JOP Conference

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

Journal of Physics: Conference

Series

PAPER • OPEN ACCESS You may also like


- Health monitoring smart glove using esp32
Intrusion Detection System using Machine microcontroller
T S Jahnavi, Naveen Thumma, Kolla
Learning and Microwave Doppler Radar Abhishek Reddy et al.

- Implementation of vibration signals


receiving unit on Raspberry single-board
To cite this article: A Ushasree et al 2022 J. Phys.: Conf. Ser. 2325 012041 computers
V A Faerman, A V Tsavnin and S A
Andreev

- Vision-Based Obstacle Detection and


Collision Prevention in Self-Driving Cars
View the article online for updates and enhancements. Y Sarada Devi, S Sathvik, P Ananya et al.

This content was downloaded from IP address 103.165.2.51 on 28/03/2024 at 07:21


International Conference on Electronic Circuits and Signalling Technologies IOP Publishing
Journal of Physics: Conference Series 2325 (2022) 012041 doi:10.1088/1742-6596/2325/1/012041

Intrusion Detection System using Machine Learning and


Microwave Doppler Radar

A Ushasree, Atluri Shanmukha Datta, Varikallu Sai Krishna, Pingili Manish Reddy
and Rampelly Sanjay Kumar
Department of Electronics & Communication, Gokaraju Rangaraju Institute of
Engineering and Technology, Hyderabad, Telangana, India.

ushasreemishra@gmail.com, shanmukdatta12345@gmail.com

Abstract: A security system is an essential part of a safe home as thefts and intrusions are
increasing in recent times; moreover, keeping the home safe is a major concern while being away.
This paper proposes an innovative way of security alert system using a microwave doppler radar
and integrating it with other peripherals such as camera, alarm, and raspberry pi, implemented
using machine learning techniques. The machine learning technique used is the deep neural
networks. This structure helps in monitoring the target space while receiving notifications on
WhatsApp and Email to improve the security.

Keywords: Microwave RADAR, Doppler Effect, Raspberry Pi, Machine Learning, Computer
Vision.

1. INTRODUCTION

Security is one of the important topics in every facet like surveillance, industrial applications, offices, and
home. A security system that monitors the entire area and reacts effectively is needed. There are many
security systems for both indoor and outdoor such as CCTV, infrared detectors, ultrasonic detectors, and
PIR sensor [1]. However, one or the other system have limitations of being expensive, more electrical
consumption, more memory space utilization of the recording system and complex circuitry. In common,
the drawback in all these systems is that there is a good possibility of false intruder detection based on
‘line of sight’ cut by any entity and not necessarily an intruder. Many security systems such as RFID, OTP
based system, and biometrics are used to prevent unauthorized access [2][3][4]. But merely preventing
unauthorized access is not enough. This project involves in using microwave technology because they are
more stable and less prone to false alarms. Here, microwave radar plays an important role. Microwave
radar generates an electromagnetic (RF) field between the transmitter and the receiver [5]. The
microwave radar transmits microwave signals and evaluates returned signals for a moving object [6]. By
using this microwave technology, the detector is less sensitive to false alarms. Microwave radar utilize
Doppler principle to detect motion of an object [7]. If a target is moving towards the radar system, the

Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution
of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.
Published under licence by IOP Publishing Ltd 1
International Conference on Electronic Circuits and Signalling Technologies IOP Publishing
Journal of Physics: Conference Series 2325 (2022) 012041 doi:10.1088/1742-6596/2325/1/012041

frequency of its radar echo is slightly higher than the frequency of the radar system itself; and if it is
moving away, the frequency is slightly lower [7]. This change in frequency with target motion is the
doppler effect. Machine learning is a method by which a machine can imitate a human in decision making
process by training with required datasets. Depending on the type of dataset given to a machine learning
algorithm, it can learn to make decisions close to human like. Machine learning can also be considered a
type of artificial intelligence as it can make human like decisions artificially. Machine learning is a very
important part of the current era, as it can decrease human dependence on iterative and valuable human
resources, and talent can be put into much more important tasks requiring innovation and creativity.

