You are on page 1of 46

I

GSM BASED HOME SECURITY


SYSTEM





DEPARTMENT OF TELECOMMUNICATION ENGINEERING
GOLLIS UNIVERSITY
HARGIESA SOMALILAND
2014


II


GSM BASED HOME SECURITY SYSTEM

Mini project report submitted in partial fulfilment of the requirement for the award of the degree of
bachelor engineering by:

Abdinasir Ahmed Iman ///Roll No:1887
Sabir Abdi Hirsi ///Roll No: 3057
Mohamed Dahir Gammur ///Roll No:2756
Abdihakin I smail Mohamed ///Roll No:1941
Abdiqani I smail Rooble ///Roll No:2721
Abdirahmaan Mohamed J ama ///Roll No:2905






Department of telecommunication engineering
Gollis University
Hargiesa Somaliland
2014


III


GOLLIS UNIVERSITY

Empowers its Students as Professional Leaders Committed to Make a Positive Difference





CERTIFICATE

This is to certify that the project report entitled gsm based on security system being submitted by
Mr. Abdinasir Ahmed Iman, Sabir Abdi Hirsi, Mohamed Dahir Gammur, Abdihakin Ismail
Mohamed, Abdiqani Ismail Rooble, Abdirahmaan Mohamed Jama, in partial fulfilment for the
award of the degree of bachelor of technology in telecommunication to the Gollis university is a
record of benefited work carried out by us under my guidance and supervision.
The results embodied in this project report have not been submitted to any other University or
institute for the award of any degree or diploma.








Dean of department
Mohamed Ali Elmi
Advisor name
Bewnet Getachew
Badda-Cas Area, Jijiga-yar District
Hargeisa, Somaliland
Phone: +252-7- 9720134 Mobile: 9119911 SOMTEL
Email: info@gollisuniversity.com
Website: www.gollisuniversity.com



IV


Acknowledgment

First we would like to express our special thanks of Allah who helps us in every time. Secondly we
would also like to thanks our parents and friends who help us allot finishing this project within the
limited time. We would like to express our special thanks of gratitude to our teacher eng: Bewnet
Getachew as well as our principal eng: Mohamed Ali Elmi Samater who gave us the golden opportunity
to do wonder full project on the topic GSM BASED HOME SECURITY SYSTEM which also helped us
in doing allot of research and came to know about so many new thinks we really thank full to them.
We are making this project not only marks but to also increase our knowledge.

THANK A GAIN TO ALL WHO HELPED US.



















V


Abstract
Security has becoming an important issue everywhere. Home security is becoming necessary nowadays
as the possibilities of intrusion are increasing day by day. Safety from theft, leaking of raw gas and fire
are the most important requirements of home security system for people. A traditional home security
system gives the signals in terms of alarm. However, the GSM (Global System for Mobile
communications) based security systems provides enhanced security as whenever a signal from sensor
occurs, a text message is sent to a desired number to take necessary actions.
This paper suggests two methods for home security system. The first system uses web camera.
Whenever there is a motion in front of the camera, it gives security alert in terms of sound and a mail is
delivered to the owner. The second method sends SMS which uses GSM-GPS Module (sim548c) and
Atmega644p microcontroller, sensors, relays and buzzers.

















VI


Table of contents
Certificate
Acknowledgment

Chapter one
1.1 . Introduction...............................................................................1
1.2 . Background...2
1.3 . Problem statement.....................................................................3
1.4 . Objectives...................................................................................4
1.5 . Assumption................................................................................4
1.6 . Motivation..................................................................................5
1.7 . Limitations of the projects.........................................................5
1.8 . Documentations.........................................................................5
Chapter two
2.1 . Introduction..........6
2.2 . OVERVIEW OF GSM.......11
2.3 . Structure of home security system.....16
2.4 . System Structure And Working Principle17
Chapter three
3.1 . Introduction....20
3.2 . GSM networks........21
3.2.1. Chosen of GSM Module...22
3.2.2. Design of System Software....22
3.3 . Wireless Sensor Network...24
3.3.1. Structure of a wireless sensor network......24
3.3.2 MESH NETWORK......24
3.3.3 HYBRID STAR-MESH NETWORK.........25
3.3.4 Design issues of a wireless sensor network.........25
3.3.5 Structure of a wireless sensor node.......27
3.3.6 Security issues in wireless sensor network....28
3.3.7 Wireless Sensor Network Node Module....29


VII


Chapter four
Testing and working gsm based on home security system
4.1. Introduction...................................................................................31
4.2. Features..........................................................................................33
4.3 . Applications...................................................................................34
4.4 . Advantages.....................................................................................35
4.5. Future Development......................................................................35
Chapter five
Conclusion.............................................................................................36
References..............................................................................................38


1
Chapter One
1.1 Introduction
Security has been an important issue in the smart home applications. Conventional security systems
keep homeowners, and their property, safe from thieves. A smart home security system, however,
offers many more benefits. A smart home or building is a home or building, usually a new one that is
equipped with special structured wiring to enable occupants to remotely control or program an array
of automated home electronic devices by entering single command.
GSM based home security system adopts voice dais of GSM network to send control command and
receive alarm distantly. When a signal to system right away .the system then sends alarm to its preset
mobile numbers and temporary dials the per set telephone /mobile phone numbers spontaneously.
It will send alarm short message to the users through the GSM module and GSM network
immediately. Automated security systems play an important role of providing an extra layer of
security through user authentication to prevent break-ins at entry points and also to track illegal
intrusions o r unsolicited activities within the vicinity of the home (indoors and outdoors).
Remotely the system allows the user to effectively monitor and control the house/office appliances
and equipments via the mobile phone set by sending commands in the form of SMS messages and
receiving the appliances status. The main concept behind the project is receiving the sent SMS and
processing it further as required to perform several operations. The type of the operation to be
performed depends on the nature of the SMS sent. The principle in which the project is based is
fairly simple. First, the sent SMS is stored and polled from the receiver mobile station and then the
required control signal is generated and sent to the intermediate hardware that we have designed
according to the command received in form of the sent message. We have selected a particular
Nokia mobile set (Nokia 3310) for our project. The messages are sent from the mobile set that
contain commands in written form which are then processed accordingly to perform the required
task. A microcontroller based system has been proposed for our project. There are several
terminologies that are used extensively throughout this project report. GSM (Global System for
Mobile Communications): It is a cellular communication standard. SMS (Short Message Service): It
is a service available on most digital mobile phones that permit the sending of short messages (also
known as text messaging service).





2
1.1.1 Background
The new age of technology has redefined communication. Most people nowadays have access to
mobile phones and thus the world indeed has become a global village. At any given moment, any
particular individual can be contacted with the mobile phone. But the application of mobile phone
cannot just be restricted to sending SMS or starting conversations. New innovations and ideas can be
generated from it that can further enhance its capabilities. Technologies such as Infra-red, Bluetooth,
etc which has developed in recent years goes to show the very fact that improvements are in fact
possible and these improvements have eased our life and the way we live. Remote management of
several home and office appliances is a subject of growing interest and in recent years we have seen
many systems providing such controls.
These days, apart from supporting voice calls a mobile phone can be used to send text messages as
well as multimedia messages (that may contain pictures, graphics, animations, etc). Sending written
text messages is very popular among mobile phone users. Instant messaging, as it is also known,
allows quick transmission of short messages that allow an individual to share ideas, opinions and
other relevant information. We have used the very concept to design a system that acts a platform to
receive messages which in fact are commands sent to control different appliances and devices
connected to the platform. We have designed a control system which is based on the GSM
technology that effectively allows control from a remote area to the desired location. The application
of our suggested system is immense in the ever changing technological world. It allows a greater
degree of freedom to an individual whether it is controlling the household appliances or office
equipments. The need to be physically present in order to control appliances of a certain location is
eliminated with the use of our system.










3
1.2 Problem Statement
Technology has advanced so much in the last decade or two that it has made life more efficient and
comfortable. The comfort of being able to take control of devices from one particular location has
become imperative as it saves a lot of time and effort. Therefore there arises a need to do so in a
systematic manner which we have tried to implement with our system. The system we have
proposed is an extended approach to automating a control system.
With the advancement and breakthroughs in technology over the years, the lives of people have
become more complicated and thus they have become busier than before.
With the adoption of our system, we can gain control over certain things that required constant
attention. The application of our system comes in handy when people who forget to do simple things
such as turn ON or OFF devices at their home or in their office, they can now do so without their
presence by the transmission of a simple text message from their mobile phone. This development,
we believe, will ultimately save a lot of time especially when people dont have to come back for
simple things such as to turn ON/OFF switches at their home or at their office once they set out for
their respective work.
The objective of this project is to develop a device that allows for a user to remotely control and
monitor multiple home/office appliances using a cellular phone. This system will be a powerful and
flexible tool that will offer this service at any time, and from anywhere with the constraints of the
technologies being applied. Possible target appliances include (but are not limited to) climate control
system, security systems, lights; anything with an electrical interface.
The proposed approach for designing this system is to implement a microcontroller-based control
module that receives its instructions and command from a cellular phone over the GSM network.
The microcontroller then will carry out the issued commands and then communicate the status of a
given appliance or device back to the cellular phone.









