Page 1
http://www.iaeme.com/IJMET/index.asp 658 [email protected]
International Journal of Mechanical Engineering and Technology (IJMET) Volume 9, Issue 11, November 2018, pp. 658–664, Article ID: IJMET_09_11_065
Available online at http://www.iaeme.com/ijmet/issues.asp?JType=IJMET&VType=9&IType=11
ISSN Print: 0976-6340 and ISSN Online: 0976-6359
© IAEME Publication Scopus Indexed
DEVELOPMENT OF A MULTI –LAYER
SECURITY SURVEILLANCE SYSTEM FOR
ENHANCED PROTECTION
R. Catherine Joy, A. Albert Rajan* J. Patrick Joshua, G. Shinelet
Department of Electronics and Communication Engineering, Karunya Institute of Technology
*corresponding author
ABSTRACT
Security of any industry, home, organization or system is an essential requirement in
an increasingly hacking environment. In order to improve the level of security, there is a
necessity of higher layers of protection. In this paper, a three-layer security system with
surveillance video streaming system is designed to enhance the system’s protection with
multiple sensor modules. Pass code verification, Finger print sensing system, online
surveillance video streaming communication are the three layers of protection enabled
for better security. If any of the mismatching inputs from the associated sensors, the
actuator ensure that the system is in locking state and activate the live streaming link, and
communicate to the authentic person. The simulation and the hardware results reveals
that significant improvement in security is ensured.
Keywords: Multilayer security, Raspberry pi, Sensor, Arduino, Smart home
Cite this Article R. Catherine Joy, A. Albert Rajan J. Patrick Joshua and G. Shinelet,
Development of A Multi –Layer Security Surveillance System for Enhanced Protection,
International Journal of Mechanical Engineering and Technology, 9(11), 2018, pp. 658–
664.
http://www.iaeme.com/IJMET/issues.asp?JType=IJMET&VType=9&IType=11
1. INTRODUCTION
Now-a-days, there is a great increase of theft around the world. In home, industries, vehicles,
various control systems are installed to avoid thefts. Various modules are developed and
commercially available in market to monitor/control the theft events. Most of the security related
products are expensive and cannot be afford by common public. There is also a great demand of
automated security system in home, organizations, etc. From security in homes to security in
industrial areas, there is an ever increasing demand to provide security solutions which are
difficult to penetrate, extremely reliable and require minimal efforts from human beings. Steps
are taken to come up with solutions so that future losses can be prevented. Some of the existing
works focusing on controlling/switching the appliances manually whenever the theft is detected
rather than remotely monitored and automatically activated the protective mechanism. In this
Page 2
R. Catherine Joy, A. Albert Rajan J. Patrick Joshua and G. Shinelet
http://www.iaeme.com/IJMET/index.asp 659 [email protected]
paper, a multi- layer security system is discussed and the real-time verification is done with
Arduino Microcontroller, Raspberry-pi Processor and associated sensors.
2. RELATED WORKS
There are literatures regarding surveillance system used in various applications are discussed
below. Among this multi-level security embedded with surveillance system is used as reference
and the various literatures about security system refer the way and the application of the usage.
Raspberry pi board based automated security system using surveillance are brought into existence
for controlling fan, light for home [1]. There are literatures discuss on the activation of camera
whenever there a threat is felt and still pictures are stored for reference. At the same time, through
GSM modem a short service message (SMS) and a link will be sending to the authorized person.
By clicking the link, the owner can view the image. This provides high level security to the home.
Using android app, a low-cost flexible standalone smart home system. Different switching
functions are provided by micro-server based on android app communication. Instead of
computer, here microcontroller itself performs all required operations. ATmega256
microcontroller is used in Arduino mega 2560. Google search recognition engine is also proposed
in this system. android apps are developed, for the smart home system [3].
Smart surveillance system using raspberry-pi are developed for automated communication to
the user in remote locations. Here the recorded or captured, video or image file can be transmitted
to the smart phone. This also gives the information of number of unauthorized persons in home
through SMS to the authorized person [1], [4]. Bluetooth based home automation is developed
with ATmega328 and Bluegiga WT11 bluetooth modules are used. Using these modules, through
smart phone different equipment in home is controlled. Internet-of-Things (IoT) based smart
surveillance system is implemented in[5], [6]. This system monitors the energy usage and provide
saving in the electricity bill. Also, provide smart home security. IoT based biometric
authentication is implemented for door locking/unlocking, attendance management [7].
Most of the security systems discussed are related to home security and there was discussion
on the antitheft against vehicles [8]. Using proximity sensor, the key insertion in vehicle is sensed.
