Security Systems for Mobile Users

Embed Size (px)

Citation preview

  • 8/13/2019 Security Systems for Mobile Users

    1/3

    SECURITY SYSTEM FOR MOBILE USERS

    EDGAR ALEJANDRO ANDRADE GONZLEZMARIO REYES AYALA

    JOS ALFREDO TIRADO MNDEZElectronic DepartmentMetropolitan Autonomous University-Azcapotzalco

    Ave. St Pablo # 180, Col. Reynosa Tamaulipas, Mxico City, MxicoCINVESTAV-IPN

    [email protected] [email protected]

    Abstract: - This paper shows a control system based in a microcontroller, personal computer and the internet servicefor security purposes. The security system alerts to the user that one strange person is in his confidential place,sending a message to his cellular phone and also it records the situation in video of the strange while he is in thatplace, the last mentioned is done using a moving detector sensor and a PC with a video camera and internet service tosend a e-mail to the user.

    Key-Words: -Internet, security system, infrared sensor, video.

    1 IntroductionThe security for the mankind today is a necessity.

    That is why, the security systems offer to the users

    maintain secure their possessions, belongings, family,money, etc.

    The software and hardware designers determine theoptimal implementation for security purposesaccording to the requirements of the user. The securitysystems through the history have improved theirtechnology for business and home applications. Thegoals for those systems are: the less time response,better efficiency, low cost, high reliability amongothers.

    There are several types of security systems from asimple alarm system (with sound and lights), until

    autonomous security systems, for example: smartbuildings, defense control systems, etc[1].

    Today, almost all the people show a big mobility intheir lives and work, for that reason, the necessity ofmonitoring the events occurred in the safe area inremote and in wireless way, is the main objective forall the security control systems [2][3].

    In this paper, we develop a security system whichcan detect an intrusion of a person using a motionsensor connected to the PC and a RF transmitter,where the RF block enable or disable the securitysystem and the PC runs the programs in order torecord the intruder and sending a message to the usersphone. The security system also sends e-mail or e-

    mails to the owner or several people related with theplace in risk, in this e-mail the program attaches thevideo file. This video is recorded for a tiny wireless

    camera when the alarm system is activated (by thesensor).This control system can be used also for educational

    purposes and it can be improving in their functions,range and performance.

    2 Design of the control systemThe control system consists in five hardware blocks:

    the motion sensor, the microcontroller (MC68HC11),the transmitter and receiver blocks and finally thepersonal computer and the camera. The control systemconsists in hardware and software blocks as we can

    see in the figure 1.

    2.1 Infrared Motion SensorThe infrared passive motion sensor detects the

    presence if someone is within a range of 15 x 12meters in the around the sensor. The sensor used wasthe sensor model IS-150T (branch IntelliSense). Thissensor has an affordable price and RF and white lightimmunity.

    2.2 Microcontroller

    The microcontroller used is the MC68HC11 modelof Motorola. The microcontroller receives the signalfrom the infrared sensor, which indicates that an

    Proceedings of the 9th WSEAS International Conference on APPLIED INFORMATICS AND COMMUNICATIONS (AIC '09)

    ISSN: 1790-5109 31 ISBN: 978-960-474-107-6

  • 8/13/2019 Security Systems for Mobile Users

    2/3

    intruder is in the restricted area. After the signal isreceive, the microcontroller sends a code to thepersonal computer through the serial port to enable thesystem and runs the program within.

    The microcontroller has a subroutine named

    BUFFALO, this command, enables the serial port andsends one code (automatically) to the personalcomputer in fast way, this reducing the code lines forthe microcontroller making it easier. This subroutinedepends of the interrupt input.

    Fig. 1Control system

    2.3 Transmitter and receiver (RF)Those blocks are the transmitter D-22A and the

    receiver D-67 by Linear Co. They are low cost andhigh compatibility blocks. There are 256 codes for itssignal transmission in 303.875 MHz. This transmittersends the signal to the XIRQ input (interrupt pin) ofthe microcontroller activating it.

    2.4 Personal computerThis block has two general functions: the first one is

    start to record in a *.mpeg or *.avi files using thedigital web camera, we made a test with a 10 secondsrecord file. After the video file is finished the programstarts the internet explorer and loads the web pagehttp://www.telcel.com.mx/menes/envio-mensajes.jspin this web page there are two sections: one for thephone number and another for the message.

    The other function is loading the e-mail in order tosend one or several e-mails with the video file attachedfor the users. The e-mail used was Outlook Express,which was configured previously.

    The software application was develop using VisualStudio 6.0.

    2.5 CameraThis block consists in a PCI board with a digital

    video camera device. This camera has a softwarenamed VMAIL.EXE file, this program is activated bythe process of the program in the PC while a eventoccur.

    As first step, the program has to assure that theVMAIL.EXE window is enabled. The validation osthe state of this windows is perform by theFindwindow() command in the visual basic program inthe PC.

    After the window validation is ok, then the programruns the file (VMAIL.EXE) using the CreateProcess()command, and wait for the signal in the serial port ofone event.When the event occurs, then the program realize aclick with the mouse in the REC button of theapplication software with the eventsMouseeventf_leftup() and Mouseeventf_leftdown(),but the program perform the function named Sleep() tostop the program, while the video record is realizedduring n seconds.

    After the record is finished, the e-mail is sent withthe outlook express software application and theMAILVIDEO.EXE is closed. We have to be assure

    that the mail was sent, the program has a delay of fiveminutes in order to send the mail and verify if thewindows is close or no, if not, then it means that anerror occurred, so the Outlook Express window isactive.

    Finally, two different functions can be perform, thefirst one is related with the MAIL_RADIO.EXE file,this program is used to write data in the e-mailwindow using the function system() andMAIL_RADIO.EXE is closed.The other option is to use the web page mentioned

    before, to send a message to a specific user. This

    function only can send one message to one user, andwith the same functions the phone number (ten digits)is write in the text box and also a message (this lastpart is not necessary).

    All the events with the keys, was done performingthe SendKeys() functions; like DOWN,DELETE, TAB, UP, etc.

    3 ConclusionThis security system developed shows a good

    performance, low time response and low cost. Severalfunctions can be added to this system for securitypurposes, but the same principle can be used to

    Proceedings of the 9th WSEAS International Conference on APPLIED INFORMATICS AND COMMUNICATIONS (AIC '09)

    ISSN: 1790-5109 32 ISBN: 978-960-474-107-6

    http://www.telcel.com.mx/menes/envio-mensajes.jsphttp://www.telcel.com.mx/menes/envio-mensajes.jsphttp://www.telcel.com.mx/menes/envio-mensajes.jsp
  • 8/13/2019 Security Systems for Mobile Users

    3/3

    monitoring of process or remote control systems tosupervise process in several environments like inresearch or home applications.

    References:

    [1] Ping L., Hua S. and Chen P.; SoD A NovelArchitecture for Home Network SecurityEnhancement and its Implementation, WSEASTransactions on Systems, Vol. 6, Issue 6, June 2007,pp. 1168-1173.[2] http://www.alarmsystemreviews.com/[3] Fei B., Yuan H. and Jung Ch.; A Practical HomeSecurity via Mobile Phones, WSEAS Transactions onCommunications, Vol. 5, Issue 6, June 2006, pp. 1061-1066.

    Proceedings of the 9th WSEAS International Conference on APPLIED INFORMATICS AND COMMUNICATIONS (AIC '09)

    ISSN: 1790-5109 33 ISBN: 978-960-474-107-6