SlideShare une entreprise Scribd logo
1  sur  16
Page | I I
Smart Security System
Ibrahim Rogers
Viktar Rybaltouski
Guriqbal Singh
Proposal Submitted In Partial Fulfillment of the
Senior Level Capstone Design Course at Penn State Harrisburg
EET419 Section 001
EE405 Section 001
Fall Semester, 2014
Page | I I
Abstract
This document presents the background, top-level functional design and budget for a
proposed, security systemthat is applicable in private homes and businesses. In the first section
(Introduction) of this document the History of home security systems and current applicable
technologies are described, including features of the proposed product that would differentiate
it from the market. The second section (Experimental Methodology) includes Specifications for
the system which were derived along with the constraints. Also included in this section is a Level
2 functional decomposition which shows a flow chart description of how the proposed system
operates. Section three (Project Management) includes a project management plan along with
a Gantt chart. Section four (Cost Analysis) includes a proposed budget needed for the design.
Finally section five (summary and conclusion) includes a summary of all the research and
experimental methodology, along with a conclusion for the proposed design.
Page | I I
TABLE OF CONTENTS
INDEX OF SYMBOLS ...................................................................................................... 4
INDEX OF FIGURES ........................................................................................................ 5
Introduction.......................................................................Error! Bookmark not defined.
Project Introduction................................................Error! Bookmark not defined.
Technical History...................................................Error! Bookmark not defined.
Technical Research................................................Error! Bookmark not defined.
Lifecycle of Similar Products ................................Error! Bookmark not defined.
Experimental Methodology...............................................Error! Bookmark not defined.
Engineering Requirements Development .............Error! Bookmark not defined.
Constraints of the System ......................................Error! Bookmark not defined.
Functional Decomposition.....................................Error! Bookmark not defined.
Project Management .........................................................Error! Bookmark not defined.
Work Breakdown...................................................Error! Bookmark not defined.
Gantt Chart.............................................................Error! Bookmark not defined.
Cost Analysis .....................................................................Error! Bookmark not defined.
Summary and Conclusion..................................................Error! Bookmark not defined.
References..........................................................................Error! Bookmark not defined.
Page | I I
INDEX OF SYMBOLS
Page | I I
INDEX OF FIGURES
No table of figures entries found.
[The listof figuresabove iscreatedusingWord’sTable of Figures(TOF).The benefitof usingTOFis
automaticupdate forpage numbers.Tocreate a TOF, youmust create captionsforall figures.Tocreate
a caption,highlightafigure andgo to ReferencesandInsertCaption.The dialogbox will appear.Under
Options,choose Figure anda positionof captione.g.,above afigure.UnderCaption,write acaption
e.g.,Figure 1: Figure 1 title.Afterapplyingcaptions,putcursoronthe listof figurespage,goto
ReferencesandInsertTable of Figures.UnderGeneral,choose Figure forCaptionlabel.Toupdate,right
click,selectUpdate Fieldandchoose one of the two options.]
[Youmighthave to adjust“Caption”style.Todo so, rightclick“Caption”style andchoose Modify.You
needtoadjustonlyonce]
Page | I I
Introduction
Project Introduction
Imagine coming home after a long day of work to a house that has been burglarized, or
going to bed at night with no sense of security and having the thought of someone breaking
into your house and possibly harming you or your family run through your mind. According to
the FBI, there were an estimated 2,103,787 burglaries in 2012, a decrease of 3.7% compared to
2011. Compared to 3.7 million household burglaries each year on average from 2003 to 2007.
In about 28% of these burglaries, a household member was present during the burglary. As you
can see the amount of burglaries has had a steady decrease in the past decade but they’re still
occurring at a very high rate. Home intrusions occur every 13 seconds in the United States. Your
chances of becoming a victim can be severely decreased by having a home security system.
Surprisingly only 17% of homes in the United States have security systems, meanwhile homes