2. LITERATURE SURVEY

In closed-circuit television (CCTV), signals are not broadcasted publicly, but are monitored for security
and surveillance purposes. In order to use CCTV, you must strategically place the cameras and observe
their output on a monitor. CCTV does not give notice in real-time when recording interference [9]. CCTV
implementation faces some challenges. To start with, it does not produce notifications or warnings
instantly when it captures any suspicious activity. Additionally, CCTV systems are designed to record
continuously, so even if nothing suspicious occurs in a home, they still capture what is happening.
Streaming and storing continuous video consumes a lot of bandwidth and storage [9][10][11].

Gayathri P. Sonawane conducted research on the different types of video surveillance systems
using ARM9 and ARM11 for the implementation [12][13]. H.264, MPEG, and JPEG are just a few
examples of video compression techniques. Among those techniques, H.264 is a better choice for usage
without losing the original image properties. A cloud-based system stores images and videos and sends
SMS and email notifications to their owners. For better monitoring purposes live streaming is also used.
Rajat Kumar used an Ultrasonic sensor [14][15]. It worked better than CCTV. An ultrasonic sensor can
detect the object in only one direction. It can be achieved with the help of a DC motor. The motor rotates
the sensor in a step manner so as to cover 360 degrees. Due to this, the cost is high, and implementation is
difficult. Ying-Wen Bai developed a system to detect intruders [16]. If any person passes through the
field sensors, there will be a fluctuation in the output and the system identifies the change. Activating the
video camera is done using the Major Voting Mechanism (MVM). The basic functionality of the system
depends on PIR sensor. Infrared radiation, which comes from the body, is what makes the system work.
According to studies, the body temperature of a normal individual can radiate infrared light at
wavelengths between 10 and 12 micrometers [17].

Infrared sensors detect motion by detecting fluctuations in infrared light. A new method (UGS) for
detecting strangers and the motion of pedestrians was proposed by Xin Jin [18]. Detection and
classification were carried out by Pema Chodon using wavelet-based techniques and PIR (Passive
Infrared) sensors [19][20]. Rakesh et al., proposed a real time system using beagle board, ZigBee, and
FTP Server [21]. Ansari et al., proposed a security system using raspberry Pi. Raspberry Pi has higher
clock speed, multiple connectivity options and more flexibility at affordable price compared to other
development boards [22]. E. Baraneetharan has done a survey on various techniques that can be used to
integrate with Wireless Sensor Networks for intrusion detection. WSNs were used for reason such as
biodiversity, ecosystem protection, surveillance and other military applications. Machine learning enabled
this system to perform a wide range of applications such as, securing the network, increased efficiency,
identification, analysis and other such features [23].

2
International Conference on Electronic Circuits and Signalling Technologies IOP Publishing
Journal of Physics: Conference Series 2325 (2022) 012041 doi:10.1088/1742-6596/2325/1/012041

Table: 1 Comparison between various sensors

Radar Type CDM324 PIR motion sensor Ultrasonic sensor

Type of communication wireless wireless wireless

Distance of communication 15m 10m 4m

Can be placed behind


Obstacles Needs to be open Needs to be open
walls or casing

Can work in any Performance impacted Performance impacted


Weather conditions
weather conditions by weather conditions by weather conditions

Speed and No parameters can be


Identification parameters Distance form sensor
approximate size obtained

3. PROPOSED SYSTEM

In the proposed system, a microwave radar module uses the Doppler frequency discrepancy between
transmitted waves and the returned waves which hits on the target when the target is moving and output
its returned signal as a voltage offset in DC. In radar, readable output is given in voltage which is
measured by calculating the frequency shift ∆f, which is then amplified, filtered, and processed by a signal
conditioning circuit in a homodyne transceiver configuration. As a result, it is possible to detect, locate,
track, and recognize objects at considerable distances using this technology.

Fig:1 Block diagram of the proposed system’s operation

3
International Conference on Electronic Circuits and Signalling Technologies IOP Publishing
Journal of Physics: Conference Series 2325 (2022) 012041 doi:10.1088/1742-6596/2325/1/012041

The security system uses a Raspberry PI as its CPU. Once an object or person is detected, deep learning
methods are used to identify the person and the numbers are identified using Haar cascade, and YOLO
algorithms.

