SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 581
DEVELOPMENT OF INDIVIDUAL HOME SECURITY SYSTEM USING
CAN AND ZIGBEE PROTOCOL
P.Mohan1
, M. Vinoth Kumar2
1
PG Scholar, Masters Degree in Embedded System Technologies, Rajiv Gandhi College of Engineering, Chennai,
Tamilnadu, India
2
Assistant professor, Department of Electrical and Electronics Engineering, Rajiv Gandhi College of Engineering,
Chennai, Tamilnadu, India
Abstract
This paper proposes a security alert system developed using CAN interface and ZigBee protocols implemented with GSM technology.
Whenever the system notices human intrusion or senses leakage of raw gas, immediately sends a Theft or Sensor alert message to the
authorities using GSM Modem and Passing alert messages to nearby ZigBee networked houses, and also the controller triggers the
exhaust fan in the case of gas leakage. The major advantage of the system is to access the secret coded electromagnetic lock using
GSM mobile that provides maximum security to the house. In the case of owner’s absence in the house, the system takes over the
control of all the equipments, and saves the energy by turning-off unused electrical appliances.
Keywords: Controller Area Network (CAN), ZigBee Protocol, Electromagnetic lock
---------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
In today‟s fast growing environment we concern for security
and convenience of daily life. Most of developed countries
certainly invested more money and manpower to research and
develop a highly protected home security system and have
achieved great success. In this project we develop an individual
home security alert system by implementing CAN, ZigBee
protocols along with GSM technology. The system can detect
the theft, leaking of raw gas and fire, and immediately send an
alert message using GSM Modem.
The hardware of this system consists of the wired CAN
module, wireless ZigBee Transceiver, as well as the GSM
module. Whenever the controller detects any human movement
or leakage of gas inside the house immediately sends the alert
message to owner and police station via GSM network and also
intimates to the nearby ZigBee nodes using ZigBee transceiver
for a quick response. This system limits the electricity power
usage by automatically shutting down unused electrical device
when the owner not present in the house. The password
protected electromagnetic lock to open and close the house
using GSM technology takes the security of the house to the
next level. Information sharing among the nearby wireless
node provides quick response to any kind of alerts by the
incident house.
Following are section in which order the project has been
explained in detail,
 Section[2] Related works
 Section[3] proposed System
 Section[4] System Requirements
 Section[5] General Block Diagram and Description
 Section[6] Conclusion and Future work
2. RELATED WORKS
The home appliances can be monitored and controlled locally
using the embedded system board from a remote location
through a web browser from anywhere in the world with an
internet access. The system is scalable and allows multi-vendor
appliances to be added, without a major hardware
modification. The Internet has also started to serve as a
medium that allows the monitoring, control and interaction
with machine and devices from a remote place.
The Internet based home automation system that provides
many features ranging from efficient use of energy to increased
comfort, greater safety and security. Even over large distances
the user can monitor and control his/her home gate, oven,
refrigerator and the water supply to the garden without any
human intervention.
Despite these attractions and benefits, home automation has
not yet received broad acceptance and attention. This is mainly
due to its high cost and complexity as well as the lack of
security. Some of the related works for this proposed system
encouraged me doing this project, the authors Khusvinder Gill,
Shuang-Hua Yang, Wan-Liang Wang using internet for
communication between the system and the user in his paper, a
Secure Remote Access to Home Automation Networks, that
makes the system costlier and give way to use new method for
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 582
communication with low cost, with this idea, the proposed
project developed with the low cost device with portability to
be carried to the remote places easily.
3. PROPOSED SYSTEM
The proposed system introduces a wired sensor network based
home security system, in which the control of the devices are
completely taken over by the system, the process of monitoring
and sending the alert messages become more important. The
system can detect the theft, leaking of raw gas and fire, and
immediately sends the alert message to owner and police
station via GSM network and also intimates to the nearby
ZigBee nodes using ZigBee transceiver for a quick response.
This system limits the electricity power usage by automatically
turning off the unused electrical device when the owner not
present in the house. In addition to all these features, the
password protected electromagnetic lock to open and close the
house using GSM technology takes the security of the house to
the next level.
The hardware of this system consist of the CAN Module,
wireless sending and receiving chip ZigBee Transceiver, as
well as the GSM module. Depending on the alert from sensors,
the messages sent to the authorized personnel via Global
