SlideShare a Scribd company logo
1 of 8
Download to read offline
Issues in Informing Science and Information Technology Volume 6, 2009
SMS Based Wireless Home Appliance Control System
(HACS) for Automating Appliances and Security
Malik Sikandar Hayat Khiyal, Aihab Khan, and Erum Shehzadi
Software Engineering Dept., Fatima Jinnah Women University,
Rawalpindi, Pakistan
m.sikandarhayat@yahoo.com; aihabkhan@yahoo.com;
engr_erum@yahoo.com
Abstract
This paper mainly focuses on the controlling of home appliances remotely and providing security
when the user is away from the place. The system is SMS based and uses wireless technology to
revolutionize the standards of living. This system provides ideal solution to the problems faced by
home owners in daily life. The system is wireless therefore more adaptable and cost-effective.
The HACS system provides security against intrusion as well as automates various home appli-
ances using SMS. The system uses GSM technology thus providing ubiquitous access to the sys-
tem for security and automated appliance control.
Keywords: Short Message Service (SMS), Global System for Mobile communication (GSM),
Radio Frequency (RF), AT Commands, ubiquitous access and Automation.
Introduction
The aim of the paper is to investigate a cost effective solution that will provide controlling of
home appliances remotely and will also enable home security against intrusion in the absence of
home owner.
The motivation is to facilitate the users to automate their homes having ubiquitous access. The
system provides availability due to development of a low cost system. The home appliances con-
trol system with an affordable cost was thought to be built that should be mobile providing re-
mote access to the appliances and allowing home security.
Home security has been a major issue where crime is increasing and everybody wants to take
proper measures to prevent intrusion. In addition there was a need to automate home so that user
can take advantage of the technological advancement in such a way that a person getting off the
office does not get melted with the hot climate. Therefore this paper proposes a system that al-
lows user to be control home appliances ubiquitously and also provide security on detection of
intrusion via SMS using GSM technol-
ogy.
The next section will explain the related
work; section 3 explains the proposed
system, methodology and algorithm.
Section 4 discusses the framework,
working, characteristics, strengths and
constraints of the system. Section 5 ex-
plains the results and section 6 is con-
clusions and the future work.
Material published as part of this publication, either on-line or
in print, is copyrighted by the Informing Science Institute.
Permission to make digital or paper copy of part or all of these
works for personal or classroom use is granted without fee
provided that the copies are not made or distributed for profit
or commercial advantage AND that copies 1) bear this notice
in full and 2) give the full citation on the first page. It is per-
missible to abstract these works so long as credit is given. To
copy in all other cases or to republish or to post on a server or
to redistributeto lists requires specific permission and payment
of a fee. Contact Publisher@InformingScience.org to request
redistribution permission.
SMS Based Wireless Home Appliance Control System
888
Related Work
Delgado, Picking, and Grout (2006) consider the problems with the implementation of home
automation systems. Furthermore the possible solutions are devised through various network
technologies. Several issues affecting home automation systems such as lack of robustness, com-
patibility issue and acceptability among the old and disabled people are discussed.
Ciubotaru-Petrescu, Chiciudean, Cioarga, and Stanescu (2006) present a design and implementa-
tion of SMS based control for monitoring systems. The paper has three modules involving sens-
ing unit for monitoring the complex applications. A processing unit that is microcontroller and a
communication module that uses GPRS modem or cell phone via serial port RS-232. The SMS is
used for status reporting such as power failure.
In their paper, Conte and Scaradozzi (2003) view home automation systems as multiple agent
systems (MAS). In the paper home automation system has been proposed that includes home ap-
pliances and devices that are controlled and maintained for home management. The major task is
to improve performance.
In their paper, Alkar and Buhur (2005) propose an Internet Based Wireless Home Automation
System for Multifunctional Devices. This paper proposes a low cost and flexible web-based solu-
tion but this system has some limitations such as the range and power failure.
Murthy (2008) explores primary health-care management for the rural population. A solution
proposes the use of the mobile web-technologies providing the PHC services to the rural popula-
tion. The system involves the use of SMS and cell phone technology for information manage-
ment, transactional exchange and personal communication.
Jawarkar, Ahmed, Ladhake, and Thakare (2008) propose remote monitoring through mobile
phone involving the use of spoken commands. The spoken commands are generated and sent in
the form of text SMS to the control system and then the microcontroller on the basis of SMS
takes a decision of a particular task.
Potamitis, Georgila, Fakotakis, and Kokkinakis, G. (2003) suggest the use of speech to interact
remotely with the home appliances to perform a particular action on behalf of the user. The ap-
proach is inclined for people with disability to perform real-life operations at home by directing
appliances through speech. Voice separation strategy is selected to take appropriate decision by
speech recognition.
Preliminaries
Home Appliance Control System (HACS)
Home appliance control system is based on GSM network technology for transmission of SMS
from sender to receiver. SMS sending and receiving is used for ubiquitous access of appliances
and allowing breach control at home.
The system proposes two sub-systems. Appliance control subsystem enables the user to control
home appliances remotely whereas the security alert subsystem provides the remote security
monitoring. The system is capable enough to instruct user via SMS from a specific cell number to
change the condition of the home appliance according to the user’s needs and requirements. The