4. HARDWARE AND SOFTWARE USED

The project is done with Raspberry Pi 3B+ board. Because raspberry is a tiny low-cost development
board that can also be considered as a stand-alone computer, it supports many programming languages
like python, and java. It has many IDE tools included in OS installation. Other development boards such
as Arduino, ESP32, Intel Galilu, and Nvidia Jetson either lack modules such as direct camera support,
WIFI and Bluetooth support or too expensive. As such Raspberry Pi 3B+ is used which has all required
components at affordable cost.
A Raspberry Pi is a development board that has all the components required to run as a standalone
computer and is researched and developed by Raspberry Pi foundation. It is a tiny computer that can use a
standard keyboard and mouse. Raspbian OS is used in it as the most popular operating system which has
to be uploaded into a micro-SD card and inserted into the Raspberry Pi.

Fig: 2 Raspberry pi 3B+ Fig:3 Raspberry Pi 3B+ Architecture.

The Raspberry Pi 3 Model B+ Variant has a 1.4 GHz clock speed and is built using 64-bit quad-core
Broadcom Arm Cortex A53-architecture. It has 15% performance improvement compared to its
predecessor model 3B. It has Bluetooth 4.2 and Bluetooth low energy are supported. It has dual-band
wireless local area networks at 2.4 and 5 GHz. Additionally, it features four USB 2.0 ports, a 40-pin GPIO
header, a full-size HDMI port, port for displays and cameras, and composite video and audio outputs.

Doppler radar is used in this project to detect the motion of objects. This project uses the doppler RADAR
CDM324.

4
International Conference on Electronic Circuits and Signalling Technologies IOP Publishing
Journal of Physics: Conference Series 2325 (2022) 012041 doi:10.1088/1742-6596/2325/1/012041

Fig: 4 CDM324 Doppler Radar

The CDM324 is a single-channel 24 GHz band radar transceiver. A planar microstrip antenna structure is
used in it, it has an independent transmitting and receiving channels and a single IF output. The main
purpose of CDM324 is for velocity information detection of short-range targets. Radial sensors can detect,
locate, track, and recognize a wide range of objects from a distance. During operation, electromagnetic
energy is sent toward targets, and then echoes are observed at the targets. It works on 30ma of current and
has an operating voltage of 5v. Its output power is 16dbm and gives an output of300mv

The term Amplifier refers to any circuit that produces an amplitude increase in the signal it receives.
Because of their ability to amplify relatively small input signals, small signal amplifiers are commonly
used devices. In this project, an LM324 op-amp that boosts the 30mV output of the Doppler radar to 5V
for the convenience of the Raspberry Pi microcontroller has been used.

Fig: 5 Amplifier circuit diagram.


This project uses High Current Active Alarm Buzzer Driver Module, that will buzz at a frequency (2300
±300Hz) on its own even when you just apply steady DC power.

5
International Conference on Electronic Circuits and Signalling Technologies IOP Publishing
Journal of Physics: Conference Series 2325 (2022) 012041 doi:10.1088/1742-6596/2325/1/012041

Fig: 6 Alarm Fig:7 Raspberry Pi Cam.

Raspberry PI cam is an original camera module designed for Raspberry PI development board. The
original Raspberry PI cam is a 5-megapixel camera module and has both normal and infrared versions
which is used for face detection purposes.

YOLO (You Only Look Once) is an algorithm to detect and recognize objects in real time. It is the most
usedalgorithm due to its high speed and accuracy. YOLO is used to detect and identify multiple objects in
a single image. This algorithm works by following three simple steps: -

Fig:8 Yolo Workflow.

YOLO workflow starts by dividing image into various grids called Residual blocks, which has a
dimension of I x I and every cell will detect objects that appear within them. The outline which highlights
the object is called Bounding box and every box in the image consists of width (bw), height (bh), class (c),
and with center (bx, by). Intersection over Union is an evaluation metric used to find an object from
boundingbox regression. The formula of IoU is given as the area of overlap divided by the area of union.

