Sie sind auf Seite 1von 62

Web-Server based Security and Data

Monitoring Automated System

Submitted by:
Raiha-tul-Zahra 2013-EE-304
Sumeyya Javaid 2013-EE-305
Khansa Tariq 2013-EE-349
Fatima Hameed Khan 2013-EE-352

Supervised by: Prof Dr. Umar Rashid

Department of Electrical Engineering


University of Engineering and Technology, Lahore

Web-Server based Security and Data Monitoring Automated System | i


Web-Server based Security and Data
Monitoring Automated System

Submitted to the faculty of the Electrical Engineering Department


of the University of Engineering and Technology Lahore
in partial fulfillment of the requirements for the Degree of

Bachelor of Science
In
Electrical Engineering.

____________________ ____________________
Internal Examiner External Examiner

____________________
Director
Undergraduate Studies

Department of Electrical Engineering


University of Engineering and Technology, Lahore

ii
Declaration

I declare that the work contained in this thesis is my own, except where explicitly
stated otherwise. In addition this work has not been submitted to obtain another
degree or professional.

Signed: ____________________ Signed: ____________________

Date: ____________________ Date: ____________________

Signed: ____________________ Signed: ____________________

Date: ____________________ Date: ____________________

iii
Acknowledgements
First and foremost, all praises and thanks to Allah (SWT), the Almighty, for His uncountable

blessings and the strength to complete this project. All best prayers and peace be unto His best

messenger, Muhammad, His pure descendant, and His sacred family, and His noble companion.

Then, we would like to thank our families. Without their love and support over the years none of

this would have been possible. They have always been there for us and we are thankful for

everything they have helped us to achieve.

We offer our sincere gratitude to our supervisor, Dr. Umar Rashid, for his patience, motivation

and immense knowledge. First, being his students and then working under his supervision in Final

Year was a great privilege for us. We would also like to extend our thanks to all faculty members

of our department and to all those who offer collegial guidance and assistance over the years.

Special thanks to Dr. Muhammad Kamran, Campus Coordinator of UET (Narowal Campus), who

put his faith on us and initiates this project with great enthusiasm. Unfortunately, he could not

continue with us due to some official reasons but his support and prayers are essential to our

success here.

In the last, cheers for all our project discussions, for the sleepless nights we were working together

before deadlines and for all the fun we had in last four years. Also we are grateful to all our friends

and class fellows for their cooperation and help in completing this project work.

iv
Dedicated to
our Parents
for their unconditional love, endless support
and all time encouragement.

v
Table of Contents

Certificate of Approval ....................................................................Error! Bookmark not defined.

Declaration.................................................................................................................................... iii

Acknowledgements ...................................................................................................................... iv

Dedication ...................................................................................................................................... v

Table of Contents ......................................................................................................................... vi

List of Figures ............................................................................................................................. viii

List of Tables ................................................................................................................................. x

Abstract ......................................................................................................................................... xi

Chapter 1 Introduction................................................................................................................. 1

1.1 Research Background ......................................................................................................................... 1


1.2 Problem Statement .............................................................................................................................. 2
1.3 Objectives ........................................................................................................................................... 2
1.4 Scope of study ..................................................................................................................................... 3
1.5 Significance of study........................................................................................................................... 3
Chapter 2 Arduino Microcontroller............................................................................................ 4

2.1 Arduino UNO...................................................................................................................................... 4


2.2 Arduino Mega ..................................................................................................................................... 4
2.3 Why Arduino?..................................................................................................................................... 5
2.4 Connecting Arduino to the Internet .................................................................................................... 6
2.5 Ethernet Shield .................................................................................................................................... 6
2.6 Arduino IDE........................................................................................................................................ 7
Chapter 3 Global System for Mobile (GSM) .............................................................................. 8

3.1 Smart Phones ...................................................................................................................................... 8


3.2 GSM .................................................................................................................................................... 8
3.3 SIM 900a............................................................................................................................................. 8
3.3.1 Sim 900a with Arduino ................................................................................................................ 9
3.4 Advantage of GSM based smart system ........................................................................................... 10

vi
Chapter 4 RFID Reader and Finger Print Scanner ................................................................ 11

4.1 Security through RFID Reader and Finger print scanner.................................................................. 11


4.2 RFID Reader ..................................................................................................................................... 11
4.3 Finger Print Scanner ......................................................................................................................... 12
4.4 Functions of RFID Reader and Fingerprint Scanner......................................................................... 13
4.5 Advantages and Limitations: ............................................................................................................ 15
Chapter 5 Automation ................................................................................................................ 18

5.1 Automation using IoT ....................................................................................................................... 18


5.2 Voice commands through VR3 voice module .................................................................................. 19
5.3 Webpage ........................................................................................................................................... 20
5.4 Command through application .......................................................................................................... 22
Chapter 6 Wireless Sensor Networks (WSN) ........................................................................... 24

6.1 Arduino as a Sensor Node ................................................................................................................. 24


6.2 Wireless Communication through XBee .......................................................................................... 27
6.3 Data Collecting Node or IOT Gateway............................................................................................. 29
6.4 Performance of Wireless Sensor Network ........................................................................................ 30
Chapter 7 Design of Website and Applications ........................................................................ 32

7.1 Windows Application ....................................................................................................................... 32


7.2 Website ............................................................................................................................................. 38
7.3 Android App ..................................................................................................................................... 42
Chapter 8 Communication Protocols ........................................................................................ 46

8.1 Serial Communication ...................................................................................................................... 46


8.2 SPI communication ........................................................................................................................... 47
Chapter 9 Outcomes and Future Scope .................................................................................... 49

9.1 Outcome ............................................................................................................................................ 49


9.2 Future Scope ..................................................................................................................................... 49
References .................................................................................................................................... 51

vii
List of Figures
Figure 2.1 Arduino UNO
Figure 2.2 Arduino mega
Figure 2.2 Arduino mega
Figure3-1 SIM900a Module
Figure 4-1 RFID Reader
Figure 4-2 Interfacing of RFID with Arduino
Figure 4-3 Biometric Finger Scanner
Figure 4-4 Biometric Interfacing with Arduino
Figure 4-5 Enrollment Process of RFID/Finger print scanner
Figure 4-6 Verification Process of RFID/Finger print scanner
Figure 5-1 Automation system
Figure 5-2 VR3 voice module
Figure 5-3 Automation through voice
Figure 5-4 Ethernet Shield with LAN connection
Figure 5-5 5V relay board
Figure 5-6 NC and NO contacts
Figure 5-7 Interfacing of Arduino with Relay board
Figure 6.1 Wireless Sensor Network
Figure 6-2 LM35 Temperature sensor
Figure 6-3 PIR Motion sensor
Figure 6-4 Flame sensor
Figure 6-5 MQ-2 Smoke sensor
Figure 6-6 XBee series-1 module
Figure 6-7 Configuration of XBee using XCTU
Figure 6-8 XBee Star Topology
Figure 6-9 Gateway position in WSN

