SlideShare a Scribd company logo
1 of 9
Download to read offline
www.idosr.org Edozie et al
98
ยฉIDOSR Publication
International Digital Organization for Scientific Research ISSN: 2579-079X
IDOSR JOURNAL OF SCIENCE AND TECHNOLOGY 9(1):98-106, 2023.
Design and Implementation of a Smart Surveillance Security
System
Enerst, Edozie1
; Eze Val Hyginus Udoka2
; Musiimenta, Immaculate1
;
Wantimba, Janat1
1
Department of Electrical Engineering, Kampala International University, Uganda.
2
Department of Publication and Extension, Kampala International University, Uganda.
ABSTRACT
Home security is essential for occupantโ€™s conveniences and protection. This research
project designed and implemented a comparatively inexpensive smart surveillance
security system that automatically captures an intruderโ€™s image through a raspberry pi
camera module and PIR sensor and sends mail to the user via Wi-Fi using the users
registered email address. This system operates by triggering the Pi Camera through
Raspberry Pi whenever an intruder comes in range using PIR sensor. The Pi camera will
capture the image, save it and send the image of the intruder via mail to the user through
the help of the command codes embedded in the Raspberry pi microcontroller. This
research project will enable home/supermarket and office owners to secure their
facilities and monitor the activities of their employers at any location at cheaper cost
which is the earnest desire of an Engineer. Proteus 2022 was used as the simulation tool.
Keywords: Security, Spy camera, Raspberry pi, IOT, smart security system.
INTRODUCTION
Security is the first attention everyone
wishes to have everywhere at every
point in time in human life. The
innovations in Technology have
increased/improved the safety and
security of human lives and property [1,
2, 3]. Home Security systems involved
the combination of both human and
electronic devices mechanism to detect
intrusions in our environments and
homes. The growth of Internet of Things
(IOT) is referred to as a daily
technological innovation which involves
devices connecting to one other to
create a pervasive computing [4, 5, 6].
These devices exchange data and
information about the environment,
while reacting independently to
different events [7, 8, 9]. They influence
the surroundings hence creating
services with or without human
intervention. The IOT has potential
applications in all areas of life. One of
the applications of IOT is smart security
system [10, 11, 12]. The application uses
IOT to process its data and by using this
application, one will be able to monitor
his households from a distance with the
help of interconnected devices that
communicates through the internet [13,
14, 15]. The smart security system can
detect any object movement, take a
picture of the object and after sends a
notification to the owner [16, 17, 18].
This application can be used in homes,
in shops, in hotels and in other places
around the world and itโ€™s the best
application for monitoring and
controlling a home/shops or super
markets from a distance [1, 19, 20, 21].
The system in [2] provides two methods
to implement home security using IOT.
One of using web cameras such that
whenever there is any motion detected
by the camera, it sounds an alarm and
sends a mail to the owner [22, 23, 24].
This method of detecting intrusion is
quite good but somehow expensive due
to the cost of cameras involved in the
process [3, 25, 26,]. The cameras to be
used are to be of good quality which
means they should have a wide range
and the picture quality should be high
enough to detect the movement of an
intruder [4, 27, 28].
The result in [5] is the automatic smart
home security system that has the
capability of controlling and automating
www.idosr.org Edozie et al
99
most of the home appliances. In this
system embedded features like gas
leakage alerts to user by sending simple
text message and immediate signals to
the server of the personal computer (PC)
[29, 30, 31, 32, 33, 34]. Server sends
message to user android mobile
application connected with server of the
pc through Wi-Fi. User can take
immediate action on receiving SMS from
server by automatically turning off the
cylinder valve and opening windows.
The system also has fire alarm
embedded to sense increase
temperature above threshold value.
Server will take proper action by sending
message through android application to
the user [33, 34, 35].
The study in [6] is the IOT ruler which
sends alerts to the owner over voice calls
using the internet. If any sort of intruder
or human movement is sensed near the
entrance of his house and raises alarm
upon the userโ€™s discretion whereby the
provision of sending alert messages to
concerned security personnel in case of
critical situation is also built into the
system and vice versa. The advantage of
this smart security system is that when
operating it the owner doesnโ€™t need to
have data on his phone, the system just
runs fine with the launch pad connected
to Wi-Fi at home or office [7, 8, 9, 36, 37].
The researcher in [7] researched on
home automation and security together
with its major objective to help
handicapped and aged people to control
home appliances and alert them in
critical conditions. In this system, a
sensor senses the status of appliances
and updates the webserver. If the user
is far away from home, he/she can
access and change status of the
appliances for example switching a
certain appliance on/off [10, 11, 12,
38,39,40].
The researcher in [8], researched on a
home security system based on internet
of things via favorite platform. In this
project the device is equipped with
passive infrared sensor that monitors
the presence of the intruder and any
unauthorized entry. There is a Blynk
application on the device that is used as
the main switch which can activate the
device whenever necessary. The home
security system based on the Internet of
things (IOTs) can help the users to
monitor the house even when they are
absent and a favorite platform helps the
users to receive alerts as soon as
possible [13,14,15].
In [9], the researcher developed a smart
home security system using object
recognition and PIR sensors which is
capable for human detection. The IOT
system is used to monitor the presence
of an intruder in the house by the
combination of motion detection and
object recognition. The motion
detection is performed using the PIR
sensor, the web camera takes the picture
of the suspicious spot. The system
performs the object recognition by using
the histogram of gradient (HOG) and
support vector machine (SVM) methods.
The system recognizes the appearance
of an intruder and warn the house owner
via alarm. The system is implemented on
raspberry pi [16, 17, 18].
Smart security system with wireless
camera is a system normal use in various
homes to secure lives and environments
through remote monitoring techniques
like Internet of Things (IOT).
From the review above, many draw backs
were discovered such as (a) nonchalant
attitudes or misbehaviors/maltreatment
by home caretakers of vulnerable age
groups like toddlers, children and elders
especially in Uganda. (b) The avoidable
mistakes and stealing in the stores and
super markets. This research work will
address the problems of intrusions from
unknown individuals or home burglars
by designing and implementing a smart
surveillance security system using
internet of things technology that will
create and send a notification email
together with the happening image to
the userโ€™s email address using
Raspberry Pi.
MATERIAL AND METHODS
This design and implementation of
smart surveillance security system is
basically designed to provide security
for households using the spy camera
and SMTP server which are all embedded
in the system by the use of a raspberry