6
International Conference on Electronic Circuits and Signalling Technologies IOP Publishing
Journal of Physics: Conference Series 2325 (2022) 012041 doi:10.1088/1742-6596/2325/1/012041

Fig: 9 Detection by YOLO

Haar Cascade is also known as Viola-Jones Face identification technique. It identifies faces in real time or
in an image by using Object Detection algorithms. The algorithm uses edge or line detection feature. It helps
in recognizing facial highlights and disregards everything else like, trees, structures, background objects etc.

Fig: 10 HAAR Cascade representation.


Here, the live feed from camera must be verified with the dataset. It is done for the identification of
known and unknown individuals. This can be achieved using computer vision. OpenCV which isan open-
source computer vision library can be used to identify objects and faces. When features need to be added,
NumPy can be included. NumPy is a library used for mathematical computations. It provides multi-

7
International Conference on Electronic Circuits and Signalling Technologies IOP Publishing
Journal of Physics: Conference Series 2325 (2022) 012041 doi:10.1088/1742-6596/2325/1/012041

dimensional arrays which arefaster than python lists.


Time helps to get local time or current time, which helps in finding the duration of a process. It returns
floating values as output. OS is a module used to get files or content present in a folder. It also has
functions which can help in creating or removing folders. RPi.GPIO is a python module to control the
GPIO interface (pins) of the Raspberry Pi.

5. METHODOLOGY USED FOR OBJECT DETECTION AND FACE RECOGNITION


Deep Neural Networks (DNN): Neural networks perform numerous calculations, like human brain`s
neural structure, and is inspired after the brain neural structure working principle, which might be meant
to understand designs. DNN is used to design the workflow similar to human neural networks. Unlike
ANN, a concept credit assignment path can be used, which makes it easier for autonomous works. As
such, the nodes can be programmed to perform specific tasks. These nodes are used to integrate Harr
cascade and YOLO for verification from dataset.
YOLO: Compared to fast RCNN which carries out detection on numerous area proposals and makes
multiple predictions in more than one instance for numerous areas in a photo, Yolo structure is greater
and passes the photo (M x M) through the FCNN and the output obtained is (N x N) prediction. This
photo M x M is divided into separate grids for identification. For every grid, this structure divides the
photo into m x m bounding boxes, and each bounding box is assigned a class probability. It is to be noted
that bounding box is much more likely to be larger than the grid itself. This helps in accurate
identificationof the objects.
Haar cascade: Face identification is an innovative method that can classify the human faces according to
the data given in objective pictures with respect to human faces in real-time pictures. It compares facial
highlights and disregards other things such as structures, trees, vehicles and bodies. In face recognition, the
errand is to find out the regions and sizes of a known quantity of appearances; for example, the distance
between eyebrows, forehead size, cheeks measurement etc., Face recognition may be regarded as a step
into the future, as it can help in quickly recognizing people and reducing redundant tasks for many
applications.

8
International Conference on Electronic Circuits and Signalling Technologies IOP Publishing
Journal of Physics: Conference Series 2325 (2022) 012041 doi:10.1088/1742-6596/2325/1/012041

Fig: 11 Flow chart

6. IMPLEMENTATION

The below schematic diagram of home security using radar explains the interfacing section of each
component. An amplifier is built using a series of resistors and capacitors to amplify the signal received
from radar using LM324 operational amplifier which is connected to raspberry pi. An alarm and camera
are also connected for video and surveillance.

9
International Conference on Electronic Circuits and Signalling Technologies IOP Publishing
Journal of Physics: Conference Series 2325 (2022) 012041 doi:10.1088/1742-6596/2325/1/012041

Fig: 12 Schematic diagram of the project

The circuit shown in the figure 12 is constructed using the IC LM324AD, motion sensor, and passive
components like resistors and capacitors.

Fig: 13 Components setup.