second aspect is that of security alert which is achieved in a way that on the detection of intrusion
the system allows automatic generation of SMS thus alerting the user against security risk.
HACS system consists of the following components (shown in Figure 1):-
Khiyal, Khan, & Shehzadi
889
PC: This unit contains the software components such as the HACS System through which the
appliances are controlled and home security is monitored.
GSM Modem: It is a hardware component that allows the capability to send and receive SMS to
and from the system. The communication with the system takes place via RS232 serial port. Cell
phone can be attached at the place of GSM hardware but it limits the hardware functionality such
as sending or receiving of SMS.
Mobile Device: Cellular phone containing SIM card has a specific number through which com-
munication takes place. The device communicates with the GSM Modem via radio frequency.
Mobile user transmits SMS using GSM technology.
Framework Overview
Figure 1: Model of HACS
Working
The working of HACS model (shown in Figure 1) is explained:-
PC: PC being the main module has HACS system installed on it. The two subsystems; one being
appliances control is responsible for ubiquitous access of appliances and the second subsystem
being security alert is responsible for security intrusion detection. Both subsystems work on GSM
technology for transmission of instructions from sender to receiver.
GSM Modem: GSM modem is a plug and play device and is attached to the PC which then com-
municates with the PC via RS232 port. GSM modem is a bridge responsible for ena-
bling/disabling of SMS capability.
Cell Phone: Mobile device communicates with the GSM Modem via radio waves. The mode of
communication is wireless and mechanism works on the GSM technology. Cell phone has a SIM
card and a GSM subscription. This cell phone number is configured on the system. User transmits
instructions via SMS and the system takes action against those instructions.
Methodology
The methodology followed in the HACS is given as:-
PC
RS232
GSM Modem
Remote User Mobile
Device
RF
HACS System
Appliance Control
System
Security System
SMS Based Wireless Home Appliance Control System
890
• GSM hardware tests are run in order to check the hardware support. The system will
call GSM modem and it will get activated.
• After activation the Modem will check for hardware support. If the hardware is missing
or some other hardware problem there will be error, resulting in communication failure
and the application will be terminated.
• If hardware responds then the serial port will be opened for communication and GSM
hardware will allow transmission of SMS.
• The system will then connect and after connection establishment the system will be
able to detect intrusion and will alert user about the breach and similarly the system
will update status of appliances by receiving SMS from the pre-defined cell number.
• SMS will be silently ignored if cell number is unauthorized.
Pseudo code
The pseudo code for HACS is given as:-
begin
Run Tests
If Test = 0
Terminate program
If Test = 1
Communication = OK, port will open
Click Connect
Controls {Cj | j=1, 2, 3, 4} = enable
If intrusion = 1
Send security alert
If incoming SMS = 1
Simulate appliances
end
Characteristics of HACS
The proposed system characteristics involve remote controlling of appliances, intrusion detection,
system security and auto-configuration such that system automatically adjusts the system settings
on running hardware support check. The system has useful features such as displaying of battery
level, charging status and signal strength of the mobile thus making system reliable.
Strengths of HACS
HACS system has many advantages such as remote controlling of home appliances, availability
and ease of users. The user can get alerts anywhere through the GSM technology thus making the
system location independent. The system contains low cost components easily available which
cuts down the overall system cost.
Moreover system alerts user about breach via SMS providing home security also it allows secure
access due to pre-configured number. The ease of deployment is due to wireless mode of com-
munication. GSM technology provides the benefit that the system is accessible in remote areas as
well. The system reliability increases due to the useful features such as battery level checking,
charging status and signal strength indicating the system about threats. The system integration is
Khiyal, Khan, & Shehzadi
891
simple and is also scalable and extensible. The auto-configuration capability allows the system
auto enabling/disabling of certain features.
Constraints of HACS
The system functionality is based on GSM technology so the technological constraints must be
kept in mind. The system is vulnerable to power failure but this disruption can be avoided by at-
taching the voltage source thus allowing users to avail the great advantage of this system.
Results
The results of the HACS system:-
Figure 2 shows various GSM hardware tests that will be run to check the hardware support.
The system then opens the serial port for communication with the GSM modem. On successful
port opening the system communicates with the GSM Modem but if fails system does not com-
municate.
The system checks support for battery level, signal strength and GSM modem SMS sending and
receiving capability. If these tests succeed the system gives response of ‘Ok’, if not then ‘ER-
ROR’ is returned.
Figure 2: GSM Hardware Test
Figure 3 shows that a particular home appliance is simulated on the reception of SMS sent by the
remote user.
The remote user sent SMS from a pre-configured cell number on the HACS system to turn on the
sound alarm and the system performed the respective function by simulating the alarm to green
color as directed by the user.
SMS Based Wireless Home Appliance Control System
892
Figure 3: Simulation of Home Appliance
Figure 4: SMS alert on Intrusion Detection
Figure 4 shows the result when the event of intrusion was triggered then the system automatically
generated SMS to inform the user about the security risk.
The system is constantly monitoring the battery level, charging status and signal strength. In Fig-
ure 4 is illustrating that the communication between system and GSM hardware device is taking
place via COM port 7.