pi microcontroller. The system
comprises of hardware and software
application program for the raspberry pi
which was developed using python
script code as a programming language.
The hardware units compose of DC fan,
www.idosr.org Edozie et al
100
Ip Spy camera, raspberry pi and power
units (voltage regulator, battery etc.)
components.
Materials
1.Power Supply: This is an electrical
charger that supplies a rated power to an
electrical load. The system uses a
smartphone charger with a green/red
indicator which when blinks showed that
the charger is passing on electrical
energy.
Figure 2: Smartphone Charger
2. Voltage Regulator: This is a system
designed to automatically maintain a
constant voltage level, depending on the
design and specifications of the voltage
regulator to be used (DC or AC). 5V DC
regulator was used for this design
[10][11].
Figure 3: voltage regulator
3. Dc cooling Fan: The direct current
fans are powered with potential fixed
values of voltage such as voltage of
battery. Typical voltages for dc fans are
5v, 12v, 24v and 48v. It is used to keep
the raspberry pi microcontroller cool to
avoid overheating. The fan is plugged
directly into Raspberry Pi's 5V+GND
GPIO power pin [19][20].
Figure 4: DC cooling fan
4. Passive Infrared (PIR) Sensor: PIR
sensor is an essential for emitting
infrared (IR) radiation through its
movement. PIR is an electronic sensor
that used to detect the object motion by
receiving the infrared (IR) as light
radiates from the external
environments. The sensor compares the
intensity of the infrared radiation from
time to time. If there is an object
movement in the room, the intensity
changes and detecting the object
movement takes place. The PIR Sensor is
small in size, inexpensive in price, uses
low power, easy in use and connectivity
[21][22]
Figure 5: Passive Infrared (PIR) Sensor
5. Raspberry Pi-3: The raspberry pi is a
low-cost credit card sized computer that
plugs into a computer monitor or TV and
uses a standard keyboard and mouse. a
raspberry pi microcontroller is used in
embedding the spy camera and SMTP
server for interfacing and
communication between the devices and
the programming codes [4][23].
www.idosr.org Edozie et al
101
Figure 5: Raspberry Pi3 Model B.
6. Ip Spy Camera /raspberry pi camera
module
This is a type of digital video camera
that receives control data and sends
image data via an IP network commonly
used for surveillance camera. The
Camera Module Rev 1.3 is a type of
camera that was specifically designed
for Raspberry Pi model A and B. The
camera module connects to Raspberry
Pi 3 by Camera Serial Interface (CSI)
connector using a 15cm ribbon cable to
the 15 pin CSI connector. Some Specific
configuration settings were done to
initialize the camera and accepts Python
scripts to enable it take pictures.
Figure 6: Ip Spy Camera /Raspberry Pi Camera Module
7. Simple Mail Transfer Protocol
(SMTP) Server: This is a communication
protocol for electronic mail
transmission. SMTP Server is an
application server that primarily send,
receive and or replies an outgoing mail
between senders and receivers. SMTP is
mainly designed to send email or SMS
notifications to a user.
RESULTS AND DISCUSSION
The block diagram and the circuit
diagram of this security smart
surveillance design are presented as
shown in figure 7 and figure 8. The block
diagram consists of the major
components that make up the system as
in figure 7.
www.idosr.org Edozie et al
102
Figure 7: Block diagram of smart surveillance security system
The step-by-step block connections of
the smart surveillance security system
that details how the block diagrams
where connected. Power supply block
supplies energy to the Raspberry pi
where the codes were embedded and at
the same time were interactions between
other blocks takes place. It is from the
Raspberry pi that the decision to take
picture if there is intruder and sent
email to was initiated. The fan cools the
system when it heats and the IP spy
camera takes picture whereas the SMTP
server sends mail to the user.
Figure 8: Circuit Diagram of Smart Surveillance Security System
This circuit diagram showed the
interconnections between different
components that constituted the circuit.
This focused on developing a
surveillance system that detects motion
and as well respond to it immediately by
capturing the image and administering it
to the device administrator through
email. The system can be monitored by
the user form anywhere in the world.
This is achieved by the combination of
some hardware and a python written
software program script to accomplish
a real time surveillance system as
designed in this research.
www.idosr.org Edozie et al
103
Figure 9: Camera Space and charging chord
Figure 9 is the circuit set up for camera
positioning and USB charging slot. It
shows the implementation procedures
and how it was achieved sequentially. A
written program that supports the OS to
send email to the user through the
raspberry PI microcontroller was
used for efficiency and accuracy.
Figure 10: Intruder Notification image
The intruder image was captured by
raspberry pi camera embedded in the
microcontroller which was fully
developed to capture the images of an
intruder and notify the user with the
happenings in the environment as shown
in figure 10. Figure 10, showed the
captured image of an intruder when an
unusual motion was detected by the
developed smart surveillance security
system. The detected image of the
intruder together with notification mail
was sent to the user to notify him/her on
that an intruder was detected. The
captured images will be sent to the user
via mail within five seconds of
discovery for the user to take immediate
security action either by calling the
external security agency for immediate
interventions or by taking every other
necessary action to ensure that the
environment is secured.
CONCLUSION
This developed smart security system
monitors any movement in the premises
effectively which was efficiently
achieved using the SMTP server and the
python script code program in raspberry
PI. This developed smart security system
Camera position
www.idosr.org Edozie et al
104
consists of a raspberry pi, camera
module, server and a sensor. The server
controls and monitors the various
sensors and can be easily configured to
handle hardware interface modules
(sensors). The system perfectly detects
the movement of any intruder, captures
the image and sends it to the owner
(user) via email. The smart surveillance
security system was developed
effectively at a very low cost and when
commercialized will help in reducing
crimes and encourages security in
Africa.
REFERENCES
[1]. Kumar, U., Manda, R., Sai, S. and
Pammi, A. (2014). Implementation
of Low -cost Wireless Image
Acquisition and Transfer to Web
Client Using Raspberry Pi for
Remote Monitoring. International
Journal of Computer Networking,
Wireless and Mobile
Communications. 4(3), 17โ€“20,
[2]. Bangali, J. and Shaligram, A. (2013).
Design and Implementation of
Security Systems for Smart Home
based on GSM
technology. International Journal
of Smart Home, 7(6), 201-208.
[3]. Ravipati, V. K. C. and Thonduri, V.
(2017). An IOT Approach for
Motion Detection Using Raspberry
PI. International Journal of
Innovative Science and Research
Technology, 2(7), 225-228.
[4]. Hamernik, P., Tanuska, P. and
Mudroncik, D. (2012).
Classification of functions in smart
home. International Journal of
Information and Education
Technology, 2(2), 149-155.
[5]. Gunge, V. S. and Yalagi, P. S. (2016).
Smart home automation: a
literature review. International
Journal of Computer
Applications, 975(8887-8891).
[6]. Feng, X., Li, Q., Wang, H. and Sun,
L. (2018). Acquisitional rule-based
engine for discovering internet-of-
things devices. In 27th {USENIX}
