0% found this document useful (0 votes)
82 views17 pages

Detection Intrusion-1

The document provides background information on intrusion detection systems. It discusses how security systems have advanced from using animals and neighbors to monitor properties to modern electronic alarm systems connected to central monitoring stations. The first electric burglar alarm was patented in 1853. By the 20th century, motion sensors and infrared technology improved detection capabilities. The document defines an intrusion detection system as a monitoring system that detects suspicious activities and generates alerts, allowing security personnel to respond.

Uploaded by

David Nwankwere
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views17 pages

Detection Intrusion-1

The document provides background information on intrusion detection systems. It discusses how security systems have advanced from using animals and neighbors to monitor properties to modern electronic alarm systems connected to central monitoring stations. The first electric burglar alarm was patented in 1853. By the 20th century, motion sensors and infrared technology improved detection capabilities. The document defines an intrusion detection system as a monitoring system that detects suspicious activities and generates alerts, allowing security personnel to respond.

Uploaded by

David Nwankwere
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

1.

0 Introduction:
This chapter dealt with the background study of the project, the motivation and purpose of
the project were highlighted leading to the statement of the problem and the aim and
objectives, the scope of the work and significant justification.

1.1 Background of Study


Security system are gaining increase importance in recent times to protect life and valuable
resources, many advanced method of providing security have been developed and are in use
in the last few decades. One important area is the security system required for
military/strategic applications as stated by the ACPO {Association of chief police officers
2002}, which has advanced greatly. Such systems being complex and expensive are useful
to high end application only. However with recent progress in technology and the growing
need for increased security in civilian and other applications, many low cost solutions
security system have now emerged. In the field of the Burglar Alarm Systems using modern
approaches has become a major means of providing security in all applications, both
military and civilian.
Due to high state of insecurity being experienced in the entire world the need to keep the
occupants of the office aware of any intrusion in to their premises, as quoted that” alarms
without the burglars put strain on police budget”(butterfield , f .2003)

In the civilian circle, security systems are required for both life and property protection.
Properties such as goods in warehouse required protection from theft and robbery. These
demand that one form or the other of an intrusion detection system be installed in the
warehouse. The purpose of the development of the office grown simple intrusion detection
system that meets the same needs as commercial available system (barazini R 2002.
Reduction of theft and false alarm a system approach).
To effectively select a security system, the first thing that has to be considered is the fact
that one has something valuable to protect that is worth the expense and time necessary to
plan, build and install an electronic alarm system at all cost. Most people today in homes,
companies and working places, have valuable materials such as goods and services that
need to be adequately protected for accurate management and efficient productivity.
(Morris, 2012).

1.2 Statement of the Problem


Erisco food company has been experiencing a lot of losses in their business, due to theft in
the warehouse,
Items such as manufactured and finished goods such as cartons of tomato paste, bags of rice
and several gallons of groundout oil has over the years be found missing which makes the
company suffer a great deal of loss which may be caused by their internal employees and
external consumers in the locality. The company have tried using the physical security
system which has not alleviated the problem or offer a lasting solution and hence the
introduction of an electronic means, such as the intrusion detection system was proposed.

1.3 Aim and Objective


The aim of this project is to design and implement an intrusion detection system for Erisco
food limited, okigwe.
The objective are:
a) To design and construct an electronic based intrusion detection system for Erisco food
company limited.
b) To dectect the presence of an intruder in erisco company warehouse after working
hours.
c) To ensure the safety of erisco food company warehouse and stored goods.
d) To prevent illegal and unauthorized access to erisco company premise.
1.4 Scope of the study
An intrusion detection system connects all peripheral equipment, such as detectors, sirens
and control units.
To analyze threat and raises alarm in the event of danger, the circuit helps safeguard the
companies manufactured and stored goods from intruders or theft, all that is needed is to
place the circuit inside the warehouse at closing hours, when any unknown person walk
over the motion sensors the circuit will trigger the alarm and the sound of the alarm comes
up, the main benefit of this system is that this can be implied in different places at a time as
two different switches produces two different sound.