4
1.3 Objectives
Main objectives of this project are to design study and impalement wireless network sensor network
gsm based on home security system.
The main aim and objective of the system is to develop an interface between the GSM and electrical
appliances for the users, used the mobile phone and to access the home appliances or other electrical
devices remotely. The objective is to develop a system that allows for a user to remotely control and
monitor multiple home appliances or electrical devices using a cellular phone or protocols.
This system will be a powerful and flexible tool that will offer this service at any time, and from
anywhere with the constraints of the technologies being applied. Possible target appliances include,
security systems,; anything with an electrical interface. The proposed approach for designing this
system is to implement a microcontroller-based control module that receives its instructions and
commands from a cellular phone over the GSM network. The microcontroller then will carry out the
issued commands and then communicate the status of a given appliance or device back to the
cellular phone. The project GSM based Control System at the title suggests is aimed to construct a
control system that enables the complete control of the interface on which it is based. General
objectives of the project are defined as;
a. To co-ordinate appliances and other devices through Short Message Service (SMS).
b. To effectively receive and transmit data via SMS
c. To eliminate the need of being physically present in any location for tasks involving the operation
of appliances within a household/office.
d. Minimize power and time wastage
1.4 Assumptions
Certain assumptions have to be made in order to implement our project. The list of assumptions for
our project is;
a. The user and control unit will establish communication via GSM
b. The cell phone and service provider chosen will support text messaging service.
c. The user is familiar with the text messaging program on their cell phone.
d. All service charges (standard messaging rates) from the service provider apply.
e. The controlled appliances can and will have to have an electrical interface in order to be controlled
by the microcontroller.




5
1.5 Motivation
This project is very interesting project allowed you to design and also understanding very
Smart equipment is used to detect by using infrared.
Side encouragement in the process to do it when we looked at the part taken many problems facing
society, which for being a thief.
This loss severely is too much living in the country and lost belongings, for example in the fall of the
homes, cars, businesses, and commercial areas of the country. To control and monitor specified
security gates, and other wired peripherals.
This system plays an important role of providing an extra layer of security through user
authentication to prevent break-ins at entry points and also to track illegal disturbance or unsolicited
activities within the surrounding area of the home.
1.6 Limitations of the projects
Lack of material which is used to design and implement this project
There are many barriers such as we have not enough experience about this project7
We are more confused to other courses so we have not enough time
Group in collaboration with many challenges faced by the reason are some of our group
Are workers and difficult to make discussions.
1.7 Documentations
This project studies about five chapters to make more explanation implementing and testing this
sensor connected to wireless network gsm based on home security system, the first chapter we will
discuss or to mention the important and also the purpose to design this project to give us benefits
and the main objectives of this smart system is used to secure your home when you go vacations
and to motivate to use this very important furthermore the end of this chapter there are list of
limitations and barriers of this system.
On other hand in chapter two gives us details and over view about Telephony system such as gsm
and also more details about wireless sensor network, and interconnection between them.
The third chapter gives us more explanation and it is main point of our project, this part mention
about components are used our project and how to design.
Chapter fourth about testing and experimenting our project to know whether this project is
successive or fail and last chapter will be conclusion of our project.



6
CHAPTER TWO
Wireless Sensor Networks (WSN)
2.1 INTRODUCTION
A wireless sensor network is a collection of nodes organized into a cooperative network. Each node
consists of processing capability (one or more microcontrollers, CPUs or DSP chips), may contain
multiple types of memory (program, data and flash memories), have a RF transceiver (usually with a
single Omni-directional antenna), have a power source (e.g., batteries and solar cells), and
accommodate various sensors and actuators. The nodes communicate wirelessly and often self-
organize after being deployed in an ad hoc fashion. Systems of 1000s or even 10,000 nodes are
anticipated. Such systems can revolutionize the way we live and work. Currently, wireless sensor
networks are beginning to be deployed at an accelerated pace. It is not unreasonable to expect that
in 10-15 years that the world will be covered with wireless sensor networks with access to them via
the Internet. This can be considered as the Internet becoming a physical network. This new
technology is exciting with unlimited potential for numerous application areas including
environmental, medical, military, transportation, entertainment, crisis management, homeland
defense, and smart spaces.
A medium access control (MAC)
Since a wireless sensor network is a distributed real-time system a natural question is how many
solutions from distributed and real-time systems can be used in these new systems?
Unfortunately, very little prior work can be applied and new solutions are necessary in all areas of the
system. The main reason is that the set of assumptions underlying previous work has changed
dramatically. Most past distributed systems research has assumed that the systems are wired, have
unlimited power, are not real-time, have user interfaces such as screens and mice, have a fixed set of
resources, treat each node in the system as very important and are location independent. In contrast,
for wireless sensor networks, the systems are wireless, have scarce power, are real-time, utilize
sensors and actuators as interfaces, have dynamically changing sets of resources, aggregate behavior
is important and location is critical. Many wireless sensor networks also utilize minimal capacity
devices which places a further strain on the ability to use past solutions. This Chapter presents an
overview of some of the key areas and research in wireless sensor networks. In presenting this work,
we use examples of recent work to portray the state of art and show how these solutions differ from
solutions found in other distributed systems. In particular, we discuss the MAC layer (section 2),


7
routing (section 3). We also present a brief discussion of two current systems (section 7) in order to
convey overall capabilities of this technology.
We conclude in section 8. A medium access control (MAC) protocol coordinates actions over a
shared channel. The most commonly used solutions are contention-based. One general contention-
based strategy is for a node which has a message to transmit to test the channel to see if it is busy, if
not busy then it transmits, else if busy it waits and tries again later. After colliding, nodes wait
random amounts of time trying to avoid re-colliding. If two or more nodes transmit at the same time
there is a collision and all the nodes colliding try again later. Many wireless MAC protocols also have
a dozen modes where nodes not involved with sending or receiving a packet in a given timeframe go
into sleep mode to save energy. Many variations exist on this basic scheme. In general, most MAC
protocols optimize for the general case and for arbitrary communication patterns and workloads.
However, a wireless sensor network has more focused requirements that include a local uni- or broad-
cast, traffic is generally from nodes to one or a few sinks (most traffic is then in one direction), have
periodic or rare communication and must consider energy consumption as a major factor. An
effective MAC protocol for wireless sensor networks must consume little power, avoid collisions, be
implemented with a small code size and memory requirements, be efficient for a single application,
and be tolerant to changing radio frequency and networking conditions.
One example of a good MAC protocol for wireless sensor networks is B-MAC. B-MAC is highly
configurable and can be implemented with a small code and memory size. It has an interface that
allows choosing various functionality and only that functionality as needed by a particular
application.
B-MAC consists of four main parts: clear channel assessment (CCA), packet back off, link layer asks,
and low power listening. For CCA, B-MAC uses a weighted moving average of samples when the
channel is idle in order to assess the background noise and better be able to detect valid packets and
collisions.
The Base Station has four open-collector transistor outputs and a 4-20mA current-loop driver output,
corresponding to the inputs on the sensor node. The transistor outputs can either reflect the state of
the switch inputs or they can be configured to turn on and off at analog input set points.
For greater range or where the link quality is not sufficient, up to four Deeter Wireless Routers can be
added to the system.
The Deeter Wireless Sensor System is an ANY Sensor System, making it suitable for use with the
following types of sensor:
Humidity / Temperature Controllers & Control Systems


