Project 2024

Download as pdf or txt
Download as pdf or txt
You are on page 1of 31

MASENO UNIVERSITY

SCHOOL OF COMPUTING AND INFORMATICS


DEPARTMENT OF COMPUTER SCIENCE
BSC COMPUTER TECHNOLOGY
COURSE CODE: CCT 405
COURSE NAME: COMPUTER TECHNOLOGY PROJECT I
TITLE: A GSM BASED LASER LIGHT SECURITY
SYSTEM
LECTURER: DR. OKOYO HENRY
PRESENTERS:
1. CALVINS WERE CCT/00015/020
2. DENNIS KIMATU CI/00126/018
3. RYAN KIPNGETICH CCT/00057/020
4. PAUL INDA CCT/00047/020
DECLARATION
We hereby declare that the project work titled; A GSM Based Laser Light Security System is an
authenticated work carried out under the guidance of Dr Okoyo for the partial fulfilment of the
award of the degree in Computer Technology and this work has not been submitted for similar
purpose anywhere else except to Department of Computer Science, Maseno University.

Dennis Kimatu CI/00126/018 Signature ……………… Date …………………


Calvins Were CCT/00015/020 Signature ……………… Date …………………
Ryan Kipngetich CCT/00057/020 Signature ……………… Date …………………
Paul Inda CCT/00047/020 Signature ……………… Date …………………

This project has been submitted for examination with my approval as University Supervisor
……………… ……………….
Signature Date
Dr. Okoyo Henry.
Maseno, Kenya.

2
ACKNOWLEDGEMENT
We begin by offering our heartfelt gratitude to Almighty God for guiding us this far. Secondly,
we would like to express our heartfelt gratitude and appreciation to our lecturer and project
guide, Dr. Henry Okoyo, for bestowing upon us this remarkable opportunity to undertake this
project. Furthermore, we acknowledge the indispensable role played by each member; without
our collaboration, this project would have remained an insurmountable challenge.

3
ABSTRACT
In an era marked by rapid technological advancement, the need for contemporary security
measures to counter evolving criminal tactics is paramount. Our project addresses this imperative
by introducing a GSM Based Laser Security System, an innovative approach to safeguarding
large areas with precision and efficiency.
Utilizing the unique properties of laser light, which remains focused over long distances without
scattering and remains nearly imperceptible to the naked eye, we have developed a cutting-edge
security solution. This security system leverages the capabilities of components such as the
Arduino microcontroller, laser light source, buzzer, and Light-Dependent Resistor (LDR), and a
GSM module all controlled by a straightforward program.
Upon intrusion, when an individual or object disrupts the laser beam, the system triggers an
immediate audible alert, indicated by the sounding of a buzzer, and the system sends an alert
SMS to the authority in charge. This system can be easily deployed in various settings to
establish security perimeters, deterring and notifying against unauthorized access.
Moreover, the GSM Based Laser Light Security System can function both as a standalone
security apparatus and as an integral component within broader security or automation systems,
providing versatile protection and alert capabilities for property owners and businesses alike. In
an ever-evolving technological landscape, this project exemplifies a proactive approach to
modern security challenges.
The project is divided into two major parts where each member plays a crucial role to produce
the desired system. The first part which is the detection system, is done by Calvins Were and
Dennis Kimatu while the second part which is communication system is done by Ryan
Kipngetich and Paul Inda.

4
Table of Contents
CHAPTER 1: EXPRESSION OF NEED .................................................................................................. 7
1.1 Introduction ......................................................................................................................................... 7
1.2 A Brief History of Security Systems ................................................................................................... 7
1.4 Goal ..................................................................................................................................................... 8
1.5 Usefulness of the GSM Based Laser Light Security System .............................................................. 8
1.6 Justification of the Project .................................................................................................................. 9
CHAPTER 2: REQUIREMENTS ANALYSIS ...................................................................................... 10
2.1 Conceptual description of the required product given user’s perspective......................................... 10
2.2 Functionality Provided by the System .............................................................................................. 10
2.3 How Users Apply the System ........................................................................................................... 11
CHAPTER 3: TECHNICAL SPECIFICATIONS ................................................................................. 11
3.1 Detection System Specifications ....................................................................................................... 12
3.2 Communication System Specifications ............................................................................................ 13
3.3 System Reliability and Maintenance Specifications ......................................................................... 14
CHAPTER 4: DESIGN ............................................................................................................................ 17
4.1 Components Required ....................................................................................................................... 17
4.2 Operation........................................................................................................................................... 17
4.3 Design Diagrams............................................................................................................................... 18
CHAPTER 5: METHODOLOGY........................................................................................................... 19
5.1 VERIFICATION OF DESIGN ..................................................................................................................... 19
5.1.1 Verification Diagrams and Proofs ............................................................................................... 21
5.2 PROTOTYPING OF DESIGN ......................................................................................................... 23
CHAPTER 6: RESULTS AND DISCUSSION ....................................................................................... 24
6.1 Results ............................................................................................................................................... 24
6.2 Discussion ......................................................................................................................................... 24
CONCLUSION ......................................................................................................................................... 26
RECOMMENDATIONS .......................................................................................................................... 27
SUGGESTIONS FOR FURTHER WORK ............................................................................................ 29
REFERENCES .......................................................................................................................................... 31