viii
Figure 7-1 Window App: User Login
Figure 7-2 Window App: Enrollment form
Figure 7-3 Window App: Admin control
Figure 7-4 Window App: User display
Figure 7-5 Window App: Automation control
Figure 7-6 Window App: Sensor data display

ix
List of Tables
Table 3-1 GSM AT commands
Table 4-1 Comparison of RFID and Barcode
Table 4-2 Comparison of different biometric techniques

x
Abstract
The issue of security is very paramount in any organization like schools banks etc. Therefore we
intend to aid in the security of any organization by bringing in a web-based security system that
involves an individual to be verified by biometric or RFID card before getting an access to some
place. To concentrate more on security, the system also includes Wireless Sensor Network (WSN)
in which each sensor node is equipped with sensors to detect fire, smoke and motion. Wireless
Sensor Nodes communicate with data collecting nodes through Xbees and display data to admin
on designed Website and application. It is also featured to provide a control of Electrical
Appliances on a single tap of your screens or through voice commands. It has an administrative
password and enables multiple users wireless access. Lastly, this system is programmed to alert
admin on a cell phone in case of the fire break out, some mysterious motion or any threatening
event.

xi
Chapter 1
Introduction

1.1 Research Background


The digital age has emerged with many benefits and advance technologies but along with all this
it has also bought some new security threats to a common person. Some master minds have
invented many surprising ways to invade any place secretly or openly. Moreover, every new
technology is coming with some new risks. It does not mean to move back in Stone Age but it
provokes us to design a system that provides a better lifestyle along with proper security
monitoring. Monitoring security system can be used anywhere but it is most suitable for the places
which experiences heavy traffic and it is difficult for the human approach to keep track of
everyone. This project uses biometric scanner and RFID for this purpose. There is MySQL
database to keep record of every movement across the place of installation. The owner is quickly
informed through email and message on phone about any ambiguous entry at prohibited time and
he has also authority to block someone to enter that particular place. All these features and proper
user interface can give a good monitoring system with human-machine approach.

It’s on us how we use the latest technology to ease us. Just monitoring people and ignoring other
factors is not enough to avoid all risks. There is a great deal of other risks to be monitored around
us like fire, smoke or some motion detected on boundaries. In APS attack, intruders used the
boundaries to enter in and did all massacre. Fortunately today, advancement in wireless technology
made it possible to design a Wireless Sensor Network which includes sensor nodes installed at
different place to monitor data and send it to central or data collecting node. All sensor nodes are
attached with different sensors and cameras to collect specific information. In WSN, central node
processed the coming data and send it to the server through IOT gateway. We have used XAMPP
server for this purpose but one can buy his domain to have his own server. There are different
application designed to access sensor data remotely through smartphones or desktops. Moreover,
this projects is featured to inform admin and alarm immediately in case of any event of threat.

Nowadays, mostly people cannot get separated from their smartphones. Providing control of
electronic devices along with access of all monitored data on their smartphones will add so much
comfort in life. Automation using Internet of Things is getting very popular as it has tons of

Web-Server based Security and Data Monitoring Automated System | 1


advantages for a user especially for handicapped and elderly user. One easy to handle system
providing all these facilities is very demanding for any organization. This also gives rise to the
need of password for all data as it should not be in the reach of everyone. This is the password
protected system with required access to multiple users allowed by admin.

1.2 Problem Statement


Recent attacks on educational institute and current situation in Pakistan really demand a security
and data monitoring system. It has become very essential to have proper security monitoring
system so that one can have full peace of mind even when he is away. Now, it is our requirement
to have all updates on our phones or personal computer about all entries and other data. Sensing
other data need random deployment of sensor node in the area of interest. Other than security,
convenience and ease of using is what our project is offering by automation. This projects offers a
futuristic way of life in which an individual have full control of his home , office, bank or any
other organization.

To acquire such system cost too much along complexities of installing and configuring it. That’s
why despite of immense demand, this has not caught much attention in market. Thus, it is essential
to make it a cost effective and simple to handle. So, maximum percentage of population can get
this for their school, home or any building they own. In other words, system modification is
required in order to lower the price to install it.

1.3 Objectives
 To develop a security concept considering different aspects on any organization
 To install sensor nodes and camera to collect data from different places of interest
 To remotely monitor all data through phones, internet or application and alert admin on
emergency conditions.
 To construct a wireless and efficient control of appliances through very common way of
commands
 To implement a low cost, reliable and scalable web-based controlling and monitoring
system

Web-Server based Security and Data Monitoring Automated System | 2


1.4 Scope of study
In order to fulfill the stated objective several steps must be taken. These steps include both
software programming and hardware implementation. These steps are as follow

 Establish a server on localhost using XAMPP and design a webpage connected with this
server.
 Programming of application on android and windows and, their interaction with online
MySQL database
 Interfacing of biometric scanner and RFID with Arduino UNO and their connection to
windows application through serial port.
 Making a simple server on Arduino Mega using Ethernet shield for wireless control of
devices through smartphone, internet and voice command
 To make a wireless sensor network communication through XBees

1.5 Significance of study


This design will undertake to create a low-cost and easy to use web-server based security and data
monitoring automated system. That will benefits the customers in many ways by giving them a
proper security check, data monitoring as well as appliances control. Client does not need any
specific skill or training to use it. Its handling is related to some of very basic actions from daily
life that anyone can utilize to make his place better and convenient.

Web-Server based Security and Data Monitoring Automated System | 3


Chapter 2
Arduino Microcontroller

Arduino is an open source platforms used to develop applications working in a real time. Arduino
boards are designed to take various inputs from sensors, buttons and different modules then process
that information to generate an output including lighting a bulb, turning on or off a motor,
displaying a value on LCD and the list goes on. Arduino programs are uploaded in the form of
sketches using Arduino IDE software.

2.1 Arduino UNO


Arduino UNO board has 14 digital input and output pins out of which 6 can be used as PWM pins.
The board contains 6 analogue pins. It has a reset button too to reset Arduino. Pin 13 is an on board
LED. To power on an Arduino connect it with computer by a USB cable. External power supply
can also be used to power it. It is operated on 5V and has 32KB flash memory. The board supports
UART, SPI communication. It has one hardware serial port as well. 3.3V on 5V power pins are
also available on the board to power different modules connecting with that board

Figure 2.1 Arduino UNO

2.2 Arduino Mega


Arduino Mega 2560 has more number of pins and memory size comparing it with Arduino UNO
board. Arduino Mega has 54 digital input output pins. Out of 54 digital output pins 15 can be used

Web-Server based Security and Data Monitoring Automated System | 4


as PWM pins. 16 analog pins are also present to give an analog input or get an analog output. The
board contains 4 hardware serial ports. The board can be powered directly through a USB cable
from computer or one can use external supply as well. 3.3V, 5V power pins, a reset button, on
board built in led is also present in MEGA 2560. It has a flash memory of 256 Kb.