System for Mobile Communications (GSM) using Short
Message Service (SMS). It is a Low power-consuming and the
capability of battery operated security monitoring system. The
wired communication among the sensor networks reduces
electromagnetic interference to human specifically for senior
citizen old aged persons in houses.
4. SYSTEM REQUIREMENTS
4.1 Hardware Requirements:
PIC Microcontroller - PIC16F877A
CAN Controller - MCP 2515
CAN Transceiver - MCP 2551
LPG Gas Sensor - MQ-6
PIR Sensor - SB0061
Electromagnetic lock - 12v DC
Zigbee transceiver - XBEE S1 (802.15.4)
4.2 Software Requirements:
MPLAB IDE v8.53
WinPIC800 Programmer
Embedded C Language
5. GENERAL BLOCK DIAGRAM AND
DESCRIPTION
5.1 PIC Microcontroller
Microcontroller PIC16F877A is one of the PICMicro Family
controllers, which is popular among the all professionals.
Because of FLASH memory technology that can be write-erase
until thousand times. The major advantage this RISC
Microcontroller compared to with other Microcontroller 8-bit
especially at a speed of and his code compression technique,
which only have 40 pin with 33 pins used for I/O operation.
PIC16F877A perfectly suited for various industries starting
from automotive industries and controlling of home appliances
to industrial instruments by monitoring remote sensors and
electrical door locks, and providing safety to devices. It is ideal
for smart cards as well as for battery supplied devices because
of its low power utilization. EEPROM memory makes it easier
to apply microcontrollers to devices where permanent storage
of various parameters is needed such as the codes for
transmitters, motor speed, and receiver frequencies. With the
Low cost and low power consumption, the flexibility of
handling the PIC16F877A controller makes applicable for
replacement in larger systems and coprocessor application.
In System Programmability of this chip with using only two
pins in data transfer that makes possible the flexibility of a
product, even after completing the assembling and testing of
the product. This potential can be used to create assembly-line
production that can store calibration data available only after
final testing and used to improve programs on finished
products. . In our project we implement CAN communication
protocol for the communication between two controllers and in
addition to that in future the number of nodes can be increased
without major modification in the Hardware.
5.2 CAN Controller
Controller Area Network (CAN) is a serial communication
network that was initially designed for the automotive industry,
and also become a popular bus in industrial automation as well
as other applications in various industries.
The CAN bus is primarily used in embedded systems, and is
the network established among microcontrollers. It can be
accessed as two-wire, half duplex, high-speed network system.
It is appropriate for high speed applications using short
messages. The benefits of CAN such as robustness, reliability
made it efficient in industry standard application.
The CAN controller can theoretically link up to 2032 devices
on a single network. However, with some of the practical
limitation of the hardware (transceivers), but it can only link up
to110 nodes (Philips controller) on a single network. It offers
top speed communication rate up to 1 Mbits/sec thus allows
real-time control.
The transmission data over the CAN communication line needs
to be processed using the CAN controller (MCP 2515) that can
be transmitted and received via CAN Transceiver (MCP 2551)
along a twisted pair cable. The maximum bus length for a CAN
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 583
network depends on the bit rate used. It is necessary that the
wave front of the bit signal has time to travel to the most
remote node and back again before the bit is sampled.
Fig.1. Block Diagram
CAN standards: version 2.0 divided into two parts as given by,
 Standard CAN (Version 2.0A). Uses 11 bit identifiers.
 Extended CAN (Version 2.0B). Uses 29 bit identifiers.
CAN transmits signals on the CAN bus which consists of two
wires, a CAN-High and CAN-Low. These 2 wires can operate
in differential mode that is they are carrying inverted voltages
to decrease noise interference during transmission.
5.3 PIR Sensor
The Passive Infrared sensor is used to measure infrared light
radiating from an object in its field of it 120 degree view. They
are Passive sensors, since they do not have an in built IR
source like active sensors and detect the natural radiation of the
object.
All objects have a certain body temperature in that specific
temperature there is a certain radiation that the body emits
called the Black Body Radiation phenomenon. This infrared
radiation is undetectable to the human eye but can be detected
by this PIR sensor. This PIR output use for alerting the
authorized person in the case of detection of human movement
inside the house when owner not present in the house.
5.4 LPG Sensor
MQ-6 LPG Gas Sensor used in this project can detect up to the
range of 200 to 10,000 ppm.
When in the state of owner is not present in the house, the gas
leakage detection by the system will perform a precautionary
function of running the exhaust fan for particular time period.
And the system will alert the authority by sending an
intimation message.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 584
Fig.2. Hardware of Home Kitchen part
5.5 GSM Modem:
A GSM modem is a wireless modem that works with a GSM