1.5 Justification/significance of study


a) To Regulate entry and exit in the company premises at a given period of time.
b) To specify at what point goods were taken and kept.
c) To keep adequate record of minimum and maximum sales of goods per working day
and record of products produced per day.
d) To enable the occupant to give accurate account of goods produced and delivered.
e) To keep security personnel alert of any unauthorized entry and exit in the company
after working hours.
2.0 Introduction:
This chapter emphasizes on the overview of an already existing knowledge on intrusion
detection systems, it focuses on summarizing, analyzing and evaluating the relevant
survey and study on intrusion detection systems leading to the design implementation
general statement of erisco foods company limited and the review of the related literature
study

2.1 Literature review


Intrusion detection system the latest state-of-the art company security systems have many
features that make our lives easier, from keyless door locks to the ability to arm your
alarm from your cell phone. While these features are relatively new, the need to protect
one’s company from intruders is not. It may surprise one to learn that intrusion detection
systems have been around in one form or another for hundreds of years, and that the
modern Electronic alarm system was invented in 1853. Even alarm monitoring has been
around for over a century! Today, we take quick look at the history of electronic alarms
to help one better appreciate the technology we have today.

Electronic alarm systems are nothing new. In one historical document from 386 B.C. it
was noted that a distinguished officer was alerted to danger by the flapping wings of
cackling geese. Over the years, dogs and other livestock helped protect homes against
intruders, and homeowners relied on neighbors or their own family members to keep their
belongings and homes safe.

In the 18th century, an English inventor created an intrusion alert that played chimes
when a skeleton key or another device was used to open a door. This let homeowners
know that someone was attempting to bypass their lock. Obviously, it had its limitations.
Fortunately, electricity came along in the 19th century, opening the door to new options
in burglar alarms.

Electricity Added to security Alarms


In 1853, the burglar alarm was patented by Reverend Augustus Russell Pope of
Somerville, Massachusetts. This unit operated off a battery, and required an individual
unit for each window or door. A few years later, Edwin Holmes bought the patent from
Pope. Holmes is credited with actually manufacturing a device that was available for
purchase. People were skeptical about using electricity for alarms, so the business didn’t
go well. It wasn’t until Holmes started marketing his product in New York City that
things took off for him. He built a network of alarms which were monitored by a central
station.

Once he established the system in New York, he sent his son back to Boston to copy it.
Instead of building a separate cable system like his dad did in NYC, Holmes’ son tapped
into the existing phone lines. This let him build a system connected to 700 homes. His
dad then quickly copied this in NYC. Holmes, who was president of Bell Phone
Company, kept the rights to use the phone lines for his alarm when he sold his interests in
the phone company. As electricity became more accepted in the form of streetlights,
people began accepting electrical burglar alarms. The growth of the phone system also
contributed to the growth of the industry.

Electronic intrusion detection system in the Twentieth Century and Beyond


In 1905, The American Telephone and Telegraph Company (AT&T, as it is known
today) bought the Holmes’ business. They began linking the system to emergency call
systems to alert the police and fire to emergencies. In the twentieth century, many
modifications were made to the burglar alarm. After World War II, the technology
advanced even more. More people saw the benefits of being connected to emergency
personnel.

In the 1970s, motion sensors and infrared technology improved the capability of burglar
alarms, but there were still many false positives until the 80s, when engineers were able
to advance the system even further. Burglar alarms became standard in building security,
and the technology became more affordable for homes.
2.2 Intrusion Detection System

