cloud controlled intrusion detection and burglary prevention stratagems in home automation systems
TRANSCRIPT
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in
Home Automation Systems
Presented by,
RAJASHREE
IntroductionBlock diagramComponentsApplicationsPros and consApplicationsreference
CONTENTS
SECURITY SURVEILLANCE PART TAKES IN SIGNIFICANT NUMBER OF HOME AUTOMATION SYSTEMS, DEPLOYING SENSORS TO AVOID BURGLARY
INTRODUCTION
P89v51RD2
UART
MAX232
Power supply
pc
BLOCK DIAGRAM
PROJECT OVERVIEWIntrusion detected.Report intrusion to cloud server.Notify user with SMS.User seeks surveillance views.Output from surveillance cameras are streamed to cloud.User views the status of all rooms.User confirms real intrusion.Action 1: inform neighbors.Action 2: inform police.Action 3:ringing alarms bell sounds
EMBEDDED CKEIL FLASH MAGIC
SOFTWARE REQUIREMENT
HARDWARE REQUIREMENT
P89V51RD2 MICROCONTROLLERRS232 & MAX 232PIR SENSORGSMCAMERALCD DISPLAYBUZZER
FEATURES:-
P89V51RD2 MICROCONTROLLER
8 BIT PHILIPS PROCESSOR40 PIN IC16 BIT ADDRESS BUS128 BYTE ROM4K RAM1-UART2- TIMERS4-I/O PORTS6-INTERRUPTS
RS232 & MAX 232
PIR SENSOR
PIR sensors allows to sense motion.
Detects whether a human has moved In or out of the sensor range
low cost & easy to use
GSMGsm was introduced in 1991Digital cellular systemUses TDMA
WIRELESS CAMERATransmit a video and audio signal to a wireless receiver through a radio band.
Low cost
Flexible to install
LCD DISPLAYSpecial thin flat panel that can let light go through it, or can block the light.
16 characters x 2 lines LCD, Parallel Display with LED backlight.
Max input voltage is 5.3V DC
BUZZERAn electrical signaling device that
Makes a buzzing sound
ADVANTAGES
COST EFFICIENTLOCATION AWARENESSREMOTE CONTROL & MONITORINGSOCIAL INTERACTIONRESOURCE SHARING
DISADVANTAGESTECHNICAL ISSUESECURITY IN CLOUDPRONE TO ATTACK
CONCLUSIONIn this project, we present the design,
implementati on and operati on of a cloud connected wireless home automati on system with en suite intrusion detecti on and burglary preventi on stratagems Along with an improved infrared camera, each node of our home automati on system has devised intelligent algorithms for intrusion detecti on and subsequently reports any event to a locati on-aware cloud service in real-ti me.
REFERENCESwww.wikipedia.comwww.ieeexplore.comwww.yahooanswers.com
THANK YOU