wireless network which can send and receive data through
radio waves. The modem uses AT commands instructions used
which are used to control a modem, in which AT is the
abbreviation of ATtention.
In this project the GSM modem interfaced with master
controller that has sensor nodes connected to it, for the purpose
of sending alert message to authorized personnel who can take
appropriate action for the alert message. And the Message
authentication to Open and Close the Electromagnetic Door of
the house, Provides more security to the owner and with an
enhanced feature of Access permission to all the family
members. In other cases the system should send the mobile
number of the unauthorized access to owner.
5.6 Electromagnetic Lock
Electromagnetic lock is a locking device that consists of an
electromagnet and an armature plate. The principle behind an
electromagnetic lock is the use of electromagnetism to lock a
door when energized. Essentially it consists of an
electromagnet attracting a conductor with a force large enough
to prevent the door from being opened.
That is to say, if only we could cut off power supply and make
electromagnet force between electromagnet and armature plate
to disappear, the door would be opened. Furthermore, we just
try to use a direct dc output momentary remote and one button
transmitter to cut off electric power to open the door. The
Electromagnet Lock can only be accessed through a password
message using the GSM modem, and the Probability of
network failure/error may be concern for the real time
implementation, to eliminate that the Zigbee based remote can
be used to open and close the Doors.
5.7 ZIGBEE Transceiver:
ZigBee is a wireless technology has been developed as a global
standard to address the distinctive needs of low-cost, low-
power wireless Node to node networks. It operates on the
physical radio specification of IEEE 802.15.4 standard and
operates on 2.4 GHz, 900 MHz and 868 MHz frequency bands,
intended for low-cost, battery-operated devices. This protocol
permits devices to communicate in a variety of network
topologies and can have battery life for several years.
A key element of the ZigBee protocol is the ability to maintain
mesh networking among them. In a mesh network, nodes are
interconnected in multiple pathways with each node. The mesh
topology allows the nodes to reconfigure routing paths based
on the new network structure. The uniqueness of mesh
topology and ad-hoc routing provide greater stability in
changing conditions or failure of a single node.
6. CONCLUSIONS AND FUTURE WORK
The proposed system of wired sensor network based home
security system to detect the theft or leaking of raw gas or fire
has been developed successfully by implementing CAN bus
communication along with the password protected
Electromagnetic lock. Inclusion of a ZigBee transceiver in the
system, to create a network of ZigBee based houses and to
make the system, more secure by sharing security alert
messages that could avoid the thievery. This system
experienced to be more secure and reliable in real time
environment.
The future work of this system will include a centralised
control for the group of individual house for immediate
response for any kind of alert generated by the individual
home.
6.1 Hardware Interfacing:
Fig.3. Interfacing circuit of 2 PIC 16F877A using CAN Bus Communication and Zigbee Module Connection with PC.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 585
6.2 Mobile Screen Shots
Fig.4. Alert Messages (i) GAS Sensor Alert (ii) PIR Sensor Alert (iii) Warning Message
REFERENCES
[1] Khusvinder Gill, Shuang-Hua Yang, Wan-Liang Wang,
Secure Remote Access To Home Automation
Networks, IET Inf. Secur., 2013, Vol. 7, Iss. 2, pp.
118–125
[2] NausheenBelim, HarshadaBhambure,
PriyankaKumbhar, SimranjitTuteja, Automate and
Secure Your Home Using Zigbee Technology, The
International Journal of Innovative Research in
Computer and Communication Engineering, VOL. 1,
ISSUE 1, march 2013.
[3] MazranEsro, Amat Amir Basari , Siva Kumar S, A.
Sadhiqin M I , ZulkifliSyariff, Controller Area
Network Application Insecurity System, World
Academy of Science, Engineering and Technology 35
2009.
[4] Dr.S.S.Riaz Ahamed, The Role Of Zigbee Technology
In Future Data Communication System, Journal of
Theoretical and Applied Information Technology, 2005
– 2009.
[5] William Stalling, “Wireless Communication and
Networks”, Fourth Edition, Pearson Publication
Limited, 2004, Pp 39-118.
[6] Richards, P. (2005). AN754: Understanding
Microchip‟s CAN Module Bit Timing. Available:
http://
www.microchip.com/downloads/en/AppNotes/00754.p
df
[7] Al-Ali, A.R., Al-Rousan, M.: „Java-based home
automation system‟, IEEE Trans. Consum. Electron.,
2004, 50, (2), pp. 498–504.
BIOGRAPHIES
P. Mohan is currently pursuing his Master‟s
degree program in Embedded System
Technologies in Rajiv Gandhi College of
Engineering, Chennai. He studied his UG
degree in Electronics and Communication
Engineering Discipline, and his research
area includes communication protocols in embedded system.
M.Vinoth Kumar is presently working as
an Assistant Professor in EEE Dept of
Rajiv Gandhi College of Engineering,
Chennai. Who have Received M.Tech in
Embedded Systems from Hindustan
University, Chennai. B.E in ECE from
Sengunthar Engineering College, Anna University, Chennai.
His research interest includes Mobile Communications,
Computer Networks, Embedded Systems and communication
networks. .