Figure 2.2 Arduino mega

2.3 Why Arduino?


Arduino is a low cost and economic board. It is a multiplatform running on different operating
system including LINUX, Windows etc. It is easy to use. It can support different shields and
modules. Lots of companies has started to build plugins for it. Interfacing different modules is easy
on this board. “Real time execution” is the most beneficial feature of Arduino. It can execute
instructions in real time which is what required for implementing home automation.

We have implemented security through RFID card readers and fingerprint scanner. The RFID card
reader and finger print scanner both are interfaced with Arduino UNO on a separate board. GSM
is also attached with these boards for generating a message. Wireless sensor nodes are made on
Arduino UNO board. These nodes are equipped with flame, smoke and motion sensor. The data
of these nodes is transmitted wirelessly to the node which is collecting this data through XBee.
XBee is also interfaced on Arduino. That node which is receiving data has a receiving XBee on
Arduino board. This Arduino board also has the GSM module and Ethernet shield for sending the
data on cell phones and internet respectively. Automation is carried on Arduino mega board. It has
relay which is operating load. Ethernet shield is also used on this for sending a data on the internet.
Moreover a voice module VR3 is also connected on this board.

Web-Server based Security and Data Monitoring Automated System | 5


2.4 Connecting Arduino to the Internet
With the rapid increase in technologies various devices have been assigned an IP address so that
they can be accessed and control through internet. This is known as internet of things. For
connecting Arduino with the external world, we have to connect it with internet. Connecting
Arduino to the webserver allows us to control the hardware remotely. For that purpose we have
used Ethernet shield.

2.5 Ethernet Shield


Ethernet shield uses RJ45 cable to connect Arduino with the internet. It uses SPI protocol and is
operates on 5V. The shield uses W5500 Ethernet module. The shield has a reset button which when
pressed resets the shield as well as Arduino. We have selected this Ethernet shield due to its
attractive specifications. It has made connecting Arduino to the internet easier.
A unique IP address is assigned to each Arduino board through Ethernet shield via DHCP. On that
IP we can access that Arduino board.

Figure 2.3 Ethernet shield for Arduino


In our project we have used Ethernet shield for the following purpose
 Remote controlling of electronic appliances
 Transmitting the data of sensors from data collecting node to web

Remote controlling of electronic appliances


To turn the electrical appliance on and off we have made a webserver on Arduino using Ethernet
shield. A webpage is made which has buttons on it to turn the bulb on or off. When the user clicks

Web-Server based Security and Data Monitoring Automated System | 6


on the button HTTP request is sent to the IP address of the device. The Arduino then responds to
the request and toggle the bulb.
Transmitting the data of sensors from data collecting node to web
The sensors data received by data collecting node from wireless sensor node is stored on the
database of the server. The data is sent to the internet with the help of an Ethernet shield. The
HTTP request is sent by the Ethernet shield to the IP address of the server on which you want to
store the data. The HTTP request is a query to store the data in the database. The Arduino having
Ethernet shield behaves as client requesting the server to save the data.
We can also make our Arduino access from the remote computer with port forwarding.

2.6 Arduino IDE


We have used Arduino IDE to program Arduino board. It is an open source, and use C and C++
language to program the microcontroller. The code is uploaded to the controller using USB cable.
We have interfaced Biometric Scanner, RFID reader, wireless sensor nodes equipped with flame
sensor, motion sensor, smoke sensor and temperature sensor, data collecting node having GSM
module and Ethernet shield and relay module which is operating 220V bulbs with Arduino board
which is programmed by this software.

Web-Server based Security and Data Monitoring Automated System | 7


Chapter 3
Global System for Mobile (GSM)

3.1 Smart Phones


Mobile phone is the perfect source to stay connected with the people. Cell phones are proven
beneficial in any emergency situations. Although there are different mediums available to convey
a message to another person but cell phone is considered as the best source to do the job in the
short time.

3.2 GSM
GSM stands for Global System for Mobile Communication. It is an international standard for
mobile networks and most commonly used in the world. Important features of GSM are
international roaming, call encryption, SMS, call forwarding and swappable SIM cards.

3.3 SIM 900a


SIM 900a is small in size and consumes low power. It delivers 900/1800MHz. It can make and
receive a call. Text messages can also be sent and received using this module. It is operated on 5V.
Due to its simple specifications, we have used it in our project. It has a red power led and a status
led also. Module contains antenna to strengthen the signals. When we insert a sim card in the
module then after a minute the status led starts blinking at a slower rate indicating that it has
established a connection.

Figure3-1 SIM900a Module

Web-Server based Security and Data Monitoring Automated System | 8


AT Commands
GSM is controlled by the commands known as AT command. AT indicates the start of command
line. AT is the abbreviation of ATtension.
We have used following AT commands:

Command Description Result


AT Check the modem OK
AT+CMGF=1 Change the SMS sending OK
mode
AT+CMGS=”MOBILE Send the message +CMGS: 71
NO.” OK

<MESSAGE {CTRL+Z}

Table 3-3 GSM AT commands

3.3.1 Sim 900a with Arduino


To make the home, office or a building more secure we are using a GSM module to generate a text
message and send it to the system administrator in case of emergency.

 Whenever a user is enrolled in in our system he will be sent a confirmation text message
through GSM.
 When the admin blocks or blocks the individual he is informed by a text message
 If someone tries to enter the building when the work hours are finished admin will be
notified with the text message.
 SMS is sent as soon as there is fire alert or motion sensed warning to the admin.

GSM is interfaced with microcontroller using serial communication. As soon as there is serial data
available for Arduino for GSM it will serially send it to GSM module which will to send to it to
mobile user.

Controller

GSM Air Interface Air Interface

Web-Server based Security and Data Monitoring Automated System | 9


3.4 Advantage of GSM based smart system
Mobile phones delivers a message to the person quickly, so admin will be alerted if some
accidental thing happens. He does not need to connect to internet and then log in to the app to
monitor the status of sensors. He will be notified in case of emergency if he is connected to the
network.

Web-Server based Security and Data Monitoring Automated System | 10


Chapter 4
RFID Reader and Finger Print Scanner

4.1 Security through RFID Reader and Finger print scanner


Biometric and Radio Frequency Identification (RFID) offer greater security and convenience than
traditional methods of person recognition. These devices have several advantages over traditional
method as they provide automatic recognition and verification of a person. This adds an extra layer
of security at entrance and exit doors of any organization. RFID or biometric create a secure
environment by identifying the individuals before giving them access to enter a particular place.
For RFID, Person is assigned a card or a tag having unique ID and he needs to swipe it in front of
the RFID reader before passing through entrance. Similarly, in biometric scanner unique ID is
assigned to each fingerprint template and individual is required to scan his finger to get verified.
RFID readers and fingerprint scanners are widely used in schools, offices, and laboratories for a
secure and reliable authentication for an individual requesting an entry.