An Intrusion Detection System (IDS) is a monitoring system that detects suspicious


activities and generates alerts when they are detected. Based upon these alerts, a security
operations center (SOC) analyst or incident responder can investigate the issue and take
the appropriate actions to remediate the threat to alert the owner of the property of the
warehouse.
According to (www.WIKIPEDIA.com) an intrusion detection system (IDS; also intrusion
prevention system or IPS) is a device or software application that monitors a network or
systems for malicious activity or policy violations. Any intrusion activity or violation is
typically reported either to an administrator.
According to (Ben Lutkevich 2009) an intrusion detection system (IDS) is a system that
monitors the presence of intrusion for suspicious activity and alerts when such activity is
discovered.
Furthermore an Intrusion Detection System is a hardware nand software programmable
device used for monitoring a premises and protecting it from an intruder. With the rapid
progress in the internet based technology new application areas for computer network
have emerged. In instances, the fields like business, financial, industry, security and
healthcare sectors the electronic systems have progressed. All of these applications are
attractive target for the abuse and a big vulnerability for company security services. Other
intrusion application in networks for instance burglars use organization’s internal systems
to collect information’s and cause vulnerabilities like Software bugs, Lapse in
administration,. As the internet emerging into the society, new stuffs like viruses and
worms are imported. The malignant so, the users use different techniques like cracking of
password, detecting unencrypted text are used to cause vulnerabilities to the system.
Hence, security is needed for the users to secure their system from the intruders. Firewall
technique is one of the popular protection techniques and it is used to protect the private
network from the public network. IDS are used in network related activities, medical
applications, credit card frauds, Insurance agency
2.2 Design

To Design means to create a plan or sketch of something that is going to be made later,
especially a plan that details what the finished thing will do and look like. A design is the
plan or sketch created as a result of this activity. It deals with the design methods and
then analysis employed in the design of the intrusion detection system, The analysis is
divided into modules namely :
 The Power supply unit
 The Processor unit
 The Software Design

2.2.1 Design of the Power Supply Unit

The power supply unit performs the function of converting an AC source to a DC power
which is needed to power the circuit. A miniature 12V power source adapter was
incorporated into the design to power the different segments of the system.

2.2.2 Design of the Processor Unit

The design of the processor unit was achieved using adriuno nano microcontroller. The
processor unit takes care of taking the signals from the sensors and activating the alarm
and display to show the point of intrusion or the place where the intruder is thereby
making it easy for the intruder to be caught. The Processor unit controls the overall
function of the system since it takes the signals from the sensor inputs and determines the
necessary action to take by showing the zone of intrusion of the intruder or thief and also
directing the security operative in apprehending the criminal by giving away the position
of the criminal, The processor unit was programmed to achieve the desired system
result.

2.2.3 The Software Design

This is the written program that contains the bearer’s intension. The screen displays the
content of this program. With particular reference to this project, the essence of this
program is to control the transmitting and receiving signals at a particular time,
Hence with the program properly implemented, the detection system would send the
signal accurately. The software/firmware development was executed in the following
phases:

a. Writing of the source code Is C++ language.


b. Compiling the source code using SDCC compiler.
c. Programming the Adriuno microcontroller with the output hex file
from the compiler using ISP flash program.

(F.i.g 2.2 Design Diagrm)

2.3 Implementation

Implementation is the execution or practice of a plan, a method or any design, idea,


model, specification, standard or policy for doing something. As such, implementation is
the action that must follow any preliminary thinking for something to actually happen.
For this project, the ultrasonic motion detector alarm system based on an Arduino nano
was created. All of the components along with many more are available in Arduino nano
was implemented, The system has the following features: ultra sonic motion sensor to
detect movement in the proximity of the device. to show alarm state and show input one
relay module is activated to arm and disarm the system.- Alarm siren horn with audible
alert from an active buzzer and visual alert via a red LED- System power indicator with a
green LED.

We undertook this project to gain more experience to coding embedded projects that
require the use of state c++ source code, The sensors must be capable of sending input
signals, the module must refresh and the LED indicator must switch off and on all
without blocking.
When the device is powered it is initialized in the disarmed state. A presence is detected
by the sensors which sends information to the programmed chip/ indicates the state of the
system and allows the user to see the input of the membrane keypad. When armed, the
devise polls the output from the PIR sensor to detect movement and triggers the alarm,
2.4 Erisco foods company limited

Erisco Foods limited, is an indigenous foods product manufacturer incorporated in Nigeria


in 2004 and started operation in 2009, we are firmly committed to producing high-quality
products that combine nourishment with value pricing. As they strive to become one of
Nigerians largest indigenous food manufacturers on a global scale. Behind every Erisco
food product is a team of people committed to creating safe products of the highest quality.
People understand that food is a source of nourishment and satisfaction, but also pleasure,
health, happiness and peace of mind. They are increasingly aware that their food and
beverage choices can impact their quality of life and affect the lives of others.