Immediately a text message is send to the owner of the vehicle and the system asks for a password.
The password is few unique characters and car key number. Biometric based security system are
brought into existence to improve the security level as primary authenticating factor comprising
of Fingerprint and Iris primarily which reduces the chance of above mentioned cyber threats [9].
For providing a high level security in authentication QR code scanner, fingerprint reader, Iris
scanner and a PIN pad to enter the password are used. A PIN number and fingerprint can be easily
stolen from the user, using thermal cameras or other means for PIN; and silica gel or by other
means for fingerprint. An additional biometric namely, Iris recognition uses an iris pattern which
cannot be stolen as easier as fingerprint. In addition, ATM cards are replaced with QR code based
ATM cards to avoid malfunction like mismatching of Biometrics. Authors in [10] proposed an
embedded system based industry surveillance system. Multiple ultrasonic sensors are used to
reduce the false alarm occurrence and to improve the reliability of the system.
For the protection of computer system, wireless intrusion detection using Arduino is
implemented. This system avoids unauthorized entry to the computer system. Unauthorized
access to wireless local area network (WLAN) in data centers can be protected [11]. Advanced
security system for ATM is brought into existence using internet-on-things (IoT), SMS and GPS
location is communicated to bank authorities or the users if some illegal activities happen in ATM
[12],[13].
In order to enhance the security level and to avoid the loss of property and information, it is
necessary to adapt multi-layer security systems so that even if one layer of security future is
failed, the other will back up and or the combination of all layer of security features will definitely
Page 3
Development of A Multi –Layer Security Surveillance System for Enhanced Protection
http://www.iaeme.com/IJMET/index.asp 660 [email protected]
meet out the purpose. This paper discus about the implementation of a multi-layer security
system additionally that has the uniqueness of connecting the live streaming of camera views so
that the user can visually see the consequence and take appropriate steps.
3. MULTI-LAYER SURVEILLANCE SYSTEM
A three-layer security model is developed in order to have a high level of security in
organizations. The three layers of security level consist of verifying the pass code using a hex
keypad locking system, Bluetooth code, and RFID tag. To reach the most important place in the
organization, the person has to go through the three layers of checking. Along with this round the
clock surveillance is done through camera which is connected to the raspberry pi. To access any
of the items in most important circle, the pressure sensor kept there is deactivated by the
fingerprint module. Using Arduino and raspberry pi the entire multilayer surveillance system is
controlled. For better safety, continuous live video feed is done by camera. Camera is connected
with raspberry pi. Through raspberry pi, live video is linked to computer server. The block
diagram of the system is shown in Figure 1.
Figure 1 Functional Blocks of a multilayer surveillance system
4. PROCESS FLOW
The process flow for the multi-layer security system is described in figure 3. The sequence of
security checks is Digital passcode verification, Bluetooth data verification, RF ID data
verification. If all the primary verification is successful, then the secondary process will be
initiated. In the secondary layer, the Raspi camera and surveillance system will be On and the
fingerprint verification system will be parallely activated and the SMS module will be activated.
Page 4
R. Catherine Joy, A. Albert Rajan J. Patrick Joshua and G. Shinelet
http://www.iaeme.com/IJMET/index.asp 661 [email protected]
Figure 2 Flow diagram of the multi-layer protection system
5. RESULTS AND DISCUSSIONS
The MPLAB XC32 C compiler is used to translate standard ANSI C programs into 32-bit device
assembly language source. Many command –line options are supported by this compiler. In the
MPLAB Software, the program was typed and it was compiled. The hardware here used is PIC
microcontroller. So, MPLAB is used for compiling the program into assembly language. It is
shown in the Figure 3.
Figure 3 Compilation of the program
Page 5
Development of A Multi –Layer Security Surveillance System for Enhanced Protection
http://www.iaeme.com/IJMET/index.asp 662 [email protected]
(a) (b)
(c)
(d)
Figure 4 Simulated outputs a) when the pressure is above 50, b) second layer of security c) when the
password is matched d) when password mis matched
Proteus design suite is used for the design and simulation of the proposed system. The design
is verified and PCB layout for the proposed system is generated from Proteus. Fig 4a describes
the outcome of the logical verification of pressure sensor during the finger print verification. The
pressure level is not matching with the preset value (50) thereby an SMS is activated. The
secondary layer of security verification is simulated and the results of the logical verification is
presented in fig.4b. In the secondary level of verification, the surveillance camera and the
associate systems are made ON. If the pressure value is above 50, then the message is send to
the person. If it is below 50, then the second layer is processed. Here the Proteus Software is used
to simulate the program. It is shown in the Figure 4a. The second layer of security is shown in
Figure 4b. The password is set by the person who is having the valuables which is simulated and
observed in figure 4c. If the password is matched, then the system will open. If the password does
not match, the lock will not open. So, the system is safe. It is shown in the Figure 4d.