We have used the following component for implementing security through RFID reader and finger
print scanner
 Arduino
 RFID Reader
 Finger Print Scanner
 GSM

4.2 RFID Reader

Figure 4-1 RFID Reader

Web-Server based Security and Data Monitoring Automated System | 11


Mifare RC522 is used to read RFID cards and tags. It reads a card or a tag from a distance of 0 to
60mm. It is operated on 3.3V and works on a frequency of 13.56 V. It works on SPI protocol. Due
to its small size, low cost, low power consumption we have used it in our project. Data is
transmitted in form of radio waves to the RFID reader through tags and cards which have integrated
circuit and antennas. Through RFID, it is possible to allow only specific group of people to enter
to a particular place by issuing cards only to them. In this project, RDIF is connected to Arduino
which is programmed to its send data to application running on computer through serial port.
Interfacing of RFID with Arduino is shown is figure below

Figure 4-2 Interfacing of RFID with Arduino

4.3 Finger Print Scanner

Figure 4-3 Biometric Finger Scanner

Web-Server based Security and Data Monitoring Automated System | 12


This fingerprint scanner makes detection and verification of finger super simple. This contains a
high power DSP chip used for detection of image, finding feature, calculations and searching
image.it can be interfaced with any controller using TTL serial and, sends data packets to it to
capture and search fingerprint templates. It can store up to 162 templates on its flash memory.
There is a red LED in the lens to show its working. This is very simple module to use because
there are softwares available to test it directly on windows and you can also set baud rate of this
scanner according to your requirement. The module works on 3.3 to 5 Volts. We have used
Arduino to program its functions and its interfacing with Arduino is shown in figure below

Figure 4-4 Biometric Interfacing with Arduino

4.4 Functions of RFID Reader and Fingerprint Scanner


RFID reader and finger print scanner has mainly to modes of functions. It is necessary to utilize
both modes to fulfill the requirements of security. Following are the mode of operation for RFID
reader and biometric scanner:

 Enrollment
 Verification
Enrollment
During the enrollment phase card is read by the RFID reader and the attached microcontroller is
communicating with RFID reader through SPI bus. Our controller is functioned to assign each card
a unique ID which is sent serially to windows application made on vb.net where it is stored in

Web-Server based Security and Data Monitoring Automated System | 13


MYSQL database along with other necessary information. On the other hand, biometric scanner
use RX TX pins to communicate with the controller. Remaining enrolment process of fingerprint
scanner is quite similar. In this mode, user provides a unique ID through window application and
scanner asks to place finger on it to store template against given ID. Enrolling person is required
to place finger on scanner twice to save as much accurate template as possible. These IDs along
with name, registration number, father name, phone number, Email ID are stored into MySQL
database through MySQL queries. The enrolled person will be notified by an email and there is a
GSM module, connected to the microcontroller, to send a text message to the person confirming
him that he has been enrolled in our system successfully.

Finger Assigning Store in Text message


scan/card unique id and Database and Email
swipe entering data

Figure 4-5 Enrollment Process of RFID/Finger print scanner


Verification

In verification mode, the system validates a person identity by comparing captured biometric
image with already stored templates in the database. If the template is present in the pre-stored
database, then its ID is sent to our designed windows application where this particular ID is
searched in MySQL database. In such a system, recognized person’s data is displayed on the screen
but he is only granted permission if he is not present in the block list. Similarly, for RFID, an
individual has to swipe his RFID card in front of RFID scanner. The unique card ID is sent to the
application. In the application, several MySQL queries are executed to search ID in the database.
If this ID is found then the status of the user is checked whether he is blocked or not. The user is
only allowed to enter if his status is unblocked. In the case of no record of the user or blocked user
the buzzer will alert others that some unauthorized person is trying to enter. If someone attempts
to enter other than working hours the admin will be informed by a text message

Web-Server based Security and Data Monitoring Automated System | 14


Scan finger/swipe card

No

Exist in
database?

Yes

No
Block?

Yes

Grant Access

Figure 4-6 Verification Process of RFID/Finger print scanner

4.5 Advantages and Limitations:


Advantages of using RFID cards:

There is another technology known as barcode scanners. They used to scan a barcode. The
following table shows the comparison of RFID and barcode techniques. By comparing these two
techniques, we concluded that RFID is better than scanning a barcode so we prefer to use RFID in
our project.

Web-Server based Security and Data Monitoring Automated System | 15


System/Characteristics Barcode RFID

Transmission media Optical (laser) EM waves

Data volume 1-100 bytes 128-8 kbytes

Data alteration Not possible Possible with read/write tag

Position of reader and tag Visual contact with line of No line of sight and no visual
contact contact in effective distance

Access distance of reader and Several meters based on laser From cm to meters based on
tag reader sensitivity(line of sight) frequency of tags

Secure access Good Better

Environmental susceptibility Dirt and other contaminant Very little affected

Table 4-1 Comparison of RFID and Barcode

Limitation of implementing Security with RFID Reader

Collision of Data
It is possible that multiple cards and tags may come in front of the RFID reader simultaneously.
RFID readers made by some vendors cannot handle this situation. So this will result in collision
and data loss may take place. Complex algorithms are needed to overcome this problem.
Advantages of Using fingerprint scanner

There are different types of methods for biometric verification each having its own pros and cons.
Following table is comparing different biometric techniques:

Web-Server based Security and Data Monitoring Automated System | 16


Biometrics Universality Uniqueness Permanence Collectability Performance Acceptability

Face High Low Medium High Low High

Fingerprint Medium High High Medium High Medium

Hand
Medium Medium Medium High Medium Medium
geometry

Keystrokes Low Low Low Medium Low Medium

Hand vein Medium Medium Medium Medium Medium Medium

Iris High High High Medium High Low

Retinal
High High Medium Low High Low
scan

signature Low Low Low High Low High

Voice print Medium Low Low Medium Low High

Table 4-4 Comparison of different biometric techniques

From comparison it can be concluded that biometric verification using fingerprint is more reliable.

Limitation of implementing Security using Fingerprint

Finger skin conditions


Finger print templates stored also depends upon skin conditions such as dryness, oiliness, and
wrinkles on fingers with time etc. Identification of an individual may fail sometimes due to these
reasons.

