Gsm Based Home Security System

Powerful Essays
GSM BASED HOME SECURITY SYSTEM
A PROJECT REPORT Submitted by

PRACHI NANDA (A1607107098) BHAVUK PUJARA (A1607107049)
In partial fulfillment for the award of the degree Of

BACHELOR OF TECHNOLOGY
In

ELECTRONICS AND TELECOMMUNICATION AMITY INSTITUTE OF TELECOM TECHNOLOGY & MANAGEMENT

AMITY UNIVERSITY UTTAR PRADESH

1

BONAFIDE CERTIFICATE

Certified that this project report GSM BASED HOME SECURITY SYSTEM is the Bonafide work of PRACHI NANDA and BHAVUK PUJARA - who carried out the project work under my guidance.

SIGNATURE

SIGNATURE

HEAD OF THE DEPARTMENT ( Col. R.K. Kapur )

PROJECT GUIDE ( Mr. Pardeep Kumar )

2

ABSTRACT

The final year project aims at exposing the students undergoing higher technical studies to the thoughts and logic that must be developed to ensure that one is able to integrate his/her ideas into something concrete. This generally is initiated by the inception of an idea or a concept, which not only aims at developing a product (Hardware or Software), but also the in-depth study of the earlier existing products in the same category and their deficiencies. Accordingly an approach is taken to propose a solution, which is better from the previous ones in one respect or the other. With the same approach in mind, we, the final year students of Bachelor of Technology (Electronics and Telecommunication), have taken up the ADVANCE GSM BASED HOME SECURITY SYSTEM as our final year project. Automated security systems are a useful addition to today’s home where safety is an important issue. Vision-based security systems have the advantage of being easy to set up, inexpensive and non-obtrusive. Home security system for detecting an intrusion into a monitored area by an infrared detector. A security system has a flee-standing intrusion detector. The free standing intrusion detector has a transmitter coupled with a portable receiver to alert a homeowner that an intrusion has taken place or occurred within a pre-set time

You May Also Find These Documents Helpful

  • Powerful Essays

    As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door.…

    • 1220 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    GSM Based Vehicle theft

    • 264 Words
    • 2 Pages

    This paper deals with the design & development of a theft control system for an automobile, which is being used to prevent/control the theft of a vehicle. The developed system makes use of an embedded system based on GSM technology. The designed & developed system is installed in the vehicle. An interfacing mobile is also connected to the microcontroller, which is in turn, connected to the engine. Once, the vehicle is being stolen, the information is being used by the vehicle owner for further processing. The information is passed onto the central processing insurance system, where by sitting at a remote place, a particular number is dialed by them to the interfacing mobile that is with the hardware kit which is installed in the vehicle. By reading the signals received by the mobile, one can control the ignition of the engine; say to lock it or to stop the engine immediately. Again it will come to the normal condition only after entering a secured password. The owner of the vehicle & the central processing system will know this secured password. The main concept in this design is introducing the mobile communications into the embedded system. The designed unit is very simple & low cost. The entire designed unit is on a single chip. When the vehicle is stolen, owner of vehicle may inform to the central processing system, then they will stop the vehicle by just giving a ring to that secret number and with the help of SIM tracking knows the location of vehicle and informs to the local police or stops it from further movement.…

    • 264 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cctv Installation (Incat)

    • 1308 Words
    • 6 Pages

    We propose this project because we notice that it is a need for a school to have CCTV in order to keep the safety of the school and avoid crimes inside the school campus. The propose project is done by installing CCTV in some strategic part of the campus to maximize the area that the camera can survey. The installation will be done by a licensed Electronic Technician that is monitored by an Electronics Engineer during the installation. It will be done…

    • 1308 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Mobile Phone Security

    • 1564 Words
    • 5 Pages

    This fact sheet has been developed for the Consumer Education Program by the Communications Commission of Kenya. It was compiled by studying material from various authoritative sources and adopting what is universally acceptable and relevant to the Kenyan situation. The fact sheet is intended to enable Consumers have a good understanding of the issues discussed and hence empower them when making decisions regarding ICT products and services. Introduction One of the biggest threats that a mobile phone user faces today is loss or theft of the phone. Not only is the mobile valued as a physical device, the phone may contain personal and financial data stored in the handset or in the phones subscriber identity module (SIM card). While a stolen SIM can be barred by a mobile network once the theft has been reported it is a bit harder to bar the handset from being used with different SIM card. Unless the user had protected his personal information with a PIN prior to the theft or loss of the phone, this data can be accessed by unauthorised persons. Mobile phone users normally store a wide range of information on their phones. This information can either be stored in the phone’s internal or external memory (depending on the make and model of the phone) or in the SIM card. The SIM card is used mainly to store contacts and short messages while the phone’s memory is used to store information such as personal photos, emails, and calendar items. In order to prevent unauthorised persons from using the phone and further gaining access to the stored information, some mobile phones have security features which the user can activate. This fact sheet has been developed to address security of the information stored and what to do should you lose the phone. Securing the information stored. There are at least two methods one can use to secure the information stored on a mobile phone. These are: a) SIM lock This method takes advantage of the SIM card…