The tabulated results are presented in Tables 1 and 2.
Table 1: Appliance Control Sub-system
a. Results of Appliance Control Subsystem:
APPLIANCE SMS INTRUSION SENT
BY USER
SYSTEM RESPONSE
Air Conditioner Air Conditioner = 1 AC button simulated to green
Alarm Alarm = 0 Alarmbutton simulated to red
Light Light = 1 Light button simulated to green
Khiyal, Khan, & Shehzadi
893
Table 2: Security Alert Sub-system
b. Results of Security Alert Subsystem:
APPLIANCE SYSTEM ACTION ALERT SMS RECEIVEDBY USER
Main Gate Intrusion detected on Main Gate,
SMS generated to user
SMS received “Breach on the main gate”
Entrance Door Intrusion detected on Entrance
Door, SMS generated to user
SMS received “Breach on the Entrance Door”
Living Room
Windows
Intrusion detected on Living
RoomWindows, SMS generated
to user
SMS received “Breach on the Living Room
Windows”
Roof Door Intrusion detected on Roof Door,
SMS generated to user
SMS received “Breach on the Roof Door”
Achieved analytical results:-
• System allowed the provision of security such that system took no action against the in-
structions received from unauthorized number. The required task was performed only
when the pre-configured number instructed the system.
• System sent breach alert when the intrusion was detected.
• Remote Controlling capability of the system allowed user to switch on/off through simu-
lating the appliance as directed by the incoming SMS.
• The system automatically performed tests and checked support for available features and
SMS sending and receiving capability and configured system accordingly.
Conclusion and Future Work
In the paper low cost, secure, ubiquitously accessible, auto-configurable, remotely controlled so-
lution for automation of homes has been introduced. The approach discussed in the paper is novel
and has achieved the target to control home appliances remotely using the SMS-based system
satisfying user needs and requirements.
GSM technology capable solution has proved to be controlled remotely, provide home security
and is cost-effective as compared to the previously existing systems. Hence we can conclude that
the required goals and objectives of HACS have been achieved.
The basic level of home appliance control and remote monitoring has been implemented. The
system is extensible and more levels can be further developed using automatic motion/glass
breaking detectors so the solution can be integrated with these and other detection systems. In
case of remote monitoring other appliances can also be monitored such that if the level of tem-
perature rises above certain level then it should generate SMS or sensors can also be applied that
can detect gas, smoke or fire in case of emergency the system will automatically generate SMS.
In future the system will be small box combining the PC and GSM modem. This hardware can be
imported from Taiwan and Singapore. The hardware will be self contained and cannot be prone to
electric failure. This appliance will have its own encapsulated UPS and charging system.
SMS Based Wireless Home Appliance Control System
894
References
Alkar, A. Z., & Buhur, U. (2005). An Internet Based Wireless Home Automation Systemfor Multifunc-
tional Devices. IEEE Consumer Electronics, 51(4), 1169-1174. Retrieved from
http://www.thaieei.com/embedded/pdf/Automation/20022.pdf
Ciubotaru-Petrescu, B., Chiciudean, D., Cioarga, R., & Stanescu, D. (2006). Wireless Solutions for Te-
lemetry in Civil Equipment and Infrastructure Monitoring. 3rd Romanian-Hungarian Joint Symposium
on Applied Computational Intelligence (SACI) May 25-26, 2006. Retrieved from
http://www.bmf.hu/conferences/saci2006/Ciubotaru.pdf
Conte, G., & Scaradozzi, D. (2003). Viewing home automation systems as multiple agents systems. Ro-
boCUP2003, Padova, Italy. Retrieved from http://www.robosiri.it/ROBOCUP_2003/ROBOCUP-
SITOSIRI/articles/pdf/Conte.pdf
Delgado, A. R., Picking, R., & Grout, V. (2006) Remote-controlled home automation systems with differ-
ent network technologies. Proceedings of the 6th International Network Conference (INC 2006), Uni-
versity of Plymouth, 11-14 July 2006, pp. 357-366. Retrieved from
http://www.newi.ac.uk/groutv/papers/p5.pdf
Jawarkar, N. P., Ahmed, V., Ladhake, S. A. & Thakare, R. D. (2008). Micro-controller based Remote
Monitoring using Mobile through Spoken Commands. Journal Of Networks, 3(2), 58-63. Retrieved
fromhttp://www.academypublisher.com/jnw/vol03/no02/jnw03025863.pdf
Murthy, M. V. R. (2008). Mobile based primary health care systemfor rural India. W3C workshop on Role
of Mobile Technologies in Fostering Social Development, Jun 2008
Potamitis, I., Georgila, K., Fakotakis, N., & Kokkinakis, G. (2003). An integrated systemfor smart-home
control of appliances based on remote speech interaction. EUROSPEECH 2003, 8th European Confer-
ence on Speech Communication and Technology, pp. 2197-2200, Geneva, Switzerland, Sept. 1-4,
2003. Retrieved from http://www.wcl.ee.upatras.gr/ai/papers/potamitis14.pdf
Biographies
Dr. Malik Sikandar Hayat Khiyal born at Khushab, Pakistan. He is
Chairperson Department of Computer Sciences and Software Engi-
neering at Fatima Jinnah Women University, Pakistan. He received his
M.Sc degree from Quaid-e-Azam University, Islamabad. He got first
position in the faculty of Natural Science of the University. He was
awarded the merit scholarship for Ph.D. He received his Ph.D. degree
from UMIST, Manchester, U.K. He developed software of under-
ground flow and advanced fluid dynamic techniques. His areas of in-
terest are Numerical Analysis, Modeling and Simulation, Discrete
structure, Data structure, Analysis of Algorithm, Theory of Automata
and Theory of Computation. He has more than fifty research publica-
tion published in National and International Journals and Conference
proceedings. He can be contacted at m.sikandarhayat@yahoo.com, Fatima Jinnah Women Uni-
versity, Rawalpindi Pakistan.
Mr. Aihab Khan works in Department of Computer Sciences Fatima Jinnah Women University,
Pakistan. His research interests are in the field of Data mining, Data Warehousing as well as In-
formation Security. He can be contacted at aihabkhan@yahoo.com, Fatima Jinnah Women Uni-
versity, Rawalpindi Pakistan.
Ms. Erum Shehzadi is a software engineer graduate from Department of Software Engineering,
Fatima Jinnah Women University, Pakistan. She can be contacted at engr_erum@yahoo.com.