8
Thermal regulation
Barometric pressure
Humidity and temperature measurement
Proximity sensors
Flow sensors
Vibration sensors
It has come to be generally believed by academia and industry alike that the sensor network will have
a key role to extend the reach ability of the next generation Internet. A key characteristic of this
network is that there is no single node in the network that is powerful enough to perform the assigned
tasks. An application should be served via the cooperation of several nodes or even the entire
network. The network serves as an information base, and is data driven, as opposed to a provider for
the point-to-point connection. The main challenge of this network is huge information organization,
including information storage, searching and retrieval, especially in a continuous way. There are
many specific and interrelated problems. We list a few examples. First, data accuracy: the correctness
of the sensor network to represent the properties of the sensor field. Second, data search and retrieval
delay; while low delay is always preferred, various applications have different delay constraints.
Third, overhead; low transmission overhead is often the main consideration in system design, as it is
directly related to the usage of energy, the most severely limited resource for sensors. In this thesis,
we first discuss load balanced sensor coverage, which provides a lower layer support for long run
sensor data collection. We then concentrate on how to balance the parameters in data collection of the
sensor networks, so that the user queries and applications can be satisfied with reasonable delay and
low overhead. Based on different application specifics, we try to use a smaller number of sensors, less
number of transmissions by exploring historical and topological information, coding techniques and
data distribution information. Our analysis and experimental results show that our architecture and
algorithms provide both theoretical and practical insights for sensor network design and deployment.
Routing
Multichip routing is a critical service required for WSN. Because of this, there has been a large
amount of work on this topic. Internet and MANET routing techniques do not perform well in WSN.
Internet routing assumes highly reliable wired connections so packet errors are rare; this is not true in
WSN. Many MANET routing solutions depend on symmetric links (i.e., if node A can reliably reach
node B, then B can reach A) between neighbors; this is too often not true for WSN. These differences
have necessitated the invention and deployment of new solutions.


9
For WSN, which are often deployed in an ad hoc fashion, routing typically begins with neighbor
discovery. Nodes send rounds of messages (packets) and build local neighbor tables. These tables
include the minimum information of each neighbors ID and location. This means that nodes must
know their geographic location prior to neighbor discovery. Other typical information in these tables
includes nodes remaining energy, delay via that node, and an estimate of link quality.
Once the tables exist, in most WSN routing algorithms messages are directed from a source location
to a destination address based on geographic coordinates, not IDs. A typical routing algorithm that
works like this is Geographic Forwarding (GF).
In GF, a node is aware of its location, and a message that it is routing contains the destination
address. This node can then computes which neighbor node makes the most progress towards the
destination by using the distance formula from geometry. It then forwards the message to this next
hop. In variants of GF, a node could also take into account delays, reliability of the link and
remaining energy.
Another important routing paradigm for WSN is directed diffusion. This solution integrates routing,
queries and data aggregation. Here a query is disseminated indicating an interest in data from remote
nodes. A node with the appropriate requested data responds with an attribute-value pair. This
attribute-value pair is drawn towards the requestor based on gradients, which are set up and updated
during query dissemination and response. Along the path from the source to the destination, data can
be aggregated to reduce communication costs. Data may also travel over multiple paths increasing the
robustness of routing.
Beyond the basics of WSN routing just presented, there are many additional key issues including:
i. Reliability,
ii. Integrating with wake/sleep
schedules,
iii. Unicast, multicast and anycast
semantics,
iv. Real-time,
v. Mobility,
vi. Voids,
vii. Security, and
viii. Congestion.
o Reliability: Since messages travel multiple hops it is important to have a high reliability on each link,
otherwise the probability of a message transiting the entire network would be unacceptably low.
Significant work is being done to identify reliable links using metrics such as received signal strength,
link quality index which is based on errors, and packet delivery ratio. Significant empirical evidence
indicates that packet delivery ratio is the best metric, but it can be expensive to collect.


10


o Integration with wake/sleep schedules: To save power many WSN place nodes into sleep states.
Obviously, a wake node should not choose an asleep node as the next hop (unless it first awakens that
node).
o Unicast, multicast and anycast semantics: As mentioned above, in most cases a WSN routes
messages to a geographic destination.
o What happens when it arrives at this destination? There are several possibilities.
First, the message may also include an ID with a specific unicast node in this area as the target, or
the semantics may be that a single node closest to the geographic destination is to be the unicast
node.
Second, the semantics could be that all nodes within some area around the destination address
should receive the message. This is an area multicast.
Third, it may only be necessary for any node, called anycast, in the destination area to receive the
message. The SPEED protocol supports these 3 types of semantics. There is also often a need to
flood (multicast) to the entire network. Many routing schemes exist for supporting efficient flooding.
o Real-Time: For some applications, messages must arrive at a destination by a deadline. Due to the
high degree of uncertainty in WSN it is difficult to develop routing algorithms with any guarantees.
Protocols such as SPEED and RAP use a notion of velocity to prioritize packet transmissions.
Velocity is a nice metric that combines the deadline and distance that a message must travel.
o Mobility: Routing is complicated if either the message source or destination or both are moving.
Solutions include continuously updating local neighbor tables or identifying proxy nodes which are
responsible for keeping track of where nodes are. Proxy nodes for a given node may also change as a
node moves further and further away from its original location.
o Voids: Since WSN nodes have a limited transmission range, it is possible that for some node in the
routing path there are no forwarding nodes in the direction a message is supposed to travel. Protocols
like GPSR solve this problem by choosing some other node not in the correct direction in an effort
to find a path around the void.
o Security: If adversaries exist, they can perpetrate a wide variety of attacks on the routing algorithm
including selective forwarding, black hole, Sybil, replays, wormhole and denial of service attacks.
Unfortunately, almost all WSN routing algorithms have ignored security and are vulnerable to these
attacks. Protocols such as SPINS have begun to address secure routing issues.
o Congestion: Today, many WSN have periodic or infrequent traffic. Congestion does not seem to be
a big problem for such networks. However, congestion is a problem for more demanding WSN and
is expected to be a more prominent issue with larger systems that might process audio, video and


11


have multiple base stations (creating more cross traffic). Even in systems with a single base station,
congestion near the base station is a serious problem since traffic converges at the base station.
Solutions use backpressure, reducing source node transmission rates, throwing out less important
messages, and using scheduling to avoid as many collisions as possible which only exacerbate the
congestion problem.
2.2 OVERVIEW OF GSM
INTRODUCTION
The GSM technical specifications define the different entities that form the GSM network by
defining their functions and interface requirements.
The GSM network can be divided into four main parts:
The Mobile Station (MS).
The Base Station Subsystem (BSS).
The Network and Switching Subsystem (NSS).
The Operation and Support Subsystem (OSS).
The architecture of the GSM network is presented in figure 1.

Figure 2.1
Mobile Station
A Mobile Station consists of two main elements:
The Subscriber Identity Module (SIM): It is protected by a four-digit Personal Identification Number
(PIN). In order to identify the subscriber to the system, the SIM card contains amongst others a
unique International Mobile Subscriber Identity (IMSI). User mobility is provided through maping
the subscriber to the SIM card rather than the terminal as we done in past cellular systems.
Mobile equipment/terminal (ME): There are different types of terminals (MN) distinguished
principally by their power and application:
o Fixed' terminals mainly installed in cars. Their maximum allowed output power is 20W
o Portable terminals can also be installed in vehicles. Their maximum allowed output power is 8W.


12


o Handheld terminals; their popularity is owed to their weight and volume, which is continuously
decreasing. According to some specification these terminals may emit up to 0.8W. However, as
technology has evolved their maximum allowed power ouput is limited to 0.1W.
Base Station Subsystem (BSS):
The BSS provides the interface between the ME and the NSS. It is in charge of the transmission and
reception. It may be divided into two parts:

Figure2.2
Base Station Controller (BSC): It controls a group of BTSs and manages their radio resources. A
BSC is principally in charge of handoffs, frequency hopping, exchange functions and power
control over each managed BTSs.
Base Transceiver Station (BTS) or Base Station: it maps to transceivers and antennas used in each
cell of the network. It is usually placed in the center of a cell. Its transmitting power defines the size
of a cell. Each BTS has between 1-16 transceivers depending on the density of users in the cell.
Network and Switching Subsystem (NSS).
Its main role is to manage the communications between the mobile users and other users, such as
mobile users, ISDN users, fixed telephony users, etc.
It also includes data bases needed in order to store information about the subscribers and to manage
their mobility. The different components of the NSS are described below.

