2. Background :MHSS)

2. Background - MHSS

2.1. GSM/GPRS Based Security System

Based on the IEEE802.11 standard, wireless home network is known as WiFi, which provides a medium for transferring media files [1]. However, it is high cost and high
International Journal of Smart Homepower consumption. Y. Zhao [2] has developed a low cost GSM/GPRS based wireless home security system which includes wireless security sensor nodes and a GSM/GPRS gateway [2-3]. It has the following features:
 (a) low cost, 
(b) low power consumption,
 (c) simple installation,
 (d) fast response and 
(e) simple user interface.
 In general, GSM modem acts as the interface between the users and the sensors nodes. There are 3 types of sensor nodes applied in the system which include the door security nodes, infrared sensor nodes, and fire alarm nodes. This architecture includes components such as filters, amplifiers, analog to digital converters and communication interfaces. The system used a wireless transceiver module to transfer data between gateway and sensor nodes. Every sensor node comprises a microprocessor and a wireless transceiver module. The function of the microprocessor is to receive and analyze the signal from the sensors’ node as well as the current status of the nodes. This system also consists of a sleep timer and switch mode pump circuit, which reduces of the power consumption.
C.K. Ng [4] has developed a wireless security system where an alarm system is programmed in a graphical user interface (GUI). The system is used to monitor the RFID reader, RFID tag and the GSM terminal. The information obtained from the tag is sent to the server in a RF link that is exhibited in a GUI. If the laptop is stolen from the covered region, the alarm system will start to draw attention. Meanwhile, the laptop owner will be notified by an alert message. In addition, the alarm system will not be stopped until the laptop is put back in the covered region, or the program is stopped/terminated.RFID have been available for many years for reading bar codes RFID tag located several meters away [5-8]. It is increasingly being used in other applications ranging from inventory management to anti-counterfeiting protection. In a wireless security system (WSS) [8], a RFID tag is attached to the laptop and RFID reader is connected to server. If the laptop is stolen from the reader, the alarm system will be triggered to draw attention with loud noise. The laptop owner will be notified with short messaging service (SMS) from the server via GSM module system in a few seconds. Alternatively, it can be improved with Bluetooth technology which is embedded in most of mobile laptop today [9]. The GSM terminal is used as the SMS interface to send messages 
[10]. Generally the notebook acts as the base station to run the program. Usually GSM terminal comes with a RS232 connector to external terminal equipment, and the Subscriber Identity Module (SIM) cardholder and the external connector [4].Nakrop Jinaporn [11] has developed a security system against asset theft by using radio frequency identification technology. 
The system consists of five main parts: 
(a) RFID reader and tag,
 (b) GUI,
 (c) database system,
 (d) CCTV and 
(e) wireless transmitter and receiver. 
The RFID reader is installed at the entrance of the campus and the tags are attached on/in student ID cards and their properties. The program of the developed system has the capabilities of investigating the identification process, database management and controlling function of the hardware.GUI is used in a vehicle security system where the information is controlled via the GUI [11-12]. The system is activated when the tag is read while the motorcycle is being located within the effective range. The system will automatically record this incident and exhibit the information on the monitor. Any theft occurrence will turn the monitor on automatically with the alarm signal which alerts other systems. When the burglar occurs, the CCTV will also be started for recording is immediately. The motorcycle engine is shut off automatically when the asset theft occurs however this requires a further investigation.

No comments:

Post a Comment

its cool