More Related Content

What's hot

Control and indicating equipment communicating via the peripheral component i...
Control and indicating equipment communicating via the peripheral component i...Control and indicating equipment communicating via the peripheral component i...
Control and indicating equipment communicating via the peripheral component i...journalBEEI
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsIOSR Journals
 
Remote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networksRemote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networkseSAT Journals
 
Wireless security
Wireless securityWireless security
Wireless securitySalma Elhag
 
Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733SIVA SASTHRI
 
Wireless Sensor Network for Radiation Detection
Wireless Sensor Network for Radiation DetectionWireless Sensor Network for Radiation Detection
Wireless Sensor Network for Radiation Detectionijeei-iaes
 
IRJET- Mobile Detector
IRJET-  	  Mobile DetectorIRJET-  	  Mobile Detector
IRJET- Mobile DetectorIRJET Journal
 
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET Journal
 
An intrusion detection algorithm for ami
An intrusion detection algorithm for amiAn intrusion detection algorithm for ami
An intrusion detection algorithm for amiIJCI JOURNAL
 
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...Conference Papers
 
Survey on Security Aspects Related to DOIP
Survey on Security Aspects Related to DOIPSurvey on Security Aspects Related to DOIP
Survey on Security Aspects Related to DOIPIRJET Journal
 
Security threats and countermeasure in 3 g network
Security threats and countermeasure in 3 g networkSecurity threats and countermeasure in 3 g network
Security threats and countermeasure in 3 g networkmmubashirkhan
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
 
S ECURED S MART S YSTEM D ESING IN P ERVASIVE C OMPUTING E NVIRONMENT U...
S ECURED  S MART  S YSTEM  D ESING  IN  P ERVASIVE  C OMPUTING E NVIRONMENT U...S ECURED  S MART  S YSTEM  D ESING  IN  P ERVASIVE  C OMPUTING E NVIRONMENT U...
S ECURED S MART S YSTEM D ESING IN P ERVASIVE C OMPUTING E NVIRONMENT U...ijujournal
 
Secured smart system desing in pervasive computing environment using vcs
Secured smart system desing in pervasive computing environment using vcsSecured smart system desing in pervasive computing environment using vcs
Secured smart system desing in pervasive computing environment using vcsijujournal
 
Smart grid chinedu opara(m00560830)
Smart grid   chinedu opara(m00560830)Smart grid   chinedu opara(m00560830)
Smart grid chinedu opara(m00560830)Chinedu Opara
 

What's hot (20)

Control and indicating equipment communicating via the peripheral component i...
Control and indicating equipment communicating via the peripheral component i...Control and indicating equipment communicating via the peripheral component i...
Control and indicating equipment communicating via the peripheral component i...
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
 
Remote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networksRemote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networks
 
Wireless security
Wireless securityWireless security
Wireless security
 
D1072327
D1072327D1072327
D1072327
 
Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733
 
Wireless Sensor Network for Radiation Detection
Wireless Sensor Network for Radiation DetectionWireless Sensor Network for Radiation Detection
Wireless Sensor Network for Radiation Detection
 
574 501-507
574 501-507574 501-507
574 501-507
 
IRJET- Mobile Detector
IRJET-  	  Mobile DetectorIRJET-  	  Mobile Detector
IRJET- Mobile Detector
 
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
 
An intrusion detection algorithm for ami
An intrusion detection algorithm for amiAn intrusion detection algorithm for ami
An intrusion detection algorithm for ami
 
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
 
Survey on Security Aspects Related to DOIP
Survey on Security Aspects Related to DOIPSurvey on Security Aspects Related to DOIP
Survey on Security Aspects Related to DOIP
 
Security threats and countermeasure in 3 g network
Security threats and countermeasure in 3 g networkSecurity threats and countermeasure in 3 g network
Security threats and countermeasure in 3 g network
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
Db24664671
Db24664671Db24664671
Db24664671
 
S ECURED S MART S YSTEM D ESING IN P ERVASIVE C OMPUTING E NVIRONMENT U...
S ECURED  S MART  S YSTEM  D ESING  IN  P ERVASIVE  C OMPUTING E NVIRONMENT U...S ECURED  S MART  S YSTEM  D ESING  IN  P ERVASIVE  C OMPUTING E NVIRONMENT U...
S ECURED S MART S YSTEM D ESING IN P ERVASIVE C OMPUTING E NVIRONMENT U...
 