Figure2.3


13


MSC: the central component of the NSS. The MSC performs the switching functions of the network.
It also provides connection to other networks.
GMSC: A gateway that interconnects two networks: the cellular network and the PSTN. It is in
charge of routing calls from the fixed network towards a GSM user. The GMSC is often
implemented in the same machines as the MSC.
HLR: The HLR stores information of the subscribers belonging to the coverage area of a MSC; it
also stores the current location of these subscribers and the services to which they have access. The
location of the subscriber maps to the SS7 address of the Visitor Location Register (VLR) associated
to the MN.
VLR: contains information from a subscriber's HLR necessary to provide the subscribed services to
visiting users. When a subscriber enters the covering area of a new MSC, the VLR associated to this
MSC will request information about the new subscriber to its corresponding HLR. The VLR will
then have enough data to assure the subscribed services without needing to ask the HLR each time a
communication is established. The VLR is always implemented together with a MSC; thus, the area
under control of the MSC is also the area under control of the VLR.
Authentication Center (AuC): It serves security purposes; it provides the parameters needed for
authentication and encryption functions. These parameters allow verification of the subscriber's
identity.
Equipment Identity Register (EIR): EIR stores security-sensitive information about the mobile
equipments. It maintains a list of all valid terminals as identified by their International Mobile
Equipment Identity (IMEI). The EIR allows them to forbid calls from stolen or unauthorized
terminals (e.g., a terminal which does not respect the specifications concerning the output RF
power).
GSM Interworking Unit (GIWU): The GIWU provides an interface to various networks for data
communications. During these communications, the transmission of speech and data can be
alternated.
Operation and Support Subsystem (OSS)
It is connected to components of the NSS and the BSC, in order to control and monitor the GSM
system. It is also in charge of controlling the traffic load of the BSS. It must be noted that as the
number of BS increases with the scaling of the subscriber population some of the maintenance tasks
are transferred to the BTS, allowing savings in the cost of ownership of the system.




14


Geographical areas
A cell, as identified by its Cell Global Identity (CGI) number, maps to the radio coverage of a BTS.
Similarly an LA as identified by its Location Area Identity (LAI) number is a cluster of cells served
by a single MSC/VLR. A group of LA under the control of the same MSC/VLR defines
the MSC/VLR area. A Public Land Mobile Network (PLMN) is the area served by one network
operator.
Network operations
In this paragraph, the description of the GSM network is focused on the different functions to fulfill
by the network and not on its physical components. In GSM, five main functions can be defined:
Transmission: of data and signaling. Not all the components of the GSM network are strongly
related with both types of types of Tx. While the MSC, BTS and BSC, among others, are involved
with data and signaling, components such as HLR, VLR or EIR registers, are only concerned with
signaling.
Radio Resources Management (RRM).
Mobility Management (MM).
Communication Management (CM).
Operation, Administration and Maintenance (OAM).
Radio Resources Management (RRM)
The role of the RR function is to establish, maintain and release communication links between
mobile stations and the MSC. The elements that are mainly concerned with the RR function are the
MN and the BTS. However, since the RR component performs connection management
also during cell handoffs, it also affects the MSC which is the handoff management component.
The RR is also responsible for the management of frequency resources as well as varying radio
interface conditions. Main component operations are:
Channel assignment, change and release.
Handoff
Frequency hopping.
Power-level control.
Discontinuous transmission and reception.
Timing advance.
Handoff
The user movements may result a change in the channel/cell, when the quality of the communication
is degrading; this is known as handoff. Handoffs occur between:


15


between channels within a cell
between cells controlled by the same BSC
between cells under the same MSC but controlled by different BSCs
between cells controlled by different MSCs
Handoffs are mainly controlled by the MSC. However to avoid unnecessary signaling, the first
two types of handoffs are managed by the respective BSC (thus, the MSC is only notified of the
handoff).
To perform the handoff the mobile station controls continuously its own signal strength and the
signal strength of the neighboring cells. The list of cells that must be monitored by the mobile station
is given by the base station. Power measurements allow deciding which the best cell is in order to
maintain the quality of the communication link. Two basic algorithms are used for handoffs:
The `minimum acceptable performance' algorithm. When the quality of the transmission degrades,
the power level of the mobile is increased, until the increase of the power level has no effect on the
quality of the signal. Upon this link layer hint, a handoff is initiated.
The power budget algorithm, Here the handoff pre-empts the power increase, to obtain a good SIR.
Mobility Management (MM)
The MM component handles:
Location Management: Location is managed through periodically or on-demand. At power-on time,
the MH signals an IMSI attach. On-demand location updates are signaled when the MN moves to a
different PLMN or new location area (LA). The signal is sent to the new MSC/VLR, which forwards
it to the subscriber's HLR. Upon authorization in the new MSC/VLR, the subscriber's
HLR removes the registration entry of the MN at the old MSC/VLR. If after the update time interval,
the MN has not registered, it is then deregistered. On power-off, the MN performs an IMSI detach.
Security and authentication: Authentication involves the SIM card and the Authentication Center. A
secret key, stored in the SIM card and the AuC together with a ciphering algorithm called A3, are
used to authenticate the user. The MN and the AuC compute a SRES through A3 using the secret
key and a nonce generated by the AuC. If the two computed SRES are the same, the subscriber is
authenticated. The different services to which the subscriber has access are also checked. Next the
security check is performed in the equipment identity (IMEI). If the IMEI number of the mobile is
authorized in the EIR, the mobile station is allowed to connect the network. To assure user
confidentiality, the user is registered with a Temporary Mobile Subscriber Identity (TMSI) after
its first location update procedure. Enciphering is another option to guarantee Avery strong security.
Communication Management (CM)


16


The CM component manages:
Call control (CC): it controls call setup, management and tear-down in relation to management of
type of service. Call routing is the primary task for this component. To reach a mobile subscriber, a
user dials the Mobile Subscriber ISDN (MSISDN) number which includes:
o a country code
o a national destination code; this identifies the subscriber's operator
o a code mapping to the subscriber's HLR.
o The call is then passed to the GMSC (if the call is originated from a fixed network) that 'knows' the
HLR corresponding to the particular MSISDN number. The GMSC signals the HLR for call routing
information. The HLR requests this information from the subscriber's current VLR. This
VLR allocates temporarily a Mobile Station Roaming Number (MSRN) for the call. The MSRN
number is the information returned by the HLR to the GMSC. It is latter that routes the call through
the MSRN number, to the subscriber's current MSC/VLR. In the subscriber's current LA, the mobile
is paged.
Supplementary Services management: This involves the MN and the HLR.
SMS management: Here the GSM network contacts the Short Message Service Center through the
two following interfaces:
o SMS-GMSC for Mobile Terminating Short Messages (SMS-MT/PP). It has the same role as the
GMSC.
o SMS-IWMSC for Mobile Originating Short Messages (SMS-MO/PP).
Operation, Administration and Maintenance (OAM)
The OAM component allows the operator to monitor and control the system as well
as modify the configuration of the elements of the system. Not only the OSS is part of the OAM, but
also the BSS and NSS participate in functions such as:
Provide the operator with all the information it needs. This information is forwarded to the OSS to
control the network.
Perform self-test tasks in addition to the OAM functions.
Control of multiple BTSs by the BSS.
2.3 Structure of home security system
Sensors are generally divided into two main groups: sensors intended to protect the home perimeter
and sensors to protect the interior of the home. The first line of defense of an alarm system is the
sensors guarding the perimeter. These sensors identify the burglar when he first enters the house -
through the window or door. The most common sensors of this group are Magnetic Sensors. These


17


sensors are composed of two parts, one of which is installed on the frame head of the window or
door and the other on the window or door itself.

Figure2.4
Skylink WD-318T Wireless Magnetic Sensor
When the window or door is closed, the two pieces are adjacent to one another. In the event the
window or door has been opened, the magnetic sensors are separated and the alarm is triggered. A
flaw of this system is seen, for example, when a burglar breaks the window and therefore does not
alert the magnetic sensors.
A solution to this problem is found in special windows containing foil wires. When such a window is
broken, the wires are severed, triggering the alarm. But what if a burglar manages to bypass even
this security measure? This is what pressure mats are intended for; sensors installed under the carpet
at strategic points - near windows and doors or other areas likely to have a burglar walk through
them. The sensors are activated when pressure- such as a foot step- is applied to them.
The second lines of defense of the alarm system are the sensors guarding the interior of the home.
Unlike the perimeter sensors, the internal sensors are not programmed to identify a certain action by
a burglar (opening of a window or door), since the burglar's actions inside the home are
unpredictable. Therefore, these sensors are programmed to identify movement in general, an action
that any burglar must do while in the house. There is a wide range of motion detectors which work in
different methods. Each one is suited to a different area of the home and to different environments:
2.4 SYSTEM STRUCTURE AND WORKING PRINCIPLE
The system structure is illustrated in Fig.2.5. It is composed of the MCU-based home wireless
control center, one WSN center node module, and several data collecting nodes, GSM module, GSM
network and mobile phone. The WSN data collecting node modules are connected with pyroelectric
infrared detector, temperature sensor, smoke detector and gas sensor separately. When the
pyroelectric infrared detector finds that some people intrudes into the house abnormally; or when the
temperature sensor detects too high indoor temperature and at the same time, the smoke sensor


18


detects overproof smoke concentration; or when the gas sensor detects overproof combustible gas
concentration, the sensors will send encoded alarm signal to the home control center through the
wireless sensor network established in home. Once the wireless controlcenter receives alarm signal,
it will send alarm short message to the users through the GSM module and GSM network
immediately.

