Sie sind auf Seite 1von 28

Presented by: Guided by: SHANI SJ

AVINASH JOB VARGHESE Asst.Professor,EEE


S7 EEE
Roll no:11
CONTENTS
 Introduction
 Objective of the work
 Components used
 Method
 Primary access points
 Secondary access point
 Hardware setup
 Sensors used
 Impementation
 Advantages
 Disadvantages
 Conclusion
 Reference
INTRODUCTION
 Researchers have been experimenting and improving the
concept of smart home since the late 1970s.
 In the past, an average home had to deal with common
slash and grab criminals, while a modern home has to
deal with sophisticated and tech savvy attackers .
 Popular communication technologies like ZigBee and
Raspberry Pi are used here.
 In modern home automation system, the system should
be such that one is capable of identifying,alerting and
preventing intrusion attemps in a home .
Objectives of the work
 Distinguish between primary and secondary access
points.

 Understand user behaviour after change in state of an


access point.

 Identify and isolate attack behaviour.


COMPONENTS USED
The experiment is conducted by using a combination of:
 Motion sensor
 Microcontrollers
 ZigBee communication
 Proximity sensor
 Arduino Uno board
What is ZIGBEE?
 ZigBee is an IEEE 802.15.4 based specification used to
create personel area networks with small,low power
digital radios,such as for home automation,medical
device data collection.
 Applications includes:
wireless light switches
home energy monitor
traffic management systems.
METHOD
 Here various access points are used to identify
improbable scenarios within a smart home during its
operation.
 In a typical home these natural access points are front
door,back door,balcony doors and windows.
 Eventhough window is not a normal access point it
need to be considered because intruders mostly prefer
these areas for entering the home.
 Based on the purpose of the access points,we classifies
access points into primary and secondary.
Contd..
 Primary access points are categorized as front
door,back door etc.
 Secondary access points are categorized as window
balcony etc.
PRIMARY ACCESS POINT
 Front door is the primary access point to any
home,inhabitants use this door as the main way in and out
of the home.
 When a user leaves an occupied home,the motion and
proximity sensors placed near these access points inside
the home are triggered before the door is opened.
 Once the user stepped out and closes the door the motion
and proximity sensors will not be triggered.
 When someone enters an empty home,they are entering
from outside so,the motion and proximity sensors will not
be triggered before the door is opened.
Contd...
 Once the user enters the home and door is closed,the
motion and proximity sensor will be triggered.
 Motion and proximity sensors are srategically placed
so that,they will be only triggered by someone from
inside the home and not simply opening and closing of
door.
How the algorithm work?
 Once the door state is changed the algorithm
considers number of proximity and sensor values
before door state is changed to know the door was
opened from inside.
 After the initial state change the algorithm keeps
observing the door for a specific interval of time
called door observation time.The algorithm observes
the motion and proximity sensor values during door
observation time to identify user action at access
points.
Various actions at access points
After opening the door,the user can either:
 Leave the door opened and come back in the house by
triggering the sensors after opening.
 Leave the door open and step outside the home
without triggering the motion and proximity sensors
after opening the door.
 Close the door from inside within the door observation
time and come back in,triggering the sensors after
door is closed.
 User closes an open door from inside and comes back
into home.The sensors are triggered before and after
the door is closed.
 User closes an open door coming from inside and steps
out of the home leaving the home empty.
SECONDARY ACCESS POINT
 The balcony and windows form the secondary access points
in a home.
 In a typical home,the balcony door is not the main access
point to and from home.When the home becomes empty
an observant and proficient intruder can use this door to
access the home.
 When the home is empty the balcony door should not be
opened at any circumstances.
 So if any opening in the balcony door in an empty
home,the system triggers intrusion defence mechanism
without waiting for any identity verification.
 Windows are opened from inside under normal
circumstances.
 So,the sensors are placed near the window inside the home
so the sensors are triggered when window is opened from
inside.
 The sensors should be strategically deployed so that the
window cannot be opened from inside without triggering
them.
 Similar to balcony,when the home is empty and the
window is opened the system triggers the intrusion defence
mechanism without waiting for identity confirmation.
FLOW CHART
HARDWARE SETUP
At the access point Arduino Uno microcontroller with
Atmega 328P IC is used to gather data.
Arduino Uno module has:
 14 digital input/output pins
 6 analog inputs
 A USB connector port
 A 16MHz resonator
 A power jack
 Reset button.
Contd..
 Arduino is flexible and offers veriety of digital analog
pins.
 It can run in standalone mode or as an interface
connected to PC.
 It is cost effective.
 Each microcontroller is connected to a PC using USB
and programmed using Arduino Interactive
Development Environment.
SENSORS USED
 A micro contact/limit switch is used at the doors and
windows to sense the state of doors and windows.
 Motion sensor:Adjustable Passive
Infrared(PIR)sensors.
 Proximity sensor:HC-SR04 ultra sonic range sensors.
 Every living thing with temperature above absolute
zero emits heat energy in the form of radiation which
are detected by the PIR sensors.
 The proposed system is implemented using ZigBee
technology.
 It allows large scale network cofigurations and utilizes
low power radio with a data rate capability of 250kb/s.
 These features make ZigBee the ideal communication
technology in smart home networks.
IMPLEMENTATION
Arrangement of sensors,board and
microcontroller deployement at
Primary Access Point
Arrangement of sensors,board and
microcontrollers at Secondary Access Point
ADVANTAGES
 The system observes primary and secondary access
points to identify and detect intrusion without causing
inconvenience to the user.
 Offers implementation ease and flexibility.
 The system requires minimum user input to identify
whether the home is occupied or not.
 The access data is stored in database on Raspberry Pi
which is more secure.
 The stored data is never shared & it can be encrypted
to further improve security.
DISADVANTAGES
 When the home is occupied by the guest,the system
asks for user verification.
 This affects the aesthetic view of the building.
 Since it sense motion and temperature,it may vary
according to the mind of user.
CONCLUSION
The paper detects the user actions at primary and
secondary access points in a home using different
sensors.These detected user actions are compared
with normal behaviour of the user at various access
points to identify intrusions or intrusion attempts.In
addition to identifying intrusions in home,the
algorithm also warns the user about security
vulnerabilities by identifying the status of various
access points,user positions and behaviours.
REFERENCES
 C. Suh and Y.-B. Ko, “Design and implementation of
intelligent home control systems based on active
sensor networks,” IEEE Transactions on Consumer
Electronics, vol. 54, no. 3, pp. 1177–1184, 2008.
 B. Fouladi, S. Ghanoun, “Security Evaluation of the Z-
Wave Wireless Protocol,” Black hat USA, Aug. 2013.
 Wenye Wang, Zhuo Lu, “Cyber security in the Smart
Grid: Survey and challenges,” Computer Networks,
Volume 57, Issue 5, Pages 1344-1371, April 2013.
THANKYOU

Das könnte Ihnen auch gefallen