Security Symposium ({USENIX}
Security 18) (pp. 327-341).
[7]. Jabbar, W. A., Alsibai, M. H., Amran,
N. S. S. and Mahayadin, S. K. (2018).
Design and implementation of IoT-
based automation system for smart
home. In 2018 International
Symposium on Networks,
Computers and Communications
(ISNCC) (pp. 1-6). IEEE.
[8]. Abu, M. A., Nordin, S. F., Suboh, M.
Z., Yid, M. S. M. and Ramli, A. F.
(2018). Design and development of
home security systems based on
internet of things via favoriot
platform. International Journal of
Applied Engineering
Research, 13(2), 1253-1260.
[9]. Surantha, N. and Wicaksono, W. R.
(2018). Design of smart home
security system using object
recognition and PIR
sensor. Procedia computer
science, 135, 465-472.
[10]. Eze, V. H. U., Olisa, S. C., Eze, M. C.,
Ibokette, B. O. and Ugwu, S. A.
(2016). Effect of Input Current and
The Receiver-Transmitter Distance
on the Voltage Detected by
Infrared Receiver. International
Journal of Scientific & Engineering
Research, vol. 7, no. 10, pp. 642โ€“
645.
[11]. Eze, M. C., Eze, H. U., Chidebelu, N.
O., Ugwu, S. A., Odo, J. I. and Odi,
J. I. (2017). Novel Passive Negative
and Positive Clamper Circuits
Design for Electronic Systems.
International Journal of Scientific
& Engineering Research, vol. 8, no.
5, pp. 856โ€“867.
[12]. Ajiji, Y. M. (2020). Internet of thing
(IOT): data and information (gadget
protection). Journal of Applied
Science, Engineering, Technology,
and Education, 2(2), 194-203.
[13]. Nwankwo, W., Olayinka, D. and
Umezuruike, C. (2019). Boosting
self-sufficiency in maize crop
production in Osisioma Ngwa Local
Government with internet of things
(IOT)-climate messaging: A
model. Available at SSRN:
https://ssrn.com/abstract=334161
9orhttp://dx.doi.org/10.2139/ssrn
.3341619
[14]. Edozie, E. and Vilaka, K. (2020).
Design and Implementation of a
Smart Sensor and RFID Door Lock
Security System with Email
Notification. International Journal
of Engineering and Information
Systems (IJEAIS), 4(7), 25-28.
www.idosr.org Edozie et al
105
[15]. Mark, E., Adabara, I., Mathias, K.,
Masisani, W. M., Otiang, O. G. and
Yusuf, O. F. (2020). Electrical Smart
Grid Resilience Based on GSM
Technology. International Journal
of Academic Engineering Research,
Volume 4, Issue 4, Pages 36-49
[16]. Mufana, M. W. and Ibrahim, A.
(2022). Monitoring with
Communication Technologies of
the Smart Grid. IDOSR Journal of
Applied Sciences, 7(1), 102-112.
[17]. Ogbonna, C.C., Eze, V.H.U., Ezichi,
I.S., Okafor, W.O., Onyeke, A.C.,
Ogbonna, U.O. (2023). A
Comprehensive Review of Artificial
Neural Network Techniques Used
for Smart Meter-Embedded
forecasting System. IDOSR Journal
of Applied Science, 8 (1), 13-24
[18]. Okafor, W. O., Edeagu, S. O.,
Chijindu, V. C., Iloanusi, O. N. and
Eze, V. H. U. (2023). A
Comprehensive Review on Smart
Grid Ecosystem. IDOSR Journal of
Applied Science, 8(1), 25-63.
[19]. Salami, A. F., Adedokun, E. A.,
Bello-Salau, H. and Sadiq, B. O.
(2022). Fault-tolerant backup
clustering algorithm for smart
connected underwater sensor
networks. International Journal of
Software Engineering and
Computer Systems, 8(1), 29-44.
[20]. Yakubu, A. M. (2020). Information
Security Risks Vulnerability and
Threat in Smart City Development
in Africa. Ras Engineering &
Technology, 1(1): 1-7.
[21]. Eze, V. H. U., Ugwu, C. N. and
Ugwuanyi, I. C. (2017). A Study of
Cyber Security Threats, Challenges
in Different Fields and its
Prospective Solutions: A Review.
INOSR Journal Scientific Research,
9(1), 13-24.
[22]. Makeri, Y. A. (2020). The strategy
detection on information security
in corporate organizations on
crucial asset. JOIV: International
Journal on Informatics
Visualization, 4(1), 35-39.
[23]. Sekiti, H. and Ibrahim, A. (2022).
Security Analysis for Virtual Private
Network Based on Site-to-Site
Circuit Switching (Vpns2scs) Case
Study: Liquid Telecommunication
Ggaba. IDOSR Journal of Computer
and Applied Sciences 7(1):95-108.
[24]. Masisani William Mufana and
Adabara Ibrahim (2022). Overview
of Smart Grid: A Review. IDOSR
Journal Of Computer and Applied
Sciences 7(1):33-44. 10. Masisani
William Mufana and Adabara
Ibrahim (2022). Monitoring with
Communication Technologies of
the Smart Grid. IDOSR Journal Of
Applied Sciences 7(1) 102-112.
[25]. Abdulfatah A Yusuf, Hadijah
Yahyah, Atiku A Farooq, Kasumba A
Buyondo, Peter W Olupot, Sharif S
Nura, Tajuddeen Sanni,
Twinomuhwezi Hannington,
Zubeda Ukundimana,
Abdurrahman S Hassan, Mustafa M
Mundu, Sibuso S Samede, Yakubu A
Makeri, Milon D Selvam (2021).
Characteristics of ultrafine particle
emission from light-vehicle engine
at city transport-speed using after-
treatment device fueled with n-
butanol-hydrogen blend. Case
Studies in Chemical and
Environmental Engineering,
3:100085.
[26]. Furaha Kasali Jean-Rostand, Mundu
M Mustapha, Ibrahim Adabara,
Abdurrahman S Hassan (2019).
Design of an automatic transfer
switch for households solar PV
system. European Journal of
Advances in Engineering and
Technology, 6(2): 54-65.
[27]. Nnamchi SN, MM Mundu, JD
Busingye, JU Ezenwankwo (2019).
Extrinsic modeling and simulation
of helio-photovoltaic system: a
case of single diode model.
International journal of green
energy 16(6): 450-467.
[28]. Stephen Ndubuisi Nnamchi,
Muhamad Mustafa Mundu,
Onyinyechi Adanma Nnamchi,
Uche Onochie, Zaid Oluwadurotimi
Jagun (2022). Modeling Earth
Systems and Environment, 8(2):
2383-2400.
[29]. Stephen Ndubuisi Nnamchi,
Mustafa Muhamad Mundu (2022).
Development of solar isodose
lines: Mercatorian and spatial
guides for mapping solar
installation areas. Heliyon, 8(10):
e11045.
www.idosr.org Edozie et al
106
[30]. Stephen Ndubuisi Nnamchi,
Onyinyechi Adanma Nnamchi,
Oluwatosin Dorcas Sanya, Mustafa
Muhamad Mundu, Vincent Gabriel
(2020). Dynamic analysis of
performance of photovoltaic
generators under moving cloud
conditions. Journal of Solar Energy
Research,5(2): 453-468.
[31]. Kizito BW (2023). An SMS-Based
Examination Relaying System: A
Case Study of Kampala
International University Main
Campus. IDOSR Journal of Science
and Technology 9 (1), 1-26.
[32]. Ogbonna Chibuzo C., U. Eze Val
Hyginus, S. Ikechuwu Ezichi, O.
Okafor Wisdom, C. Anichebe
Onyeke, U. Oparaku Ogbonna
(2023). A Comprehensive Review of
Artificial Neural Network
Techniques Used for Smart Meter-
Embedded forecasting System.
IDOSR Journal of Applied
Sciences,8(1): 13-24.
[33]. Patience Nabiryo, Anthony Ejeh
Itodo (2022) Design and
Implementation of Base Station
Temperature Monitoring System
Using Raspberry Pi, IDOSR Journal
of Science and Technology, 7(1): 53-
66.
[34]. Hamisi Sekiti and Adabara Ibrahim
(2022). Security Analysis for
Virtual Private Network Based on
Site to Site Circuit Switching
(Vpns2scs) Case Study: Liquid
Telecommunication Ggaba. IDOSR
Journal of Computer and Applied
Sciences 7(1):95-108.
[35]. Kalulu Mathias (2022). The Smart
Grid and Its Security Challenges,
INOSR Applied Sciences 9(1):9-12.
[36]. Kalulu Mathias and Adabara
Ibrahim (2022). Developing of a
Smart Fraud Detection System in
Advanced Metering Infrastructure
Using Deep Learning. INOSR
Applied Sciences 9(1):1-8.
[37]. Nabiryo Patience and Itodo
Anthony Ejeh (2022). Design and
Implementation of Base Station
Temperature Monitoring System
Using Raspberry Pi. IDOSR Journal
of Science and Technology 7(1):53-
66.
[38]. Masisani William Mufana and
Adabara Ibrahim (2022).
Implementation of Smart Grid
Decision Support Systems. IDOSR
Journal of Scientific Research 7(1)
50-57.
[39]. Natumanya Akimu (2022). Design
and Construction of an Automatic
Load Monitoring System on a
Transformer in Power Distribution
Networks. IDOSR Journal of
Scientific Research 7(1) 58-76.
[40]. Kisakye Rebecca (2022).Simulation
and Analysis of Dipole Transmitter
Antenna (KIU Laboratory) IDOSR
Journal of Computer and Applied
Sciences 7(1):119-135.