5
6
CHAPTER 1: EXPRESSION OF NEED
1.1 Introduction
In the contemporary landscape of security systems, the imperative for robust and efficient
solutions is paramount. As technological advancements continue to shape the way we safeguard
our assets and environments, there arises a critical need for a cutting-edge security system that
integrates the reliability of laser technology with the convenience and accessibility afforded by
GSM (Global System for Mobile Communications) communication. This project outlines the
compelling need for the development of a state-of-the-art GSM-based Laser Light Security
System.
1.2 A Brief History of Security Systems
Security systems have come a long way since their inception. Historically, mechanical locks and
physical barriers were the primary means of protecting valuable assets. As technology
progressed, so did the sophistication of security measures. The advent of electronic alarm
systems in the mid-20th century marked a significant turning point, enabling remote monitoring
and instant alerts.
Traditional security systems often encounter limitations in terms of real-time monitoring,
scalability, and adaptability. The integration of laser technology in security systems has proven to
be highly effective due to its precision and instantaneous response capabilities. However, the
existing gap lies in the seamless communication of security alerts to stakeholders, which is
crucial for timely intervention. The proposed system aims to bridge this gap by incorporating
GSM technology, allowing for remote monitoring and instant notification.

1.3 Objectives.
Enhanced Security: The system is meant to utilize laser technology for perimeter security,
ensuring a highly accurate and immediate response to unauthorized intrusions. Also, it is meant
to minimize false alarms through advanced laser detection algorithms, enhancing the reliability
of the system.
Real-time Monitoring: Implement GSM communication to enable real-time monitoring of
security status from anywhere in the world.
Facilitate remote access to the system through mobile devices, ensuring constant vigilance and
control.
Instant Notification: Integrate GSM alerts to notify designated stakeholders, including security
personnel and property owners, in case of a security breach.
Provide customizable alert settings for different levels of security incidents.
Scalability and Flexibility: Design the system to be scalable, accommodating varying sizes of
properties and security requirements.
Ensure flexibility in system configuration to adapt to diverse environments and user preferences.
User-friendly Interface: Develop an intuitive user interface for easy system configuration,
monitoring, and maintenance. Provide a comprehensive dashboard for visualizing security
metrics.

7
1.4 Goal
The goal of the GSM Based Laser Light Security System project is to design, develop, and
implement an advanced security solution that harnesses the capabilities of laser technology and
GSM communication module to address the shortcomings of traditional security systems. The
project aims to provide a cutting-edge security solution that enhances precision, reduces false
alarms, improves security coverage, and adapts to various security needs and environments.
Ultimately, the GSM based Laser Light Security System seeks to contribute to the advancement
of security technology, bolstering safety and security in a wide range of applications and settings.
1.5 Usefulness of the GSM Based Laser Light Security System
The GSM Based Laser Light Security System offers a range of advantages, making it a preferred
choice for modern security applications. Here are the key advantages of such a system:
Precision Detection: Laser systems provide highly accurate and precise detection of intrusions.
They can pinpoint the exact location where a breach occurs, minimizing false alarms.
Reduced False Alarms: Laser technology is less susceptible to false alarms triggered by
environmental factors like wind, rain, or small animals. This leads to a more reliable and
efficient security system.
Quick Response: The system provides rapid detection and can trigger alarms or alerts with the
help of the GSM module and buzzer, almost instantly when an intrusion occurs, allowing for
swift response by security personnel or automated systems.
Adaptability: The security systems can be tailored to suit specific security needs and
environments. They can cover various types of terrains and can be adjusted for different threat
levels.
Integration Capabilities: These systems can be integrated with other security technologies, such
as surveillance cameras, access control systems, and alarms, creating a comprehensive security
solution.
Low Maintenance: The system typically requires minimal maintenance compared to traditional
security systems. They have fewer moving parts and are less affected by wear and tear.
Reliability in Challenging Conditions: Laser technology remains effective in adverse weather
conditions, such as rain, fog, or extreme temperatures, ensuring continuous protection.
Remote Monitoring: The security systems can be connected to remote monitoring centers,
enabling 24/7 surveillance and immediate response to security breaches.
Reduced Wiring: Wireless laser security systems are available, reducing the need for extensive
wiring during installation and allowing for greater flexibility in system placement.
Scalability: These systems are scalable, allowing users to expand or modify their security
infrastructure as needed, making them suitable for both small and large-scale applications.
Cost-Effective: In the long run, the security systems can be cost-effective due to their lower
maintenance requirements and reduced false alarms, which can save both time and money.
Environmental Friendliness: Laser systems are environmentally friendly as they do not emit
harmful substances, making them a sustainable security solution.

8
1.6 Justification of the Project
In a world that is getting more complicated and interconnected, better security measures are
essential. The GSM Based Laser Light Security System's creation is justified by its capacity to
circumvent the restrictions of conventional security systems. The potential to deliver a security
solution that is more reliable, affordable (less costly), and effective.
The successful implementation of the proposed GSM-based Laser Light Security System is
anticipated to yield the following outcomes:
• A highly secure and responsive perimeter protection system.
• Real-time monitoring capabilities for improved situational awareness.
• Swift and accurate notification of security incidents, enabling prompt intervention.
• Increased scalability and adaptability to diverse security needs.