Web-Server based Security and Data Monitoring Automated System | 17


Chapter 5
Automation

5.1 Automation using IoT


Nowadays, automation is getting very popular as it plays an important role in providing a better
lifestyle and user-friendly environment.it has millions of advantages especially for handicapped
and elder users in which it will be easier for them to control their appliances. This project focuses
on flexible control and monitoring of system using Internet of Things. This is achieved by
controlling electrical appliances remotely through the internet or via smartphone or via speech.it
gives you the ability to control your electronic devices by sending data over the network without
requiring human-to-human or human-to-computer interaction. The device that is to be controlled
remotely is connected to our central controller through a wire or wirelessly. Automation in this
project is also linked with biometric and RFID. When biometric scanner or RFID sensed zero
entries then lights will be turned off by themselves and turned on first entry. Arduino based
automation will be applied in our project and we have used three bulbs to demonstrate different
appliances.

Android/Windows Webpage
Application

Voice Command

Web-
Server

Ethernet Arduino UNO Relay


Shield

Figure 5-1 Automation system

This project will consider a cost effective and easy to create method for automation. It will
beneficial for manufacture by making it easy to install and also for customer as it will make your

Web-Server based Security and Data Monitoring Automated System | 18


place much more convenient. The fundamental control system is connected to appliances
through wire but there control is via wireless commands. There are three ways giving command
to device.
1. Voice commands
2. Webpage
3. Android Application

5.2 Voice commands through VR3 voice module

Figure 5-2 VR3 voice module


This is voice independent device that is fully compatible with Arduino and easy to control through
speech commands. It has capability to support up to 80 voice commands but maximum 7 command
can work at a time. There is trainer program available to train any specific voice command first
before it is used as a command for a device. There are two ways of controlling this module. One
is through serial port which allows its full function and other method through general IO pins.
General IO pins generates serval function. We have used serial communication to control this
module.

Figure 5-3 Automation through voice

Web-Server based Security and Data Monitoring Automated System | 19


Speech is very common way of interaction so user don’t need to be trained to control device
through voice. It is very beneficial for elder and senior citizens or for the people who have trouble
in using their hands. Controlling through speech ease your life style in today’s busy routine at less
installation cost. Though, it has bit more probability of error as voice is not always accurate. User
may have to try multiple times to give exact command but other tons of advantage overcome this
limitation. More work is done to make more accurate voice modules.

5.3 Webpage
In contrast from devices controlled from voice commands, there are simple techniques to control
of appliances through internet. Above everything, IOT base automation can reduce cost and
conserve energy and provides you comfortable and cool environment. Customer in not bound to
place to control appliances at his home or office. In case, user forget to turn off any device while
leaving then IOT base automation gives him the opportunity to turn it off through connecting to
any Wi-Fi network. Wireless automation through Internet of Things is very useful application to
control electronic devices over the cloud. The essential components and material for automation
using IOT are listed bellow
 Arduino Mega
 Ethernet Shield
 Relay Board
 Wired LAN connection
Ethernet to make Web-Server
You can turn you simple Arduino into a web-server by connecting it to an Ethernet Shield. You
can access this server through any browser connected with same network. Using Ethernet library
for Arduino, you may programmed your controller to answer a HTTP request with Ethernet shield.
From your browser, you navigate to your Ethernet shield IP’s address then it will respond with
HTML to display the required result on your browser. This shield connects a Wiznet Ethernet
controller with Arduino via SPI bus. It is also possible to access server through any other network
but for this purpose, your personal computer should be configured for port forwarding. This allows
you to control your hardware device from a webpage using HTML buttons.

Web-Server based Security and Data Monitoring Automated System | 20


Figure 5-4 Ethernet Shield with LAN connection
MAC and IP address is assigned to shield using Ethernet.begin() function in library. Every device
has globally unique MAC address. You can’t give same MAC address to different shields.
Moreover, IP address for the shield depend on settings for one’s network but user can use DHCP
to assign IP address to Ethernet Shield.
Relay Board
A relay is electromechanically operated switch that utilizes electromagnet to operate mechanical
switch.it use two provide isolation between two circuits. We can control high power circuits with
low power circuit using relay as it minimizes the chances of spark or something dangerous. In our
project, there is no requirement for isolation, but as we are using Arduino for switching of
appliances and Arduino pin has very low voltage. Relay is used to control electronic devices at
220V through Arduino pin.

Figure 5-5 5V relay board


Relay boards are available with two configuration: one is active low and active high. Board used
in project is active low which means it will trigger when zero at input pin of controller. Output pin
also have two contacts, one is normally closed (NC) and other is normally open (NO). NC contact
are closed when relay is denergized and when relay is triggered they become open. We have to use
NC contact as our board is active low so turn device on logic one NC are required. Interfacing of

Web-Server based Security and Data Monitoring Automated System | 21


Arduino with relay board is shown in Figure X.7. Digital pins of Arduino connected with relay
input can be change according to the requirement.

Figure 5-6 NC and NO contacts

Figure 5-7 Interfacing of Arduino with Relay board

5.4 Command through application


1. Android Application
In the era of technology, smart phones are now integral part of our live. According to the survey
conducted by an American organization, 85% of youth have said that they can’t live without their
phones so it would be an essential step to have control of your devices on one tap. In this project,
we have emphasize to design an android app in which you can switch on and off your devices just
clinking a button on screen. MIT app inventor is used to program an application for phones. We

Web-Server based Security and Data Monitoring Automated System | 22


have place a URL for specific device on a click of a button. Phone uses a GET method to make a
HTTP request to the web server. Web server responds according to the request made. The layout
of application is shown in the figure below.

2. Windows application
This project is also intended to make an application for user to automate their devices through
windows.it is always necessary to approach your phones all the time as it may ran out of battery
or some other technical issues. There is an option to control appliances through windows
application. We have used vb.net to design an application for this purpose. Layout of windows app
is shown in software chapter.
Results
We managed to an automation system for automated project in a user friendly and cost effective
manner. User friendly in a way that any common person can use it to control electronic devices
through smartphones, webpage or a speech command. There is no need for special training or
particular skill to operate this system. All components use in this project for automation do not
cost very high and they easily available in market.

Web-Server based Security and Data Monitoring Automated System | 23


Chapter 6
Wireless Sensor Networks (WSN)

Wireless networking is defined as the connection of different devices to each other using radio
signals. Devices are connected and allowed to communicate. It plays a vital role when you want
to place a device or a sensor where no cable can be installed. Wireless sensor Network is a large
set of small electronic devices which are programmed to sense, compute and transmit data of
physical environment to data collecting node. Wireless Sensor Networks (WSNs) have given a
new level to military, industrial, scientific and commercial applications in a cost effective manner.
WSNs are very efficient alternate when human observation or traditional sensors would be
undesirable, inaccurate, expensive or dangerous. Today, WSNs are widely used at different
commercial and industrial level to monitor any activity. If an event is triggered, sensor nodes sense
it and send the information to the main node where it is processed and stored.