Secured smart system desing in pervasive computing environment using vcs
Secured smart system desing in pervasive computing environment using vcsSecured smart system desing in pervasive computing environment using vcs
Secured smart system desing in pervasive computing environment using vcs
 
23709008 smart-sensors
23709008 smart-sensors23709008 smart-sensors
23709008 smart-sensors
 
Smart grid chinedu opara(m00560830)
Smart grid   chinedu opara(m00560830)Smart grid   chinedu opara(m00560830)
Smart grid chinedu opara(m00560830)
 

Similar to SMS Based Wireless Home Appliance Control and Security System

11.[106 118]design and implementation of a short message service based remote...
11.[106 118]design and implementation of a short message service based remote...11.[106 118]design and implementation of a short message service based remote...
11.[106 118]design and implementation of a short message service based remote...Alexander Decker
 
Design of a gsm based biometric access control system
Design of a gsm based biometric access control systemDesign of a gsm based biometric access control system
Design of a gsm based biometric access control systemAlexander Decker
 
Gsm based home automation ppt
Gsm based home automation pptGsm based home automation ppt
Gsm based home automation pptChakresh Tiwari
 
Cell phone based automation systems
Cell phone based automation systemsCell phone based automation systems
Cell phone based automation systemsManpreet Chandhok
 
GSM Based Anti theft system
GSM Based Anti theft systemGSM Based Anti theft system
GSM Based Anti theft systemKshitij Rokde
 
Anti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 finalAnti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 finalAshu0711
 
Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission systemDurgarao Gundu
 
Ijmsr 2016-01
Ijmsr 2016-01Ijmsr 2016-01
Ijmsr 2016-01ijmsr
 
Development of wireless and intelligent home automation system
Development of wireless and intelligent home automation systemDevelopment of wireless and intelligent home automation system
Development of wireless and intelligent home automation systemTELKOMNIKA JOURNAL
 
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...Mehraj U Din
 
Paper id 24201457
Paper id 24201457Paper id 24201457
Paper id 24201457IJRAT
 
Home Automation Using Mobile Communication
Home Automation Using Mobile CommunicationHome Automation Using Mobile Communication
Home Automation Using Mobile Communicationiosrjce
 
A Proposed Cost Effective Prototype Model for PLC Based GSM Remote Control in...
A Proposed Cost Effective Prototype Model for PLC Based GSM Remote Control in...A Proposed Cost Effective Prototype Model for PLC Based GSM Remote Control in...
A Proposed Cost Effective Prototype Model for PLC Based GSM Remote Control in...IOSR Journals
 
Gsm based emergency calling system
Gsm based emergency calling systemGsm based emergency calling system
Gsm based emergency calling systemIAEME Publication
 

Similar to SMS Based Wireless Home Appliance Control and Security System (20)

11.[106 118]design and implementation of a short message service based remote...
11.[106 118]design and implementation of a short message service based remote...11.[106 118]design and implementation of a short message service based remote...
11.[106 118]design and implementation of a short message service based remote...
 
Design of a gsm based biometric access control system
Design of a gsm based biometric access control systemDesign of a gsm based biometric access control system
Design of a gsm based biometric access control system
 
Gsm based home automation ppt
Gsm based home automation pptGsm based home automation ppt
Gsm based home automation ppt
 
01362503
0136250301362503
01362503
 
Cell phone based automation systems
Cell phone based automation systemsCell phone based automation systems
Cell phone based automation systems
 
GSM Based Anti theft system
GSM Based Anti theft systemGSM Based Anti theft system
GSM Based Anti theft system
 
Anti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 finalAnti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 final
 
Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission system
 
Ijmsr 2016-01
Ijmsr 2016-01Ijmsr 2016-01
Ijmsr 2016-01
 
M2M_COMMUNICATION.pptx
M2M_COMMUNICATION.pptxM2M_COMMUNICATION.pptx
M2M_COMMUNICATION.pptx
 
Development of wireless and intelligent home automation system
Development of wireless and intelligent home automation systemDevelopment of wireless and intelligent home automation system
Development of wireless and intelligent home automation system
 
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
 
Paper id 24201457
Paper id 24201457Paper id 24201457
Paper id 24201457
 
GSM BASED e-NOTICE BOARD SRS
GSM BASED e-NOTICE BOARD SRSGSM BASED e-NOTICE BOARD SRS
GSM BASED e-NOTICE BOARD SRS
 
D017651519
D017651519D017651519
D017651519
 
Home Automation Using Mobile Communication
Home Automation Using Mobile CommunicationHome Automation Using Mobile Communication
Home Automation Using Mobile Communication
 
G010133748
G010133748G010133748
G010133748
 
A Proposed Cost Effective Prototype Model for PLC Based GSM Remote Control in...
A Proposed Cost Effective Prototype Model for PLC Based GSM Remote Control in...A Proposed Cost Effective Prototype Model for PLC Based GSM Remote Control in...
A Proposed Cost Effective Prototype Model for PLC Based GSM Remote Control in...
 
smart grid
smart gridsmart grid
smart grid
 
Gsm based emergency calling system
Gsm based emergency calling systemGsm based emergency calling system
Gsm based emergency calling system
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