without security systems are up to 300% more likely to be broken into. Many people choose
not to have these systems because they’re either too expensive or too complicated to use.
Others rely on the protection of having home insurance but sometimes buglers steal things that
have sentimental value and can’t be replaced. Almost all home security systems available to
consumers require monitoring by an outside party such as ADT and ESCO; these outside parties
usually charge an installation fee and a recurring monthly fee. Our design called The Smart
Security System (SSS) will allow home and business owners to monitor their homes and
businesses via their smart phones. Activating and deactivating the sensors will be done via their
smart phone wirelessly using Wi-Fi technology. This allows them to have control of the system
regardless of where they are. Our system will include a motion sensor, gas/smoke detector,
Page | I I
temperature sensor and built in camera. Almost all the security systems available in the market
today only come with motion detectors and the rest are sold separate at an extra cost to the
customer. With our design customers will only have the one-time cost of the device with no
installation fees or reoccurring monthly fee, this allows them to save hundreds each year. The
SSS will be more convenient and portable since every component (such as motion sensor and
camera) will be built in one device allowing customers to self-install the device.
Technical History
In recent years, home security has moved away from simple control panels and deadbolt
locks to high-tech security technologies that are composed on many homeowners’ wish lists.
Today’s security systems are not simply the product of technological developments of the past
few years, but the combination of experience and hard work throughout decades. To understand
how home security became as what it is today, we should take a look back to the past.
The increase in crime after World War I resulted in Americans becoming sensitive to
security needs and they were willing to find methods to keep themselves and their property
secured [1]. Additionally, many insurance companies stepped in, offering premium discounts to
alarm subscribers. During this time period demand for alarm systems had begun to peak and the
American telephone companies introduced emergency call systems that invited police and fire
fighting personnel into the security system era [1].
Although video surveillance technology was developed in the 1940s, it was not until the
1970s that it was used in homes as a security measure. After World War II home security
systems became less expensive and more versatile for use in 1980s [2]. Early advanced home
security systems included bulky camera that would be motorized and moved down a track to
Page | I I
view the outdoor of the home throughout eyeholes mounted in the front door [2]. The video
cameras transmitted rough images of visitors to a stationary television monitor that also served as
the control panel where the homeowner could remotely control the camera’s movements.
Now days, surveillance cameras are as small as one square inch and connected to the
Internet. These camera can be outfitted with powerful lenses that can capture and stream high
definition video online that can be viewed from anywhere in the world. The signal is transmitted
wirelessly to the user. Additionally, with a connected smart home, homeowners can program
their security systems to send a live video clip of an area if motion is detected when the home is
unoccupied and the alarm is activated. Some systems not only can warn you of intruders, but also
can notify authorities of a medical emergency, monitor smoke, and carbon monoxide and water
levels or pressures. Some systems also are linked into your home's wiring, heating or lighting
systems and use your mobile phone, device, or computer to control them [3].
Technical Research
Home security systems work on the simple concept of securing entry points into
a home with sensors that communicate with a control panel or command center installed in a
convenient location somewhere in the home [4]. Sensors are typically placed in doors that lead
to and from a house as well as easily accessible windows, particularly any that open, especially
those at ground level. Some systems not only can warn you of intruders, but also can notify
authorities of a medical emergency and monitor smoke and carbon monoxide levels. Some
systems can be linked into your home's wiring, heating or lighting systems and use your mobile
phone or computer to control them [3]. There are a few companies that provide the similar
Page | I I
features in their home security system but they require multicomponent such camera, smoke
and carbon monoxide and even a pin pad to activate and deactivate the system.
ADT and Brinks are just a few companies that provide many useful features but they