Sensor Node 1

Online Database Data Collecting


Node

Wireless Transmission
Sensor Node 2

Figure 6.1 Wireless Sensor Network

6.1 Arduino as a Sensor Node


Since, our objective is to build a working prototype so we will keep our sensor node configuration
simple. We will use several inexpensive sensors to capture environment temperature, motion
occurred, fire break-out and smoke in the air. Each sensor is attached to a microcontroller that is

Web-Server based Security and Data Monitoring Automated System | 24


responsible for acquiring data through pre-defined instruction set. The microcontroller, along with
sensors, power supply, and a radio module, is called a Sensor Node. It is a deployable unit that
captures sensor’s data and it has no capability to store data locally.it uses a low-energy radio
communication to send the data to the central location.

We use the following components for Sensor Node

 Arduino UNO
 LM 35
 PIR Motion Sensor
 Flame Sensor
 MQ-2 Gas Sensor
 Xbee S1

LM35
LM 35 is very low cost and easily associable sensor. It is a linear device i.e. 10mV/C which means
LM35’s output will rise by 10mV for an increase in every degree. So if the output of LM35 is
220mv/0.22V then the temperature of the environment is 22°C.

Figure 6-2 LM35 Temperature sensor


As such no extra component is required to interface LM35 with Arduino. Its output has to be
attached with any analog pin of the controller and apply an operational voltage between 4 to 20V.
It is rated to measure accurate temperature from -55 C to 150 C range. Another advantage of LM35
is that it is suitable for remote application due to its smaller size.

PIR Motion Sensor


This sensor allows you to sense any motion occurring in its range. It detects whether something or
someone has moved in or out of its sensing range. It is small in size, cheap, low-power consuming,
easy to handle and don’t wear out.

Web-Server based Security and Data Monitoring Automated System | 25


Figure 6-3 PIR Motion sensor

They have a sensitivity range up to 20 feet. PIR motion sensor works great at input voltage 5-
12V and it has digital output pin which gives one when motion is detected. These easy to use
specifications made us to use it in our sensor node.

Flame Sensor

Figure 6-4 Flame sensor


This module is designed to sense flame and radiation. It can also detect ordinary light with the
wavelength in the range of 760nm-1100nm. It has detection range up to 100cm with detection
angle about 60o. It has both analog which gives analog voltage output and digital pin, indicating 1
in the case of fire and zero when idle. The flame sensor module is easy to use as it has power
indicating red led and green led as a digital output indicator.

Web-Server based Security and Data Monitoring Automated System | 26


MQ-2 Smoke Sensor

Figure 6-5 MQ-2 Smoke sensor


MQ-2 is one of the gas detectors that detects flammable gasses and smoke in the air. The sensor
has the ability to measure flammable gasses of the concentration of 300 to 10,000 ppm. The MQ-
2 gas sensor is sensitive to many gases such as LPG, i-butane, propane, methane, alcohol,
Hydrogen and smoke. They are mostly used in gas leakage detecting equipment in home and
industry and also as a portable gas detector. Its operational voltage is around 5V.

6.2 Wireless Communication through XBee

Figure 6-6 XBee series-1 module


XBee modules provide a way to create a wireless point-to-point or mesh network. They are
configured with the standard AT commands using some software. This module offers a very
reliable and simple communication between microcontrollers, computer or any system having a
serial port. They are available in multiple flavors, with the support of different protocols like
ZigBee, Bluetooth, and even Wi-Fi. The XBee modules have an option of configuration to operate
either in an AT mode (also known as transparent mode) or in application programming interface

Web-Server based Security and Data Monitoring Automated System | 27


(API) mode. We have used AT mode for Xbee to send data immediately to the remote module
identified by the destination address in memory. There is no need for packet formation in this mode
as data is just sent serially to the Tx pin of one XBee and received at Rx pin of the destination
XBee.

We have used most popular XBee module series 1 802.15.4 in our project. It needs a bit
configuration to set PAN ID and destination address for communication. There are different
softwares available for its configuration but we have chosen XCTU as it has very simple user
interface. Figure below shows its configuration software settings.

Figure 6-7 Configuration of XBee using XCTU


The XBee modules have two major classifications: XBee series 1 and XBee series 2. Both are very
similar but selection should depend on application requirements. We chose XBee Series 1 for our
WSN as it is simple and fulfilling our requirements.

Web-Server based Security and Data Monitoring Automated System | 28


Figure 6-8 XBee Star Topology
Network topologies tell the way to interact with all nodes and establish a path between each other.
We have used star topology in our network as shown in Figure.X.6. In this topology, all nodes are
connected to one master or central node and this central node is responsible for collecting data
from all nodes and forward it to the proper communication link. In AT mode, data coming to Xbee
is directly transmitted to environment with intention of sending it to other radio modules without
any modification. Transmitted data is addressed to one target in case of point-to-point topology or
broadcast to multiple targets in a star topology. We will use AT mode to connect sensor node to
coordinator node. The XBee module connected to the sensor node is referred as a Router, while
the other one connected with IOT gateway will act as a coordinator.

6.3 Data Collecting Node or IOT Gateway


IOT gateway combines sensor data and processes them before send onwards or more. IOT gateway
basically connects the thing (Sensor Data) to the cloud (Server). They are needed to manage and
control all complex data coming from different nodes. In our case, there are just two nodes but the
situation can be complex. It can be hundreds or thousands nodes and IOT gateway has to normalize
all node’s data before sending it to online MySQL database. The gateway acquires data from
multiple nodes and manipulates them to a specific format that is understood by further data
processing. Mostly, sensors and controllers at Router side have low energy and they use low-
powered communication network. Thus, they cannot support energy extensive protocols like Wi-

Web-Server based Security and Data Monitoring Automated System | 29


Fi, Bluetooth or Ethernet to send data to the cloud. A gateway uses multiple protocols to accept
data sent by sensor nodes and to connect a gateway to a process running in a cloud.

Figure 6-9 Gateway position in WSN

We use following components in Data Collecting node/IOT Gateway

 Arduino UNO
 Ethernet Shield
 Xbee Series 2
 GSM

Here XBee is acting as a coordinator. It receives the data from both sensor nodes and gets them
separated according to the node it belongs. Ethernet shield mounted on Arduino is to save the
sensor node’s data in the online database in a useful manner for future use. An application is also
programmed to have remote access to the sensor’s data on your personal computers and
smartphones. GSM (explained in another chapter) is also connected to alert admin in any
emergency activity at node’s installation place.