More Related Content

Viewers also liked

Cfd simulation on different geometries of venturimeter
Cfd simulation on different geometries of venturimeterCfd simulation on different geometries of venturimeter
Cfd simulation on different geometries of venturimetereSAT Publishing House
 
Text independent speaker recognition using combined lpc and mfc coefficients
Text independent speaker recognition using combined lpc and mfc coefficientsText independent speaker recognition using combined lpc and mfc coefficients
Text independent speaker recognition using combined lpc and mfc coefficientseSAT Publishing House
 
Fpga implementation of run length encoding with new formulated codeword gener...
Fpga implementation of run length encoding with new formulated codeword gener...Fpga implementation of run length encoding with new formulated codeword gener...
Fpga implementation of run length encoding with new formulated codeword gener...eSAT Publishing House
 
Thermal, microstructure and dielectric behavior of la modified bismuth titana...
Thermal, microstructure and dielectric behavior of la modified bismuth titana...Thermal, microstructure and dielectric behavior of la modified bismuth titana...
Thermal, microstructure and dielectric behavior of la modified bismuth titana...eSAT Publishing House
 
Degradation of mono azo dye in aqueous solution using
Degradation of mono azo dye in aqueous solution usingDegradation of mono azo dye in aqueous solution using
Degradation of mono azo dye in aqueous solution usingeSAT Publishing House
 
A vivacious approach to detect and prevent d do s attack
A vivacious approach to detect and prevent d do s attackA vivacious approach to detect and prevent d do s attack
A vivacious approach to detect and prevent d do s attackeSAT Publishing House
 
Vlsi implementation of adaptive kalman filter for
Vlsi implementation of adaptive kalman filter forVlsi implementation of adaptive kalman filter for
Vlsi implementation of adaptive kalman filter foreSAT Publishing House
 
Safety zone determination for wireless cellular
Safety zone determination for wireless cellularSafety zone determination for wireless cellular
Safety zone determination for wireless cellulareSAT Publishing House
 
Enhancing the capability of supply chain by
Enhancing the capability of supply chain byEnhancing the capability of supply chain by
Enhancing the capability of supply chain byeSAT Publishing House
 
Elzaki transform homotopy perturbation method for
Elzaki transform homotopy perturbation method forElzaki transform homotopy perturbation method for
Elzaki transform homotopy perturbation method foreSAT Publishing House
 
Clustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clusteringClustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clusteringeSAT Publishing House
 
Revamping quality of service of video streaming over wireless lan
Revamping quality of service of video streaming over wireless lanRevamping quality of service of video streaming over wireless lan
Revamping quality of service of video streaming over wireless laneSAT Publishing House
 
An innovative way for computerized smith chart generation and transmission li...
An innovative way for computerized smith chart generation and transmission li...An innovative way for computerized smith chart generation and transmission li...
An innovative way for computerized smith chart generation and transmission li...eSAT Publishing House
 
Implementation and analysis of power reduction in 2 to 4 decoder design using...
Implementation and analysis of power reduction in 2 to 4 decoder design using...Implementation and analysis of power reduction in 2 to 4 decoder design using...
Implementation and analysis of power reduction in 2 to 4 decoder design using...eSAT Publishing House
 
Performance investigation of re shuffling packet
Performance investigation of re shuffling packetPerformance investigation of re shuffling packet
Performance investigation of re shuffling packeteSAT Publishing House
 
Dynamic model of zeta converter with full state
Dynamic model of zeta converter with full stateDynamic model of zeta converter with full state
Dynamic model of zeta converter with full stateeSAT Publishing House
 
Measurement model of software quality in user’s
Measurement model of software quality in user’sMeasurement model of software quality in user’s
Measurement model of software quality in user’seSAT Publishing House
 
