Preview

Gsm Based Home Security System

Powerful Essays
Open Document
Open Document
6549 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Gsm Based Home Security System
GSM BASED HOME SECURITY SYSTEM
A PROJECT REPORT Submitted by

PRACHI NANDA (A1607107098) BHAVUK PUJARA (A1607107049)
In partial fulfillment for the award of the degree Of

BACHELOR OF TECHNOLOGY
In

ELECTRONICS AND TELECOMMUNICATION AMITY INSTITUTE OF TELECOM TECHNOLOGY & MANAGEMENT

AMITY UNIVERSITY UTTAR PRADESH

1

BONAFIDE CERTIFICATE

Certified that this project report GSM BASED HOME SECURITY SYSTEM is the Bonafide work of PRACHI NANDA and BHAVUK PUJARA - who carried out the project work under my guidance.

SIGNATURE

SIGNATURE

HEAD OF THE DEPARTMENT ( Col. R.K. Kapur )

PROJECT GUIDE ( Mr. Pardeep Kumar )

2

ABSTRACT

The final year project aims at exposing the students undergoing higher technical studies to the thoughts and logic that must be developed to ensure that one is able to integrate his/her ideas into something concrete. This generally is initiated by the inception of an idea or a concept, which not only aims at developing a product (Hardware or Software), but also the in-depth study of the earlier existing products in the same category and their deficiencies. Accordingly an approach is taken to propose a solution, which is better from the previous ones in one respect or the other. With the same approach in mind, we, the final year students of Bachelor of Technology (Electronics and Telecommunication), have taken up the ADVANCE GSM BASED HOME SECURITY SYSTEM as our final year project. Automated security systems are a useful addition to today’s home where safety is an important issue. Vision-based security systems have the advantage of being easy to set up, inexpensive and non-obtrusive. Home security system for detecting an intrusion into a monitored area by an infrared detector. A security system has a flee-standing intrusion detector. The free standing intrusion detector has a transmitter coupled with a portable receiver to alert a homeowner that an intrusion has taken place or occurred within a pre-set time

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The Rogers Smart Home Monitoring campaign offers an advanced new home security system featuring real time 24/7 home monitoring. This product assures the customer that they will stay connected wherever they are by being able to keep an eye on their home via tablet, smartphone or computer. The system is completely customizable, allowing the consumer to adjust the alerts to suit their specific needs. For example, the consumer can opt to receive a text message when the front door is opened or an email when carbon monoxide levels in the house have changed.…

    • 593 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security measure would cover the detection of intrusions, unauthorized usage, authentication, hashing, digital certification, updated security software, network security, hacking prevention, phishing prevention and encryption K.W. Ross, J. K. (2012). There are many risks, threats, and vulnerabilities with online access and usage of the internet, regardless if wired or wireless and all should be secured. Wireless devices communicate through radio without a connection to anything physical Radack, S. (n.d.). The wireless device may be a cell phone, laptop, local area network, remote controls, stereos, personal network, microphones, a headphone, IPad, IPod, etc. It is important to secure the access points because the system may be compromised by unauthorized persons for theft, or other risk factors. The internet could be used by someone unknown, without the user’s permission or knowledge and simply to commit crimes using the user’s credentials. This report will show the importance of securing a wireless system and why it is important.…

    • 1936 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    design for home use. The target market is composed of lowincome individuals who cannot afford the services of a…

    • 3883 Words
    • 16 Pages
    Powerful Essays
  • Better Essays

    Gsm Based Home Alarm System

    • 2286 Words
    • 10 Pages

    GSM based Security System using LabVIEW Hasan Baig1, Muhammad Owais1, Muhammad Saleheen Aftab1, Kamran Shamim1 and Hamza Azeem2 Department of Electronic Engineering NED University of Engineering & Technology, 2PAF KIET, Pakistan. (hasan.baig, ovaisbabai, saleheen2006, kamranshamim, hamzaazeem)@hotmail.com 1 Abstract- The purpose of this paper is to introduce an efficient, reliable and cost-effective security system for use at homes, offices, schools, and shops. The system automatically reports intrusion by making a call to a target mobile phone. Thus, the reporting mechanism is based on Global System for Mobile (GSM) and the logic is designed using LabVIEW.…

    • 2286 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Laser Intruder Alarm System

    • 3274 Words
    • 14 Pages

     An Alarm is a type of security equipment that can be used to safeguard houses and property.  Now a days Burglar Crimes are continually rising with each passing day.  Many have lost homes and families through violent burglaries in many countries  Some of them lost most precious things such as Jewelry, Vehicles, huge investments in banks etc..  This led to the development of ALARM SYSTEM…

    • 3274 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Anti Theft Control System

    • 516 Words
    • 3 Pages

    In a situation where there is high level of theft, there is need for better security system. It is much safer to have a system that monitors and communicates to the device owner without putting human life to risk in the name of “Watchman”. This tends to utilize the availability of GSM network, mobile phone and electronics circuit to achieve an automated system which is programmed to work as a thinking device to accomplish this purpose. By simply dialling the phone number of the mobile phone attached to the circuit and sending a code after the phone has…

    • 516 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    GSM BASED CAR SECURITY

    • 572 Words
    • 3 Pages

    Working Principle:- The GSM based on car security system will consists of main features say the announciation protection against :-…