Figure2.5. System structural diagram
The wireless sensor network in home of this system is composed of one center node module and
several data collecting node modules, operating in point-to-multipoint communication mode. In
different application, the formation of a WSN node is not always the same. In general, a WSN node
includes four parts: data collecting unit, data processing unit, wireless communication unit and
power management unit, as illustrated in

Figure2. Composing block diagram of WSN node


19


The data collecting unit is composed of the sensors and A/D conversion module. In this remote
wireless home security system, some pyroelectric infrared detectors, temperature sensors, smoke
detectors and gas sensors are used. The data processing unit is responsible to save and deal with the
data collected by the sensors and received from other nodes. In this system, the C8051F310 MCU
from Cygnal Corporation is chosen as the data processing unit. The wireless communication unit is
often composed of the low power consumption, short distance radio frequency (RF) transceiver. In
this system, the wireless dual-way chip CC1100 dedicated in wireless and low power consumption
application is chosen to implement wireless communication. C8051F310 MCU can control the main
working parameter of CC1100 and communicate with CC1100 through SPI interface. The SPI
standard interface include main output slave input (MOSI), main input slave output (MISO) and
serial clock (CLK). The master CLK is synchronized with the slave CLK.CC1100 can set the
working mode, read and write cache data and status register through SPI bus. The RF chip is
connected with MCU through SPI interface to make a wireless communication
system that can control receiving and sending function freely. The hardware connection between
C8051F310 with CC1100 is showed in Fig. 3 [3]. The SPI interface of CC1100 is to be connected to
the hardware SPI interface of CPU. In general,GDO0 or GDO2 pin of CC1100 can be connected to
any pin of CPU. But if an interrupt service program is to be used to implement the function of data
receiving and transmitting or wireless wakeup, GDO0 or GDO2 pin of CC1100 must be connected
to the out interrupt pin of CPU .Use CR2032 button cell to provide power for the WSN node. It can
provide approximately 200mAh power when the voltage is higher than 2.8v. The data collecting
nodes of this system are composed of these four units described before. The center node is a little












20


Chapter three
Designing and implementation of home
Security system
3.1 INTRODUCTION
Safety is the most important requirement of home for people. With the development of IT
technology, network and automatic control technology, a remote home security monitoring and
alarming system becomes more and more practicable today. By combining wireless sensor network
(WSN) and GSM technology, this paper designs a low-power consumption remote home security
monitoring and alarming system that can detect the theft, leaking of raw gas and fire, and send alarm
message to the house owners mobile phone.
Wireless sensor network is composed of a large amount of miniature self-organizing wireless sensor
nodes.
By combining three kinds of technology such as sensor, micromechatronics and wireless
communication, WSN can detect, collect and deal with the object information in its covering area,
and send data to the observer. In a word, WSN technology has the advantages of wide covering area,
able to remote monitoring, high monitoring precision, fast network establishment and reasonable
cost GSM network has the advantages of mature technology, wide covering area, long
communication distance, and sound communication effect and so on. The remote home security
system presented in this paper combines so many advantages of WSN and GSM.
Firstly, wherever the users are, once some dangerous instance happens in home, such as thief
intruding, this system can send alarm short message to the users through GSM network immediately,
informing people the possible dangerous circumstances in home. Secondly, the wireless sensor
network established in home has the features of ease establishment, without use of cable, and low-
power consumption.

Figure3.1 Hardware components of home security system


21


3.3 GSM networks
Global system for mobile communication (GSM) is a globally accepted standard for digital
cellular communication. GSM is the name of a standardization group established in 1982 to create a
common European mobile telephone standard that would formulate specifications for a pan-
European mobile cellular radio system operating at 900 MHz It is estimated that many countries
outside of Europe will join the GSM partnership.
Cellular is one of the fastest growing and most demanding telecommunications applications.
Throughout the evolution of cellular telecommunications, various systems have been developed
without the benefit of standardized specifications. This presented many problems directly related to
compatibility, especially with the development of digital radio technology. The GSM standard is
intended to address these problems.
From 1982 to 1985 discussions were held to decide b/w building an analog or digital system. After
multiple field tests, a digital system was adopted for GSM. The next task was to decide between a
narrow or broad-band solution. In May 1987, the narrowband time division multiple access (TDMA)
solution was chosen.
GSM provides recommendations, not requirements. The GSM specifications define the functions
and interface requirements in detail but do not address the hardware. The reason for this is to limit
the designers as little as possible but still to make it possible for the operators to buy equipment from
different suppliers. The GSM network is divided into three major systems: the switching system
(SS), the base station system (BSS), and the operation and support system (OSS).

Figure3.2 GSM Architecture



22


3.2.1 Chosen of GSM Module
As the third generation GSM dual frequency module, TC35 GSM module has the following
features: compact and low power consumption; support dual frequency of GSM900 and
GSM1800; provide standard AT command interface to users; provide fast, reliable and safe
transmission of data, voice, short message and fax. It is ideal for this system because of its high
quality short message function.

Figure3.2.1 GSM BASED HOME SECURITY SYSTEM
3.2.2 DESIGN OF SYSTEM SOFTWARE
The system software, which is developed with C51 programming language, has two main modules,
one for the WSN node communication, and one for the GSM communication.
Software Module for WSN Node Communication
In the indoor wireless sensor network, the communication protocol is divided into three layers.
The first layer is physical layer whose function has been implemented by CC1100 hardware itself.
The second layer is network layer which applies TEEN (threshold sensitive energy efficient sensor
network) protocol.
The data will be transmitted through the WSN only when the observed value changes suddenly.
The third layer is application layer in this layer, the systems application software is divided into
two modules, WSN data collecting node software module and WSN center node software module.
The former, running on the slave MCU of data collecting nodes, is responsible for collecting sensor
data and wireless transmitting them. The latter, running on the master MCU of WSN center node, is
responsible for wireless receiving data and judging whether its need to start the alarming process
or not. If yes, it will drive TC35 GSM module to send alarm short message to users mobile phone.


23


The software flow of center node module is illustrated in Fig. 4. And the software flow of data
collecting node module is illustrated in Fig. 5.
536 serial ports Some GSM AT commands relevant to short message are listed in table 1. The
sending mode of short message depends on the interface supported by the short message service
center in the GSM network.
European Telecommunications Standards Institute (ETSI) has defined three kinds of interface
protocol for sending short message:
Block mode, Text mode and PDU mode. Block mode requires the mobile phone manufacture to
provide driving support. Text mode doesnt support Chinese text. So at present, PDU mode has
become the core of most mobile phone for their short message communication. It can provide more
powerful functions than the other modes. So, this system applies PDU mode to send alarming short
message.
TABLE I. SOME AT COMMANDS RELEVANT TO SHORT MESSAGE
AT Command Command Function
AT+CSMS Select short message service
AT+CMGF Set short message encoding mode (1 for text mode, 0 for PDU mode)
AT+CMGS Send short message
AT+ CSCA Short message service center number




24


3.3 Wireless Sensor Network
Wireless Sensor Networks (WSNs) can be defined as a self-configured and infrastructure-less
wireless networks to monitor physical or environmental conditions, such as temperature, sound,
vibration, pressure, motion or pollutants and to cooperatively pass their data through the network to
a main location or sink where the data can be observed and analyzed. A sink or base station acts like
an interface between users and the network. One can retrieve required information from the network
by injecting queries and gathering results from the sink. Typically a wireless sensor network
contains hundreds of thousands of sensor nodes. The sensor nodes can communicate among
themselves using radio signals. A wireless sensor node is equipped with sensing and computing
devices, radio transceivers and power components. The individual nodes in a wireless sensor
network (WSN) are inherently resource constrained: they have limited processing speed, storage
capacity, and communication bandwidth. After the sensor nodes are deployed, they are responsible
for self-organizing an appropriate network infrastructure often with multi-hop communication with
them. Then the onboard sensors start collecting information of interest. Wireless sensor devices also
respond to queries sent from a control site to perform specific instructions or provide sensing
samples. The working mode of the sensor nodes may be either continuous or event driven. Global
Positioning System (GPS) and local positioning algorithms can be used to obtain location and
positioning information. Wireless sensor devices can be equipped with actuators to act upon
certain conditions.
Wireless sensor networks (WSNs) enable new applications and require non-conventional paradigms
for protocol design due to several constraints. Owing to the requirement for low device complexity
together with low energy consumption (i.e. long network lifetime), a proper balance between
communication and signal/data processing capabilities must be found.
3.3.1 Structure of a wireless sensor network
Structure of a WSN includes different topologies for radio communications networks. A short
discussion of the network topologies that apply to wireless sensor networks are outlined below.
3.3.2 MESH NETWORK
A mesh network allows transmitting data to one node to other node in the network that is within its radio
transmission range. This allows for what is known as multi-hop communications, that is, if a node wants
to send a message to another node that is out of radio communications range, it can use an intermediate
node to forward the message to the desired node.