Effect of zn s as an impurity on the physical properties
Effect of zn s as an impurity on the physical propertiesEffect of zn s as an impurity on the physical properties
Effect of zn s as an impurity on the physical propertieseSAT Publishing House
 
Study of fiber optic sensor using concrete beams
Study of fiber optic sensor using concrete beamsStudy of fiber optic sensor using concrete beams
Study of fiber optic sensor using concrete beamseSAT Publishing House
 
Research scholars evaluation based on guides view
Research scholars evaluation based on guides viewResearch scholars evaluation based on guides view
Research scholars evaluation based on guides vieweSAT Publishing House
 

Viewers also liked (20)

Cfd simulation on different geometries of venturimeter
Cfd simulation on different geometries of venturimeterCfd simulation on different geometries of venturimeter
Cfd simulation on different geometries of venturimeter
 
Text independent speaker recognition using combined lpc and mfc coefficients
Text independent speaker recognition using combined lpc and mfc coefficientsText independent speaker recognition using combined lpc and mfc coefficients
Text independent speaker recognition using combined lpc and mfc coefficients
 
Fpga implementation of run length encoding with new formulated codeword gener...
Fpga implementation of run length encoding with new formulated codeword gener...Fpga implementation of run length encoding with new formulated codeword gener...
Fpga implementation of run length encoding with new formulated codeword gener...
 
Thermal, microstructure and dielectric behavior of la modified bismuth titana...
Thermal, microstructure and dielectric behavior of la modified bismuth titana...Thermal, microstructure and dielectric behavior of la modified bismuth titana...
Thermal, microstructure and dielectric behavior of la modified bismuth titana...
 
Degradation of mono azo dye in aqueous solution using
Degradation of mono azo dye in aqueous solution usingDegradation of mono azo dye in aqueous solution using
Degradation of mono azo dye in aqueous solution using
 
A vivacious approach to detect and prevent d do s attack
A vivacious approach to detect and prevent d do s attackA vivacious approach to detect and prevent d do s attack
A vivacious approach to detect and prevent d do s attack
 
Vlsi implementation of adaptive kalman filter for
Vlsi implementation of adaptive kalman filter forVlsi implementation of adaptive kalman filter for
Vlsi implementation of adaptive kalman filter for
 
Safety zone determination for wireless cellular
Safety zone determination for wireless cellularSafety zone determination for wireless cellular
Safety zone determination for wireless cellular
 
Enhancing the capability of supply chain by
Enhancing the capability of supply chain byEnhancing the capability of supply chain by
Enhancing the capability of supply chain by
 
Elzaki transform homotopy perturbation method for
Elzaki transform homotopy perturbation method forElzaki transform homotopy perturbation method for
Elzaki transform homotopy perturbation method for
 
Clustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clusteringClustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clustering
 
Revamping quality of service of video streaming over wireless lan
Revamping quality of service of video streaming over wireless lanRevamping quality of service of video streaming over wireless lan
Revamping quality of service of video streaming over wireless lan
 
An innovative way for computerized smith chart generation and transmission li...
An innovative way for computerized smith chart generation and transmission li...An innovative way for computerized smith chart generation and transmission li...
An innovative way for computerized smith chart generation and transmission li...
 
Implementation and analysis of power reduction in 2 to 4 decoder design using...
Implementation and analysis of power reduction in 2 to 4 decoder design using...Implementation and analysis of power reduction in 2 to 4 decoder design using...
Implementation and analysis of power reduction in 2 to 4 decoder design using...
 
Performance investigation of re shuffling packet
Performance investigation of re shuffling packetPerformance investigation of re shuffling packet
Performance investigation of re shuffling packet
 
Dynamic model of zeta converter with full state
Dynamic model of zeta converter with full stateDynamic model of zeta converter with full state
Dynamic model of zeta converter with full state
 
Measurement model of software quality in user’s
Measurement model of software quality in user’sMeasurement model of software quality in user’s
Measurement model of software quality in user’s
 
Effect of zn s as an impurity on the physical properties
Effect of zn s as an impurity on the physical propertiesEffect of zn s as an impurity on the physical properties
Effect of zn s as an impurity on the physical properties
 
Study of fiber optic sensor using concrete beams
Study of fiber optic sensor using concrete beamsStudy of fiber optic sensor using concrete beams
Study of fiber optic sensor using concrete beams
 
Research scholars evaluation based on guides view
Research scholars evaluation based on guides viewResearch scholars evaluation based on guides view
Research scholars evaluation based on guides view
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 

Recently uploaded (20)