9
CHAPTER 2: REQUIREMENTS ANALYSIS
2.1 Conceptual description of the required product given user’s perspective.
From the user's point of view, the Laser Light Security System should be a strong and user-
friendly security solution that provides complete protection against illegal invasions. Users
demand a system that is unobtrusive in appearance, dependable in function, and flexible enough
to accommodate different security circumstances. The system should inspire confidence by
reducing false alerts and offering quick, precise threat detection.
The envisioned GSM-based Laser Light Security System offers users a seamlessly integrated and
intuitive experience through a sophisticated yet user-friendly interface. Users can effortlessly
control the system's operation with one-touch arming and disarming options, and scheduling
capabilities add an extra layer of convenience.
The live feed from laser sensors ensures continuous visual monitoring of the protected perimeter,
and instant alerts, triggered upon intrusion detection, are swiftly communicated via SMS or calls
to designated contacts. Customizable alert settings empower users to tailor notifications based on
the severity of security incidents.
The product emphasizes compatibility with various devices, offering a cross-platform experience
with push notifications to keep users informed. Additionally, comprehensive documentation and
customer support resources are seamlessly integrated into the interface, providing users with
assistance and guidance as needed. This conceptual description encapsulates a user-centric
approach, focusing on simplicity, real-time monitoring, and customization to empower users in
securing their environments effectively.
2.2 Functionality Provided by the System
The GSM-based Laser Light Security System offers a range of advanced functionalities designed
to provide robust security measures, with a particular emphasis on precision detection and
efficient communication. The system's key functionalities include:
Laser-Based Intrusion Detection: The system utilizes laser technology for highly accurate and
immediate intrusion detection along the perimeter of the secured area. Laser beams are
strategically deployed to form an invisible barrier, and any disruption to these beams triggers an
alert.
Immediate Alert Generation and Communication: Upon detecting an intrusion, the system
generates instant alerts to notify designated stakeholders. These alerts are communicated through
GSM technology, allowing for swift and reliable notifications via SMS or calls to predefined
contacts.
Customizable Alert Settings: Users have the flexibility to configure and customize alert settings
based on the severity of security incidents. This includes the ability to prioritize different types of
alerts and set specific response protocols for each scenario.
Scalability: The system is designed to be scalable, accommodating a variety of property sizes
and security needs. This scalability ensures that the security solution can be tailored to different
environments, from residential properties to large commercial spaces.

10
Compatibility with GSM Networks: The system is compatible with a range of GSM networks,
ensuring global accessibility and reliability. This compatibility allows the security system to
function seamlessly in diverse geographical locations with varying network infrastructures.
False Alarm Minimization: The system must reduce false alarms brought on by unthreatening
movements or environmental causes.
By integrating these functionalities, the GSM-based Laser Light Security System not only
establishes a highly effective laser-based intrusion detection system but also ensures efficient and
timely communication of security alerts, empowering users with a comprehensive and responsive
security solution.

2.3 How Users Apply the System


The application of the GSM-based Laser Light Security System is designed to be user-friendly
and adaptable to a variety of security needs. Users can apply the product in the following ways:
Installation and Setup: Users start by installing the laser sensors strategically along the
perimeter they want to secure. The system is designed for easy installation, with clear guidelines
provided in the documentation. After physical installation, users follow a guided setup process
through the user interface to configure system parameters, including sensitivity levels, contact
details for alerts, and any personalized preferences.
Arming and Disarming: The system allows users to easily arm or disarm the security features
through the user interface. This can be done manually, or users can take advantage of scheduling
options for automatic arming and disarming during specific time periods.
Alert Configuration: Users have the flexibility to configure alert settings based on their
preferences and the severity of security incidents. This includes choosing the mode of
communication (SMS or calls), defining the contacts to be notified, and customizing the content
of alerts.
Scalability for Different Environments: The system is designed to be scalable, accommodating
various property sizes and security requirements. Users can adapt the product to fit the unique
characteristics of their environment, whether it's a small residential property or a large
commercial space.
Maintenance and Updates: The system supports over-the-air updates, simplifying the process
of keeping the system up to date. Users can also perform routine maintenance tasks through the
user interface, ensuring the longevity and optimal performance of the security system.
Help and Support: In case users need assistance or information, the system provides access to
comprehensive documentation, FAQs, and customer support resources.

CHAPTER 3: TECHNICAL SPECIFICATIONS


A GSM Based Laser Light Security System typically uses laser beams to create a perimeter or
barrier, and when those beams are interrupted or tampered with, it triggers an alarm or security
response by sending an SMS to the designated stakeholders through the GSM module. These
systems are often used in high-security applications, such as protecting sensitive areas or assets.

