Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/334167858

Smart Security Surveillance using IoT

Conference Paper · August 2018


DOI: 10.1109/ICRITO.2018.8748703

CITATIONS READS
4 4,107

4 authors, including:

Sharmin Akter Rima Md. Sohid Ullah


Daffodil International University 1 PUBLICATION 4 CITATIONS
10 PUBLICATIONS 15 CITATIONS
SEE PROFILE
SEE PROFILE

Syed Akhter Hossain


Daffodil International University
141 PUBLICATIONS 1,255 CITATIONS

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Bengali news headline classification using LSTM View project

Bangla Handwritten Character Recognition View project

All content following this page was uploaded by Sharmin Akter Rima on 02 December 2019.

The user has requested enhancement of the downloaded file.


Smart Security Surveillance using IoT
Sharmin Akter1, Rehana Afroz Sima2, Md. Sohid Ullah3, Syed Akhter Hossain4
1,2,3,4
Daffodil International University, 102 Shukrabad, Dhaka, Bangladesh
1
sharmin3731@diu.edu.bd, 2sima3678@diu.edu.bd, 3sohid4074@diu.edu.bd
4
aktarhossain@daffodilvarsity.edu.bd

Abstract:With the advancement of technology and ICT, a radical rectangle face of the sensor helps detecting the infrared
change in life is reflecting all around. In this 21st century, with radiation. This sensor which is split into two halves: one to
the gift of Internet, Internet of Things (IoT) has become an detect the radiation and the other to detect the change in
integral part of our everyday life. Today IoT not only enable condition of the radiation when a target enters its field of
sensations of life but also imparts new genre of innovations. It has radiation. The potential difference generated due to changes in
been found that IoT plays a significant role in achieving security.
In this proposed research using IoT for Smart Security
the amount of infrared radiation on the element which is
Surveillance System aimed at enhancing the security of home with measured through an electronic circuit attached to the sensor.
the help of IoT. The research intends to develop a smartest During a motion of objects within the radiation field, the PIR
version of doorbell with more security, flexibility and sensor triggers its output to high, which can either be read by
connectivity. In this work, with the help of sensor and camera, the an embedded system to switch an element [2].
system detects motion in front of the door and capture picture
which is sent to the user’s cell phone along with the picture in the Smart security surveillance using IoT with PIR sensor and
email inbox and a detection message. In addition a push button camera module is an interesting idea to involve detection of
for the guest interaction is also considered. The user is able to see sensing of the moving object and generate responses for better
what is happening in front of the door in real time sitting on the security. In this work we proposed a technique to smart
Internet. A camera module is deployed to capture the picture of
security surveillance using Rapsberry Pi, PIR sensor and
the visitor and stream a video on the basis of passive infra-red
(PIR) sensor and the button. In the future, further AI will be camera module.
added to the system for recognizing and identifying the gesture of
the visitor using CV. The rest of the paper is organized as follows. In section 2,
literature review is discussed. Section 3 discuss the proposed
Keywords:Security, Surveillance, motion detection, PIR, system with detail methods and experimental results and
Embedded systems, Reliability. conclusion in Section 4, and Section 5.

II. LITERATURE REVIEW


I. INTRODUCTION
Aamir et.al.[3] in a research work proposed a framework for
Internet of things (IoT) is one of the growing factor of modern
movement discovery with the help of Raspberry-Pi and IoT
technology. It is the way to control physical device by
approach. In this research, movement location framework is
computer or software through internet. That means controlling
proposed to support for security framework. In another
any device from anywhere and anytime. During the passage of
research work, A Sunil Kumar et.al.[4] proposed a framework
innovation, the Internet of Things (IoT) had evolved into to a
based on IOT for movement recognition to support insightful
comprehensive system using multiple technologies
remote control observation of a web server. In a similar
encompassing the Internet to wireless communication in the
research work, Priya B. Patel et.al [5] proposed another
form of enriched embedded systems. With the rapid
framework based on android for remote server monitoring
transformation, experts working with IoT estimated about 30+
purposes. The framework is based on IOT and it deploys push
billion objects by 2020 to be part with IoT. Besides, it is also
notification messages on android gadget while detecting an
estimated the raise of $7.1 trillion global market value of IoT
interruption inside the room. The system authorizes clients to
by 2020[1]. In its most practical form, IoT, in the rapid
the respective observations using the framework remotely on a
orchestration of messages across objects in the Intenet, allows
smart phone. In another similar research work, Jie-Ci Yang
objects sharing using remote accessibility across existing
et.al. [6] proposed a framework in view of human location.
network infrastructure. These objects interactions in computer
The proposed framework dealt with the rule of face location
systems create opportunities for sharing on real-world points
and able to distinguish the objective as individual by face
of view. This helps attaining improved efficiency, accuracy
recognition. In another work, Hyoung-Ro Lee et.al. [7]
and economic benefit at the cost of human intervention.
experimented and demonstrated a framework to identify
A pyro-electric passive infrared (PIR) sensor measures infrared visitors using IOT with the help of IR sensor. It helps to
emissions from objects due to temperature gradient of the body differentiate human body. This research utilizes two ultrasonic
and infrared radiation in its field of view. The crystalline sensors to determine the position of a visitor. In the same
structure of the material which is used at the center of a research a camera module is also deployed through servo
2018 7th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), August 29-31, 2018,
AIIT, Amity University Uttar Pradesh, Noida, India

