How to design home security and monitoring system Based on FPGA?

Introduction to system

How to design home security and monitoring system Based on FPGA? In the conventional design of home security systems, only the property is typically monitored, without taking into consideration the physical control aspects of the house itself. Besides, the term security is not strictly well defined in view of the fact that there is usually a time delay between the alarm system going on and actual arrival of the security personnel.

This article presents the development of a home security and monitoring system that is suitable where the traditional security systems that are mostly concerned about curbing burglary, gathering evidence against trespassing and so on fail. The design and implementation details of this new home control and security system which is based on field programmable gate array (FPGA) has been discussed in the subject paper.

The user here can interact directly with the system through a web-based interface over the Internet, while home appliances like air conditioners, lights, door locks and gates are controlled remotely through a user-friendly web page. An additional feature that enhances the security aspect of the system is its capability to monitor entry points such as doors and windows so that in the event of any breach, an alerting email message could be sent to the home owner instantly.

Why do we need a security system?

The security issues have grown so dramatically in recent years that the necessity to remotely control and secure residential and commercial properties assumed significant importance (Alheraish, 2004; Assaf et al., 2012; Kanma et al., 2003; Kim and Kim, 2006; Tsai et al., 2009). There have been many attempts to develop and implement a fully functional and reliable home security system but unfortunately none of those was really able to penetrate the highly competitive market.

The statistical evidence reveals that a home without a security system is three times more likely to be broken into as compared to those which are equipped with a state-of-the art security system (Wong, 1994).

These facts make it obvious that a good home security system will reduce the chances of intrusion and thus, can protect both life and property. Hence, it is necessary to develop and implement a very dependable home security system that can protect the user and properties. Increasing advanced home networking infrastructures are giving rise to a multitude of new applications including home automation and home security (Wong, 1994). According to statistical data of 2007, there were four million household break-ins in the United States, of which 500,000 resulted in bodily injuries and 20,000 resulted in homicides.

The home security is thus becoming increasingly important to homeowners. Many companies are now endeavoring to enter the market by providing technology that furnishes remote home security over a broadband application using Internet. AT&T reports that the U.S. broadband penetration is about 60 percent, while home security penetration is only about 25 percent; these figures suggest a remarkable market opportunity. Research in the area of home automation and security includes but is not limited to the X10/A10 personal computer (PC) interfaces for lighting and appliance control (Wu et al., 2006; Yang et al., 2007), in which the CM11A computer interface is connected to the PC, sending its signals over existing house wiring to control lights and appliances connected to the X10 modules.

The interface even works with the PC being switched off. Once the interface has been programmed, the PC is no longer needed. Two standard AAA batteries maintain the time, schedule events and macros for up to 500 hours even if the power fails. One can even unplug the interface after programming it and plug it in somewhere else in the home. However, this product has been discontinued for reasons not quite clear. Another product is the Motorola home-sight home monitoring and control system which provides everything that is needed to install a system for security and protection.

It is an affordable alternative to expensive custom-installed systems, where one can even monitor activity being away from home. The real-time notifications are received through cell phones or emails when trouble occurs (over broadband connection). The text message alerts and still images are also received on the cell phone. From the home or office, real-time color video clips and still images could be viewed on the PC. The system will also record events while the user is out, so that color video clips with sound or still images could be viewed later.

The system developed by Motorola is different from the home control and monitoring system developed in this paper. Motorola project focused primarily on monitoring (Kim and Kim, 2006) and lacks control aspects of the home. For example, if an incident like someone entering the house during the day and trying to steal certain valuable possessions occurs, the camera captures that person, records it and sends the images to the user and law enforcement authorities. Also, security is not defined because there is a time delay between when the message is sent and when the security people actually arrive.

Loss of lives and injuries could happen during this time interval. If we look at 3 these security systems in real depth, it becomes evident that these are there mainly to curb burglaries and to obtain evidence against trespassers. The home control and monitoring system as developed herein, on the other hand, being very cost-effective, also provides the user with a much greater control. In the following section, we present an overview of the proposed system.

Methodology

RESULTS ON IMPLEMENTATION

Figure 3 is a snapshot of the layout of the house and lights. The house is represented by an image that shows its different areas. The images are partitioned in such a way that clicking on a particular area would activate or deactivate the relevant light. In the above code, the bathroom lights are toggled whenever the image area that represents the bathroom is clicked. This is done using a post from the web page. The post data are interpreted by the http.c file. The board then controls the lights. The other part of the code is the user feedback. This is done by simulating yellow tint over the area of the house that was lit. The on click action is called whenever the image is clicked. This leads to a JavaScript function being activated that changes the opacity of a yellow tint using CSS. The following code snippet shows the JavaScript code being set.

function toggleKitchenLights(){

if(kitchenLgt){

alert(‘Turn off’);

kitchenLgt = false;

document.getElementById(“kitchen”).style.opacity = 1.0;

}

else {

alert(‘Turn on’);

kitchenLgt = true;

document.getElementById(“kitchen”).style.opacity = 0.3;

}

}

It is clear from the code that just the opacity of a layer above the tint (image of the house) is changed. If the light is on, the opacity is off and therefore, the image looks normal. If the lights are turned on, the image becomes transparent and allows a yellow background to become visible.

CONCLUSION:-

In the subject paper, the development details of a home control and security system based on the use of FPGA and Internet web-based technology has been proposed. It is evident from the implementation strategy that the system is 11 quite suitable for real-time home security monitoring; besides being capable of remotely controlling the home appliances and others. The system was designed and implemented on a Nios cyclone II FPGA development board as a custom designed processor. The user interacts with the system to send control commands and receive feedback from different devices and peripherals over the Internet or through SMS messages. The entire design was simulated and tested, a prototype was realized and the working and correctness of the system were duly verified.

Future Work

Although the home automation security  system which we discuss in this report is very effective yet it has two drawbacks one is its complexity  that many peoples which are using it for got it because they couldn’t be able to understand it so manufacturer of this system are working on it to use such technology by which the can make user friendly system which could be easily  be understandable .Secondly the security system which I discuss is best security system  to protect our home from robber ,killer or many disasters of such kinds but bit has draw back that it could be hacked by hacker so by hacking the system  the could easily robbed a house so keeping it in a view the manufacturer are trying to programmed the system in such way so that a hacker cannot be hacked on it so   that in future the introduce such a strong home automation and security system which could not only save the home form simple robber but also by a hacker robber.

Leave a Reply

Your email address will not be published.