National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 

Development of individual home security system using

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 581 DEVELOPMENT OF INDIVIDUAL HOME SECURITY SYSTEM USING CAN AND ZIGBEE PROTOCOL P.Mohan1 , M. Vinoth Kumar2 1 PG Scholar, Masters Degree in Embedded System Technologies, Rajiv Gandhi College of Engineering, Chennai, Tamilnadu, India 2 Assistant professor, Department of Electrical and Electronics Engineering, Rajiv Gandhi College of Engineering, Chennai, Tamilnadu, India Abstract This paper proposes a security alert system developed using CAN interface and ZigBee protocols implemented with GSM technology. Whenever the system notices human intrusion or senses leakage of raw gas, immediately sends a Theft or Sensor alert message to the authorities using GSM Modem and Passing alert messages to nearby ZigBee networked houses, and also the controller triggers the exhaust fan in the case of gas leakage. The major advantage of the system is to access the secret coded electromagnetic lock using GSM mobile that provides maximum security to the house. In the case of owner’s absence in the house, the system takes over the control of all the equipments, and saves the energy by turning-off unused electrical appliances. Keywords: Controller Area Network (CAN), ZigBee Protocol, Electromagnetic lock ---------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION In today‟s fast growing environment we concern for security and convenience of daily life. Most of developed countries certainly invested more money and manpower to research and develop a highly protected home security system and have achieved great success. In this project we develop an individual home security alert system by implementing CAN, ZigBee protocols along with GSM technology. The system can detect the theft, leaking of raw gas and fire, and immediately send an alert message using GSM Modem. The hardware of this system consists of the wired CAN module, wireless ZigBee Transceiver, as well as the GSM module. Whenever the controller detects any human movement or leakage of gas inside the house immediately sends the alert message to owner and police station via GSM network and also intimates to the nearby ZigBee nodes using ZigBee transceiver for a quick response. This system limits the electricity power usage by automatically shutting down unused electrical device when the owner not present in the house. The password protected electromagnetic lock to open and close the house using GSM technology takes the security of the house to the next level. Information sharing among the nearby wireless node provides quick response to any kind of alerts by the incident house. Following are section in which order the project has been explained in detail,  Section[2] Related works  Section[3] proposed System  Section[4] System Requirements  Section[5] General Block Diagram and Description  Section[6] Conclusion and Future work 2. RELATED WORKS The home appliances can be monitored and controlled locally using the embedded system board from a remote location through a web browser from anywhere in the world with an internet access. The system is scalable and allows multi-vendor appliances to be added, without a major hardware modification. The Internet has also started to serve as a medium that allows the monitoring, control and interaction with machine and devices from a remote place. The Internet based home automation system that provides many features ranging from efficient use of energy to increased comfort, greater safety and security. Even over large distances the user can monitor and control his/her home gate, oven, refrigerator and the water supply to the garden without any human intervention. Despite these attractions and benefits, home automation has not yet received broad acceptance and attention. This is mainly due to its high cost and complexity as well as the lack of security. Some of the related works for this proposed system encouraged me doing this project, the authors Khusvinder Gill, Shuang-Hua Yang, Wan-Liang Wang using internet for communication between the system and the user in his paper, a Secure Remote Access to Home Automation Networks, that makes the system costlier and give way to use new method for
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 582 communication with low cost, with this idea, the proposed project developed with the low cost device with portability to be carried to the remote places easily. 3. PROPOSED SYSTEM The proposed system introduces a wired sensor network based home security system, in which the control of the devices are completely taken over by the system, the process of monitoring and sending the alert messages become more important. The system can detect the theft, leaking of raw gas and fire, and immediately sends the alert message to owner and police station via GSM network and also intimates to the nearby ZigBee nodes using ZigBee transceiver for a quick response. This system limits the electricity power usage by automatically turning off the unused electrical device when the owner not present in the house. In addition to all these features, the password protected electromagnetic lock to open and close the house using GSM technology takes the security of the house to the next level. The hardware of this system consist of the CAN Module, wireless sending and receiving chip ZigBee Transceiver, as well as the GSM module. Depending on the alert from sensors, the messages sent to the authorized personnel via Global System for Mobile Communications (GSM) using Short Message Service (SMS). It is a Low power-consuming and the capability of battery operated security monitoring system. The wired communication among the sensor networks reduces electromagnetic interference to human specifically for senior citizen old aged persons in houses. 