6.4 Performance of Wireless Sensor Network


A brief description of some factors that affects the functioning of the sensor network and based on
these factors, we concluded few parameters to measure the performance of Wireless Sensor
Network. Those factors are given below

Web-Server based Security and Data Monitoring Automated System | 30


Latency: it is defined as the time taken for a sensor node to sense any triggered event from
surrounding and communicate it with central unit. Latency in a network is based on a time that
sensor node take to collect, process and send information to destination in heavy or low load traffic

Energy Awareness: All devices and sensors in WSN use energy to perform activities like sensing,
transmitting, and storage. Any node in the network should know the estimated amount of energy
to perform any specific task as value can be vary depending on the functionality.

Synchronization: Synchronization between two nodes is when they ensure that flow of data and
its receiving are done at the same rate. Receiving end of WSN should be able to recognize the data
that is transmitted on the sending side is in the same order, it sent.

Web-Server based Security and Data Monitoring Automated System | 31


Chapter 7
Design of Website and Applications

7.1 Windows Application


Vb.net
We programmed on Visual Basic.Net to make the user interface for the system. It is a simple,
object-oriented computer programming language. Inheritance, exception handling, threading, file
handling etc. are important features of vb.net. Most important feature of vb.net is creating windows
form that performs common application tasks. Windows form applications can be built by placing
controls such as timers, textboxes, radio buttons, labels, combo boxes, group boxes, tool tips, data
grid views etc. from the toolbox on the form and developing responses to actions such as mouse
click, cell click etc. This windows Application is developed on vb.net using visual studio 2015.

MySQL
SQL in MySQL stands for Structured Query Language. We can access the database directly
through MySQL or by embedding MySQL queries into the code written in other languages like
vb.net, PHP, C# etc.
Here is a brief description of our designed application.

Web-Server based Security and Data Monitoring Automated System | 32


Login Form
The application is password protected. There are one admin and multiple users who can access the
software. Each user has its own username and password.

Figure 7-1 Window App: User Login

Web-Server based Security and Data Monitoring Automated System | 33


Biometric and RFID
Enrolment
An individual is enrolled with the help of serial communication between biometric scanner or
RFID reader and the application with other necessary information such as name, registration
number, phone number etc. through enrolment form. The information is stored into MySQL
database.

Figure 7-2 Window App: Enrollment form

Web-Server based Security and Data Monitoring Automated System | 34


Admin Control
The administrator can log into admin control form by entering his password. Admin has the access
to update or deletes records of a certain user. He can also block or unblock the user. Admin control
form also has a search option from where admin can search the specific user.

Figure 7-3 Window App: Admin control

Web-Server based Security and Data Monitoring Automated System | 35


Display
As soon as RFID card is swiped or fingerprint scanner scans the fingerprint template, respective
IDs are matched with the data stored in the table of the database. If the IDs are matched the form
will show the necessary details such as name, status, entry or exit time of the individual entered or
left the building.

Figure 7-4 Window App: User display

Automation
Toggling buttons are made on automation form for toggling bulbs. When the button is clicked
request is sent to the server and after getting response from it bulb is turned on or off.

Web-Server based Security and Data Monitoring Automated System | 36


Figure 7-5 Window App: Automation control

Sensors
Sensor form shows the current status of different sensor nodes installed. In the case of fire, smoke
or any mysterious motion user will be notified through this application. By using load button user
can view the data logs of wireless nodes.

Figure 7-6 Window App: Sensor data display

Web-Server based Security and Data Monitoring Automated System | 37


Admin
Admin Form is used by the administrator of the application to give access to users to use this
software. Admin can add or remove a user, change a password of a certain user through this form.

Figure 7-7 Window App: Admin login

The software is easy to use even for the user who possesses less technical skills. It has buttons,
icons and search boxes for performing various actions which make it user-friendly. This software
shows message box for indicating warnings, errors or success status.

7.2 Website
Web-server based Security and Data Monitoring System can be accessed from anywhere around
the world through the laptop, desktop, tablet or by a smartphone by connecting to the internet,
typing the URL in the browser and login details into the login form. We have made a web server

Web-Server based Security and Data Monitoring Automated System | 38


on XAMPP to host this website. It can be accessed through remote computers by port forwarding.
This website is designed using combination of different languages like HTML, PHP, and CSS.

Web-Server
Web server stores, processes and delivers files that form web pages to clients. For accessing a
particular web page, the client sends the request to the server. The web server then searches that
web page. If the requested page is found it will send that page to the client with HTTP response
otherwise it will send HTTP response: Error Not found.

Request
Web-Server Client

Response

Xampp
XAMPP (Cross-Platform (X), Apache (A), MariaDB (M), PHP (P) and Perl (P) consisting of
Apache HTTP Server, MariaDB database, and interpreters for scripts written in the PHP and Perl
programming languages. Developers use Xampp to create a local web server for testing and
deployment purposes. Xampp is free, simple and open source cross-platform web server solution
stack package containing everything needed to set up a web server.

Port Forwarding
Port forwarding makes a specific computer accessible to other computers on the internet. A port
number is set on the gateway for communicating with the particular service in the private network
for a particular computer. Remote computers can communicate with this specific computer by
providing the port number and the IP address of the gateway.

Router

LAN: 192.168.10.1
10.0.0.2 WAN: 39.55.108.66 192.168.10.3
Sending request to 39.55.108.66:81 Port: 81

Web-Server based Security and Data Monitoring Automated System | 39


HTML
Hyper Text Markup Language (HTML) describes and defines the appearance and contents of a
web page. Webpage structure is based on HTML. Markups known as tags are used to organize
text, graphics and other contents of webpage. <head>, <title>, <body>, <header>, <footer>, <p>,
<div>, <span>, <img> are some examples of HTML markups.

CSS
Cascading Style Sheets (CSS) add style to the document written in HTML by setting the back
ground colors, text colors, font size, font style, text alignment, paragraph spacing, table layout,
border styles, margin layout, height and width, positions etc.

PHP
Hypertext Processor (PHP) is server side scripting language used for managing dynamic content
while designing web pages. PHP interacts with databases which include Oracle, Informix, MySQL
etc. PHP is embedded in HTML.

Figure 7-8 Website: home page

Web-Server based Security and Data Monitoring Automated System | 40


RFID/ Biometric
User can check who entered or left the building by viewing the exit and entry tables of RFID and
biometric.

Figure 7-9 Website: RFID and Biometric data display page

Automation
Automation web page will allow the user to turn on or off bulbs with the single tap. The bulb will
be remotely controlled thus providing convenience to the user.

Figure 7-10 Website: Automation control

Web-Server based Security and Data Monitoring Automated System | 41


Sensors
The user can monitor the status of sensors connected to nodes by logging in to the website and can
also view the previous records.