also offer separate components and you have to pay each month to keep your systemup and
running [5]. ADT provides 3 different security plans, first is a basic home security with gives you
a few good features for less cost. If you want their best features which include remote alarm
system and live video, it will cost you a lot more than the basic plan [5]. Another company that
provides home security systemis Brinks. Brinks has many useful features in their security
system but same as ADT if you want the high end security features you have to pay more [6].
Our Smart Security System offers advantages like video surveillance, a smoke detector, carbon
monoxide detector and a temperature/humidity sensor all built into one device. Also the
activation and deactivation of the systemwill be done through a mobile device or smart device.
The best thing about our system is that you don’t have to pay a monthly fee, it’s a once time
cost and total monitoring/control is done by the owner.
Lifecycle of similar products
Funlux 8ch 960h
Page | I I
Experimental Methodology
EngineeringRequirementsDevelopment
Planning
Requirements
& Analysis
Architecture &
Design
Development
Testing
Deployment
Maintenance
Marketing
Requirements
Engineering Requirements Justifications
Page | I I
The systemthat we have designed will operate off a battery or it will have backup
battery in case of an emergency. The systemthat we have designed is very efficient because it
only needs 5V maximum to power the entire system so that means we could use a 9V battery
to run our system which makes it more portable. The weight of the system will be 453 grams so
it will be able to be mounted to the ceiling. The systemwill be able to provide the user with
visual images that will be supported by all smart phones such as Android, IOS, and Windows.
The security systemwill be connected to the internet though W-FI but controlled by a smart
phone at all times.
Constraints of the system
Safety:
1,2 The systemmustbe batteryoperated. Replaceable 9v battery or
rechargeable battery to keep
cost down or connected to a
constant power source such as
an outlet.
3,6 Maximumproductlengthis13 inch
Maximumproductwidthis10 inch
Maximumproductthicknessis2 1/2 inch
Maximumproductweightis453 grams
Mounted on the ceiling.
5 Visual imageswill be inJointPhotographic
ExpertsGroup(JPEG) format.The Imageswill be
ina formatcompatible withPortableNetwork
Graphic (PNG) andWindowsBitmapFormat
(DIB).
Format that will be supported
on mobile and computer
devices
4 Device shouldbe controlledwirelesslyvia
BluetoothorWi-Fi.
Most smart phonesand
computersalreadyhave
BluetoothorWi-Fi capabilities
Marketingrequirements:
1. Must be available forpurchase of the general publicin$300-$400 range
2. Must be battery poweredorchargeable
3. Must not be greaterthan 10 x 13 inch
4. Must be able tohave full control of the system
5. Must be able toreceive visual andaudiblealerts
6. Must be able tobe mountedonthe wall orceiling
Page | I I
Our product will be designed as a low power device (5V max). The system will be
battery operated.
Testing:
Testing will be done in lab and in the environment with all possible conditions. The
testing will include durability, reliability and efficiency.
Cost:
The prototype will cost $135.
Timing:
The actual prototype is expected to be finished on May 1st 2015.
The system is very low powered device that will only need 5v maximum supply. To
make the system more portable, a 9V battery can be used. Most of testing will be done is a lab
but the system will be put through many tests to ensure quality of our product. The total cost of
the system is $135 and the prototype is expected to be finished by May 1st 2015.
Functional Decomposition
External device: Smart phone
Module Temperature &Humiditysensor
Input Temperature &Humiditychanges
Outputs Digital signal tothe microprocessor
Function To monitortemperature andhumiditychanges
Page | I I
Module Smoke sensor
Input LPG, i-butane,methane,andalcohol
Outputs Analogsignal tothe microprocessor
Function To detectgassesin the securedarea
Module CO sensor
Input CO gas
Outputs Digital signal tothe microprocessor
Function To detectexcessCOgas
Module Motionsensor
Input Passive Infrared
Outputs Digital signal tothe microprocessor
Function To detectmotion
Module Camera
Input Light
Outputs JPEG image to microprocessor
Function To take an image of securedarea
Module Microprocessor
Input Sensors,camera,andWi-Fi
Outputs Signal toWi-Fi,cameraand buzzers
Function Receive/interpretdata
Module Wi-Fi
Input Microprocessorandsmartphone
Outputs Microprocessorandsmartphone
Function Communicationbetweenmicroprocessorandsmartphone
Module Smart phone
Input Analyzeddatafrommicroprocessor,user
Outputs Commandstothe microprocessor
Function To control/manage the system
Page | I I
Project Management
Work Breakdown
Gantt Chart
Page | I I
Cost Analysis
Page | I I
Summary and Conclusion