engine to determine the position of the visitor. A web server movement detection and response generation as real-time as
connected through sensor is utilized to facilitate the visitors possible.
data for the remote client. Furthermore, in the home
automation using IoT, Varisrikrishna Patchava et.al. [8] III. PROPOSED SYSTEM
proposed a collaborative framework on the top of Raspberry-Pi
modules connected to computing vision strategy. The proposed The proposed system is based on PIR sensor and camera
framework controls home appliances through IoT. For module connected to Raspberry Pi along with other system
detection and inspection, Raspberry-Pi is deployed to control peripherals. The use case model proposed system is shown
movement sensor and the camcorder. In another similar below in Figure 1.
research work, Naga Jyothi et.al. [8] experimented with
another framework for security observation using web of
things. The proposed system interacts for identifying the
movement location using Python to determine the capacity
utilization. In this research, the motion detection algorithm is
performed using Raspberry-Pi2 and Pi Camera. The system
also facilitates live video splitting and help the discovery of
articles in motion and generate alert messages soon the
movement is detected. In another research, objects interactions
changes discovery using IOT is demonstrated by Alessandra
Sforzin et.al. [9]. In this research, they demonstrated incredible
achievability and sensing using Raspberry-Pi during an open
source interruption recognition framework. Virginia et.al. [10]
proposed another interesting framework for local observation
of locations in association with business zones. The proposed Fig. 1. Use case model of proposed system.
system is based on Raspberry-Pi and computer vision
framework to identify moving articles in the inspection As shown in the above diagram in Figure 1, there are two
territory. Based on the stimulus received from the system, turn actors in the proposed system of IoT doorbell. One is the guest
the lights on to capture the pictures and streams using MPJG and another one is the admin or the user. Admin will be able to
streamer which is available to authorized users to view. login and see what is happening in front of the doorbell in real
time. The visitors can press the push button and the
As seen from different related research work, the PIR sensors notification will be sent to the admin along with his or her
are commonly used in surveillance systems [11] and also used photo. But if the visitor wouldn’t press the button it will
in automatic light switching systems [12]. It has been found to simply send the notification along with the photo directly to
have promising capabilities as low-cost camera enhancers in the user.
video surveillance systems from the work depicted. Besides,
the research work [13] uses PIR sensors in conjunction with
cameras to address privacy issues and shown to be also very
effective. In this work, PIR sensors are deployed in private
rooms while cameras in public areas for capturing of event
pictures. In this research work, tracking of human is
accomplished through correlation of information from the two
systems deployed.

In another research works different approaches are presented to


track human using PIR sensors. Due to sensitivity of PIR
sensors on changes in incident radiation, in another research
sensors are arranged in an array in concurrence with a chopper
wheel [14]. In this research paper the wheel holds same Fig. 2. System block diagram.
temperature as the background. As a result the module used for
testing generates an output subject to the body having different The proposed system block diagram is shown in the Figure 2.
temperatures compared to background. This behaves like a The main principle of IoT is interaction of physical device
thermal imager. In another similar research work [15] that has through internet. The Raspberry-pi or the doorbell collect
developed a pyro-electric motion tracking system based on necessary information and store it to the public server. The
coded apertures. public sever send the data to user’s phone on the basis of web
app. The full procedures happen through the internet. Here
As seen from different research articles, a common raspberry pi or the doorbell and mobile apps are connected to
characteristic of the security surveillance lies with the the Internet.

654
2018 7th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), August 29-31, 2018,
AIIT, Amity University Uttar Pradesh, Noida, India

The Raspberry Pi Camera Module is used in the proposed As seen from the work flow diagram shown in Figure 4,
system. The camera module is configured for maximum initially the doorbell will be connected to the internet and it
throughput and best response time. Several experiments are will be waiting for motion or button click. When any type of
performed on the camera module to improve efficiency and motion is detected it will wait for certain period of time. After
throughput. Along with the camera module, buzzer is also certain period of time if it is not found any button click then it
attached for audible interactions. The Figure 3 shows the will simply send the notification as suspicious. But if the guest
Raspberry-Pi camera module. clicks on the button it will simply send the notification saying
that there is a guest in front of the doorbell.

IV. EXPERIMENTAL RESULTS

The detail of the experimental setup and the experimental


result is shown in the following Figures. The experimental
setup is configured using Raspberry Pi with all necessary
library modules for GPIO connectivity and PIR sensor along
with the camera module programming using Python language.
We developed the program modules for interactions with PIR
sensors and GPIO to trigger PIR sensor and camera module
and read data from the GPIO for necessary speed calculation.

Fig. 3. Raspberry-Pi camera module.

The proposal system deploys PIR sensor tuned systematically


to ensure that radiation pattern overlaps in a region for the
detection of intruder.

Fig. 5. Raspbeery Pi configurations and settings.