11
The technical specifications of a GSM Based Laser Light Security System can vary significantly
depending on its purpose and the specific requirements of the application. However, this system
is divided into two major subsystems with two members working diligently on each subsystem.
The first subsystem is the Detection system which is designed by Calvins Were and Dennis
Kimatu, while the second subsystem is the Communication system which is designed by Ryan
Kipngetich and Paul Inda.
The technical specifications for this matter will be divided into three major parts: Detection
system specifications, Communication system specifications and system reliability and
maintenance specifications.
3.1 Detection System Specifications
The detection system is responsible for monitoring and collecting input signals for processing
from the environment where the system is placed. Its major components consist of the laser
diode, LDR sensor, and microcontroller. The specifications of the major components are detailed
below:
Laser Diode
This is the emitter of the Laser light and the choice of the laser diode will depend solely on these
factors:
Type of laser: Different types of lasers can be used, such as diode lasers, solid-state lasers, or gas
lasers, depending on the application.
Wavelength: The choice of wavelength depends on the system's requirements and environmental
factors.
Perimeter Coverage: Sensors are configured to cover the entire perimeter of the secured area.
Height and Angle Adjustment: Sensors may be adjustable in terms of height and angle to
accommodate different environmental factors.
Depending on the factors, the diode lasers will be effective with the following parameters:
Type: Infrared Laser Diode
Wavelength: 650nm (Infrared)
Power Output: 5mW (for safety reasons)
Modulation: Continuous Wave (CW)
LDR Sensor (Receiver):
The LDR (Light Dependent Resistor) sensor will serve as the receiver of the laser light send by
the diode laser. Whenever projection of light from the laser diode to the LDR sensor is interrupt,
an alarm is made. The component in use here can be a Photoresistor or LDR (Light-Dependent
Resistor).
Resistance Range: Typically, a few hundred ohms in bright light and several kilohms or more in
darkness
Interface: Connected to one of the analog input pins on the microcontroller.
Buzzer:
A buzzer or beeper is an audio signaling device, which may be mechanical,

12
electromechanical, and piezoelectric. Typical uses of buzzers and beepers include alarm
devices, timers and confirmation of user input such as a mouse click or keystroke.
Microcontroller:
The microcontroller is the central processing unit that receives input signals from the Laser
sources, controls the system in real time and sends output signals to the GSM module for
communication whenever an interruption in normal processing occurs between the laser diode
and the LDR sensor.
There are a variety of microcontrollers and the microcontroller in use should support both the
detection system and the communication system in one system. The Arduino microcontrollers
will be effective before of the increased pin capacity, easy programming and are user-friendly.
3.2 Communication System Specifications
Detecting intrusion alone is not enough security measure therefore, a communication module is
added to the system to alert the designated stakeholders in case of intrusion on their mobile
devices. A GSM module provides us with a solution and for this reason it is used to send alerts to
the user once a LOW signal is experienced on the system.
There are several GSM modules including SIM900, 800 and SIM7600. For this project,
SIM7600 is preferred the other modules. This module excels in providing high-speed
connectivity, supporting LTE CAT4 and offering global coverage across multi-band
frequencies. With its backward compatibility for 3G and 2G networks, the SIM7600
ensures adaptability to diverse regional network infrastructures.

• Key Specifications of the GSM module:


• Frequency Bands:
• LTE-FDD: B1/B3/B5/B7/B8/B20
• LTE-TDD: B38/B40/B41
• GSM/GPRS/EDGE: 900/1800 MHz
• Data Transfer Rate:
• LTE: Up to 10 Mbps (downlink), Up to 5 Mbps (uplink)
• HSPA+: Up to 42 Mbps (downlink), Up to 5.76 Mbps (uplink)
• GPRS/EDGE: Up to 85.6 kbps
• Interfaces:
• UART, USB, I2C, GPIO, ADC, PCM, etc.
• Operating Voltage:
• Power supply: 3.4V to 4.2V
• Logic level: 1.8V
• Dimensions:
• 30 mm × 30 mm × 2.9 mm
• Operating Temperature:
• -40°C to +85°C

13
• Features:
• Compact and versatile GSM module suitable for various IoT and M2M
applications.
• Provides high-speed data transfer over LTE and backward compatible with 2G
and 3G networks.
• Supports various communication interfaces, enabling integration with
microcontrollers and other devices.
• Low power consumption for energy-efficient operation.
• Designed for global compatibility with support for multiple frequency bands.
• Applications:
• IoT (Internet of Things) devices and applications.
• M2M (Machine-to-Machine) communication.
• Asset tracking and monitoring.
• Remote control and monitoring systems.
• Industrial automation and telemetry.
• Usage Considerations:
• Ensure proper antenna connection for optimal signal reception.
• Supply the module with the recommended operating voltage.

3.3 System Reliability and Maintenance Specifications


These specifications affect the working conditions of the entire system and its environs. They
include but are not limited to:
Power Requirements:
Power supply: Voltage and power requirements for the laser source and associated components.
Backup power: Battery or uninterruptible power supply (UPS) for continued operation during
power outages.
For these, the requirements are as follows:
• Voltage: 5V for Arduino and components (ensure sufficient current capacity)
• A suitable power source for the laser diode with a current driver circuit if needed.
Environmental Considerations:
1. Temperature Range:
Operating Temperature: -20°C to 50°C (Typical range but can vary depending on
component specifications).
Storage Temperature: -30°C to 60°C (Storage conditions when the system is not in use).
2. Humidity Range:
Operating Humidity: 10% to 90% RH (Relative Humidity) non-condensing.
Storage Humidity: 5% to 95% RH non-condensing.
3. Outdoor or Indoor Use:
The system is designed for both indoor and outdoor use, with appropriate
weatherproofing for outdoor applications.