Contenu connexe

Tendances

Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Shashi Kumar
 
Home automation System (Acknowledgement and Preface Only)
Home automation System (Acknowledgement and Preface Only)Home automation System (Acknowledgement and Preface Only)
Home automation System (Acknowledgement and Preface Only)Naman Gautam
 
Automatic water level monitoring and control system using IoT
Automatic water level monitoring and control system using IoTAutomatic water level monitoring and control system using IoT
Automatic water level monitoring and control system using IoTDanish Mehraj
 
sixth sense presentation
sixth sense presentationsixth sense presentation
sixth sense presentationAayush Agrawal
 
CCTV Security Cameras - Basics
CCTV Security Cameras - Basics CCTV Security Cameras - Basics
CCTV Security Cameras - Basics Emmanuel Kirui
 
Arduino Automatic Watering System Plants Sprinkler Using IoT
Arduino Automatic Watering System Plants Sprinkler Using IoTArduino Automatic Watering System Plants Sprinkler Using IoT
Arduino Automatic Watering System Plants Sprinkler Using IoTPRAVEEN KANSARI
 
Introduction to vision systems in lab view
Introduction to vision systems in lab viewIntroduction to vision systems in lab view
Introduction to vision systems in lab viewedmilsonrobertobraga
 
Smart Home Automation And security System
Smart Home Automation And security SystemSmart Home Automation And security System
Smart Home Automation And security SystemAmit Kundu
 
Tracking system on IOT
Tracking system on IOTTracking system on IOT
Tracking system on IOTAlex Vishwa
 
Smart home solution
Smart home solutionSmart home solution
Smart home solutiontipo-lab
 
Water Level Monitoring System using IOT
Water Level Monitoring System using IOTWater Level Monitoring System using IOT
Water Level Monitoring System using IOTIRJET Journal
 
Natural User Interfaces
Natural User InterfacesNatural User Interfaces
Natural User InterfacesLuigi Oliveto
 
Smart Home technologies
Smart Home technologiesSmart Home technologies
Smart Home technologiesloggcity
 
Ip Cameras
Ip CamerasIp Cameras
Ip CamerasirisZH21
 
NIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYNIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYMihika Shah
 
Intelligent wireless video monitoring system using computer111111
Intelligent wireless video monitoring system using computer111111Intelligent wireless video monitoring system using computer111111
Intelligent wireless video monitoring system using computer111111venkatesh deekonda
 

Tendances (20)

Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) -
 
Home automation System (Acknowledgement and Preface Only)
Home automation System (Acknowledgement and Preface Only)Home automation System (Acknowledgement and Preface Only)
Home automation System (Acknowledgement and Preface Only)
 
Automatic water level monitoring and control system using IoT
Automatic water level monitoring and control system using IoTAutomatic water level monitoring and control system using IoT
Automatic water level monitoring and control system using IoT
 
sixth sense presentation
sixth sense presentationsixth sense presentation
sixth sense presentation
 
CCTV Security Cameras - Basics
CCTV Security Cameras - Basics CCTV Security Cameras - Basics
CCTV Security Cameras - Basics
 
Arduino Automatic Watering System Plants Sprinkler Using IoT
Arduino Automatic Watering System Plants Sprinkler Using IoTArduino Automatic Watering System Plants Sprinkler Using IoT
Arduino Automatic Watering System Plants Sprinkler Using IoT
 
Introduction to vision systems in lab view
Introduction to vision systems in lab viewIntroduction to vision systems in lab view
Introduction to vision systems in lab view
 
Smart Home Automation And security System
Smart Home Automation And security SystemSmart Home Automation And security System
Smart Home Automation And security System
 
What is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoTWhat is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoT
 
Tracking system on IOT
Tracking system on IOTTracking system on IOT
Tracking system on IOT
 
Smart home solution
Smart home solutionSmart home solution
Smart home solution
 
Water Level Monitoring System using IOT
Water Level Monitoring System using IOTWater Level Monitoring System using IOT
Water Level Monitoring System using IOT
 
Natural User Interfaces
Natural User InterfacesNatural User Interfaces
Natural User Interfaces
 
Smart Home technologies
Smart Home technologiesSmart Home technologies
Smart Home technologies
 
Ip Cameras
Ip CamerasIp Cameras
Ip Cameras
 
NIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYNIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGY
 
Smart Steps Presentation
Smart Steps Presentation Smart Steps Presentation
Smart Steps Presentation
 
Intelligent wireless video monitoring system using computer111111
Intelligent wireless video monitoring system using computer111111Intelligent wireless video monitoring system using computer111111
Intelligent wireless video monitoring system using computer111111
 
Home security system
Home security systemHome security system
Home security system
 
CHILD TRACKING SYSTEM
CHILD TRACKING SYSTEMCHILD TRACKING SYSTEM
CHILD TRACKING SYSTEM
 

Similaire à Smart Security System Final Proposal

Design and Development of IntelliHome
Design and Development of IntelliHomeDesign and Development of IntelliHome
Design and Development of IntelliHomeIRJET Journal
 