Figure 5 shows the necessary configuration issues of


Raspberry Pi and system settings. The programming
environment is shown in the Figure 6 below.

Fig. 4. Proposed system work flow diagram. Fig. 6. Programming for motion detection.

655
2018 7th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), August 29-31, 2018,
AIIT, Amity University Uttar Pradesh, Noida, India

The complete system is shown in the following Figure 7. As seen in the Figure 8, the proposed system identifies and
detects guest type based on intelligence. During the
experiments, the detection accuracy is determined based on
sensor alignment with reference to the baseline as shown in the
following Table 1.

TABLE I: Comparative Alignments

Detection
Duration (min) Sensor Alignment
accuracy
3 45 degree <=30%
4 65 degree 40-45%
3 70 degree 50-55%
3 75 degree 60-65%
5 80 degree 68-75%
Fig. 7. Security surveillance system based on IoT. 3 90 degree 85-93%

As seen in the Figure 7, the PIR sensor when ready to detect As seen in the Table 1, intruder detection accuracy needs
the motion, the object enters the environment and the system careful tuning of sensors specially placement alignment for.
capture the image using the camera module. The system send the camera module and PIR sensor.
the picture and message in the email and also prepare for
sending in SMS using GSM network. The responses are shown V. CONCLUSION
in the Figure 7 and Figure 8.
In this research work, we developed security surveillance
system using Raspberry Pi along with PIR motion sensor and
camera module. We experimented with PIR sensor in
association with camera module for detail understanding of the
motion sensing and thereafter triggering of the camera module
and detection of intruders on real-time basis. The surveillance
system is tested for intruder detection. The proposed system
using PIR sensor and camera module can be further enhanced
for face detection and recognition based on threshold of
changes and using CV.

REFERENCES

[1] M. Moghavvemi and L. C. Seng, “Pyroelectric infrared sensor


for intruder detection,” in Proc. IEEE Region 10 Conf.
(TENCON 2004), Nov. 2004, vol. 4, pp. 656–659.
Fig. 8. Email received from Security surveillance system. [2] https://learn.adafruit.com/pir-passive-infrared-proximity-motion-
sensor, last accessed on 11 August 2017.
[3] N.Z Aamir, S. Mohamed, “An Internet of Things approaches for
motion detection using Raspberry-Pi, ” International Conference
on intelligent computing and Internet of Things (ICIT) 2015.
[4] K. Sunil, R. Rahul, “An Internet of Things approach for motion
detection using Raspberry-Pi,” International Journal of
Advanced Technology and Innovative Research 2016; 8:3622-
3627.
[5] B.P. Priya, M.C. Viraj, “Smart Motion Detection System using
Raspberry-PI,” International Journal of Applied Information
System (IJAIS) 2016; 10:37-40.
[6] C.Y. Jie, L.L. Chin, “An Automated Door control system based
on a smart camera, ” Sensors 2013; 13:5923-5936.
[7] R.L. Hyoung, H.L. Chi, “Development of an IOT based visitor
detection system, ” IEEE Trans. 2016.
[8] S.N. Jyothi, V. Vijaya, “Design and Implementation of real Time
Fig. 9. Guest detection from Security surveillance system. security Surveillance system using IOT, ” IEEE Trans. 2016.

656
2018 7th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), August 29-31, 2018,
AIIT, Amity University Uttar Pradesh, Noida, India

[9] Alessandro Sforzin, Mouryo Conti, Felix Gomez Marmol and Int. Workshop Sens. Actor Netw. Protoc. Appl., Boston, MA,
Jens Matthaias Bohli, International IEEE conferences on Aug. 2004, pp.21–29
Ubiquities Intelligence and Computing, Advanced and trusted [13] K. Hashimoto, K. Morinaka, N. Yoshiike, C. Kawaguchi, and S.
computing, Internet of people, and smart world congress, IEEE Matsueda, “People count system using multi-sensing application,
2016. ” presented at the Int. Conf. Solid State Sens. Actuators
[10] M. Virginia, P. Vamsrikrishna, “Surveillance and monitoring (TRANSDUCERS 1997), Chicago, IL, Jun. 1997.
System using Raspberry-Pi and simple CV”, IEEE 2016. [14] U. Gopinathan, D. Brady, and N. Pitsianis, “Coded apertures for
[11] Y. W. Bai and Y. T. Ku, “Automatic room light intensity efficient pyroelectric motion tracking, ” Opt. Exp., vol. 11, no.
detection and control using a microprocessor and light sensors, ” 18, pp. 2142–2152, 2003.
IEEE Trans. Consum. Electron., vol. 54, no. 3, pp. 1173–1176, [15] Q. Hao, D. Brady, B. Guenther, J. Burchett, M. Shankar, and S.
Aug. 2008. Feller, “Human tracking with wireless distributed pyroelectric
[12] A. Rajgarhia, F. Stann, and J. Heidemann, “Privacy-sensitive sensors, ” IEEE Sensors J., vol. 6, no. 6, pp. 1683–1696, Dec.
monitoring with a mix of IR sensors and cameras, ” in Proc. 2nd 2006.

657

View publication stats

You might also like