Innovation has been at the heart of the company since its beginning striving to make the
products tastier and healthier choices that help consumers care for themselves and their
families.
Behind every one food product there is a team of scientists, engineers, nutritionists,
designers, regulatory specialists and consumer care representatives dedicated to earn their
consumers’ trust with safe products of the highest quality. in terms of convenience, health
or pleasure, erisco foods company are able and committed to create trustworthy products,
systems and services that contribute to improving the quality of consumers lives. To
become one of the largest indigenous manufacturers of food products globally producing
high-quality products that combine nourishment with value pricing.

2.5 Review of Related Literature


This is a detailed review of existing literature relating to intrusion detection of a thesis or
dissertation, we talked about the security alarm as a system designed to detect intrusion,
such as unauthorized entry, into a building or other areas such as a home or school.
Security alarms used in residential, commercial, and industrial facilities protect against
burglary (theft) or property damage, as well as personal protection against intruders.
Security alerts in neighborhoods show a connection with diminished robbery. Modern
intrusion detection system have been the best help when it comes to protection of Goods
and Environment from unauthorized personnel and this describe the importance of
electronic alarm security systems.
3.0 Introduction:
This chapter dealt with the material and components required to design the system and
the basic methodology adapted while designing the intrusion detection system

3.1 Material Requirement:


The material requirement or material used in this project are
a) Adriuno nano micro controller
b) Ultrasonic motion sensor
c) Alarm siren system
d) One relay module
e) Dc to DC bulk converter
f) 12v DC power supply system

3.1.1 Adriuno Nano Microcontroller


An Arduino nano microcontroller is an open-source platform used for building
electronics projects. Arduino consists of both a physical programmable circuit board
(often referred to as a microcontroller) and a piece of software, or IDE (Integrated
Development Environment) that runs on computers, used to write and upload computer
code to the physical board. widely used in robotics, embedded systems, automation,
Internet of Things(IoT) and electronics projects. These boards were initially introduced
for the students and non-technical users but nowadays for industrial projects.
The Micro controller was programmed with a subset of C/C++ source code

(Fig 3.1.1) Adruino Nano Microcontroller


3.1.2 Ultrasonic Motion Sensor
An ultrasonic motion detector or sensor is a device that can detect movement of people or
objects within a limited area, it sense motion by analyzing sound waves in its
environment send ultrasonic signals and how they are relayed back
In carrying out this project an ultrasonic motion detection sensor was programmed to the
adriuno nano as the receiver to detect the movement of objects generating sound waves in
the ultrasonic frequency range around 30 to 50 khz, it uses a transducer to send and
receive impulses that relay back information about the objects proximity

(Fig 3.1.2) Ultrasonic Motion Sensor.

3.1.3 Alarm Siren Horn


An Alarm siren horn is a loud noise making device it works by having two states. armed
and disarmed , the alarm sirens are activated if the system is a armed and a movement
detector is triggered.
In this project the alarm siren was used as noise making device, when the ultrasonic
sensor senses a movement and transmit the signal to the relay it triggers the alarm siren
horn to signal an alarm and the presence of an intruder

(Fig 3.1.3) Alarm Siren Horn


3.1.4 One Relay Module
The relay module is used to control high voltage through the adriuno which runs on 5v,
because the adriuno nano cannot directly control high voltage,
In this project the relay as an electromagnetic device a wire coil that becomes temporary
magnet when electricity is passed through, it is turned on with a relatively small current
turning or powering the alarm system with a much larger current.

(Fig 3.1.4) One Relay Module

3.1.5 DC to DC Bulk Converter


The buck converter uses a transistor as a switch that alternately connects and disconnects
the input voltage meaning that it will take the current and pass it through a switching
element this turns the signal into a wave usually AC the wave then passes through
another filter which turns it back to a dc signal of the appropriate voltage.
It was connected directly to the power supply to enable efficient transmission of DC in
the project.

