire, and medical services responsible for
responding to emergencies triggered by the security system.
- **Interest:** Swift and accurate communication from the security system to
enhance emergency response times.
7. **Insurance Companies:**
- **Role:** Entities offering insurance coverage for homes and properties.
- **Interest:** Supporting the adoption of effective security systems that reduce the
risk of theft or damage, potentially leading to lower insurance premiums.
30
10. **Community Representatives:**
- **Role:** Individuals representing the interests of local communities or
neighborhood associations.
- **Interest:** Collaborating with homeowners to implement security measures that
contribute to overall community safety.
Effective communication and collaboration among these stakeholders are essential for
the successful development, deployment, and adoption of a comprehensive home
security system. Understanding and addressing the diverse interests and concerns of
these stakeholders contribute to the system's overall effectiveness and acceptance in the
market.
Evaluation Metrics:
31
- **Description:** Evaluate how quickly the system initiates emergency protocols
and communicates with relevant authorities in response to identified threats.
5. **Privacy Features:**
- **Metric:** Encryption Strength, Access Control
- **Description:** Evaluate the effectiveness of privacy-centric features, including
the strength of encryption and user-controlled access permissions.
7. **Power Consumption:**
- **Metric:** Power Usage Effectiveness (PUE)
- **Description:** Measure the efficiency of power consumption, ensuring the
system operates with minimal energy usage and includes power-saving features.
8. **Scalability:**
- **Metric:** Ease of Integration, Flexibility
- **Description:** Evaluate the system's scalability by assessing its ability to
integrate additional features or devices seamlessly as technological advancements or
user requirements evolve.
9. **Cost-Effectiveness:**
- **Metric:** Total Cost of Ownership (TCO)
- **Description:** Assess the overall cost-effectiveness of the system, considering
both initial investment and ongoing maintenance expenses.
32
10. **User Education and Support:**
- **Metric:** User Training Completion, Customer Support Effectiveness
- **Description:** Evaluate the effectiveness of user education materials and the
responsiveness of customer support in addressing user queries and issues.
By assessing the home security system against these metrics, stakeholders can gain
insights into its performance, user satisfaction, and overall impact, ensuring that the
system effectively addresses security needs while meeting ethical, legal, and
environmental standards.
Project Scope:
Goals:
Project Scope: Comprehensive Home Security System**
The project scope outlines the boundaries, deliverables, and objectives of the
development of a comprehensive home security system. The scope includes:
1. **System Components:**
- Development of a suite of interconnected security components, including
surveillance cameras, motion sensors, door/window sensors, smart locks, control
panels, and mobile applications.
33
3. **User Interfaces:**
- Designing user-friendly interfaces for both in-home control panels and mobile
applications, allowing homeowners to easily monitor, customize settings, and receive
real-time alerts.
5. **Privacy-Centric Features:**
- Integration of robust privacy features, including encryption, secure communication
protocols, and user-controlled access permissions, to address privacy concerns and
ensure compliance with data protection regulations.
7. **Power Management:**
- Optimization for low power consumption, incorporating power-saving features and,
where applicable, alternative power sources to ensure continuous operation and
reliability during power disruptions.
34
11. **Legal and Regulatory Compliance:**
- Adherence to privacy laws, data protection regulations, and other legal requirements
related to the deployment of home security systems.
The project scope aims to deliver a comprehensive home security system that provides a
high level of security, user convenience, and privacy, while also considering
environmental impact and legal compliance. The defined scope serves as a guide for
project planning, resource allocation, and successful execution.
Conclusion:
35
The identified challenges, including adaptability, intrusion detection
accuracy, user interfaces, privacy concerns, and emergency response,
have been acknowledged and addressed within the project's objectives.
By embracing these challenges as opportunities for innovation, the
project aims to create a system that surpasses traditional security
measures, offering homeowners a heightened sense of protection and
control.
36
In essence, the envisioned comprehensive home security system aspires
to transcend traditional paradigms, offering a synergy of cutting-edge
technology, user-centric design, and ethical considerations. Through this
endeavor, the project seeks to empower homeowners with a security
solution that not only safeguards their physical spaces but also aligns with
the evolving dynamics of modern living.
4. OBJECTIVES
Setting clear objectives for your home security system is essential to ensure it meets
your specific needs and provides the level of protection you desire. When considering
the objectives for a security system for the home, several key goals are typically
prioritized to ensure the safety and protection of the household and its occupants. These
objectives may include:
37
4. Fire and Carbon Monoxide Detection: Home security systems should also
incorporate fire and carbon monoxide detectors to safeguard against these
hazards. Early detection and timely alerts can save lives and property.
9. Customization and Scalability: Homes differ in size, layout, and security needs.
An objective of a good security system is to offer customization options and
scalability, allowing homeowners to tailor the system to their specific
requirements and expand it as needed.
38
5. METHODOLOGY
1. Risk Analysis: Determine the level of security required for different areas of the
home based on the identified vulnerabilities and the family's needs.Prioritize
security measures based on the level of risk associated with different areas.
4. Motion Sensors: Identify locations for motion sensors to detect movement within
and around the house.
5. Smart Locks and Alarms: Consider smart locks for doors, windows, and alarms
that integrate with the overall security system.