    • 572 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Mobile Phone Security

    • 1564 Words
    • 5 Pages

    This fact sheet has been developed for the Consumer Education Program by the Communications Commission of Kenya. It was compiled by studying material from various authoritative sources and adopting what is universally acceptable and relevant to the Kenyan situation. The fact sheet is intended to enable Consumers have a good understanding of the issues discussed and hence empower them when making decisions regarding ICT products and services. Introduction One of the biggest threats that a mobile phone user faces today is loss or theft of the phone. Not only is the mobile valued as a physical device, the phone may contain personal and financial data stored in the handset or in the phones subscriber identity module (SIM card). While a stolen SIM can be barred by a mobile network once the theft has been reported it is a bit harder to bar the handset from being used with different SIM card. Unless the user had protected his personal information with a PIN prior to the theft or loss of the phone, this data can be accessed by unauthorised persons. Mobile phone users normally store a wide range of information on their phones. This information can either be stored in the phone’s internal or external memory (depending on the make and model of the phone) or in the SIM card. The SIM card is used mainly to store contacts and short messages while the phone’s memory is used to store information such as personal photos, emails, and calendar items. In order to prevent unauthorised persons from using the phone and further gaining access to the stored information, some mobile phones have security features which the user can activate. This fact sheet has been developed to address security of the information stored and what to do should you lose the phone. Securing the information stored. There are at least two methods one can use to secure the information stored on a mobile phone. These are: a) SIM lock This method takes advantage of the SIM card…

    • 1564 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Ultrasonic Range Meter

    • 10472 Words
    • 42 Pages

    The main aim of this project is provide security, safety and automation for homes and offices. These are very essential in present life style.…

    • 10472 Words
    • 42 Pages
    Powerful Essays
  • Powerful Essays

    House Security System

    • 2145 Words
    • 8 Pages

    Nowadays, house security system becomes the best solution to overcome house intrusion problem when user is not in house. As we know, there are many types of house security system which is too expensive and difficult to use. For that reason, an effective house security system at low cost is built where user can also program the security system by their own. This project is focusing on developing a house security system with an active infrared motion detector which is controlled by microcontroller Intel 8051. The overall project is divided into two parts. The first part is concern on the hardware development where all electronics component are connected via the circuit design using wrapping technique. An active infrared, the magnetic sensor, and keypad are the input components while buzzer, indicator, and LCD display are the output components where it’s all controlled by controller circuit. The second part is base on software programming to operate the hardware structure. Program for security system based on microcontroller Intel 8051 assembly language is assemble using ASM51 assembler to get the binary file thus, to load into external memory of the hardware structure via serial communication. The process of downloading and executing the program is done using HyperTerminal’s communication software to the microcontroller serial port. In order to achieve the best house security system, more detectors or sensors can be connected to the microcontroller output port where it can be reprogram by user using their personal computer at home. As the result, the infrared motion detector is capable to detect motion while the microcontroller is capable to control the whole operation of the security system.…

    • 2145 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Cctv Installation (Incat)

    • 1308 Words
    • 6 Pages

    We propose this project because we notice that it is a need for a school to have CCTV in order to keep the safety of the school and avoid crimes inside the school campus. The propose project is done by installing CCTV in some strategic part of the campus to maximize the area that the camera can survey. The installation will be done by a licensed Electronic Technician that is monitored by an Electronics Engineer during the installation. It will be done…

    • 1308 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The electronic security market in India has witnessed a considerable growth in the last few years. The rising incidents of crime and burglary and the rising awareness about benefits of the electronic security equipments amongst the people have primarily driven the electronic security market. Many electronic security brands are now experimenting with advanced technology to provide their customers with more options.…

    • 591 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    TABLE OF CONTENTS CHAPTER NAME PAGE NO. * INTRODUCTION 3 * SYSTEM OVERVIEW 4 * BLOCK DIAGRAM 5 * THE CIRCUIT 9 * SENSOR SECTION 10 * SEQUENCEDETECTORSENSOR 11 * COUNTER &DISPLAYSECTION 13 * GATECONTROLSECTION 15 * COMPONENTLIST 16 * MISCLLONEOUS 17…

    • 2672 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Currently,theft has been done in lot of places in our society while considering safety issues this idea is proposed.The objective of this paper is to design the IMAGE based door opening and closing system and also increase the security in banks, collegesand homes based on biometric system. The biometric person authentication technique based on the pattern of the human iris is well suitable for application to any access control system requiring a high level of security. Today, biometric recognition is a common and reliable way to authenticate the identification of a person based on physiological or behavioral characteristics. So in thispaper if iris is matched the door it will be opened otherwise it will not be open. IR sensor used to detect the human in or out.By using this concept,we can avoid the theft in bank&home.It also used in various places in our society to avoid theft.The result of our idea is done in MATLAB & the simulation&Hardware Result are shown in this paper. This idea is very useful in banks, offices, shops etc..…

    • 2104 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Ventilation of Cars

    • 3975 Words
    • 16 Pages

    [9] Chen Peijiang, Jiang Xuehua, “Design and implementation of Remote monitoring system based on GSM”, vol. 42, pp. 167-175, 2008.…

    • 3975 Words
    • 16 Pages
    Powerful Essays