This security system is implemented using various hardware and software components. The base of this
system is CDM324 Doppler radar which detects the motion of any object within its specified range using
Doppler effect. Once an object enters the range of the doppler radar, there will be a change in the received
frequencies. Radar calculates the frequency difference and gives an output in mV. The security system
uses a Raspberry PI as its CPU. But the output voltage from the radar is too small. So, an amplifier is
used which amplifies the output voltage into a more readable signal. The output signal is sent to
Raspberry Pi. The output signal will show 0 for no detection and above 1, if any object is detected and a
noise is generated. So, the values are subtracted by a threshold which makes these values nearly 0 and 1.
This process eases out the testing phase. Based on trigger, feed is taken from the camera. Once an object
or person is detected, deep learning methods are used to identify the person and the numbers using Haar

10
International Conference on Electronic Circuits and Signalling Technologies IOP Publishing
Journal of Physics: Conference Series 2325 (2022) 012041 doi:10.1088/1742-6596/2325/1/012041

cascade and YOLO algorithms. The first in the flow is YOLO which identifies the numbers of intruders
and check if it is human or not. YOLO classifies the image into grid cells and divides those grid cells into
bounding boxes by using another program called Intersection Over Union. This process is used to
eliminate the background and other useless objects, thus giving the bounding boxes with objects within
them. After that, those objects are compared with the dataset. The dataset has images of known persons,
animals, and vehicles in different angles. Vehicles, animals, and small objects are ignored. From this
dataset, if the intruder is classified as unknown, then immediately a notification is sent through Email and
WhatsApp along with a loud alarm.

7. RESULTS

The testing is done in a real-world scenario in an office. Once individuals enter the detecting range, the
radar raspberry pi camera is activated and starts recording. The raspberry pi then analyses the recording in
real- time and identifies the number of intruders and known individuals using YOLO and Haar cascade.
Once intruders try to enter, the alarm starts ringing and the event is notified through WhatsApp and email.

Fig: 14 Unknown person identification

11
International Conference on Electronic Circuits and Signalling Technologies IOP Publishing
Journal of Physics: Conference Series 2325 (2022) 012041 doi:10.1088/1742-6596/2325/1/012041

Fig: 15 WhatsApp notification Fig: 16 Email notification

8. CONCLUSION

The project has been designed to enhance the home security system by alerting the household members.
In this paper, an innovative security system is proposed using microwave radar and machine learning
techniques. The sensor gets activated when there is an object in its range, and when an intruder is
identified, the system alarms and notifies the owner. Despite the cost of the radar sensor, the proposed
system gives the accurate results in comparison with all other existing solutions. It is believed that the
chosen technical and technological approach is better than the former solutions in terms of accuracy.

REFERENCES

[1]. N. Surantha and W. R. Wicaksono, “Design of Smart Home Security System using Object
Recognition and PIR Sensor,” in Procedia Computer Science, vol. 135, pp. 465-472, 2018.

[2] A. Jules, "RFID security and privacy: A research survey", IEEE Journal on Selected Areas in
Communications, vol. 24, no. 2, pp. 381- 394, 2006.

12
International Conference on Electronic Circuits and Signalling Technologies IOP Publishing
Journal of Physics: Conference Series 2325 (2022) 012041 doi:10.1088/1742-6596/2325/1/012041

[3] J. Jeong, M. Y. Chung and H. Choo, "Integrated OTP-based user authentication scheme using smart
cards in home networks," In Proceedings of the 41st IEEE Annual Hawaii International Conference on
System Sciences, pp. 294-294,2008.

[4] A. K. Jain, A. Ross, and S. Prabhakar, "An introduction to biometric recognition," IEEE Transactions
on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 4-20, 2004.

[5]. Rajat Kumar Dwibedi,L Pattathu Rani, P.Vinnarasi Ponnury, "Security Alert System Using Radar",
International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Vol.6, Issue
1, pp.723-727, March 2018, Available :http://www.ijedr.org/papers/IJEDR1801125.pdf

[6]. Skolnik, M. I. introductiontoradarsystems-merrillskolnikiiirded-140506103641-phpapp02. pdf.

[7]. Pozar, D. M. (2012). Microwave Engineering. Fourth Editions, University of Massachusetts at


Amherst, John Wiley & Sons, Inc, 26-30.

[8]. Kumar, Sushant, and S. S. Solanki, “Remote homesurveillance system,” IEEE Int.Con.Advances in
Computing, Communication, and Automation, 2016, pp. 1-4.