25



Figure3.3.2. A Mesh network topology
3.3.3 Hybrid Star-Mesh Network
A hybrid between the star and mesh network
provides a robust and versatile communications
network, while maintaining the ability to keep the
wireless sensor nodes power consumption to a
minimum. In this network topology, the sensor
nodes with lowest power are not enabled with. The
ability to forward messages. This allows for
minimal power consumption to be maintained.
Figure3.3.3. a Hybrid Star Mesh Network
Topology
3.3.4 Design issues of a wireless sensor network
There are a lot of challenges placed by the deployment of sensor networks which are a superset of
those found in wireless ad hoc networks. Sensor nodes communicate over wireless, loss lines with no
infrastructure. An additional challenge is related to the limited, usually non-renewable energy supply
of the sensor nodes. Let us now discuss the individual design issues in greater detail.
Fault Tolerance: Sensor nodes are vulnerable and frequently deployed in dangerous environment.
Nodes can fail due to hardware problems or physical damage or by exhausting their energy supply.
We expect the node failures to be much higher than the one normally considered in wired or
infrastructure-based wireless networks. The protocols deployed in a sensor network should be able to
detect these failures as soon as possible and be robust enough to handle a relatively large number of
failures while maintaining the overall functionality of the network. This is especially relevant to the
routing protocol design, which has to ensure that alternate paths are available for rerouting of the
packets. Different deployment environments pose different fault tolerance requirements.
Scalability: Sensor networks vary in scale from several nodes to potentially several hundred
thousand. In addition, the deployment density is also variable. For collecting high-resolution data, the


26


node density might reach the level where a node has several thousand neighbors in their transmission
range. The protocols deployed in sensor networks need to be scalable to these levels and be able to
maintain adequate performance.
Production Costs: Because many deployment models consider the sensor nodes to be disposable
devices, sen-sor networks can compete with traditional information gathering approaches only if the
individual sensor node can be produced very cheaply. The target price envisioned for a sensor node
should ideally be less than $1.
Hardware Constraints: At minimum, every sensor node needs to have a sensing unit, a processing
unit, a transmission unit, and a power supply. Optionally, the nodes may have several built-in sensors
or additional devices such as a localization system to enable location-aware routing. However, every
additional functionality comes with additional cost and increases the power consumption and physical
size of the node. Thus, additional functionality needs to be always balanced against cost and low-
power requirements.
Sensor Network Topology: Although WSNs have evolved in many aspects, they continue to be
networks with constrained resources in terms of energy, computing power, memory, and
communications capabilities. Of these constraints, energy consumption is of paramount importance,
which is demonstrated by the large number of algorithms, techniques, and protocols that have been
developed to save energy, and thereby extend the lifetime of the network. Topology Maintenance is
one of the most important issues researched to reduce energy consumption in wireless sensor
networks.
Transmission Media: The communication between the nodes is normally implemented using radio
communication over the popular ISM bands. However, some sensor networks use optical or infrared
communication, with the latter having the advantage of being robust and virtually interference free.
Power Consumption: As we have already seen, many of the challenges of wireless sensor networks
revolve around the limited power resources. The size of the nodes limits the size of the battery.
The software and hardware design needs to carefully consider the issues of efficient energy use. For
instance, data compression might reduce the amount of energy used for radio transmission, but uses
additional energy for computation and/or filtering. The energy policy also depends on the application;
in some applications, it might be acceptable to turn off a subset of nodes in order to conserve energy
while other applications require all nodes operating simultaneously.





27


3.3.5 Structure of a wireless sensor node
A sensor node is made up of four basic components such as sensing unit, processing unit, transceiver
unit and a power unit which is shown in Fig3.3.5a.

Figure.3.3.5a the components of a sensor node
It also has application dependent additional components such as a location finding system, a power
generator and mobilizes. Sensing units are usually composed of two subunits: sensors and analogue to
digital converters (ADCs). One of the most important components of a sensor node is the power unit.
Power units can be supported by a power scavenging unit such as solar cells.
A functional block diagram of a versatile wireless sensing node is provided in Fig.3.3.5b.

Figure.3.3.5b. Functional block diagram of a sensor
Modular design approach provides a flexible and versatile platform to address the needs of a wide
variety of applications. For example, depending on the sensors to be deployed, the signal conditioning
block can be re-programmed or replaced. This allows for a wide variety of different sensors to be
used with the wireless sensing node. Similarly, the radio link may be swapped out as required for a
given applications wireless range requirement and the need for bidirectional communications.


28


3.3.6 Security issues in wireless sensor network
Security issues in sensor networks depend on the need to know what we are going to protect. In (Zia
et al., 2006), the authors defined four security goals in sensor networks which are Confidentiality,
Integrity, Authentication and Availability. Another security goal in sensor network is introduced in
(Sharma et al., 2011).Confidentiality is the ability to conceal message from a passive attacker, where
the message communicated on sensor networks remain confidential.
Integrity refers to the ability to confirm the message has not been tampered, altered or changed while
it was on the network. Authentication Need to know if the messages are from the node it claims to be
from, determining the reliability of messages origin. Availability is to determine if a node has the
ability to use the resources and the network is available for the messages to move on. This
requirement is especially important when the WSN nodes use shared-keys for message
communication, where a potential adversary can launch a replay attack using the old key as the new
key is being refreshed and propagated to all the nodes in the WSN.
Having built a foundation of security goals in sensor network, the major possible security attacks in
sensor networks are identified in. Routing loops attacks target the information exchanged between
nodes. False error messages are generated when an attacker alters and replays the routing
information. Routing loops attract or repel the network traffic and increases node to node latency.
Selective forwarding attack influences the network traffic by believing that all the participating
nodes in network are reliable to forward the message. Once a malicious node cherry picks on the
messages, it reduces the latency and deceives the neighboring nodes that they are on a shorter route.
Effectiveness of this attack depends on two factors. First the location of the malicious node, the
closer it is to the base stations the more traffic it will attract. Second is the percentage of messages it
drops.
When selective forwarder drops more messages and forwards less, it retains its energy level thus
remaining powerful to trick the neighboring nodes. In sinkhole attacks, adversary attracts the traffic
to a compromised node. The simplest way of creating sinkhole is to place a malicious node where it
can attract most of the traffic, possibly closer to the base station or malicious node itself deceiving as
a base station. One reason for sinkhole attacks is to make selective forwarding possible to attract the
traffic towards a compromised node. The nature of sensor networks where all the traffic flows
towards one base station makes this type of attacks more susceptible. Sybil attacks are a type of
attacks where a node creates multiple illegitimate identities in sensor networks either by fabricating
or stealing the identities of legitimate nodes. Sybil attacks can be used against routing algorithms and
topology maintenance; it reduces the effectiveness of fault tolerant schemes such as distributed


29


storage and disparity. Another malicious factor is geographic routing where a Sybil node can appear
at more than one place simultaneously. In wormhole attacks an adversary positioned closer to the
base station can completely disrupt the traffic by tunneling messages over a low latency link. Here
an adversary convinces the nodes which are multi hop away that they are closer to the base station.
This creates a sinkhole because adversary on the other side of the sinkhole provides a better route to
the base station. In Hello flood attacks a Broadcasted message with stronger transmission power is
pretending that the HELLO message is coming from the base station. Message receiving nodes
assume that the HELLO message sending node is the closest one and they try to send all their
messages through this node. In this type of attacks all nodes will be responding to HELLO floods
and wasting the energies. The real base station will also be broadcasting the similar messages but
will have only few nodes responding to it. Denial of service (DoS) attacks occur at physical level
causing radio jamming, interfering with the network protocol, battery exhaustion etc. in which a
sensor nodes power supply is targeted. Attacks of this type can reduce the sensor lifetime from
years to days and have a devastating impact on a sensor network.
3.2.7 Wireless Sensor Network Node Module
The wireless sensor network in home of this system is composed of one center node module and
several data collecting node modules, operating in point-to-multipoint communication mode. In
different application, the formation of a WSN node is not always the same. In general, a WSN node
includes four parts: data collecting unit, data processing unit, wireless communication unit and power
management unit.
As illustrated in Fig1 & Fig. 2.