39
proper placement of cameras, sensors, and alarms for maximum coverage and
effectiveness.
11. User Training and Education: Train family members on how to use the security
system effectively, including arming and disarming, accessing surveillance
footage, and responding to alerts. Emphasize the importance of maintaining
passwords, updating software/firmware, and regular system checks.
12. Testing and Maintenance: Regularly test the system to ensure all components are
functioning correctly. Conduct routine maintenance, such as replacing batteries,
cleaning cameras, and updating software, to keep the system in optimal
condition.
13. Continuous Improvement: Stay updated on the latest security technologies and
trends to upgrade the system periodically and enhance its effectiveness.Adapt the
security measures based on any changes in the home's layout or security risks.
Developing a methodology for implementing a security system for your home involves
a systematic approach to ensure that your objectives are met effectively and efficiently.
Here's a step-by-step methodology to guide you through the process:
1. Assessment and Planning:
a. Identify Security Needs: Begin by assessing your specific security needs. Consider
factors such as the size and layout of your home, the crime rate in your area, and the
vulnerabilities you want to address.
b. Set Objectives: Clearly define your security objectives, as discussed in the previous
response. Determine what you aim to achieve with your home security system.
c. Budget Planning: Establish a budget for your security system, taking into account
equipment costs, installation fees, and ongoing monitoring expenses.
d. Legal and Regulatory Considerations: Research and understand any local
regulations or permits required for security system installations, especially if you plan
to install outdoor cameras or alarms.
2. System Design:
40
a. Select Security Components: Choose the specific security components that align
with your objectives. This may include door/window sensors, motion detectors, security
cameras, and environmental sensors (e.g., smoke detectors).
b. Integration: If you have other smart home devices, ensure compatibility and plan for
integration to create a cohesive smart home ecosystem.
c. Placement and Coverage: Strategically place security components to maximize
coverage and effectiveness. Consider entry points, high-traffic areas, and blind spots.
d. Wiring and Connectivity: Determine the wiring and connectivity requirements for
your system. Decide between wireless or wired connections, and ensure reliable power
sources.
3. Equipment Acquisition:
a. Purchase Equipment: Acquire the selected security equipment from reputable
manufacturers or service providers. Ensure that the equipment meets industry standards
for quality and security.
b. Professional Installation: If professional installation is required, schedule an
appointment with a qualified technician to set up and configure your security system
correctly.
4. Configuration and Setup:
a. Network Setup: Connect your security system to your home network, ensuring a
secure and reliable connection.
b. System Programming: Configure the system's settings, including user codes, alert
preferences, and notification methods.
c. Testing: Test each component of the security system to ensure it functions as
expected. Verify that sensors trigger alarms, cameras record properly, and notifications
are received.
5. Monitoring and Response:
a. Monitoring Service: If you opt for professional monitoring, subscribe to a reputable
monitoring service that can respond to alarms and emergencies 24/7.
b. Emergency Contacts: Provide emergency contact information to the monitoring
service and ensure they have clear instructions on how to respond to different types of
alerts.
Remember, each home's security needs may vary, so customizing the system based on
specific requirements and regularly reassessing its effectiveness is crucial for ensuring
maximum protection. Consulting with security professionals or experts in the field can
also provide valuable insights during the process.
41
6. CONCLUSION
A home security system is a valuable investment for any homeowner. It
can help to deter burglars, protect your family and property, and give
you peace of mind when you're away from home.
There are many different types of home security systems available, so
it's important to choose one that is right for your needs and budget.
Some factors to consider include:
Professional installation vs. DIY: Professional installation is more
expensive, but it ensures that your system is installed correctly and that
all of the components are working properly. DIY systems are less
expensive, but they can be more difficult to install and may not be as
reliable.
Monitoring: Some security systems come with professional monitoring,
which means that a central monitoring station will monitor your system
24/7 and dispatch the police or other emergency services if necessary.
Other systems allow you to self-monitor, which means that you will
receive alerts if your system is triggered, but you will be responsible for
contacting the authorities yourself.
Features: Different security systems offer different features, such as
alarms, motion detectors, door and window sensors, smoke and carbon
monoxide detectors, and video cameras. Consider which features are
important to you and choose a system that has them.
Once you've chosen a security system, be sure to test it regularly to
make sure that it's working properly. You should also create a security
plan for your home and teach your family members how to use the
system.
There are many reasons why a home security system is important.
First, it can help to deter burglars. Studies have shown that homes
with security systems are less likely to be burglarized. Second, a
security system can protect your family and property. If a burglar
does break into your home, a security system can alert the
authorities and help to catch them. Third, a security system can
give you peace of mind when you're away from home. Knowing
that your home is protected can help you to relax and enjoy your
time away.
CHAPTER 1: INTRODUCTION
CHAPTER 3: OBJECTIVE
2. Chen, C. W., & Wu, C. H. (2019). Smart Home Security System with
Fuzzy Logic and IoT Technologies. IEEE Access, 7, 114437-114448.
8. Zhu, Q., & Li, X. (2018). Design and Implementation of Smart Home
Security System Based on Internet of Things.(pp. 1467-1471). IEEE.