SMS Based Wireless Home Appliance Control and Security System

  • 1. Issues in Informing Science and Information Technology Volume 6, 2009 SMS Based Wireless Home Appliance Control System (HACS) for Automating Appliances and Security Malik Sikandar Hayat Khiyal, Aihab Khan, and Erum Shehzadi Software Engineering Dept., Fatima Jinnah Women University, Rawalpindi, Pakistan m.sikandarhayat@yahoo.com; aihabkhan@yahoo.com; engr_erum@yahoo.com Abstract This paper mainly focuses on the controlling of home appliances remotely and providing security when the user is away from the place. The system is SMS based and uses wireless technology to revolutionize the standards of living. This system provides ideal solution to the problems faced by home owners in daily life. The system is wireless therefore more adaptable and cost-effective. The HACS system provides security against intrusion as well as automates various home appli- ances using SMS. The system uses GSM technology thus providing ubiquitous access to the sys- tem for security and automated appliance control. Keywords: Short Message Service (SMS), Global System for Mobile communication (GSM), Radio Frequency (RF), AT Commands, ubiquitous access and Automation. Introduction The aim of the paper is to investigate a cost effective solution that will provide controlling of home appliances remotely and will also enable home security against intrusion in the absence of home owner. The motivation is to facilitate the users to automate their homes having ubiquitous access. The system provides availability due to development of a low cost system. The home appliances con- trol system with an affordable cost was thought to be built that should be mobile providing re- mote access to the appliances and allowing home security. Home security has been a major issue where crime is increasing and everybody wants to take proper measures to prevent intrusion. In addition there was a need to automate home so that user can take advantage of the technological advancement in such a way that a person getting off the office does not get melted with the hot climate. Therefore this paper proposes a system that al- lows user to be control home appliances ubiquitously and also provide security on detection of intrusion via SMS using GSM technol- ogy. The next section will explain the related work; section 3 explains the proposed system, methodology and algorithm. Section 4 discusses the framework, working, characteristics, strengths and constraints of the system. Section 5 ex- plains the results and section 6 is con- clusions and the future work. Material published as part of this publication, either on-line or in print, is copyrighted by the Informing Science Institute. Permission to make digital or paper copy of part or all of these works for personal or classroom use is granted without fee provided that the copies are not made or distributed for profit or commercial advantage AND that copies 1) bear this notice in full and 2) give the full citation on the first page. It is per- missible to abstract these works so long as credit is given. To copy in all other cases or to republish or to post on a server or to redistributeto lists requires specific permission and payment of a fee. Contact Publisher@InformingScience.org to request redistribution permission.
  • 2. SMS Based Wireless Home Appliance Control System 888 Related Work Delgado, Picking, and Grout (2006) consider the problems with the implementation of home automation systems. Furthermore the possible solutions are devised through various network technologies. Several issues affecting home automation systems such as lack of robustness, com- patibility issue and acceptability among the old and disabled people are discussed. Ciubotaru-Petrescu, Chiciudean, Cioarga, and Stanescu (2006) present a design and implementa- tion of SMS based control for monitoring systems. The paper has three modules involving sens- ing unit for monitoring the complex applications. A processing unit that is microcontroller and a communication module that uses GPRS modem or cell phone via serial port RS-232. The SMS is used for status reporting such as power failure. In their paper, Conte and Scaradozzi (2003) view home automation systems as multiple agent systems (MAS). In the paper home automation system has been proposed that includes home ap- pliances and devices that are controlled and maintained for home management. The major task is to improve performance. In their paper, Alkar and Buhur (2005) propose an Internet Based Wireless Home Automation System for Multifunctional Devices. This paper proposes a low cost and flexible web-based solu- tion but this system has some limitations such as the range and power failure. Murthy (2008) explores primary health-care management for the rural population. A solution proposes the use of the mobile web-technologies providing the PHC services to the rural popula- tion. The system involves the use of SMS and cell phone technology for information manage- ment, transactional exchange and personal communication. Jawarkar, Ahmed, Ladhake, and Thakare (2008) propose remote monitoring through mobile phone involving the use of spoken commands. The spoken commands are generated and sent in the form of text SMS to the control system and then the microcontroller on the basis of SMS takes a decision of a particular task. Potamitis, Georgila, Fakotakis, and Kokkinakis, G. (2003) suggest the use of speech to interact remotely with the home appliances to perform a particular action on behalf of the user. The ap- proach is inclined for people with disability to perform real-life operations at home by directing appliances through speech. Voice separation strategy is selected to take appropriate decision by speech recognition. Preliminaries Home Appliance Control System (HACS) Home appliance control system is based on GSM network technology for transmission of SMS from sender to receiver. SMS sending and receiving is used for ubiquitous access of appliances and allowing breach control at home. The system proposes two sub-systems. Appliance control subsystem enables the user to control home appliances remotely whereas the security alert subsystem provides the remote security monitoring. The system is capable enough to instruct user via SMS from a specific cell number to change the condition of the home appliance according to the user’s needs and requirements. The second aspect is that of security alert which is achieved in a way that on the detection of intrusion the system allows automatic generation of SMS thus alerting the user against security risk. HACS system consists of the following components (shown in Figure 1):-