[9]. R. Chandana, S. a K. Jilani, and S. J. Hussain, “Smart Surveillance System using Thing Speak and
Raspberry Pi,” Int. J. Adv. Res. Comput. Commun. Eng., vol. 4, no. 7, pp. 214-218,
2015.

[10]. J. Bangali and A. Shaligram, "Design and Implementation of Security Systems for Smart Home
based on GSM technology," International Journal of Smart Home, vol. 7, no. 6, pp. 201-208, 2013.

[11]. U.RAMAKRISHNA and N. SWATHI, "Design and Implementation of an IoT Based Smart
Security Surveillance System", International Journal of Scientific Engineering and Technology Research,
Vol. 5, Issue 4, pp 697-702, Feb-2016.

[12]. Gayatri.P.Sonawane and Dr A.J. Patil, "A Survey on Different Digital Video Monitoring Systems",
International Journal of Computer Science Trends and Technology, Volume 3 Issue 3, pp. 132-134, May-
June 2015.

[13]. S. N. Jyothi and K. V. Vardhan, "Design and implementation of real-time security surveillance
system using IoT," In International Conference on Communication and Electronics Systems (ICCES-
2016), pp. 1-5,2016.

[14]. Rajat Kumar Dwibedi, L Pattathu Rani, P.Vinnarasi Ponnury, "Security Alert System Using Radar",
International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Vol.6, Issue
1, pp.723-727, March 2018, Available :http://www.ijedr.org/papers/IJEDR1801125.pdf

[15]. Y. W. Bai, L. S. Shen and Z. H. Li, "Design and implementation of an embedded home.

[16]. Ying-Wen Bai, Li-Sih Shen and Zong-Han Li, "Design and Implementation of an Embedded Home

13
International Conference on Electronic Circuits and Signalling Technologies IOP Publishing
Journal of Physics: Conference Series 2325 (2022) 012041 doi:10.1088/1742-6596/2325/1/012041

Surveillance System by Use of Multiple Ultrasonic Sensors", IEEE Transactions on Consumer


Electronics, Vol. 56. Issue No. 1, February 2010.

[17]. S. Yuvaraj Prof. and Ramesh S., "Improved Response Time on Safety Mechansim Based on PIR
sensor," International Journal of Emerging Technology and Advanced Engineering, vol. 2, no. 4, April
2012.

[18]. Xin Jin, Soumalya Sarkar, Asok Ray, Shalabh Gupta, and Thyagaraju Damarla,"Target Detection
and Classification Using Seismic and PIR Sensors", IEEE Sensors Journal, VOL. 12, NO. 6, JUNE 2012

[19]. P. N. Saranu, G. Abirami, S. Sivakumar, K. M. Ramesh, U. Arul and J. Seetha, "Theft Detection
System using PIR Sensor," 2018 4th International Conference on Electrical Energy Systems (ICEES),
2018, pp. 656-660, doi: 10.1109/ICEES.2018.8443215.

[20]. Chodon, P., Adhikari, D. M., Nepal, G. C., Biswa, R., & Gyeltshen, S. (2013). Passive Infrared
(PIR) Sensor Based Security System. International Journal of Electrical, Electronics & Computer
Systems, 14(2). surveillance system by use of multiple ultrasonicsensors," IEEE Transactions on
Consumer Electronics, vol. 56, no. 1, pp. 119-124, 2010.

[21]. Rakesh, V. S., P. R. Sreesh, and Sudhish N. George, “An improved real-time surveillance system for
home security system using BeagleBoard SBC, Zigbee and FTP webserver,” IEEE Int.Con, 2012, pp.
1240-1244.

[22]. Ansari, Aamir Nizam, Mohamed Sedky, NeelamSharma, and Anurag Tyagi, “An Internet of things
approach for motion detection using Raspberry Pi,” IEEE Int.Con.Intelligent Computing and Internet of
Things, 2014, pp. 131-134.

[23]. Baraneetharan, E. "Role of Machine Learning Algorithms Intrusion Detection in WSNs: A Survey."
Journal of Information Technology 2, no. 03 (2020): 161-173.

14

You might also like