PC based Ultrasonic Intrusion Detection System

被引:0
|
作者
Unni, R. [1 ]
Pati, U. C. [1 ]
机构
[1] NIT, Dept Elect & Commun Engn, Rourkela, India
关键词
HCSR04; GSM; LabVIEW; IMAQ; USB-camera; Human detection algorithm;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An effective low-cost intrusion detection system is necessary for smart homes, offices, server room since number of theft operations are being reported day by day. For preventing this an intrusion detection system is required which is placed in a monitoring location and can track the intruders distance, velocity, and date of occurrence. An active sensor such as, the ultrasonic sensor is used since it has good accuracy and is able to track the intruders distance in the range of meters. The HC-SR04 ultrasonic sensor have high frequency, high sensitivity, and high penetrating power so it can easily sense the intruder. Output of the sensor is received through a microcontroller for programming and further display in a LCD. When the intruder detected, a primary alert process is initiated followed by a text message alert. The text message alert is given to the registered number via a global system for mobile communication (GSM) module. The serial data obtained from the microcontroller is interfaced with LabVIEW for data logging. When intruder is detected a good resolution USB-camera is turned on which is controlled by LabVIEW and IMAQ vision assistant. IMAQ will receive data from the USB camera and the intruder image is snapped and stored to the host PC (Personal computer). The obtained pictures are further carried out for human detection. MATLAB based human detection algorithm detects the intruder morphology and number of intruders. This system can be achieved with little computational power that makes the system ideal for many situations. This design could find application in security systems for smart home, bank locker, and jewelry.
引用
收藏
页码:942 / 947
页数:6
相关论文
共 50 条
  • [1] General Study of Intrusion Detection System and Survey of Agent Based Intrusion Detection System
    Saxena, Aumreesh Ku.
    Sinha, Sitesh
    Shukla, Piyush
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 417 - 421
  • [2] An intrusion detection system based on system call
    Shen, Yue
    Yu, Fei
    Zhang, Ling-Fen
    An, Ji-Yao
    Zhu, Miao-Liang
    2005 1ST IEEE/IFIP INTERNATIONAL CONFERENCE IN CENTRAL ASIA ON INTERNET (ICI), 2005, : 150 - 153
  • [3] Kernel based intrusion detection system
    Kim, BJ
    Kim, IK
    Fourth Annual ACIS International Conference on Computer and Information Science, Proceedings, 2005, : 13 - 18
  • [4] Intrusion Detection System Based on Classification
    Gong Shang-fu
    Zhao Chun-lan
    2012 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL, AUTOMATIC DETECTION AND HIGH-END EQUIPMENT (ICADE), 2012, : 78 - 83
  • [5] An Intrusion Detection System Based on Hadoop
    Shi, Zhiguo
    An, Jianwei
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 826 - 830
  • [6] An Intrusion Detection System Based on WiMAX
    Zhou, Bo
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2448 - 2451
  • [7] Host Based Intrusion Detection System
    Kothari, Sandip
    Parmar, Hemant
    Das, Eshan
    Panda, Neroja
    Ahmed, Afrin
    Marchang, Jims
    2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL III, 2010, : 336 - 339
  • [8] HOST BASED INTRUSION DETECTION SYSTEM
    Kothari, Sandip
    Parmar, Hemant
    Das, Eshan
    Panda, Neroja
    Ahmed, Afrin
    Marchang, Jims
    2011 INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING AND TECHNOLOGY (ICMET 2011), 2011, : 875 - 878
  • [9] NetFlow Based Intrusion Detection System
    Wang Zhenqi
    Wang Xinyu
    2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 825 - 828
  • [10] Bayesian based intrusion detection system
    Altwaijry, Hesham
    Algarny, Saeed
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2012, 24 (01) : 1 - 6