14
Outdoor-Use Rating: IP65 (Ingress Protection rating) for dust and water resistance, for
example.
Range and Coverage
1. Maximum Detection Range:
Detection Range: Up to 50 meters (This value can vary significantly based on the power
of the laser diode, environmental conditions, and the sensitivity of the detection system).
Adjustable Range: The system allows for adjustable detection ranges based on your
specific needs.
2. Coverage Area:
Coverage Width: 180 degrees (Typical for a wide-angle security system).
Coverage Height: 2 meters above ground level.
Total Coverage Area: Approximately 50 meters in length and 2 meters in height within
the detection width.

Integration
1. Compatibility with Access Control Systems:
Access Control Protocols: The system is compatible with common access control
protocols, allowing it to trigger access control measures such as locking or unlocking
doors.
Interoperability: The system can interface with electronic access control systems,
including card readers and biometric systems.
2. Compatibility with Alarms:
Alarm Triggering: The system can trigger alarms in coordination with other security
systems.
Alarm Protocols: It supports standard alarm protocols for communication with central
alarm monitoring centers.
Safety and Compliance
1. Laser Safety:
Compliance with Laser Safety Standards: The system adheres to laser safety standards
such as ANSI Z136.1 to prevent accidental exposure to laser radiation.
Safety Interlocks: Safety interlock mechanisms are in place to automatically shut down
the laser source in case of unauthorized access or a system fault.
Safety Signage: Laser safety signage and warnings are posted in areas where the system
is deployed to alert individuals of potential laser hazards.
2. Regulatory Requirements:
Adherence to Local Regulations: The system complies with local and national regulations
related to the use of lasers, safety, and surveillance.
Industry-Specific Standards: The system meets industry-specific standards, (e.g., ISO
standards for security systems).

15
With all the technical specifications in place, the design part of the project is approached with all
the specifications in place to avoid maximal errors in the implementation stage.

16
CHAPTER 4: DESIGN
Designing a laser light security system involves integrating various components to ensure
effective detection and communication. Below is a conceptual design that outlines key elements
of both the detection and communication systems.
4.1 Components Required
Microcontroller (for communication and control).
• The central control unit responsible for managing the system's operation and
communication.
• Controls the laser diode, LDR sensor, GSM module and buzzer.
• Establishes a connection to a central monitoring station or control system.
Laser Diode (for emitting the laser beam).
• Emits a continuous or modulated laser beam across the secured area.
LDR (Light-Dependent Resistor) Sensor (for detecting interruptions in the laser beam).
Buzzer (for alerting).
GSM Module (for notification via SMS).

4.2 Operation
Laser Emission:
The microcontroller controls the laser diode to emit a laser beam across the area to be secured.
The laser diode is modulated as needed for security and safety purposes.
Intrusion Detection:
The LDR sensor continuously monitors the laser beam's path.
If an object or intruder interrupts the laser beam, the LDR detects a drop in light intensity and
triggers an intrusion event.
Alerting and Communication:
Upon intrusion detection, the microcontroller activates the buzzer to sound an alarm, and the
GSM Module sends an alert SMS to the designated stakeholders.
The microcontroller can send alerts or data to a central monitoring station or control system
through the chosen communication module.
Integration:
If integrated with other security systems, the microcontroller can also trigger responses in those
systems, such as activating CCTV cameras or access control systems.
Laser Alignment and Mounting
Laser Alignment:
• Position the laser diode and LDR sensor on opposite sides of the area you want to secure.
• Ensure that the laser diode is securely mounted and properly aligned with the LDR
sensor.
Power Supply:
• The microcontroller, laser diode, LDR, and buzzer will need a power supply. The voltage
and current requirements should be in accordance with the component specifications.

17
• Include provisions for a backup power source, such as a battery, to ensure continuous
operation during power outages.

Integrating the GSM Module with detection system


Step one: Connecting the GSM Module
Connect the SIM7600 module to your Arduino board: The SIM7600 module with slot straight on
top of the Arduino connecting the SIM7600's RX pin to the Arduino's digital pin 10 and connect
the SIM7600's TX pin to the digital pin 11. (The digital pins may vary according to the
programmer).
Step 2: Opening the Arduino IDE
Open the Arduino IDE. Install the Software Serial library: In the Arduino IDE, go to Sketch >
Include Library > Manage Libraries, search for Software Serial, and install the library. Create a
new sketch: In the Arduino IDE, go to File > New to create a new sketch.
Step Three: Uploading Code
After creating the sketch, a code is written to allow connection of the GSM module with the area
owner’s contact. The code is written in the Arduino IDE environment and then compiled and
uploaded to the Arduino Uno.
Upload the sketch to your Arduino board: Connect the Arduino board to your computer using a
USB cable and click the Upload button in the Arduino IDE.
Step Four: Checking the Output
Check the serial monitor: After the sketch has finished uploading, go to Tools > Serial Monitor in
the Arduino IDE to see the output of the SIM7600 module. You should see a message indicating
that the SMS has been sent successfully.
4.3 Design Diagrams

18
CHAPTER 5: METHODOLOGY

5.1 VERIFICATION OF DESIGN

A verification of design conducted for both the intrusion system and the communication system
worked efficiently. The synthesis of the components was proved to be logically correct as it
performed the desired function with the right programming code in place. Below is an overview
of the system was verified.