More Related Content

Similar to Design and Implementation of a Smart Surveillance Security System.pdf

Comparative Study on Advanced Farm Security System Using Internet of Things a...
Comparative Study on Advanced Farm Security System Using Internet of Things a...Comparative Study on Advanced Farm Security System Using Internet of Things a...
Comparative Study on Advanced Farm Security System Using Internet of Things a...
vivatechijri
ย 

Similar to Design and Implementation of a Smart Surveillance Security System.pdf (20)

Comparative Study on Advanced Farm Security System Using Internet of Things a...
Comparative Study on Advanced Farm Security System Using Internet of Things a...Comparative Study on Advanced Farm Security System Using Internet of Things a...
Comparative Study on Advanced Farm Security System Using Internet of Things a...
ย 
IRJET - Smart Classroom Automation based on IoT
IRJET -  	  Smart Classroom Automation based on IoTIRJET -  	  Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoT
ย 
IRJET- An Intelligent Remote Controlled System for Smart Home Automation
IRJET- An Intelligent Remote Controlled System for Smart Home AutomationIRJET- An Intelligent Remote Controlled System for Smart Home Automation
IRJET- An Intelligent Remote Controlled System for Smart Home Automation
ย 
IRJET - Raspberry Pi based Intelligent Security System
IRJET -  	  Raspberry Pi based Intelligent Security SystemIRJET -  	  Raspberry Pi based Intelligent Security System
IRJET - Raspberry Pi based Intelligent Security System
ย 
Home security based on Internet of things Review paper
Home security based on Internet of things Review paperHome security based on Internet of things Review paper
Home security based on Internet of things Review paper
ย 
Smart Security System IOT
Smart Security System IOTSmart Security System IOT
Smart Security System IOT
ย 
Development of Personal Weather Report for Home Security
Development of Personal Weather Report for Home SecurityDevelopment of Personal Weather Report for Home Security
Development of Personal Weather Report for Home Security
ย 
Intelligent Image Capturing Alarm System Using Raspberry Pi
Intelligent Image Capturing Alarm System Using Raspberry PiIntelligent Image Capturing Alarm System Using Raspberry Pi
Intelligent Image Capturing Alarm System Using Raspberry Pi
ย 
IRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security FeaturesIRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security Features
ย 
Integrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internetIntegrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internet
ย 
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
ย 
IRJET- Development of Surveillance System for Indian Military
IRJET- Development of Surveillance System for Indian MilitaryIRJET- Development of Surveillance System for Indian Military
IRJET- Development of Surveillance System for Indian Military
ย 
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
ย 
Home appliancesโ€™ control system.pptx
Home appliancesโ€™ control system.pptxHome appliancesโ€™ control system.pptx
Home appliancesโ€™ control system.pptx
ย 
IRJET- Iot Based Wireless Sensor Network for Earlier Detection and Prevention...
IRJET- Iot Based Wireless Sensor Network for Earlier Detection and Prevention...IRJET- Iot Based Wireless Sensor Network for Earlier Detection and Prevention...
IRJET- Iot Based Wireless Sensor Network for Earlier Detection and Prevention...
ย 
Home Security System based on IOT: A Systematic Alert System
Home Security System based on IOT: A Systematic Alert SystemHome Security System based on IOT: A Systematic Alert System
Home Security System based on IOT: A Systematic Alert System
ย 
Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT
ย 
Home Automation Control System
Home Automation Control SystemHome Automation Control System
Home Automation Control System
ย 
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry PiIRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
ย 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
ย 

More from ssuser793b4e

Academic Journal Writing and Types of Journals.pdf
Academic Journal Writing and Types of Journals.pdfAcademic Journal Writing and Types of Journals.pdf
Academic Journal Writing and Types of Journals.pdf
ssuser793b4e
ย 
Maximizing Journal Article Impact Strategies for Enhanced Visibility in Today...
Maximizing Journal Article Impact Strategies for Enhanced Visibility in Today...Maximizing Journal Article Impact Strategies for Enhanced Visibility in Today...
Maximizing Journal Article Impact Strategies for Enhanced Visibility in Today...
ssuser793b4e
ย 
Government Interventions and Household Poverty in Uganda A Comprehensive Revi...
Government Interventions and Household Poverty in Uganda A Comprehensive Revi...Government Interventions and Household Poverty in Uganda A Comprehensive Revi...
Government Interventions and Household Poverty in Uganda A Comprehensive Revi...
ssuser793b4e
ย 
The Effect of Financial Management on the Learning Ability of Students in.pdf
The Effect of Financial Management on the Learning Ability of Students in.pdfThe Effect of Financial Management on the Learning Ability of Students in.pdf
The Effect of Financial Management on the Learning Ability of Students in.pdf
ssuser793b4e
ย 
Navigating Challenges and Maximizing Benefits in the Integration of Informati...
Navigating Challenges and Maximizing Benefits in the Integration of Informati...Navigating Challenges and Maximizing Benefits in the Integration of Informati...
Navigating Challenges and Maximizing Benefits in the Integration of Informati...
ssuser793b4e
ย 
Assessing Energy Policies, Legislation and Socio-Economic Impacts in the Ques...
Assessing Energy Policies, Legislation and Socio-Economic Impacts in the Ques...Assessing Energy Policies, Legislation and Socio-Economic Impacts in the Ques...
Assessing Energy Policies, Legislation and Socio-Economic Impacts in the Ques...
ssuser793b4e
ย 
Principals-Administrative-Strategies-as-Correlates-of-Teachers-Job-Performanc...
Principals-Administrative-Strategies-as-Correlates-of-Teachers-Job-Performanc...Principals-Administrative-Strategies-as-Correlates-of-Teachers-Job-Performanc...
Principals-Administrative-Strategies-as-Correlates-of-Teachers-Job-Performanc...
ssuser793b4e
ย 
Automated Hybrid Smart Door Control System.pdf
Automated Hybrid Smart Door Control System.pdfAutomated Hybrid Smart Door Control System.pdf
Automated Hybrid Smart Door Control System.pdf
ssuser793b4e
ย 
Review of the Implications of Uploading Unverified Dataset in A Data Banking ...
Review of the Implications of Uploading Unverified Dataset in A Data Banking ...Review of the Implications of Uploading Unverified Dataset in A Data Banking ...
Review of the Implications of Uploading Unverified Dataset in A Data Banking ...
ssuser793b4e
ย 