IRJET- Industrial Automation with a Smart Robot and Mobile Control
IRJET- Industrial Automation with a Smart Robot and Mobile ControlIRJET- Industrial Automation with a Smart Robot and Mobile Control
IRJET- Industrial Automation with a Smart Robot and Mobile ControlIRJET Journal
 
SDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveSDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveDawn Nash Pfeiffer
 
Make things come alive in a secure way - Sigfox
Make things come alive in a secure way - SigfoxMake things come alive in a secure way - Sigfox
Make things come alive in a secure way - SigfoxSigfox
 
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...
IRJET - Safety and Security Aspects of Smart Home Applications using Face...IRJET Journal
 
IRJET- Experimental Investigation on Properties of High Volume Fly Ash High S...
IRJET- Experimental Investigation on Properties of High Volume Fly Ash High S...IRJET- Experimental Investigation on Properties of High Volume Fly Ash High S...
IRJET- Experimental Investigation on Properties of High Volume Fly Ash High S...IRJET Journal
 
IRJET- Design and Implementation of a Smart Home(Smoke, Fire, Gas and Motion ...
IRJET- Design and Implementation of a Smart Home(Smoke, Fire, Gas and Motion ...IRJET- Design and Implementation of a Smart Home(Smoke, Fire, Gas and Motion ...
IRJET- Design and Implementation of a Smart Home(Smoke, Fire, Gas and Motion ...IRJET Journal
 
IRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security FeaturesIRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security FeaturesIRJET Journal
 
Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...
Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...
Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...Enerco Energy Solutions LLP
 
Message based home automation & security system
Message based home automation  & security systemMessage based home automation  & security system
Message based home automation & security systemjhp_eee
 
The Role of Technology in Commercial Roof Inspections High Point’s Innovative...
The Role of Technology in Commercial Roof Inspections High Point’s Innovative...The Role of Technology in Commercial Roof Inspections High Point’s Innovative...
The Role of Technology in Commercial Roof Inspections High Point’s Innovative...Mobile Free To Play
 
Industrial engineering 4.0
Industrial engineering 4.0Industrial engineering 4.0
Industrial engineering 4.0Pramod kathamore
 
Home Security App Development.docx
Home Security App Development.docxHome Security App Development.docx
Home Security App Development.docxCMARIX TechnoLabs
 
Trust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT DevicesTrust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT Devicesijtsrd
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarketFinite Moments
 
10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance InstallationShein Myint Aung
 

Similaire à Smart Security System Final Proposal (20)

MAJOR_PROJECT
MAJOR_PROJECTMAJOR_PROJECT
MAJOR_PROJECT
 
Design and Development of IntelliHome
Design and Development of IntelliHomeDesign and Development of IntelliHome
Design and Development of IntelliHome
 
IRJET- Industrial Automation with a Smart Robot and Mobile Control
IRJET- Industrial Automation with a Smart Robot and Mobile ControlIRJET- Industrial Automation with a Smart Robot and Mobile Control
IRJET- Industrial Automation with a Smart Robot and Mobile Control
 
IoT (IIoT) Implementation .pptx
IoT (IIoT) Implementation .pptxIoT (IIoT) Implementation .pptx
IoT (IIoT) Implementation .pptx
 
IBM Xforce Q4 2014
IBM Xforce Q4 2014IBM Xforce Q4 2014
IBM Xforce Q4 2014
 
SDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveSDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator Perspective
 
Make things come alive in a secure way - Sigfox
Make things come alive in a secure way - SigfoxMake things come alive in a secure way - Sigfox
Make things come alive in a secure way - Sigfox
 
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
 
IRJET- Experimental Investigation on Properties of High Volume Fly Ash High S...
IRJET- Experimental Investigation on Properties of High Volume Fly Ash High S...IRJET- Experimental Investigation on Properties of High Volume Fly Ash High S...
IRJET- Experimental Investigation on Properties of High Volume Fly Ash High S...
 
IRJET- Design and Implementation of a Smart Home(Smoke, Fire, Gas and Motion ...
IRJET- Design and Implementation of a Smart Home(Smoke, Fire, Gas and Motion ...IRJET- Design and Implementation of a Smart Home(Smoke, Fire, Gas and Motion ...
IRJET- Design and Implementation of a Smart Home(Smoke, Fire, Gas and Motion ...
 
IRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security FeaturesIRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security Features
 
Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...
Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...
Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...
 
Message based home automation & security system
Message based home automation  & security systemMessage based home automation  & security system
Message based home automation & security system
 
Intel_YogaBlueprint
Intel_YogaBlueprintIntel_YogaBlueprint
Intel_YogaBlueprint
 
The Role of Technology in Commercial Roof Inspections High Point’s Innovative...
The Role of Technology in Commercial Roof Inspections High Point’s Innovative...The Role of Technology in Commercial Roof Inspections High Point’s Innovative...
The Role of Technology in Commercial Roof Inspections High Point’s Innovative...
 
Industrial engineering 4.0
Industrial engineering 4.0Industrial engineering 4.0
Industrial engineering 4.0
 
Home Security App Development.docx
Home Security App Development.docxHome Security App Development.docx
Home Security App Development.docx
 
Trust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT DevicesTrust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT Devices
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation
 

Smart Security System Final Proposal

  • 1. Page | I I Smart Security System Ibrahim Rogers Viktar Rybaltouski Guriqbal Singh Proposal Submitted In Partial Fulfillment of the Senior Level Capstone Design Course at Penn State Harrisburg EET419 Section 001 EE405 Section 001 Fall Semester, 2014
  • 2. Page | I I Abstract This document presents the background, top-level functional design and budget for a proposed, security systemthat is applicable in private homes and businesses. In the first section (Introduction) of this document the History of home security systems and current applicable technologies are described, including features of the proposed product that would differentiate it from the market. The second section (Experimental Methodology) includes Specifications for the system which were derived along with the constraints. Also included in this section is a Level 2 functional decomposition which shows a flow chart description of how the proposed system operates. Section three (Project Management) includes a project management plan along with a Gantt chart. Section four (Cost Analysis) includes a proposed budget needed for the design. Finally section five (summary and conclusion) includes a summary of all the research and experimental methodology, along with a conclusion for the proposed design.
  • 3. Page | I I TABLE OF CONTENTS INDEX OF SYMBOLS ...................................................................................................... 4 INDEX OF FIGURES ........................................................................................................ 5 Introduction.......................................................................Error! Bookmark not defined. Project Introduction................................................Error! Bookmark not defined. Technical History...................................................Error! Bookmark not defined. Technical Research................................................Error! Bookmark not defined. Lifecycle of Similar Products ................................Error! Bookmark not defined. Experimental Methodology...............................................Error! Bookmark not defined. Engineering Requirements Development .............Error! Bookmark not defined. Constraints of the System ......................................Error! Bookmark not defined. Functional Decomposition.....................................Error! Bookmark not defined. Project Management .........................................................Error! Bookmark not defined. Work Breakdown...................................................Error! Bookmark not defined. Gantt Chart.............................................................Error! Bookmark not defined. Cost Analysis .....................................................................Error! Bookmark not defined. Summary and Conclusion..................................................Error! Bookmark not defined. References..........................................................................Error! Bookmark not defined.
  • 4. Page | I I INDEX OF SYMBOLS
  • 5. Page | I I INDEX OF FIGURES No table of figures entries found. [The listof figuresabove iscreatedusingWord’sTable of Figures(TOF).The benefitof usingTOFis automaticupdate forpage numbers.Tocreate a TOF, youmust create captionsforall figures.Tocreate a caption,highlightafigure andgo to ReferencesandInsertCaption.The dialogbox will appear.Under Options,choose Figure anda positionof captione.g.,above afigure.UnderCaption,write acaption e.g.,Figure 1: Figure 1 title.Afterapplyingcaptions,putcursoronthe listof figurespage,goto ReferencesandInsertTable of Figures.UnderGeneral,choose Figure forCaptionlabel.Toupdate,right click,selectUpdate Fieldandchoose one of the two options.] [Youmighthave to adjust“Caption”style.Todo so, rightclick“Caption”style andchoose Modify.You needtoadjustonlyonce]