Circuit Connection/Wiring and Programming Code


The Arduino uno microcontroller is the brain and the central processing unit of the
project. The sensor (Infrared laser module) monitors its environment while communicating with
the central processing unit, such that if any interruption occurs, the Arduino uno then sends
signals to the buzzer and LEDs for alerts. Otherwise, the system remains in an armed state.

1. Infrared sensor module connectivity with the Arduino uno.


The VCC pin of the Infrared laser module will be connected to a Power source (+ve).
The Ground pin of the Infrared laser module will be connected to Ground source (-ve).
The Output Pin of the Infrared laser module will be connected to pin D2 of the Arduino
uno. Pin D2 will be responsible for receiving signals from the infrared sensor and
interpreting them to produce an output.

2. The Buzzer’s connectivity with the Arduino Uno


The positive pin of the buzzer will be connected to Pin D4 of the Arduino Uno while the
negative pin will be connected to a ground terminal. Pin D4 is responsible for sending an
output signal to the buzzer in case of interruption of the Infrared laser module. That
means that incase of intrusion, Pin D4 turns to logic state 1 (HIGH) and remains 0 (LOW),
otherwise.

3. The LEDs connectivity with the Arduino Uno


The positive pin of the LED will be connected to a resistor to reduce the amount of
current flow and shall be connected to pin D3 of the Arduino uno. The ground pin of the
LED shall be connected to a ground terminal. In case of intrusion, pin D3 turns to logic
state 1 (HIGH), and remains 0 (LOW), otherwise.

4. The LCD connectivity with the Arduino Uno


To begin with, the VSS and RW pins of the LCD will be connected to a ground terminal.
The RW bit tells the LCD whether we wish to read from or write from the RAM, which is
not our case. The VSS is a source power supply which is connected to zero/ground when we
have a single power supply.
The Register Select (RS) pin of the LCD is connected to pin D8 of the Arduino uno. The RS
19
(Data/Instruction select) bit tells the LCD whether we are going to send an instruction or
a piece of data.
The Enable (E) pin of the LCD is connected to pin D9 of the Arduino uno. The E (enable) bit
tells the LCD when it should read the data lines.
The VDD pin of the LCD is connected to a positive power supply terminal.
Pins D4, D5, D6, and D7 of the LCD are connected to pins D10, D11, D12, and D13 of the
Arduino uno respectively. These pins will be used to address the characters to be displayed. For
example, “NO INTRUSION”, “WARNING, SOMEBODY THERE!”.

5. The Potentiometer connectivity with the LCD


A potentiometer will be used to control the contrast of the LCD. The potentiometer has
three pins; Two outside pins (Power pin and the Ground pin) which will be connected to
power and ground terminals respectively, and one inside pin which will be connected to the
VEE pin of the LCD to control its contrast.

The Programming code to control the Arduino Uno

#include <LiquidCrystal.h>
// Initialize the LiquidCrystal library with the numbers of the interface pins
LiquidCrystal lcd(8, 9, 10, 11, 12, 13);
// Define pin numbers
int irPin = 2; // IR sensor pin
int LED = 3; // LED pin
int buzzerPin = 4; // Buzzer pin
int sensorOut = LOW; // Variable to store sensor output state (initialize as LOW)
void setup () {

lcd.begin (16, 2); // Set up the LCD's number of columns and rows.
// Set pin modes
pinMode (irPin, INPUT); // Set IR pin as input
pinMode (LED, OUTPUT); // Set LED pin as output
pinMode (buzzerPin, OUTPUT); // Set buzzer pin as output
// Begin serial communication for debugging
Serial.begin (9600);
}
void loop () {
// Read the state of the IR sensor
sensorOut = digitalRead (irPin);
// Check if there is no intrusion
if (sensorOut == LOW)

20
{
Serial.println ("No Intrusion!");
lcd.clear ();
lcd.print ("No Intrusion!");
// Turn off LED and buzzer
digitalWrite (LED, LOW);
digitalWrite (buzzerPin, LOW);
}
else
{ // Intrusion detected.
Serial.println ("Somebody there!");
lcd.clear ();
lcd.print ("Warning!");
lcd.setCursor (0, 1);
lcd.print ("Somebody there!");
// Turn on LED and buzzer
digitalWrite (LED, HIGH);
digitalWrite (buzzerPin, HIGH);
}
delay(200); // Delay to avoid rapid readings and enhance stability.
}

5.1.1 Verification Diagrams and Proofs

For the detection system, the verification was done through the Proteus Simulation software. The
verification was done according to the specified requirements and synthesized according to the
design. Here are proofs of the verification working correctly.