  • 3. Khiyal, Khan, & Shehzadi 889 PC: This unit contains the software components such as the HACS System through which the appliances are controlled and home security is monitored. GSM Modem: It is a hardware component that allows the capability to send and receive SMS to and from the system. The communication with the system takes place via RS232 serial port. Cell phone can be attached at the place of GSM hardware but it limits the hardware functionality such as sending or receiving of SMS. Mobile Device: Cellular phone containing SIM card has a specific number through which com- munication takes place. The device communicates with the GSM Modem via radio frequency. Mobile user transmits SMS using GSM technology. Framework Overview Figure 1: Model of HACS Working The working of HACS model (shown in Figure 1) is explained:- PC: PC being the main module has HACS system installed on it. The two subsystems; one being appliances control is responsible for ubiquitous access of appliances and the second subsystem being security alert is responsible for security intrusion detection. Both subsystems work on GSM technology for transmission of instructions from sender to receiver. GSM Modem: GSM modem is a plug and play device and is attached to the PC which then com- municates with the PC via RS232 port. GSM modem is a bridge responsible for ena- bling/disabling of SMS capability. Cell Phone: Mobile device communicates with the GSM Modem via radio waves. The mode of communication is wireless and mechanism works on the GSM technology. Cell phone has a SIM card and a GSM subscription. This cell phone number is configured on the system. User transmits instructions via SMS and the system takes action against those instructions. Methodology The methodology followed in the HACS is given as:- PC RS232 GSM Modem Remote User Mobile Device RF HACS System Appliance Control System Security System
  • 4. SMS Based Wireless Home Appliance Control System 890 • GSM hardware tests are run in order to check the hardware support. The system will call GSM modem and it will get activated. • After activation the Modem will check for hardware support. If the hardware is missing or some other hardware problem there will be error, resulting in communication failure and the application will be terminated. • If hardware responds then the serial port will be opened for communication and GSM hardware will allow transmission of SMS. • The system will then connect and after connection establishment the system will be able to detect intrusion and will alert user about the breach and similarly the system will update status of appliances by receiving SMS from the pre-defined cell number. • SMS will be silently ignored if cell number is unauthorized. Pseudo code The pseudo code for HACS is given as:- begin Run Tests If Test = 0 Terminate program If Test = 1 Communication = OK, port will open Click Connect Controls {Cj | j=1, 2, 3, 4} = enable If intrusion = 1 Send security alert If incoming SMS = 1 Simulate appliances end Characteristics of HACS The proposed system characteristics involve remote controlling of appliances, intrusion detection, system security and auto-configuration such that system automatically adjusts the system settings on running hardware support check. The system has useful features such as displaying of battery level, charging status and signal strength of the mobile thus making system reliable. Strengths of HACS HACS system has many advantages such as remote controlling of home appliances, availability and ease of users. The user can get alerts anywhere through the GSM technology thus making the system location independent. The system contains low cost components easily available which cuts down the overall system cost. Moreover system alerts user about breach via SMS providing home security also it allows secure access due to pre-configured number. The ease of deployment is due to wireless mode of com- munication. GSM technology provides the benefit that the system is accessible in remote areas as well. The system reliability increases due to the useful features such as battery level checking, charging status and signal strength indicating the system about threats. The system integration is
  • 5. Khiyal, Khan, & Shehzadi 891 simple and is also scalable and extensible. The auto-configuration capability allows the system auto enabling/disabling of certain features. Constraints of HACS The system functionality is based on GSM technology so the technological constraints must be kept in mind. The system is vulnerable to power failure but this disruption can be avoided by at- taching the voltage source thus allowing users to avail the great advantage of this system. Results The results of the HACS system:- Figure 2 shows various GSM hardware tests that will be run to check the hardware support. The system then opens the serial port for communication with the GSM modem. On successful port opening the system communicates with the GSM Modem but if fails system does not com- municate. The system checks support for battery level, signal strength and GSM modem SMS sending and receiving capability. If these tests succeed the system gives response of ‘Ok’, if not then ‘ER- ROR’ is returned. Figure 2: GSM Hardware Test Figure 3 shows that a particular home appliance is simulated on the reception of SMS sent by the remote user. The remote user sent SMS from a pre-configured cell number on the HACS system to turn on the sound alarm and the system performed the respective function by simulating the alarm to green color as directed by the user.
  • 6. SMS Based Wireless Home Appliance Control System 892 Figure 3: Simulation of Home Appliance Figure 4: SMS alert on Intrusion Detection Figure 4 shows the result when the event of intrusion was triggered then the system automatically generated SMS to inform the user about the security risk. The system is constantly monitoring the battery level, charging status and signal strength. In Fig- ure 4 is illustrating that the communication between system and GSM hardware device is taking place via COM port 7. The tabulated results are presented in Tables 1 and 2. Table 1: Appliance Control Sub-system a. Results of Appliance Control Subsystem: APPLIANCE SMS INTRUSION SENT BY USER SYSTEM RESPONSE Air Conditioner Air Conditioner = 1 AC button simulated to green Alarm Alarm = 0 Alarmbutton simulated to red Light Light = 1 Light button simulated to green