  • 6. Page | I I Introduction Project Introduction Imagine coming home after a long day of work to a house that has been burglarized, or going to bed at night with no sense of security and having the thought of someone breaking into your house and possibly harming you or your family run through your mind. According to the FBI, there were an estimated 2,103,787 burglaries in 2012, a decrease of 3.7% compared to 2011. Compared to 3.7 million household burglaries each year on average from 2003 to 2007. In about 28% of these burglaries, a household member was present during the burglary. As you can see the amount of burglaries has had a steady decrease in the past decade but they’re still occurring at a very high rate. Home intrusions occur every 13 seconds in the United States. Your chances of becoming a victim can be severely decreased by having a home security system. Surprisingly only 17% of homes in the United States have security systems, meanwhile homes without security systems are up to 300% more likely to be broken into. Many people choose not to have these systems because they’re either too expensive or too complicated to use. Others rely on the protection of having home insurance but sometimes buglers steal things that have sentimental value and can’t be replaced. Almost all home security systems available to consumers require monitoring by an outside party such as ADT and ESCO; these outside parties usually charge an installation fee and a recurring monthly fee. Our design called The Smart Security System (SSS) will allow home and business owners to monitor their homes and businesses via their smart phones. Activating and deactivating the sensors will be done via their smart phone wirelessly using Wi-Fi technology. This allows them to have control of the system regardless of where they are. Our system will include a motion sensor, gas/smoke detector,
  • 7. Page | I I temperature sensor and built in camera. Almost all the security systems available in the market today only come with motion detectors and the rest are sold separate at an extra cost to the customer. With our design customers will only have the one-time cost of the device with no installation fees or reoccurring monthly fee, this allows them to save hundreds each year. The SSS will be more convenient and portable since every component (such as motion sensor and camera) will be built in one device allowing customers to self-install the device. Technical History In recent years, home security has moved away from simple control panels and deadbolt locks to high-tech security technologies that are composed on many homeowners’ wish lists. Today’s security systems are not simply the product of technological developments of the past few years, but the combination of experience and hard work throughout decades. To understand how home security became as what it is today, we should take a look back to the past. The increase in crime after World War I resulted in Americans becoming sensitive to security needs and they were willing to find methods to keep themselves and their property secured [1]. Additionally, many insurance companies stepped in, offering premium discounts to alarm subscribers. During this time period demand for alarm systems had begun to peak and the American telephone companies introduced emergency call systems that invited police and fire fighting personnel into the security system era [1]. Although video surveillance technology was developed in the 1940s, it was not until the 1970s that it was used in homes as a security measure. After World War II home security systems became less expensive and more versatile for use in 1980s [2]. Early advanced home security systems included bulky camera that would be motorized and moved down a track to
  • 8. Page | I I view the outdoor of the home throughout eyeholes mounted in the front door [2]. The video cameras transmitted rough images of visitors to a stationary television monitor that also served as the control panel where the homeowner could remotely control the camera’s movements. Now days, surveillance cameras are as small as one square inch and connected to the Internet. These camera can be outfitted with powerful lenses that can capture and stream high definition video online that can be viewed from anywhere in the world. The signal is transmitted wirelessly to the user. Additionally, with a connected smart home, homeowners can program their security systems to send a live video clip of an area if motion is detected when the home is unoccupied and the alarm is activated. Some systems not only can warn you of intruders, but also can notify authorities of a medical emergency, monitor smoke, and carbon monoxide and water levels or pressures. Some systems also are linked into your home's wiring, heating or lighting systems and use your mobile phone, device, or computer to control them [3]. Technical Research Home security systems work on the simple concept of securing entry points into a home with sensors that communicate with a control panel or command center installed in a convenient location somewhere in the home [4]. Sensors are typically placed in doors that lead to and from a house as well as easily accessible windows, particularly any that open, especially those at ground level. Some systems not only can warn you of intruders, but also can notify authorities of a medical emergency and monitor smoke and carbon monoxide levels. Some systems can be linked into your home's wiring, heating or lighting systems and use your mobile phone or computer to control them [3]. There are a few companies that provide the similar