When set at logic 0, the system indicates “No Intrusion”, and the LED is OFF.

When set at logic 1, the system indicates “Warning Somebody There!”, and the LED turns ON.

21
22
5.2 PROTOTYPING OF DESIGN

After verification of design was done and everything working correct logically, the next thing
was to implement the prototype for the product. The components used were locally available thus
making it easy for us to implement the prototype. The synthesis of the components was done
according to the specification of requirements and strictly according to the design of the product.
The prototyping was done in two phases; The intrusion system implementation , then followed
by integrating the communication system. The intrusion system worked correctly with no delays
and was ready to be integrated with the communication system. For the communication system, a
problem arose as it could not send the messages to the recipients contact. The members
conducting the communication system had the verification working but the implementation of
the prototype failed as documented.
The images for the prototypes are attached below.

23
CHAPTER 6: RESULTS AND DISCUSSION

6.1 Results
• Intrusion Detection System (IDS) Functionality:
The Intrusion Detection System, based on laser light technology, operated as intended during the
testing phase. It successfully detected intrusions by monitoring disruptions in the laser beams
along the perimeter.

• GSM Module Integration:


The GSM module, intended for wireless communication of intrusion alerts, was integrated into
the system as planned. However, during testing, the GSM functionality did not perform as
required.

• Observations:
Upon triggering an intrusion event, the Intrusion Detection System correctly generated alerts.
However, the GSM module failed to transmit these alerts to the designated recipients (e.g.,
security personnel, property owners) via SMS or calls.
Attempts to troubleshoot the GSM module, including verifying network connectivity, ensuring
proper SIM card insertion, and checking configuration settings, did not resolve the issue.

6.2 Discussion
Potential Causes of GSM Module Failure:
Network Connectivity Issues: The failure of the GSM module to transmit alerts suggests possible
issues with network connectivity. Despite verifying the SIM card and network coverage, the
module may have encountered communication barriers or network congestion.
Hardware or Software Malfunction: It is possible that the GSM module itself experienced
hardware or software malfunctions, leading to its failure to initiate communication.
Integration Challenges: The integration of the GSM module with the existing system architecture
may have introduced compatibility issues or communication conflicts, impacting its
functionality.
Impact on System Reliability:
The inability of the GSM module to transmit intrusion alerts compromises the reliability and
effectiveness of the overall security system. Without timely communication of detected
intrusions, the system's ability to mitigate security threats and alert stakeholders is compromised.

24
Mitigation Strategies:
Technical Troubleshooting: Further investigation into the root cause of the GSM module failure
is warranted. Technical troubleshooting, including hardware diagnostics and software debugging,
may help identify and resolve underlying issues.
Alternative Communication Channels: In the interim, consideration should be given to
alternative communication channels for transmitting intrusion alerts. Backup options, such as
CCTV cameras or dedicated alarm systems, could provide redundancy in alert mechanisms.
Vendor Support and Warranty: Engaging with the GSM module vendor for technical support and
warranty services is advisable. Vendor assistance may help diagnose and address hardware or
software issues impacting module performance.

25
CONCLUSION
In conclusion, the development of the GSM-based Laser Light Security System represents a
significant step towards enhancing perimeter security and intrusion detection capabilities.
Through the integration of laser technology and wireless communication, the system aimed to
provide real-time alerts and proactive monitoring of secured areas.
The project successfully implemented the Intrusion Detection System (IDS), leveraging infrared
laser technology to detect intrusions accurately along the perimeter. However, challenges arose
during the integration of the GSM module, hindering the system's ability to transmit intrusion
alerts effectively.
Despite the setback with the GSM module, the project highlights the importance of
interdisciplinary collaboration, rigorous testing, and adaptive problem-solving in complex
system development. Technical expertise in systems engineering, electronics, and
communication technologies was instrumental in the design and implementation phases.
Moving forward, addressing the root cause of the GSM module failure and implementing
mitigation strategies will be essential to restore the system's reliability and functionality.
Additionally, incorporating redundancy measures, refining testing procedures, and fostering
vendor support will enhance the system's robustness and resilience to unforeseen challenges.
Overall, the GSM-based Laser Light Security System project underscores the iterative nature of
systems engineering and project management. While challenges may arise, each obstacle
presents an opportunity for learning and refinement. By embracing a proactive approach to
problem-solving and continuous improvement, the project lays the foundation for future
advancements in security technology and perimeter protection.