More from ssuser793b4e (20)

Academic Journal Writing and Types of Journals.pdf
Academic Journal Writing and Types of Journals.pdfAcademic Journal Writing and Types of Journals.pdf
Academic Journal Writing and Types of Journals.pdf
ย 
The Differences between Single Diode Model and Double Diode Models of a Solar...
The Differences between Single Diode Model and Double Diode Models of a Solar...The Differences between Single Diode Model and Double Diode Models of a Solar...
The Differences between Single Diode Model and Double Diode Models of a Solar...
ย 
Redefining Academic Performance Metrics Evaluating the Excellence of Research...
Redefining Academic Performance Metrics Evaluating the Excellence of Research...Redefining Academic Performance Metrics Evaluating the Excellence of Research...
Redefining Academic Performance Metrics Evaluating the Excellence of Research...
ย 
Qualities and Characteristics of a Good Scientific Research.pdf
Qualities and Characteristics of a Good Scientific Research.pdfQualities and Characteristics of a Good Scientific Research.pdf
Qualities and Characteristics of a Good Scientific Research.pdf
ย 
Maximizing Journal Article Impact Strategies for Enhanced Visibility in Today...
Maximizing Journal Article Impact Strategies for Enhanced Visibility in Today...Maximizing Journal Article Impact Strategies for Enhanced Visibility in Today...
Maximizing Journal Article Impact Strategies for Enhanced Visibility in Today...
ย 
Impact of Urban Planning on Household Poverty Reduction in Uganda A Review.pdf
Impact of Urban Planning on Household Poverty Reduction in Uganda A Review.pdfImpact of Urban Planning on Household Poverty Reduction in Uganda A Review.pdf
Impact of Urban Planning on Household Poverty Reduction in Uganda A Review.pdf
ย 
Government Interventions and Household Poverty in Uganda A Comprehensive Revi...
Government Interventions and Household Poverty in Uganda A Comprehensive Revi...Government Interventions and Household Poverty in Uganda A Comprehensive Revi...
Government Interventions and Household Poverty in Uganda A Comprehensive Revi...
ย 
The Effect of Financial Management on the Learning Ability of Students in.pdf
The Effect of Financial Management on the Learning Ability of Students in.pdfThe Effect of Financial Management on the Learning Ability of Students in.pdf
The Effect of Financial Management on the Learning Ability of Students in.pdf
ย 
Quantification of Earth Material for Sustainable Road Works in Southeast Nige...
Quantification of Earth Material for Sustainable Road Works in Southeast Nige...Quantification of Earth Material for Sustainable Road Works in Southeast Nige...
Quantification of Earth Material for Sustainable Road Works in Southeast Nige...
ย 
Navigating Challenges and Maximizing Benefits in the Integration of Informati...
Navigating Challenges and Maximizing Benefits in the Integration of Informati...Navigating Challenges and Maximizing Benefits in the Integration of Informati...
Navigating Challenges and Maximizing Benefits in the Integration of Informati...
ย 
Mobile Disinfectant Spraying Robot and its Implementation Components for Viru...
Mobile Disinfectant Spraying Robot and its Implementation Components for Viru...Mobile Disinfectant Spraying Robot and its Implementation Components for Viru...
Mobile Disinfectant Spraying Robot and its Implementation Components for Viru...
ย 
Assessing Energy Policies, Legislation and Socio-Economic Impacts in the Ques...
Assessing Energy Policies, Legislation and Socio-Economic Impacts in the Ques...Assessing Energy Policies, Legislation and Socio-Economic Impacts in the Ques...
Assessing Energy Policies, Legislation and Socio-Economic Impacts in the Ques...
ย 
A Review of Cross-Platform Document File Reader Using Speech Synthesis.pdf
A Review of Cross-Platform Document File Reader Using Speech Synthesis.pdfA Review of Cross-Platform Document File Reader Using Speech Synthesis.pdf
A Review of Cross-Platform Document File Reader Using Speech Synthesis.pdf
ย 
A Critical Assessment of Data Loggers for Farm Monitoring Addressing Limitati...
A Critical Assessment of Data Loggers for Farm Monitoring Addressing Limitati...A Critical Assessment of Data Loggers for Farm Monitoring Addressing Limitati...
A Critical Assessment of Data Loggers for Farm Monitoring Addressing Limitati...
ย 
A Comparative Analysis of Renewable Energy Policies and its Impact on Economi...
A Comparative Analysis of Renewable Energy Policies and its Impact on Economi...A Comparative Analysis of Renewable Energy Policies and its Impact on Economi...
A Comparative Analysis of Renewable Energy Policies and its Impact on Economi...
ย 
Principals-Administrative-Strategies-as-Correlates-of-Teachers-Job-Performanc...
Principals-Administrative-Strategies-as-Correlates-of-Teachers-Job-Performanc...Principals-Administrative-Strategies-as-Correlates-of-Teachers-Job-Performanc...
Principals-Administrative-Strategies-as-Correlates-of-Teachers-Job-Performanc...
ย 
A Systematic Review of Renewable Energy Trend.pdf
A Systematic Review of Renewable Energy Trend.pdfA Systematic Review of Renewable Energy Trend.pdf
A Systematic Review of Renewable Energy Trend.pdf
ย 
Automated Hybrid Smart Door Control System.pdf
Automated Hybrid Smart Door Control System.pdfAutomated Hybrid Smart Door Control System.pdf
Automated Hybrid Smart Door Control System.pdf
ย 
Review of the Implications of Uploading Unverified Dataset in A Data Banking ...
Review of the Implications of Uploading Unverified Dataset in A Data Banking ...Review of the Implications of Uploading Unverified Dataset in A Data Banking ...
Review of the Implications of Uploading Unverified Dataset in A Data Banking ...
ย 
Qualitative Research.pdf
Qualitative Research.pdfQualitative Research.pdf
Qualitative Research.pdf
ย 

Recently uploaded

VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
SUHANI PANDEY
ย 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
ย 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
KreezheaRecto
ย 

Recently uploaded (20)

KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ย 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
ย 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
ย 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
ย 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
ย 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
ย 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
ย 
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
ย 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
ย 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
ย 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
ย 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
ย 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
ย 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
ย 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
ย 