Figure 7-11 Website: Sensor data

7.3 Android App


By having this application on the android device, the user remains aware of the current situation
of the building by login into the application and viewing the entries and exits tables of biometric
and RFID. Emergency situations such as smoke, fire and intruder motion detection can be
monitored remotely by the user so he can take actions accordingly. The Android application also
allows controlling electrical appliances at a distance thus providing comfort at the user end.
App Inventor
App inventor is easy and open source tool which is used to create android applications using
graphical user interface by dragging and dropping the required components. Applications are
developed by connecting various programming elements including objects, methods, and
properties similar to joining blocks or jigsaw puzzle.

Web-Server based Security and Data Monitoring Automated System | 42


Figure 7-12 Android App: Home Figure 7-13 Android App: Login

Web-Server based Security and Data Monitoring Automated System | 43


Figure 7-14 Android App: Biometric Data Figure 7-15 Android App: Automation

Web-Server based Security and Data Monitoring Automated System | 44


Figure 7-16 Android App: RFID Data Figure 7-17 Android App: Sensor Data

Web-Server based Security and Data Monitoring Automated System | 45


Chapter 8
Communication Protocols

8.1 Serial Communication


Serial communication is the transfer of data bit by bit. When using this communication protocol
it is to be confirmed that both transmitting and receiving ends ae using same protocol. Data bits,
synchronization bits, parity bits and baud rate ensures the error free transmission.

Baud Rate

How speedily data transfer takes place can be known with the help of a baud rate. It is usually
measured in bits per second. Higher value of baud rate indicates the fast data transferring. Setting
baud rate too high usually greater than 115200 can cause errors.

Frame of data

Data is sent as a packet or frame of bit. Basically serial packet is the data it carries. The block of
data is known as data chunk as it has no specific size.

Synchronization bits

The bits which are sent with each frame of data are known as synchronization bits. The stop bit
and start bits are synchronization bits. These bits indicate the beginning and ending of the data
packet.

Parity bits

Parity bits are used to check the error in transmissions. The two types of parity bits are there even
parity and odd parity. If even parity is set, the bit will be 0 if the data contains even number of 1s.
Similarly, in case of odd parity the bit will be set to 0 for odd 1s.

Web-Server based Security and Data Monitoring Automated System | 46


Interfacing with hardware

Tx Tx
Rx Rx
GND GND
VCC VCC

Transmission pin is connected to the receiving pin and receiving pin is connected to transmitting
device. Ground is connected with ground and VCC with VCC.

In our project biometric scanner, GSM, XBees and voice module are working on serial protocol.

8.2 SPI communication


Serial Peripheral Interface (SPI) is a synchronous communication protocol using a separate line
for data and clock. The clock tells the receiving end when to start sample the data. This is to be
selected either at falling edge or rising edge of a clock signal sampling should start.

Figure 8.1 SPI Communication


In SPI clock signal called SCK or CLK is generated by one side. That side is known as the
master side, other is termed as slave. There is one master and one or multiple slaves in SPI
communication.

The data sent from master to slave is known as Master Out Slave In (MOSI) and the data sent by
slave to master is called Master In Slave Out (MISO).

Web-Server based Security and Data Monitoring Automated System | 47


Interfacing with hardware

SCK SCK
MOSI MOSI
MISO MISO
SS SS

SCK is connected with SCK, MOSI with MOSI, MISO with MISO and SS with SS.

Ethernet shield and RFID reader is interfaced with microcontroller using this protocol.

Web-Server based Security and Data Monitoring Automated System | 48


Chapter 9
Outcomes and Future Scope

9.1 Outcome
In this project, we successfully implemented a security system consisting of proper monitoring
and wireless alerts through text messages or email. The designed system meets the modern concept
of security which revolves around the sophisticated technologies such as biometric scanning and
RFID technology. The hardware equipment including RFID and biometric were tested and
required results were obtained. The system is smart enough to sense temperature, fire, smoke and
motion of area of interest through an independent unit called sensor node. We also tested the
wireless communication of sensed data though XBees and it gives positive results too. Designed
Wireless Sensor Network (WSN) meets our expected requirements including scalability and
autonomous operation. This project is also successful in providing mobile controlled and user
friendly system for automation of appliances. We programmed a software and websites where
credentials user can log in to the desktop application, android application or website to monitor
current status of sensor data, update the information of the persons enrolled, view all entries and
toggling of the electrical devices. The software part is also successfully interfaced with hardware
equipment and gets the results as expected. This project is cost effective. Implementation of this
project in present day will effectively provide a peace of mind to a resident. This project can be
implemented in homes, schools, banks, offices or any other organization.

9.2 Future Scope


Next step can be to include automatic emergency exits and sirens to make the system more secure.
Further work can be done to make the entry and exit points more secure by installing a camera
which can be programmed to detect and recognize face. Further improvements can be made by
setting a certain temperature and then making the necessary adjustments on achieving that
temperature by controlling the heating and air cooling systems. Motion sensors and automatic
timers can be programmed in such a way that they coordinate with lights to remain on or off for a
certain time thus saving the energy. Wireless sensor nodes can be extended by adding glass
breaking sensors, humidity sensor and pressure sensor to give user a more secure environment.
Webpage can be protected from attackers or hackers by using web security protocols. By making

Web-Server based Security and Data Monitoring Automated System | 49


some changes system can be implemented in schools, offices, hospitals, large buildings or even in
industries.

Web-Server based Security and Data Monitoring Automated System | 50


References

1. Mastering visual Basic 2010 by Evangelos Petroutsos


2. Visual Basic 2010 by Michael Halvorson Making Things Talk by Tom Igoe
3. Making Things Talk by Tom Igoe
4. Building Wireless Sensor Networks by Robert Faludi
5. Arduino Guide (https://www.arduino.cc/en/guide/introduction)
6. RFID for Energy and Utility Industries, PennWell
7. Weis Stephen A.(2007), RFID (Radio Frequency Identification): Principles and Applications,
MIT CSAIL
8. Spark fun Electronics [US] (https://www.sparkfun.com/products/11021)
9. John R. Vacca Computer and information security handbook, Morgan Kaufmann
10. GSM and GPS based vehicle location and tracking system
11. Transmit Management Systems
(http://ntl.bts.gov/lib/jpodocs/edldocs/13480/ch6.pdf)
12. Basic at commands for SIM900a; Pantech Solutions Blogs
(https://www.pantechsolutions.net/blog/basic-at-commands-for-sim900a-gsmgprs-module/)
13. MFRC522 Datasheet (https://www.nxp.com/documents/data_sheet/MFRC522.pdf)
14. http://blog.atlasrfidstore.com/rfid-vs-barcodes
15. Serial Communication (https://learn.sparkfun.com/tutorials/serial-communication)
16. Serial Peripheral Interface SPI
(https://learn.sparkfun.com/tutorials/serial-peripheral-interface-spi)

Web-Server based Security and Data Monitoring Automated System | 51

Das könnte Ihnen auch gefallen