26
RECOMMENDATIONS
Based on the findings and challenges encountered during the development of the GSM-based
Laser Light Security System, the following recommendations are proposed for consideration:
1. Root Cause Analysis: Conduct a thorough root cause analysis to identify the
underlying issues contributing to the failure of the GSM module. This analysis should encompass
hardware, software, and integration aspects to pinpoint the specific areas requiring attention.
2. Technical Expertise and Training: Invest in additional technical expertise or training
for team members involved in system integration and troubleshooting. Enhanced skills in
communication technologies, hardware diagnostics, and system integration will facilitate more
effective problem-solving.
3. Vendor Collaboration: Collaborate closely with the GSM module vendor to leverage
their expertise and support in diagnosing and resolving technical issues. Engaging with the
vendor for troubleshooting assistance, firmware updates, or hardware replacements can expedite
the resolution process.
4. Redundancy Planning: Incorporate redundancy measures for critical system
components, such as communication modules, to mitigate the impact of single-point failures.
Implementing backup GSM modules or alternative communication technologies will enhance
system reliability and fault tolerance.
5. Comprehensive Testing: Enhance testing procedures to include comprehensive
validation of system functionality under varied conditions. Real-world simulations, stress testing,
and scenario-based testing will help identify and address potential integration challenges before
deployment.
6. Iterative Development: Embrace an iterative development approach that emphasizes
continuous improvement and adaptive problem-solving. Regular review and refinement of
system design, integration processes, and performance metrics will drive ongoing optimization
and enhancement.
7. Documentation and Knowledge Sharing: Document lessons learned, troubleshooting
procedures, and best practices for future reference. Establish a knowledge-sharing platform or
repository to facilitate collaboration and knowledge transfer among team members.
8. Stakeholder Engagement: Maintain open communication with stakeholders, including
end-users, security personnel, and property owners, throughout the development process. Solicit
feedback, address concerns, and provide regular updates on system improvements and
enhancements.
9. Regulatory Compliance: Ensure compliance with relevant regulatory standards and
requirements governing security systems, communication technologies, and data privacy.
Adhering to industry regulations will uphold system integrity and trustworthiness.

27
10. Long-Term Support and Maintenance: Develop a long-term support and maintenance
plan to sustain system reliability and performance post-deployment. Establish protocols for
ongoing monitoring, software updates, and hardware maintenance to extend the system's
operational lifespan.
By implementing these recommendations, the project team can address the challenges
encountered and strengthen the GSM-based Laser Light Security System's functionality,
reliability, and effectiveness in detecting and communicating security breaches.

28
SUGGESTIONS FOR FURTHER WORK
To further advance the GSM-based Laser Light Security System and address the challenges
encountered, the following suggestions for further work are proposed:
1. Enhanced Integration Testing: Conduct thorough integration testing with a focus on the
GSM module's interaction with other system components. Test various scenarios and edge cases
to validate the reliability and robustness of the integrated system.
2. Optimization of Communication Protocols: Explore alternative communication
protocols or methods for transmitting intrusion alerts via the GSM module. Evaluate the
efficiency and effectiveness of different protocols in ensuring timely and reliable
communication.
3. Advanced Fault Detection Mechanisms: Develop advanced fault detection mechanisms
within the system to identify and diagnose issues with the GSM module in real-time. Implement
automated monitoring and alerting systems to promptly address any communication failures.
4. Redundancy and Failover Solutions: Investigate redundancy and failover solutions to
mitigate the impact of GSM module failures. Implement backup communication channels or
redundant GSM modules to ensure continuous operation and fault tolerance.
5. Remote Diagnostic and Management Features: Incorporate remote diagnostic and
management features into the system to facilitate troubleshooting and maintenance of the GSM
module. Enable remote configuration, firmware updates, and diagnostic checks to streamline
support processes.
6. Integration with Central Monitoring Systems: Integrate the security system with central
monitoring systems or security operations centers (SOCs) for centralized management and
monitoring. Enable seamless communication between the security system and SOC personnel for
efficient incident response.
7. User-Friendly Configuration Interfaces: Develop user-friendly configuration interfaces
for configuring and managing the GSM module settings. Simplify the process of setting up alert
recipients, message formats, and communication parameters to enhance usability.
8. Expandable and Modular Architecture: Design the system with an expandable and
modular architecture to accommodate future upgrades and enhancements. Allow for the
integration of additional sensors, communication modules, or security features to meet evolving
requirements.
9. Field Testing and Validation: Conduct extensive field testing and validation of the
enhanced system in real-world environments. Collaborate with end-users and stakeholders to
gather feedback and validate the system's performance under diverse conditions.

29
10. Continuous Improvement and Feedback Loop: Establish a continuous improvement
process to gather feedback, prioritize enhancements, and iterate on system improvements. Foster
a feedback loop with end-users, stakeholders, and technical experts to drive ongoing
optimization.
By pursuing these suggestions for further work, the GSM-based Laser Light Security System can
evolve into a more robust, reliable, and effective solution for perimeter security and intrusion
detection. Continued innovation and iterative development will contribute to the system's success
in safeguarding assets and enhancing security capabilities.

30
REFERENCES
Smith, J., Johnson, A., & Williams, B. (2023). Wireless Intrusion Detection System Using Laser
Technology. In Proceedings of the IEEE International Conference on Wireless Communications
and Networking (WCNC).
Lee, C., Kim, D., & Park, S. (2022). Integration of GSM Modules in Wireless Sensor Networks
for Remote Monitoring. IEEE Transactions on Industrial Informatics.
Chen, L., Zhang, H., & Wang, Y. (2021). Fault Detection and Diagnosis in GSM-based
Communication Systems. International Journal of Communication Systems.
Patel, R., Smith, K., & Jones, M. (2020). System Integration and Testing: Principles and Best
Practices. Wiley-IEEE Press.

31

You might also like