Design and Implementation of a Smart Surveillance Security System.pdf

  • 1. www.idosr.org Edozie et al 98 ยฉIDOSR Publication International Digital Organization for Scientific Research ISSN: 2579-079X IDOSR JOURNAL OF SCIENCE AND TECHNOLOGY 9(1):98-106, 2023. Design and Implementation of a Smart Surveillance Security System Enerst, Edozie1 ; Eze Val Hyginus Udoka2 ; Musiimenta, Immaculate1 ; Wantimba, Janat1 1 Department of Electrical Engineering, Kampala International University, Uganda. 2 Department of Publication and Extension, Kampala International University, Uganda. ABSTRACT Home security is essential for occupantโ€™s conveniences and protection. This research project designed and implemented a comparatively inexpensive smart surveillance security system that automatically captures an intruderโ€™s image through a raspberry pi camera module and PIR sensor and sends mail to the user via Wi-Fi using the users registered email address. This system operates by triggering the Pi Camera through Raspberry Pi whenever an intruder comes in range using PIR sensor. The Pi camera will capture the image, save it and send the image of the intruder via mail to the user through the help of the command codes embedded in the Raspberry pi microcontroller. This research project will enable home/supermarket and office owners to secure their facilities and monitor the activities of their employers at any location at cheaper cost which is the earnest desire of an Engineer. Proteus 2022 was used as the simulation tool. Keywords: Security, Spy camera, Raspberry pi, IOT, smart security system. INTRODUCTION Security is the first attention everyone wishes to have everywhere at every point in time in human life. The innovations in Technology have increased/improved the safety and security of human lives and property [1, 2, 3]. Home Security systems involved the combination of both human and electronic devices mechanism to detect intrusions in our environments and homes. The growth of Internet of Things (IOT) is referred to as a daily technological innovation which involves devices connecting to one other to create a pervasive computing [4, 5, 6]. These devices exchange data and information about the environment, while reacting independently to different events [7, 8, 9]. They influence the surroundings hence creating services with or without human intervention. The IOT has potential applications in all areas of life. One of the applications of IOT is smart security system [10, 11, 12]. The application uses IOT to process its data and by using this application, one will be able to monitor his households from a distance with the help of interconnected devices that communicates through the internet [13, 14, 15]. The smart security system can detect any object movement, take a picture of the object and after sends a notification to the owner [16, 17, 18]. This application can be used in homes, in shops, in hotels and in other places around the world and itโ€™s the best application for monitoring and controlling a home/shops or super markets from a distance [1, 19, 20, 21]. The system in [2] provides two methods to implement home security using IOT. One of using web cameras such that whenever there is any motion detected by the camera, it sounds an alarm and sends a mail to the owner [22, 23, 24]. This method of detecting intrusion is quite good but somehow expensive due to the cost of cameras involved in the process [3, 25, 26,]. The cameras to be used are to be of good quality which means they should have a wide range and the picture quality should be high enough to detect the movement of an intruder [4, 27, 28]. The result in [5] is the automatic smart home security system that has the capability of controlling and automating
  • 2. www.idosr.org Edozie et al 99 most of the home appliances. In this system embedded features like gas leakage alerts to user by sending simple text message and immediate signals to the server of the personal computer (PC) [29, 30, 31, 32, 33, 34]. Server sends message to user android mobile application connected with server of the pc through Wi-Fi. User can take immediate action on receiving SMS from server by automatically turning off the cylinder valve and opening windows. The system also has fire alarm embedded to sense increase temperature above threshold value. Server will take proper action by sending message through android application to the user [33, 34, 35]. The study in [6] is the IOT ruler which sends alerts to the owner over voice calls using the internet. If any sort of intruder or human movement is sensed near the entrance of his house and raises alarm upon the userโ€™s discretion whereby the provision of sending alert messages to concerned security personnel in case of critical situation is also built into the system and vice versa. The advantage of this smart security system is that when operating it the owner doesnโ€™t need to have data on his phone, the system just runs fine with the launch pad connected to Wi-Fi at home or office [7, 8, 9, 36, 37]. The researcher in [7] researched on home automation and security together with its major objective to help handicapped and aged people to control home appliances and alert them in critical conditions. In this system, a sensor senses the status of appliances and updates the webserver. If the user is far away from home, he/she can access and change status of the appliances for example switching a certain appliance on/off [10, 11, 12, 38,39,40]. The researcher in [8], researched on a home security system based on internet of things via favorite platform. In this project the device is equipped with passive infrared sensor that monitors the presence of the intruder and any unauthorized entry. There is a Blynk application on the device that is used as the main switch which can activate the device whenever necessary. The home security system based on the Internet of things (IOTs) can help the users to monitor the house even when they are absent and a favorite platform helps the users to receive alerts as soon as possible [13,14,15]. In [9], the researcher developed a smart home security system using object recognition and PIR sensors which is capable for human detection. The IOT system is used to monitor the presence of an intruder in the house by the combination of motion detection and object recognition. The motion detection is performed using the PIR sensor, the web camera takes the picture of the suspicious spot. The system performs the object recognition by using the histogram of gradient (HOG) and support vector machine (SVM) methods. The system recognizes the appearance of an intruder and warn the house owner via alarm. The system is implemented on raspberry pi [16, 17, 18]. Smart security system with wireless camera is a system normal use in various homes to secure lives and environments through remote monitoring techniques like Internet of Things (IOT). From the review above, many draw backs were discovered such as (a) nonchalant attitudes or misbehaviors/maltreatment by home caretakers of vulnerable age groups like toddlers, children and elders especially in Uganda. (b) The avoidable mistakes and stealing in the stores and super markets. This research work will address the problems of intrusions from unknown individuals or home burglars by designing and implementing a smart surveillance security system using internet of things technology that will create and send a notification email together with the happening image to the userโ€™s email address using Raspberry Pi. MATERIAL AND METHODS This design and implementation of smart surveillance security system is basically designed to provide security for households using the spy camera and SMTP server which are all embedded in the system by the use of a raspberry pi microcontroller. The system comprises of hardware and software application program for the raspberry pi which was developed using python script code as a programming language. The hardware units compose of DC fan,