4. SYSTEM REQUIREMENTS 4.1 Hardware Requirements: PIC Microcontroller - PIC16F877A CAN Controller - MCP 2515 CAN Transceiver - MCP 2551 LPG Gas Sensor - MQ-6 PIR Sensor - SB0061 Electromagnetic lock - 12v DC Zigbee transceiver - XBEE S1 (802.15.4) 4.2 Software Requirements: MPLAB IDE v8.53 WinPIC800 Programmer Embedded C Language 5. GENERAL BLOCK DIAGRAM AND DESCRIPTION 5.1 PIC Microcontroller Microcontroller PIC16F877A is one of the PICMicro Family controllers, which is popular among the all professionals. Because of FLASH memory technology that can be write-erase until thousand times. The major advantage this RISC Microcontroller compared to with other Microcontroller 8-bit especially at a speed of and his code compression technique, which only have 40 pin with 33 pins used for I/O operation. PIC16F877A perfectly suited for various industries starting from automotive industries and controlling of home appliances to industrial instruments by monitoring remote sensors and electrical door locks, and providing safety to devices. It is ideal for smart cards as well as for battery supplied devices because of its low power utilization. EEPROM memory makes it easier to apply microcontrollers to devices where permanent storage of various parameters is needed such as the codes for transmitters, motor speed, and receiver frequencies. With the Low cost and low power consumption, the flexibility of handling the PIC16F877A controller makes applicable for replacement in larger systems and coprocessor application. In System Programmability of this chip with using only two pins in data transfer that makes possible the flexibility of a product, even after completing the assembling and testing of the product. This potential can be used to create assembly-line production that can store calibration data available only after final testing and used to improve programs on finished products. . In our project we implement CAN communication protocol for the communication between two controllers and in addition to that in future the number of nodes can be increased without major modification in the Hardware. 5.2 CAN Controller Controller Area Network (CAN) is a serial communication network that was initially designed for the automotive industry, and also become a popular bus in industrial automation as well as other applications in various industries. The CAN bus is primarily used in embedded systems, and is the network established among microcontrollers. It can be accessed as two-wire, half duplex, high-speed network system. It is appropriate for high speed applications using short messages. The benefits of CAN such as robustness, reliability made it efficient in industry standard application. The CAN controller can theoretically link up to 2032 devices on a single network. However, with some of the practical limitation of the hardware (transceivers), but it can only link up to110 nodes (Philips controller) on a single network. It offers top speed communication rate up to 1 Mbits/sec thus allows real-time control. The transmission data over the CAN communication line needs to be processed using the CAN controller (MCP 2515) that can be transmitted and received via CAN Transceiver (MCP 2551) along a twisted pair cable. The maximum bus length for a CAN
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 583 network depends on the bit rate used. It is necessary that the wave front of the bit signal has time to travel to the most remote node and back again before the bit is sampled. Fig.1. Block Diagram CAN standards: version 2.0 divided into two parts as given by,  Standard CAN (Version 2.0A). Uses 11 bit identifiers.  Extended CAN (Version 2.0B). Uses 29 bit identifiers. CAN transmits signals on the CAN bus which consists of two wires, a CAN-High and CAN-Low. These 2 wires can operate in differential mode that is they are carrying inverted voltages to decrease noise interference during transmission. 5.3 PIR Sensor The Passive Infrared sensor is used to measure infrared light radiating from an object in its field of it 120 degree view. They are Passive sensors, since they do not have an in built IR source like active sensors and detect the natural radiation of the object. All objects have a certain body temperature in that specific temperature there is a certain radiation that the body emits called the Black Body Radiation phenomenon. This infrared radiation is undetectable to the human eye but can be detected by this PIR sensor. This PIR output use for alerting the authorized person in the case of detection of human movement inside the house when owner not present in the house. 5.4 LPG Sensor MQ-6 LPG Gas Sensor used in this project can detect up to the range of 200 to 10,000 ppm. When in the state of owner is not present in the house, the gas leakage detection by the system will perform a precautionary function of running the exhaust fan for particular time period. And the system will alert the authority by sending an intimation message.