    • 1564 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Gsm Based Home Alarm System

    • 2286 Words
    • 10 Pages

    GSM based Security System using LabVIEW Hasan Baig1, Muhammad Owais1, Muhammad Saleheen Aftab1, Kamran Shamim1 and Hamza Azeem2 Department of Electronic Engineering NED University of Engineering & Technology, 2PAF KIET, Pakistan. (hasan.baig, ovaisbabai, saleheen2006, kamranshamim, hamzaazeem)@hotmail.com 1 Abstract- The purpose of this paper is to introduce an efficient, reliable and cost-effective security system for use at homes, offices,…

    • 2286 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    design for home use. The target market is composed of lowincome individuals who cannot afford the services of a…

    • 3883 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays
    • 2672 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    The electronic security market in India has witnessed a considerable growth in the last few years. The rising incidents of crime and burglary and the rising awareness about benefits of the electronic security equipments amongst the people have primarily driven the electronic security market. Many electronic security brands are now experimenting with advanced technology to provide their customers with more options.…

    • 591 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Currently,theft has been done in lot of places in our society while considering safety issues this idea is proposed.The objective of this paper is to design the IMAGE based door opening and closing system and also increase the security in banks, collegesand homes based on biometric system. The biometric person authentication technique based on the pattern of the human iris is well suitable for application to any access control system requiring a high level of security. Today, biometric recognition is a common and reliable way to authenticate the identification of a person based on physiological or behavioral characteristics. So in thispaper if iris is matched the door it will be opened otherwise it will not be open. IR sensor used to detect the human in or out.By using this concept,we can avoid the theft in bank&home.It also used in various places in our society to avoid theft.The result of our idea is done in MATLAB & the simulation&Hardware Result are shown in this paper. This idea is very useful in banks, offices, shops etc..…

    • 2104 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Laser Intruder Alarm System

    • 3274 Words
    • 14 Pages

     An Alarm is a type of security equipment that can be used to safeguard houses and property.  Now a days Burglar Crimes are continually rising with each passing day.  Many have lost homes and families through violent burglaries in many countries  Some of them lost most precious things such as Jewelry, Vehicles, huge investments in banks etc..  This led to the development of ALARM SYSTEM…

    • 3274 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Term paper

    • 1329 Words
    • 6 Pages

    A physical model and steps of building the security system will be discussed as well as its set up and mode of operation. System testing showed a quick and efficient operation of the system, where in case of smoke or fire detection, light and siren are triggered and fire department is called, and in case of break-in police is called as well as siren is triggered.…

    • 1329 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    address, like your computer or a server. And just as an e-mail is broken into chunks and routed as packets anywhere in the world, so, too, is voice traffic. (2003)…

    • 509 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cctv Guide

    • 7519 Words
    • 31 Pages

    Due to a booming population, increasing scarcity of jobs and growing drug problems especially in urban cities, the number of burglaries and criminal activities in business and residences have increased in the past years. Having a security system is therefore becoming a requirement not only for banks and organizations typically employing tight security but also for small businesses and residences. A good alternative to hiring security guards is to install security cameras. For home owners, it allows monitoring of activities inside (keeping an eye on children, baby sitters and maids) and outside (checking people and vehicles entering,…

    • 7519 Words
    • 31 Pages
    Good Essays
  • Satisfactory Essays

    Micr

    • 587 Words
    • 3 Pages

    In real world , security is a major concern in our day-today life. Everyone wants to be as much secure as possible. An access control for doors forms a vital link in a security chain. The microcontroller based digital lock for doors is an access control system that allows only authorized persons to access a restricted area. The system is fully controlled by the 8 bit microcontroller AT89C2051 which has a 2Kbytes of ROM for the program memory. The password is stored in the EPROM so that we can change it at any time. The system has a Keypad by which the password can be entered through it. When the entered password equals with the password stored in the memory then the relay gets on and so that the door is opened. If we entered a wrong password for more than three times then the Alarm is switched on.…

    • 587 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Ultrasonic Range Meter

    • 10472 Words
    • 42 Pages

    Security is primary concern for every one. This Project describes a design of effective security alarm system that can monitor the house with eight different sensors. Unauthorized access, Fire accident, wall braking, IR detection, and fire detection can be monitored by the status of each individual sensor and is indicated with an LED.…

    • 10472 Words
    • 42 Pages
    Powerful Essays