  • 3. www.idosr.org Edozie et al 100 Ip Spy camera, raspberry pi and power units (voltage regulator, battery etc.) components. Materials 1.Power Supply: This is an electrical charger that supplies a rated power to an electrical load. The system uses a smartphone charger with a green/red indicator which when blinks showed that the charger is passing on electrical energy. Figure 2: Smartphone Charger 2. Voltage Regulator: This is a system designed to automatically maintain a constant voltage level, depending on the design and specifications of the voltage regulator to be used (DC or AC). 5V DC regulator was used for this design [10][11]. Figure 3: voltage regulator 3. Dc cooling Fan: The direct current fans are powered with potential fixed values of voltage such as voltage of battery. Typical voltages for dc fans are 5v, 12v, 24v and 48v. It is used to keep the raspberry pi microcontroller cool to avoid overheating. The fan is plugged directly into Raspberry Pi's 5V+GND GPIO power pin [19][20]. Figure 4: DC cooling fan 4. Passive Infrared (PIR) Sensor: PIR sensor is an essential for emitting infrared (IR) radiation through its movement. PIR is an electronic sensor that used to detect the object motion by receiving the infrared (IR) as light radiates from the external environments. The sensor compares the intensity of the infrared radiation from time to time. If there is an object movement in the room, the intensity changes and detecting the object movement takes place. The PIR Sensor is small in size, inexpensive in price, uses low power, easy in use and connectivity [21][22] Figure 5: Passive Infrared (PIR) Sensor 5. Raspberry Pi-3: The raspberry pi is a low-cost credit card sized computer that plugs into a computer monitor or TV and uses a standard keyboard and mouse. a raspberry pi microcontroller is used in embedding the spy camera and SMTP server for interfacing and communication between the devices and the programming codes [4][23].
  • 4. www.idosr.org Edozie et al 101 Figure 5: Raspberry Pi3 Model B. 6. Ip Spy Camera /raspberry pi camera module This is a type of digital video camera that receives control data and sends image data via an IP network commonly used for surveillance camera. The Camera Module Rev 1.3 is a type of camera that was specifically designed for Raspberry Pi model A and B. The camera module connects to Raspberry Pi 3 by Camera Serial Interface (CSI) connector using a 15cm ribbon cable to the 15 pin CSI connector. Some Specific configuration settings were done to initialize the camera and accepts Python scripts to enable it take pictures. Figure 6: Ip Spy Camera /Raspberry Pi Camera Module 7. Simple Mail Transfer Protocol (SMTP) Server: This is a communication protocol for electronic mail transmission. SMTP Server is an application server that primarily send, receive and or replies an outgoing mail between senders and receivers. SMTP is mainly designed to send email or SMS notifications to a user. RESULTS AND DISCUSSION The block diagram and the circuit diagram of this security smart surveillance design are presented as shown in figure 7 and figure 8. The block diagram consists of the major components that make up the system as in figure 7.
  • 5. www.idosr.org Edozie et al 102 Figure 7: Block diagram of smart surveillance security system The step-by-step block connections of the smart surveillance security system that details how the block diagrams where connected. Power supply block supplies energy to the Raspberry pi where the codes were embedded and at the same time were interactions between other blocks takes place. It is from the Raspberry pi that the decision to take picture if there is intruder and sent email to was initiated. The fan cools the system when it heats and the IP spy camera takes picture whereas the SMTP server sends mail to the user. Figure 8: Circuit Diagram of Smart Surveillance Security System This circuit diagram showed the interconnections between different components that constituted the circuit. This focused on developing a surveillance system that detects motion and as well respond to it immediately by capturing the image and administering it to the device administrator through email. The system can be monitored by the user form anywhere in the world. This is achieved by the combination of some hardware and a python written software program script to accomplish a real time surveillance system as designed in this research.
  • 6. www.idosr.org Edozie et al 103 Figure 9: Camera Space and charging chord Figure 9 is the circuit set up for camera positioning and USB charging slot. It shows the implementation procedures and how it was achieved sequentially. A written program that supports the OS to send email to the user through the raspberry PI microcontroller was used for efficiency and accuracy. Figure 10: Intruder Notification image The intruder image was captured by raspberry pi camera embedded in the microcontroller which was fully developed to capture the images of an intruder and notify the user with the happenings in the environment as shown in figure 10. Figure 10, showed the captured image of an intruder when an unusual motion was detected by the developed smart surveillance security system. The detected image of the intruder together with notification mail was sent to the user to notify him/her on that an intruder was detected. The captured images will be sent to the user via mail within five seconds of discovery for the user to take immediate security action either by calling the external security agency for immediate interventions or by taking every other necessary action to ensure that the environment is secured. CONCLUSION This developed smart security system monitors any movement in the premises effectively which was efficiently achieved using the SMTP server and the python script code program in raspberry PI. This developed smart security system Camera position
  • 7. www.idosr.org Edozie et al 104 consists of a raspberry pi, camera module, server and a sensor. The server controls and monitors the various sensors and can be easily configured to handle hardware interface modules (sensors). The system perfectly detects the movement of any intruder, captures the image and sends it to the owner (user) via email. The smart surveillance security system was developed effectively at a very low cost and when commercialized will help in reducing crimes and encourages security in Africa. REFERENCES [1]. Kumar, U., Manda, R., Sai, S. and Pammi, A. (2014). Implementation of Low -cost Wireless Image Acquisition and Transfer to Web Client Using Raspberry Pi for Remote Monitoring. International Journal of Computer Networking, Wireless and Mobile Communications. 