  • 7. Khiyal, Khan, & Shehzadi 893 Table 2: Security Alert Sub-system b. Results of Security Alert Subsystem: APPLIANCE SYSTEM ACTION ALERT SMS RECEIVEDBY USER Main Gate Intrusion detected on Main Gate, SMS generated to user SMS received “Breach on the main gate” Entrance Door Intrusion detected on Entrance Door, SMS generated to user SMS received “Breach on the Entrance Door” Living Room Windows Intrusion detected on Living RoomWindows, SMS generated to user SMS received “Breach on the Living Room Windows” Roof Door Intrusion detected on Roof Door, SMS generated to user SMS received “Breach on the Roof Door” Achieved analytical results:- • System allowed the provision of security such that system took no action against the in- structions received from unauthorized number. The required task was performed only when the pre-configured number instructed the system. • System sent breach alert when the intrusion was detected. • Remote Controlling capability of the system allowed user to switch on/off through simu- lating the appliance as directed by the incoming SMS. • The system automatically performed tests and checked support for available features and SMS sending and receiving capability and configured system accordingly. Conclusion and Future Work In the paper low cost, secure, ubiquitously accessible, auto-configurable, remotely controlled so- lution for automation of homes has been introduced. The approach discussed in the paper is novel and has achieved the target to control home appliances remotely using the SMS-based system satisfying user needs and requirements. GSM technology capable solution has proved to be controlled remotely, provide home security and is cost-effective as compared to the previously existing systems. Hence we can conclude that the required goals and objectives of HACS have been achieved. The basic level of home appliance control and remote monitoring has been implemented. The system is extensible and more levels can be further developed using automatic motion/glass breaking detectors so the solution can be integrated with these and other detection systems. In case of remote monitoring other appliances can also be monitored such that if the level of tem- perature rises above certain level then it should generate SMS or sensors can also be applied that can detect gas, smoke or fire in case of emergency the system will automatically generate SMS. In future the system will be small box combining the PC and GSM modem. This hardware can be imported from Taiwan and Singapore. The hardware will be self contained and cannot be prone to electric failure. This appliance will have its own encapsulated UPS and charging system.
  • 8. SMS Based Wireless Home Appliance Control System 894 References Alkar, A. Z., & Buhur, U. (2005). An Internet Based Wireless Home Automation Systemfor Multifunc- tional Devices. IEEE Consumer Electronics, 51(4), 1169-1174. Retrieved from http://www.thaieei.com/embedded/pdf/Automation/20022.pdf Ciubotaru-Petrescu, B., Chiciudean, D., Cioarga, R., & Stanescu, D. (2006). Wireless Solutions for Te- lemetry in Civil Equipment and Infrastructure Monitoring. 3rd Romanian-Hungarian Joint Symposium on Applied Computational Intelligence (SACI) May 25-26, 2006. Retrieved from http://www.bmf.hu/conferences/saci2006/Ciubotaru.pdf Conte, G., & Scaradozzi, D. (2003). Viewing home automation systems as multiple agents systems. Ro- boCUP2003, Padova, Italy. Retrieved from http://www.robosiri.it/ROBOCUP_2003/ROBOCUP- SITOSIRI/articles/pdf/Conte.pdf Delgado, A. R., Picking, R., & Grout, V. (2006) Remote-controlled home automation systems with differ- ent network technologies. Proceedings of the 6th International Network Conference (INC 2006), Uni- versity of Plymouth, 11-14 July 2006, pp. 357-366. Retrieved from http://www.newi.ac.uk/groutv/papers/p5.pdf Jawarkar, N. P., Ahmed, V., Ladhake, S. A. & Thakare, R. D. (2008). Micro-controller based Remote Monitoring using Mobile through Spoken Commands. Journal Of Networks, 3(2), 58-63. Retrieved fromhttp://www.academypublisher.com/jnw/vol03/no02/jnw03025863.pdf Murthy, M. V. R. (2008). Mobile based primary health care systemfor rural India. W3C workshop on Role of Mobile Technologies in Fostering Social Development, Jun 2008 Potamitis, I., Georgila, K., Fakotakis, N., & Kokkinakis, G. (2003). An integrated systemfor smart-home control of appliances based on remote speech interaction. EUROSPEECH 2003, 8th European Confer- ence on Speech Communication and Technology, pp. 2197-2200, Geneva, Switzerland, Sept. 1-4, 2003. Retrieved from http://www.wcl.ee.upatras.gr/ai/papers/potamitis14.pdf Biographies Dr. Malik Sikandar Hayat Khiyal born at Khushab, Pakistan. He is Chairperson Department of Computer Sciences and Software Engi- neering at Fatima Jinnah Women University, Pakistan. He received his M.Sc degree from Quaid-e-Azam University, Islamabad. He got first position in the faculty of Natural Science of the University. He was awarded the merit scholarship for Ph.D. He received his Ph.D. degree from UMIST, Manchester, U.K. He developed software of under- ground flow and advanced fluid dynamic techniques. His areas of in- terest are Numerical Analysis, Modeling and Simulation, Discrete structure, Data structure, Analysis of Algorithm, Theory of Automata and Theory of Computation. He has more than fifty research publica- tion published in National and International Journals and Conference proceedings. He can be contacted at m.sikandarhayat@yahoo.com, Fatima Jinnah Women Uni- versity, Rawalpindi Pakistan. Mr. Aihab Khan works in Department of Computer Sciences Fatima Jinnah Women University, Pakistan. His research interests are in the field of Data mining, Data Warehousing as well as In- formation Security. He can be contacted at aihabkhan@yahoo.com, Fatima Jinnah Women Uni- versity, Rawalpindi Pakistan. Ms. Erum Shehzadi is a software engineer graduate from Department of Software Engineering, Fatima Jinnah Women University, Pakistan. She can be contacted at engr_erum@yahoo.com.