30


The data collecting unit is composed of the sensors and A/D conversion module. In this remote
wireless home security system, some pyroelectric infrared detectors, temperature sensors, smoke
detectors and gas sensors are used.
The data processing unit is responsible to save and deal with the data collected by the sensors and
received from other nodes. In this system, the C8051F310 MCU from Signal Corporation is chosen as
the data processing unit. The wireless communication unit is often composed of the low power
consumption, short distance radio frequency (RF) transceiver. In this system, the wireless dual-way
chip CC1100 dedicated in wireless and low power consumption application is chosen to implement
wireless communication. C8051F310 MCU can control the main working parameter of CC1100 and
communicate with CC1100 through SPI interface. The SPI standard interface include main output
slave input (MOSI), main input slave output (MISO) and serial clock (CLK). The master CLK is
synchronized with the slave CLK.CC1100 can set the working mode, read and write cache data and
status register through SPI bus. The RF chip is connected with MCU through SPI interface to make a
wireless communication system that can control receiving and sending function freely.
The hardware connection between C8051F310 with CC1100 is showed in Fig. 3.

Figure3. The hardware connection between C8051F310 with CC1100
The SPI interface of CC1100 is to be connected to the hardware SPI interface of CPU. In general,
GDO0 or GDO2 pin of CC1100 can be connected to any pin of CPU. But if an interrupt service
program is to be used to implement the function of data receiving and transmitting or wireless
wakeup, GDO0 or GDO2 pin of CC1100 must be connected to the out interrupt pin of CPU.
Use CR2032 button cell to provide power for the WSN node. It can provide approximately 200mAh
power when the voltage is higher than 2.8v.
The data collecting nodes of this system are composed of these four units described before. The
center node is a little different, in that it is not connected with sensors but with the GSM module
through the indoor wireless control center.


31


CHAPTER FOUR
Testing and working gsm based on home security system
4.1 INTRODUCTION
GSM BASED HOME SECUITY Alarm System can cover 8 alarm zones within the premises. In
addition, the unit can be connected to window breaking sensors, motion detectors and other alarm
triggers. Once triggered, alerts can be sent to 8 pre-set numbers. The SMS alarm unit also comes
completed with 3 sms remote control zones. Through this, you can activate a number of electrical
appliances and equipment like the air-conditioner, generator, sensors, and lighting remotely via sms
or phone call. Using this service can help in theft prevention as lighting can be switched on or off
remotely to give the impression that there are people on the premises. If the premises comes with an
auto gate, the WT-1010SA GSM alarm system can also be used to open/close the gate via either the
remote control unit or via a command through the telephone unit The SMS alarm system comes with
2 remote control units to arm and disarm the burglar alarm system. These remote control units are
also multi-functional and can be used not just for arming and disarming the security alarm system, but
also as an emergency/panic button, as a remote to open the garage door/ main gate, to switch on/off
electrical appliances within the home. Another feature of the WT-1010SA is that the GSM alarm can
be armed and disarmed remotely using the mobile phone. As the WT-1010SA SMS alarm works on a
wireless system, the risk of thieves cutting the connection is low as there are no wires to connect the
unit to the telephone line. Even if the thieves use a GSM jammer to cancel the wireless signal, the
WT-1010SA SMS alarm has been designed to overcome this. When a GSM jammer is detected, the
unit will automatically send out a sms and trigger the alarm siren. To ensure that in cases of power
failure or if the power supply has been cut by thieves, the WT-1010SA burglar alarm is equipped
with a standby rechargeable battery to ensure that the unit continues to function. In the event of
power cut, the unit will again automatically send out a sms to the pre-set mobile number to inform
that the battery has failed. Another feature of the WT-1010SA

Figure4.1a


32


GSM intruder alarm is the auto test reporting system whereby the system will, at the programmed
time, test to ensure that the system is alive. A message is then sent to the pre-set mobile number.
This auto test ensures that the security alarm system is constantly functioning
WT-1010SA as a Telephone System

Fig4.1b
Lets face it, installing a new phone landline can be a nightmare. From the moment you apply till the time
the line is installed, it could take a long while as the date of installation is determined by the availability of
personnel from the telephone company. While waiting for installation, there is also the inconvenience of
not having a communications line available
Installation of a landline telephone system also normally involves the payment of a deposit, which
could be a significant amount of upfront expenditure if its for a business premises. Apart from the
deposit, theres also a month phone line rental regardless of whether or not calls are made.
When the time is ready for installation of the landline telephone system, for aesthetic purposes, there
might be small renovations involved. This will incur additional costs.
The WT-1010SA unit can also be connected to a basic telephone and used to make phone calls. Using
the WT-1010SA as a telephone system has many advantages over traditional landlines.




33


Firstly, all thats needed to activate the phone line is a GSM SIM card which is easily applied for can
be used almost immediately. The system works with both prepaid and postpaid SIM cards.
In todays communications environment, many phone calls are made to mobile lines. Mobile phone
operators normally have plans that offer very low cost or complimentary calls within the same
network. By using a GSM based phone for your premises, it can help to save on your monthly phone
bill as there is no monthly phone line rental costs to bear and calls made between landline and
mobile lines normally cost more too.
The WT-1010SA GSM alarms and telephone system offers the perfect solution for those who are
renting their premises. Apart from the upfront and on-going savings, when the lease is over, the
system can be very quickly dismantled ready to install in your new rented premises.
4.2 Features
Eight Alarm Inputs: The system has the function to send sms and call to the user in the even of input
triggered. For example, Zone 4 connected to an electrical door, when there is intruder or electrical
door is open illegally, WT-1010SA GSM alarms will receive short circuit impulse on Zone 4 and
automatically sends a signal to the pre-set number and notify the owner.
It is possible to arm/ disarm the unit remotely via SMS or phone call. Alternatively, it also can
connect to the basic telephone to perform arm/disarm. Remote control also will be provided
Input alarm zoning can be edited and programmed up to 50 characters long. You can use this
function to program any languages. You can change the displayed text by sending a command by
SMS to the unit. For examples, changing the Zone 4 to DOOR OPEN Three SMS remote control
output. These open collector outputs (that can sink max 300ma per output) can be turned on and off
remotely through a SMS or phone call. The SMS remote control will be reachable by sending a SMS
or phone call with a certain command. For example sms/ call in to switch on lighting, air conditional,
generator, sensor or other equipment
Automatically call to 8 pre-programmed phone numbers while alarming. The WT-1010 GSM
intruder alarm also will SMS to 8 programmable phone number to notify the user if any intruder
Open your auto gate with your basic telephone. Connect the WT-1010 with the auto gate and your
house basic telephone. Besides you can use the WT-1010 as your house telephone, you also can
open your auto gateway by pressing a command at the basic telephone or remote control which we
provided
Most of the countries, GSM Mobile operator offer cheaper call plan compared to telecom landline.
The WT 1010 GSM home alarm can connect to the basic telephone to make call. If any intruder, the
WT-1010 SMS alarm will cut the telephone call and sent the alarm messages first.