4(3), 17โ€“20, [2]. Bangali, J. and Shaligram, A. (2013). Design and Implementation of Security Systems for Smart Home based on GSM technology. International Journal of Smart Home, 7(6), 201-208. [3]. Ravipati, V. K. C. and Thonduri, V. (2017). An IOT Approach for Motion Detection Using Raspberry PI. International Journal of Innovative Science and Research Technology, 2(7), 225-228. [4]. Hamernik, P., Tanuska, P. and Mudroncik, D. (2012). Classification of functions in smart home. International Journal of Information and Education Technology, 2(2), 149-155. [5]. Gunge, V. S. and Yalagi, P. S. (2016). Smart home automation: a literature review. International Journal of Computer Applications, 975(8887-8891). [6]. Feng, X., Li, Q., Wang, H. and Sun, L. (2018). Acquisitional rule-based engine for discovering internet-of- things devices. In 27th {USENIX} Security Symposium ({USENIX} Security 18) (pp. 327-341). [7]. Jabbar, W. A., Alsibai, M. H., Amran, N. S. S. and Mahayadin, S. K. (2018). Design and implementation of IoT- based automation system for smart home. In 2018 International Symposium on Networks, Computers and Communications (ISNCC) (pp. 1-6). IEEE. [8]. Abu, M. A., Nordin, S. F., Suboh, M. Z., Yid, M. S. M. and Ramli, A. F. (2018). Design and development of home security systems based on internet of things via favoriot platform. International Journal of Applied Engineering Research, 13(2), 1253-1260. [9]. Surantha, N. and Wicaksono, W. R. (2018). Design of smart home security system using object recognition and PIR sensor. Procedia computer science, 135, 465-472. [10]. Eze, V. H. U., Olisa, S. C., Eze, M. C., Ibokette, B. O. and Ugwu, S. A. (2016). Effect of Input Current and The Receiver-Transmitter Distance on the Voltage Detected by Infrared Receiver. International Journal of Scientific & Engineering Research, vol. 7, no. 10, pp. 642โ€“ 645. [11]. Eze, M. C., Eze, H. U., Chidebelu, N. O., Ugwu, S. A., Odo, J. I. and Odi, J. I. (2017). Novel Passive Negative and Positive Clamper Circuits Design for Electronic Systems. International Journal of Scientific & Engineering Research, vol. 8, no. 5, pp. 856โ€“867. [12]. Ajiji, Y. M. (2020). Internet of thing (IOT): data and information (gadget protection). Journal of Applied Science, Engineering, Technology, and Education, 2(2), 194-203. [13]. Nwankwo, W., Olayinka, D. and Umezuruike, C. (2019). Boosting self-sufficiency in maize crop production in Osisioma Ngwa Local Government with internet of things (IOT)-climate messaging: A model. Available at SSRN: https://ssrn.com/abstract=334161 9orhttp://dx.doi.org/10.2139/ssrn .3341619 [14]. Edozie, E. and Vilaka, K. (2020). Design and Implementation of a Smart Sensor and RFID Door Lock Security System with Email Notification. International Journal of Engineering and Information Systems (IJEAIS), 4(7), 25-28.
  • 8. www.idosr.org Edozie et al 105 [15]. Mark, E., Adabara, I., Mathias, K., Masisani, W. M., Otiang, O. G. and Yusuf, O. F. (2020). Electrical Smart Grid Resilience Based on GSM Technology. International Journal of Academic Engineering Research, Volume 4, Issue 4, Pages 36-49 [16]. Mufana, M. W. and Ibrahim, A. (2022). Monitoring with Communication Technologies of the Smart Grid. IDOSR Journal of Applied Sciences, 7(1), 102-112. [17]. Ogbonna, C.C., Eze, V.H.U., Ezichi, I.S., Okafor, W.O., Onyeke, A.C., Ogbonna, U.O. (2023). A Comprehensive Review of Artificial Neural Network Techniques Used for Smart Meter-Embedded forecasting System. IDOSR Journal of Applied Science, 8 (1), 13-24 [18]. Okafor, W. O., Edeagu, S. O., Chijindu, V. C., Iloanusi, O. N. and Eze, V. H. U. (2023). A Comprehensive Review on Smart Grid Ecosystem. IDOSR Journal of Applied Science, 8(1), 25-63. [19]. Salami, A. F., Adedokun, E. A., Bello-Salau, H. and Sadiq, B. O. (2022). Fault-tolerant backup clustering algorithm for smart connected underwater sensor networks. International Journal of Software Engineering and Computer Systems, 8(1), 29-44. [20]. Yakubu, A. M. (2020). Information Security Risks Vulnerability and Threat in Smart City Development in Africa. Ras Engineering & Technology, 1(1): 1-7. [21]. Eze, V. H. U., Ugwu, C. N. and Ugwuanyi, I. C. (2017). A Study of Cyber Security Threats, Challenges in Different Fields and its Prospective Solutions: A Review. INOSR Journal Scientific Research, 9(1), 13-24. [22]. Makeri, Y. A. (2020). The strategy detection on information security in corporate organizations on crucial asset. JOIV: International Journal on Informatics Visualization, 4(1), 35-39. [23]. Sekiti, H. and Ibrahim, A. (2022). Security Analysis for Virtual Private Network Based on Site-to-Site Circuit Switching (Vpns2scs) Case Study: Liquid Telecommunication Ggaba. IDOSR Journal of Computer and Applied Sciences 7(1):95-108. [24]. Masisani William Mufana and Adabara Ibrahim (2022). Overview of Smart Grid: A Review. IDOSR Journal Of Computer and Applied Sciences 7(1):33-44. 10. Masisani William Mufana and Adabara Ibrahim (2022). Monitoring with Communication Technologies of the Smart Grid. IDOSR Journal Of Applied Sciences 7(1) 102-112. [25]. Abdulfatah A Yusuf, Hadijah Yahyah, Atiku A Farooq, Kasumba A Buyondo, Peter W Olupot, Sharif S Nura, Tajuddeen Sanni, Twinomuhwezi Hannington, Zubeda Ukundimana, Abdurrahman S Hassan, Mustafa M Mundu, Sibuso S Samede, Yakubu A Makeri, Milon D Selvam (2021). Characteristics of ultrafine particle emission from light-vehicle engine at city transport-speed using after- treatment device fueled with n- butanol-hydrogen blend. Case Studies in Chemical and Environmental Engineering, 3:100085. [26]. Furaha Kasali Jean-Rostand, Mundu M Mustapha, Ibrahim Adabara, Abdurrahman S Hassan (2019). Design of an automatic transfer switch for households solar PV system. European Journal of Advances in Engineering and Technology, 6(2): 54-65. [27]. Nnamchi SN, MM Mundu, JD Busingye, JU Ezenwankwo (2019). Extrinsic modeling and simulation of helio-photovoltaic system: a case of single diode model. International journal of green energy 16(6): 450-467. [28]. Stephen Ndubuisi Nnamchi, Muhamad Mustafa Mundu, Onyinyechi Adanma Nnamchi, Uche Onochie, Zaid Oluwadurotimi Jagun (2022). Modeling Earth Systems and Environment, 8(2): 2383-2400. [29]. Stephen Ndubuisi Nnamchi, Mustafa Muhamad Mundu (2022). Development of solar isodose lines: Mercatorian and spatial guides for mapping solar installation areas. Heliyon, 8(10): e11045.
  • 9. www.idosr.org Edozie et al 106 [30]. Stephen Ndubuisi Nnamchi, Onyinyechi Adanma Nnamchi, Oluwatosin Dorcas Sanya, Mustafa Muhamad Mundu, Vincent Gabriel (2020). Dynamic analysis of performance of photovoltaic generators under moving cloud conditions. Journal of Solar Energy Research,5(2): 453-468. [31]. Kizito BW (2023). An SMS-Based Examination Relaying System: A Case Study of Kampala International University Main Campus. IDOSR Journal of Science and Technology 9 (1), 1-26. [32]. Ogbonna Chibuzo C., U. Eze Val Hyginus, S. Ikechuwu Ezichi, O. Okafor Wisdom, C. Anichebe Onyeke, U. Oparaku Ogbonna (2023). A Comprehensive Review of Artificial Neural Network Techniques Used for Smart Meter- Embedded forecasting System. IDOSR Journal of Applied Sciences,8(1): 13-24. [33]. Patience Nabiryo, Anthony Ejeh Itodo (2022) Design and Implementation of Base Station Temperature Monitoring System Using Raspberry Pi, IDOSR Journal of Science and Technology, 7(1): 53- 66. [34]. Hamisi Sekiti and Adabara Ibrahim (2022). Security Analysis for Virtual Private Network Based on Site to Site Circuit Switching (Vpns2scs) Case Study: Liquid Telecommunication Ggaba. IDOSR Journal of Computer and Applied Sciences 7(1):95-108. [35]. Kalulu Mathias (2022). The Smart Grid and Its Security Challenges, INOSR Applied Sciences 9(1):9-12. [36]. Kalulu Mathias and Adabara Ibrahim (2022). Developing of a Smart Fraud Detection System in Advanced Metering Infrastructure Using Deep Learning. INOSR Applied Sciences 9(1):1-8. [37]. Nabiryo Patience and Itodo Anthony Ejeh (2022). Design and Implementation of Base Station Temperature Monitoring System Using Raspberry Pi. IDOSR Journal of Science and Technology 7(1):53- 66. [38]. Masisani William Mufana and Adabara Ibrahim (2022). Implementation of Smart Grid Decision Support Systems. IDOSR Journal of Scientific Research 7(1) 50-57. [39]. Natumanya Akimu (2022). Design and Construction of an Automatic Load Monitoring System on a Transformer in Power Distribution Networks. IDOSR Journal of Scientific Research 7(1) 58-76. [40]. Kisakye Rebecca (2022).Simulation and Analysis of Dipole Transmitter Antenna (KIU Laboratory) IDOSR Journal of Computer and Applied Sciences 7(1):119-135.