5.1. Hardware implementation of multi-layer security system
The multilayer security system with GSM, Bluetooth, RFID, video streaming and hex keypad is
realized in hardware and tested successfully to confirm its functionality. The hardware prototype
us shown in Figure 5.
Page 6
R. Catherine Joy, A. Albert Rajan J. Patrick Joshua and G. Shinelet
http://www.iaeme.com/IJMET/index.asp 663 [email protected]
Figure. 5 Hardware prototype of Multilayer Security System
6. CONCLUSION
This work was aimed at developing a smart system to help people feel safe when they are far
away from their valuable things. A multilayer security system was developed and was tested both
in simulation and implementation level. The system involves the four different Layers of security
system all interlinked together and ensures maximum protection for the user. When an intruder
is sensed, the system would lock down the associated high security compartments and the
information will be sent to the concern person. The whole programming of the system was done
using MPLAB and PROTEUS Software. The system provides satisfactory results in a stimulated
real world environment. The future aspect of this model will be executed in real time applications
such as banking, commercial and all kind of security systems.
REFERENCES
[1] P. Vigneswari, V. Indhu, R. R. Narmatha, A. Sathinisha, and J. M. Subashini, Automated
Security System using Surveillance, Int. J. Curr. Eng. Technol., 55(22), pp. 2277–4106, 2015.
[2] S. Kumar, Ubiquitous Smart Home System using Android Application, Int. J. Comput.
Networks Commun., 6(1), pp. 33–43, 2014.
[3] A. Singh, A. Pal, and B. Rai, Gsm Based Home Automation System Using App-Inventor for
Android Mobile Phone, Int. J. Comput. Sci. Mob. Comput., 4(4), pp. 158–167, 2015.
[4] P. Sanjana, P.Mahalakshmi, A.John Clement Sunder, R.Swathi, Smart Surveillance
Monitoring System Using Raspberry Pi and PIR, Int. J. Comput. Sci. Inf. Technol., 5(6), pp.
7107–7109, 2014.
[5] S. Nupur, W. Payal, and P. Kajal, Bluetooth Based Device Automation System Using
Cellphone, Int. J. Comput. Appl. Inf. Technol.,7(1), pp. 136–141, 2014.
[6] K. Santhi, M. Deepa, M. Lawanya Shri, and M. B. Benjula Anbu Malar, Smart Home
Observing and Control Security System: A Case Study, Int. J. Civ. Eng. Technol., 9(9), pp.
1468–1477, 2018.
[7] D. Shah and V. Haradi, IoT Based Biometrics Implementation on Raspberry Pi, Procedia
Comput. Sci., 79, pp. 328–336, 2016.
[8] S. Kompalli, M. Venkateshwarlu, Anti theft control system design using embedded system,
Int. J. Adv. Technol. Innov. Res., 7(7), pp. 1190–1193, 2015.
Page 7
Development of A Multi –Layer Security Surveillance System for Enhanced Protection
http://www.iaeme.com/IJMET/index.asp 664 [email protected]
[9] M. Avinash, R. K. Ku, M. Munusamy, D. Muthuvel, K. N. Ku, and K. Th, Multi-level
Security using QR Code , Biometrics and Password for Security Systems, Int. J. Eng. Sci.
Comput., 7(4), pp. 6334–6337, 2017.
[10] K. G. Ramchandra , Mahesh S. Kumbhar, A Remote Industrial Surveillance System Using
Multiple Ultrasonic Sensors, Int. J. Adv. Innov. Thoughts Ideas, pp. 1–6, 2012.
[11] K. Prakash , Pradeep Kumar, Arduino Based Wireless Intrusion Detection Using IR Sensor
and GSM, Int. J. Comput. Sci. Mob. Comput.,2(5), pp. 417–424, 2013.
[12] M. Muhaidheen and S. Muralidharan, Internet of Things based Advanced Security System for
ATM, Int. J. Mech. Eng. Technol., 9(8), pp. 722–726, 2018.
[13] G. Sanket, Pranali Desai, Vasanth Swaminathan, Multi-Level Security Embedded With
Surveillance System, IEEE Sens. J., 17(22), pp. 7497–7501, 2017.
[14] Swarnalatha P, Anandakumar S, Vairamuthu S, Swarna Priya R.M and Sathyaraj R, Secure
Wireless Communication and Surveillance System, International Journal of Civil Engineering
and Technology, 9(7), 2018, pp. 123–133.
http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=9&IType=7