(Fig 3.1.5) DC to DC bulk converter


3.1.6 12v Power Source
This is a higher output processor voltage regulator that converts electric current from the
source to the correct voltage current and frequency to power the load.
In this project a 12v power source was used to pass current directly from the source to the
project.

(Fig 3.1.6 12V Power Source)

3.2 Methodology
This is the prototyping of the system, a model of the system was built

Introduction:
This chapter deals with the construction, testing, results and discussion of the
performance of the electronic alarm system

Construction
The construction of the project was done in three different stages. Which are testing on a
breadboard, soldering on the Vero board and casing for the entire constructed work.
Bread Boarding
This is where the preliminary implementation of the project was done. Each of the
various components in the system was tested separately on a bread board before being
transferred to the Main board.
Main Board
The final construction of the sytem was coupled on the main boards. Integrated circuit
sockets were used for ease of troubleshooting and parts replacement.

Results and Discussion

During the construction of this project, testing was carried out at different stages to
determine if the result obtained at each stage met the desired specifications. After the
design and implementation phase, the system built has to be tested for Durability,
Efficiency, and Effectiveness and also ascertain if there is need to modify this design.
The system was first assembled using a breadboard. All components were properly
inserted into the breadboard from whence some tests were carried out at various stages.
To ensure proper functioning of components’ expected data, the components were tested
using a digital multimeter (DMM). Resistors were tested to ensure that they were within
the tolerance value. Faulty resistors were discarded .The LM7805 voltage regulator was
also tested, the resulting output was 4.99v which is just a deviation of 0.01v from the
expected result of 5.00v. The system was powered and operated upon using several
possibilities. They include triggering more than one alarm at the same time and noting the
output responses of the system hardware. The system displayed the corresponding point
of intrusion and buzzer came on each time there were intrusion. The completely coupled
system performed well displaying the correct location of intrusion and movement and
This goes to show that the use of adriuno nano microcontroller in designing effectively
reduces the number of components and also make for active control of device and
components using program code

Conclusion
The ideal security system is yet to be designed so far. In this project an attempt has been
made to come up with a cheap but effective security system for Erisco foods company ltd

The software developed to run the microcontrollers run according to the specifications
proved to be very effective as a security system.
Despite all the odds and difficulties encountered in regard to resource availability all the
project objectives were ache

There was also an attempt to provide possible designs possible to implement this project,
The design type chosen here was mainly to deal with the standard for Erisco foods
company LTD. To secure large warehouses this type of design needs to be 'improved.
This could be done by use of addressed sensors that would be sending information to
control unit instead of use of polling the sensors. This would enable many sensors to be
connected to the microcontroller thus resulting in a stable complex system that cover
large warehouses, building and factories which would include other features such as fire
alarm. employee clocking in and out, Chemical gas warning and much more. The design
here is conclusive but needs a lot of improvement and development for larger facilities
and system indicating that there is still huge room for future development. As the need of
more secure and complex system keeps on growing there is need in depth research and
development to keep up with the needs of consumers

Recommendations
Alarm systems are installed in buildings to protect people and assets. When an alarm has
been triggered, a response to the alarm is needed. Normally, a security guard is sent to the
location where the alarm went off to check the premises and try to find the cause of the
alarm. If the security at the location has been breached, caused by for example a burglary
or a fire, a fast response may limit the potential damages and loss of assets. This project
has basic steps taken in the design and construction of burglary alarm system in an
electrical/ electronic workshop, Institution, Houses, etc these places which are well
equipped, model for students of electrical/electronics to enhance and impact in them
adequate knowledge on the various electrical devices and components. Again, different
electronics components were studied under this condition like Resistor, Transistor,
Capacitor, Rectifier, Led etc. their functions, properties and types even Transformer volts
was used as the project makes use of a lot of electronic devices.
Conceptual diagram of the complete Equipment

You might also like