34


In order prevent professional thief to disconnect GSM home alarm by using GSM Jammer, the
WT-1010 security alarm will transmit the alarm if signal drop immediately and trigger the siren
The owner will automatically receive the SMS text messages for Battery Fail, Telecom Line
Fail, AC Fail, INPUT 1 INPUT 4 Fail, GSM Alive if any of the above having problem
Auto test reporting system after the owner program the reporting time, the WT-1010 home alarm
will dial the programmable number to inform that GSM Alive. This is to make sure that in case of
emergency, the GSM home alarms still will function well
Standby recharger battery to prevent power failure or electricity cut off by intruder. The GSM home
alarm will function as normal when no electricity supply. LCD display to check the GSM signal
strange and battery capacity
4.3 Applications:
1.This project has its main application in security system. This project can be used in home as SMS
based domestic security system. It will be really useful for the security of flat, bungalow or any row
house. It can be used in our house for theft detection at night time. The other part of the project
(password detector) can be used to automate the door locking process, so the user need not to carry
the door lock keys along with him, he/she can just remember the password and use it later to open the
door.
2.Various parameters monitored in this project like LPG gas leakage, theft detection and overheat due
to fire are also applicable for industrial purpose as well. So this system can also be used in industries
as a GSM based industrial security system.
3.We can use this project in Restaurants as well as hotels, since LPG Gas cylinders are majorly used for
cooking purpose in hotels and restaurants. Also they are very much prone to fire. So this project can
be fitted in cooking section or kitchen of hotels. We can also use this project for the lodging rooms in
hotels or rented rooms in a hotel. User will be provided a password to enter in this room and various
parameters in this room will be monitored.
4.This project can be used in hospitals. We need to do little bit modifications for use in hospital. We
can add oxygen gas sensor to detect the leakage in oxygen gas cylinders, as it can also cause fire. The
password operated locking section can be used in hospitals for those rooms which have limited access
like rooms with chemical or x-ray machine units. So only authorized person can gain access to this
areas/rooms/sections.



35


4.4 Advantages:
1.Remote indication: With the use of GSM technology owner of the house or industry get remote
indication through SMS. So even if the user is away from home or industry, he/she will be intimated
about the hazardous or undesirable conditions / situations inside the house.
2.This system is fully automated. So once this system is installed inside home or industry, then it does
not require any human interaction to operate.
With the use of this system we can save the life of person inside home / industry. Since the accidents
caused due to fire and LPG gas leakage can cause life threat.
3.Also the property inside house and various materials inside the house and industry are saved from to
theft and from fire detection.
4.This system is Cost effective. Also it is Fast and efficient
4.5 Future Development:
1.Voice announcement system can be added to indicate device conditions. We can add voice announ-
cement system along with the buzzer so if there are hazardous parameters detected then respective
voice message will be announced.
2.We can add fingerprint sensor instead of password based door operating. So entry will be allowed
for the authorized person using their fingerprints.
3.We can monitor and control more parameters and devices. We can implement other related modules
like fire sensor, wind sensor.

















36


Conclusion
Home security has been a major issue where crime is increasing and everybody wants to take proper
measures to prevent intrusion. In addition, there is need to automate home so that the user can take
the advantage of technological advancement. This project presents a model that will provide security
to their home, office or cabin etc via SMS using GSM technology.
Keeping in view the rapid growth of wireless communication we are inspired to work on this project.
The idea behind this project is to meet the upcoming challenges of the modern practical applications
of wireless communication and to facilitate our successors with such splendid ideas that should clear
their concept about wireless communication and control system.
The applications of SMS/GSM Based security system are quite diverse. There are many real life
situations that require control of different devices remotely and to provide security. There will be
instances where a wired connection between a remote appliance/device and the control unit might not
be feasible due to structural problems. In such cases a wireless connection is a better option.
Basic Idea of our project is to provide GSM Based security even if the owner is away from the
restricted areas. For this we adopted wireless mode of transmission using GSM. Beside this there are
many methods of wireless communication but we selected GSM in our project because as compared
to other techniques, this is an efficient and cheap solution also, we are much familiar with GSM
technology and it is easily available.
This project is designed to provide ubiquitous access to the system for the security using extensive
GSM technology for communication purposes and microcontroller for device control. The highlights
of our system are the long range of communication and password security. The security is provided
by sending a message to our access number, controlling and acknowledgement is done through SMS
code between our access number and the authenticated user.
This system consists of a GSM modem for sending and receiving the SMS, Intel 89S52
microcontroller which is controlling the entire system, LCD for the display purpose , keypad for
entering the password and supporting circuitries like rectifier for ac to dc conversion. It can be
installed at any desired location e.g., office (to protect important files and document), banks (to
protect cash in locker) etc.
In this system, the authorized person will have the entire control and he will decide which people will
be allowed in that restricted area. Those person who can have access to that area, will have a
password in advance. If anyone wants to enter in that restricted area in the absence of authorized
person, then that person will enter the password on the keypad. If the password will be correct, then a
message containing the details like name, address and designation etc. of that person will be


37


forwarded to authorized person via GSM Modem. Now the authorized person will send a coded reply
to the microcontroller via GSM Modem. Depending upon the response from the authorized person,
microcontroller will decide whether to permit or not. If the approval will be positive then the
controller will turn on the relay connected to the door and the authenticated user will be in a position
to have access to that area else the request will be rejected and the door will not open. The GSM
modem provides the communication mechanism between the user and the microcontroller system by
means of SMS messages.
The microcontroller is an exiting, challenging, and growing field; it will pervade industry for decades
to come. To meet the challenges of this growing technology, we will have to conversant with the
programmable aspect of the microcontroller. Programming is a process of problem solving and
communicating in a strange language of mnemonics. The projects could be developed significantly
faster and much easily using a microcontroller.
The purpose of this project is to implement the various concepts of microcontroller and embedded
designing environment. An embedded microcontroller is a chip which has a computer processor with
all its support functions (clock & reset), memory (both program and data), and I/O (including bus
interface) built into the device. These built in functions minimize the need for external circuits and
devices to be designed in the final application.
This Project is a very good example of embedded system as all its operations are controlled by
intelligent software inside the microcontroller. Read more about what is embedded system.
The aim of this project is to provide security to the restricted area even if the owner is anywhere in
the world. For this purpose user can use any type of Mobile, This way it overcomes the limited range
of infrared and radio remote controls.
Short Message Service (SMS) is defined as a text-based service that enables up to 160 characters to
be sent from one mobile phone to another. In a similar vein to email, messages are stored and
forwarded at an SMS centre, allowing messages to be retrieved later if you are not immediately
available to receive them. Unlike voice calls, SMS messages travel over the mobile networks low-
speed control channel.
"Texting", as its also known, is a fast and convenient way of communicating. In fact, SMS has taken
on a life of its own, spawning a whole new shorthand language thats rapidly being adopted as the
norm.
Technology Used:
As microcontrollers are the core of the todays digital circuit design in industry, this system uses it for
the centralized operation and digital processing.


38


The technology used here is embedded technology which is the future of todays modern electronics.
Here we have used a very high speed Microcontroller i.e. 89S52. This runs on 6-clk cycle period
instead of 12-clk cycle. This makes the communication rate faster at 115200kbps. Since we are using
F-Bus protocol with the mobile, a full duplex communication with the above baud rate is required.
Features:
The following are the prominent features of SMS based security system
Can provide security to 8-devices,
User-programmable plain text message control,
Communicate from any other mobile,
Password protected,
Can be controlled from anywhere, anytime,
In-system programmable i.e. we can modify the code of the Controller at anytime depending
upon our requirement without taking out the controller from the board.

What contributions would the project make?
If this system is installed in an office cabin where all important files (share paper, tender files
or other files) are kept and the owner is in away from the place (e.g., London) attending a meeting
and at the same day he is supposed to submit a tender. In this case he can allow any of his trustworthy
employees and get the work done. In this way he will be saved from the bearing a heavy loss.
This system can be used for home automation too with desired changes in the program and by
some additional hardware.
If you need to turn pumps, lights etc. on remotely or need to remotely monitor equipment
alarms then this project is for you.
There are thousands of uses, like turning on remote pumps, lights, monitoring cool room
temperatures, open doors etc.



39


References
[1] The-History-of-Home-Security 4th July 2010 [Online]. Available: http://ezinearticles.com.
[2] V. Karri and J. S. Daniel Lim, Method and Device to Communicate via SMS After a Security
Intrusion, 1st International Confe-rence on Sensing Technology, Palmerston North, New Zealand,
(2005) November 21-23.
[3] Y. Zhao and Z. Ye, Low cost GSM/GPRS BASED wireless home security system, IEEE Trans.
Consumer Electron, vol. 56, no. 4, (2007) January, pp. 546-567.
[4] Z. Bing, G. Yunhung, L. Bo, Z. Guangwei and T. Tian, Home Video Security Surveillance,
Info-Tech and Infonet, 2001,Proceedings,ICII 2001-Beijing. 2001 International Conference, vol. 3,
pp. 202-208.
[5] M. Meyer, M. Hotter and T. Ohmacht, A new system for Video-based Detection of moving
objects and its integration into digital networks, Security Technology 1996, 30th Annual 1996
International Carnahan Conference, (1996), pp. 105-110.
Internet Sources
a. www.gsmworld.com, October 2008
b. www.google.com
c. www.gnokii.org, November 2008
d. www.keil.com, November 2008

You might also like