  • 9. Page | I I features in their home security system but they require multicomponent such camera, smoke and carbon monoxide and even a pin pad to activate and deactivate the system. ADT and Brinks are just a few companies that provide many useful features but they also offer separate components and you have to pay each month to keep your systemup and running [5]. ADT provides 3 different security plans, first is a basic home security with gives you a few good features for less cost. If you want their best features which include remote alarm system and live video, it will cost you a lot more than the basic plan [5]. Another company that provides home security systemis Brinks. Brinks has many useful features in their security system but same as ADT if you want the high end security features you have to pay more [6]. Our Smart Security System offers advantages like video surveillance, a smoke detector, carbon monoxide detector and a temperature/humidity sensor all built into one device. Also the activation and deactivation of the systemwill be done through a mobile device or smart device. The best thing about our system is that you don’t have to pay a monthly fee, it’s a once time cost and total monitoring/control is done by the owner. Lifecycle of similar products Funlux 8ch 960h
  • 10. Page | I I Experimental Methodology EngineeringRequirementsDevelopment Planning Requirements & Analysis Architecture & Design Development Testing Deployment Maintenance Marketing Requirements Engineering Requirements Justifications
  • 11. Page | I I The systemthat we have designed will operate off a battery or it will have backup battery in case of an emergency. The systemthat we have designed is very efficient because it only needs 5V maximum to power the entire system so that means we could use a 9V battery to run our system which makes it more portable. The weight of the system will be 453 grams so it will be able to be mounted to the ceiling. The systemwill be able to provide the user with visual images that will be supported by all smart phones such as Android, IOS, and Windows. The security systemwill be connected to the internet though W-FI but controlled by a smart phone at all times. Constraints of the system Safety: 1,2 The systemmustbe batteryoperated. Replaceable 9v battery or rechargeable battery to keep cost down or connected to a constant power source such as an outlet. 3,6 Maximumproductlengthis13 inch Maximumproductwidthis10 inch Maximumproductthicknessis2 1/2 inch Maximumproductweightis453 grams Mounted on the ceiling. 5 Visual imageswill be inJointPhotographic ExpertsGroup(JPEG) format.The Imageswill be ina formatcompatible withPortableNetwork Graphic (PNG) andWindowsBitmapFormat (DIB). Format that will be supported on mobile and computer devices 4 Device shouldbe controlledwirelesslyvia BluetoothorWi-Fi. Most smart phonesand computersalreadyhave BluetoothorWi-Fi capabilities Marketingrequirements: 1. Must be available forpurchase of the general publicin$300-$400 range 2. Must be battery poweredorchargeable 3. Must not be greaterthan 10 x 13 inch 4. Must be able tohave full control of the system 5. Must be able toreceive visual andaudiblealerts 6. Must be able tobe mountedonthe wall orceiling
  • 12. Page | I I Our product will be designed as a low power device (5V max). The system will be battery operated. Testing: Testing will be done in lab and in the environment with all possible conditions. The testing will include durability, reliability and efficiency. Cost: The prototype will cost $135. Timing: The actual prototype is expected to be finished on May 1st 2015. The system is very low powered device that will only need 5v maximum supply. To make the system more portable, a 9V battery can be used. Most of testing will be done is a lab but the system will be put through many tests to ensure quality of our product. The total cost of the system is $135 and the prototype is expected to be finished by May 1st 2015. Functional Decomposition External device: Smart phone Module Temperature &Humiditysensor Input Temperature &Humiditychanges Outputs Digital signal tothe microprocessor Function To monitortemperature andhumiditychanges
  • 13. Page | I I Module Smoke sensor Input LPG, i-butane,methane,andalcohol Outputs Analogsignal tothe microprocessor Function To detectgassesin the securedarea Module CO sensor Input CO gas Outputs Digital signal tothe microprocessor Function To detectexcessCOgas Module Motionsensor Input Passive Infrared Outputs Digital signal tothe microprocessor Function To detectmotion Module Camera Input Light Outputs JPEG image to microprocessor Function To take an image of securedarea Module Microprocessor Input Sensors,camera,andWi-Fi Outputs Signal toWi-Fi,cameraand buzzers Function Receive/interpretdata Module Wi-Fi Input Microprocessorandsmartphone Outputs Microprocessorandsmartphone Function Communicationbetweenmicroprocessorandsmartphone Module Smart phone Input Analyzeddatafrommicroprocessor,user Outputs Commandstothe microprocessor Function To control/manage the system
  • 14. Page | I I Project Management Work Breakdown Gantt Chart
  • 15. Page | I I Cost Analysis
  • 16. Page | I I Summary and Conclusion