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 584 Fig.2. Hardware of Home Kitchen part 5.5 GSM Modem: A GSM modem is a wireless modem that works with a GSM wireless network which can send and receive data through radio waves. The modem uses AT commands instructions used which are used to control a modem, in which AT is the abbreviation of ATtention. In this project the GSM modem interfaced with master controller that has sensor nodes connected to it, for the purpose of sending alert message to authorized personnel who can take appropriate action for the alert message. And the Message authentication to Open and Close the Electromagnetic Door of the house, Provides more security to the owner and with an enhanced feature of Access permission to all the family members. In other cases the system should send the mobile number of the unauthorized access to owner. 5.6 Electromagnetic Lock Electromagnetic lock is a locking device that consists of an electromagnet and an armature plate. The principle behind an electromagnetic lock is the use of electromagnetism to lock a door when energized. Essentially it consists of an electromagnet attracting a conductor with a force large enough to prevent the door from being opened. That is to say, if only we could cut off power supply and make electromagnet force between electromagnet and armature plate to disappear, the door would be opened. Furthermore, we just try to use a direct dc output momentary remote and one button transmitter to cut off electric power to open the door. The Electromagnet Lock can only be accessed through a password message using the GSM modem, and the Probability of network failure/error may be concern for the real time implementation, to eliminate that the Zigbee based remote can be used to open and close the Doors. 5.7 ZIGBEE Transceiver: ZigBee is a wireless technology has been developed as a global standard to address the distinctive needs of low-cost, low- power wireless Node to node networks. It operates on the physical radio specification of IEEE 802.15.4 standard and operates on 2.4 GHz, 900 MHz and 868 MHz frequency bands, intended for low-cost, battery-operated devices. This protocol permits devices to communicate in a variety of network topologies and can have battery life for several years. A key element of the ZigBee protocol is the ability to maintain mesh networking among them. In a mesh network, nodes are interconnected in multiple pathways with each node. The mesh topology allows the nodes to reconfigure routing paths based on the new network structure. The uniqueness of mesh topology and ad-hoc routing provide greater stability in changing conditions or failure of a single node. 6. CONCLUSIONS AND FUTURE WORK The proposed system of wired sensor network based home security system to detect the theft or leaking of raw gas or fire has been developed successfully by implementing CAN bus communication along with the password protected Electromagnetic lock. Inclusion of a ZigBee transceiver in the system, to create a network of ZigBee based houses and to make the system, more secure by sharing security alert messages that could avoid the thievery. This system experienced to be more secure and reliable in real time environment. The future work of this system will include a centralised control for the group of individual house for immediate response for any kind of alert generated by the individual home. 6.1 Hardware Interfacing: Fig.3. Interfacing circuit of 2 PIC 16F877A using CAN Bus Communication and Zigbee Module Connection with PC.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 585 6.2 Mobile Screen Shots Fig.4. Alert Messages (i) GAS Sensor Alert (ii) PIR Sensor Alert (iii) Warning Message REFERENCES [1] Khusvinder Gill, Shuang-Hua Yang, Wan-Liang Wang, Secure Remote Access To Home Automation Networks, IET Inf. Secur., 2013, Vol. 7, Iss. 2, pp. 118–125 [2] NausheenBelim, HarshadaBhambure, PriyankaKumbhar, SimranjitTuteja, Automate and Secure Your Home Using Zigbee Technology, The International Journal of Innovative Research in Computer and Communication Engineering, VOL. 1, ISSUE 1, march 2013. [3] MazranEsro, Amat Amir Basari , Siva Kumar S, A. Sadhiqin M I , ZulkifliSyariff, Controller Area Network Application Insecurity System, World Academy of Science, Engineering and Technology 35 2009. [4] Dr.S.S.Riaz Ahamed, The Role Of Zigbee Technology In Future Data Communication System, Journal of Theoretical and Applied Information Technology, 2005 – 2009. [5] William Stalling, “Wireless Communication and Networks”, Fourth Edition, Pearson Publication Limited, 2004, Pp 39-118. [6] Richards, P. (2005). AN754: Understanding Microchip‟s CAN Module Bit Timing. Available: http:// www.microchip.com/downloads/en/AppNotes/00754.p df [7] Al-Ali, A.R., Al-Rousan, M.: „Java-based home automation system‟, IEEE Trans. Consum. Electron., 2004, 50, (2), pp. 498–504. BIOGRAPHIES P. Mohan is currently pursuing his Master‟s degree program in Embedded System Technologies in Rajiv Gandhi College of Engineering, Chennai. He studied his UG degree in Electronics and Communication Engineering Discipline, and his research area includes communication protocols in embedded system. M.Vinoth Kumar is presently working as an Assistant Professor in EEE Dept of Rajiv Gandhi College of Engineering, Chennai. Who have Received M.Tech in Embedded Systems from Hindustan University, Chennai. B.E in ECE from Sengunthar Engineering College, Anna University, Chennai. His research interest includes Mobile Communications, Computer Networks, Embedded Systems and communication networks. .