integrated home security system: module on mobile
TRANSCRIPT
INTEGRATED HOME SECURITY SYSTEM: MODULE ON MOBILE APPLICATION
MUHAMMAD 'IZZAT BIN RAMLI
This report is submitted in partial fulfillment of the requirements for the award of the degree of Bachelor of Computer Systems and Networking
Faculty of Computer Systems & Software Engineering
Universiti Malaysia Pahang
NOVEMBER 2010
ABSTRACT
Home security system is needed for occupants' convenience and safety. Nowadays, there
is lot of burglary happening across the city, the reason is no one helping or getting late for help.
Sometimes, guard in housing area also not helping because of the big area housing environment.
Nowadays, Malaysian still uses old technology alarm for their home security. How people react
for the alarm? Can the guard in housing area hear it? For this paper, I have design and
implementing a security system for home using Bluetooth and SMS notification which is smart in
helping owner to get helps from neighbor, friend, police station or guard in housing area faster.
The user can choose the recipient number from contact's phonebook and set SMS by self. This
system was implemented in J2ME to operate in mobile.
ABSTRAK
Alat penggera dirumah diperlukan untuk keselesaan penghuni dan keselamatan. Sehingga
kini, ada banyak kecurian berlaku di seluruh bandar, alasannya adalah tidak ada yang membantu
atau terlambat mendapatkan bantuan. Kadang-kadang, penjaga di kawasan perumahan juga tidak
membantu kerana kawasan perumahan yang luas. Pengguna di Malaysia saat mi masih
menggunakan penggera lama untuk keselamatan rumah mereka. Bagaimana orang sekeliling
bertindak balas? Bolehkah penjaga di kawasan perumahan mendengarnya? Untuk kajian mi, saya
telah merancang dan meiaksanakan sistem keselamatan untuk rwnah dengan menggunakan
Bluetooth dan notis SMS yang bijak dalam membantu pemilik untuk mendapatkan bantuan dan
tetangga, teman, pihak polis atau penjaga di kawasan perumahan dengan lebih cepat. Pengguna
boleh memiiih nombor penerima daripada buku telefon dan menetapkan SMS sendiri. Sistem mi
dilaksanakan di J2ME untuk beroperasi secara mobile.
TABLE OF CONTENTS
CHAPTER TITLE PAGE
DECLARATION
DEDICATION iii
ACKNOWLEDGEMENT iv
ABSTRACT v
ABTSRAK vi
TABLE OF CONTENTS vii
LIST OF TABLES xi
LIST OF FIGURES xii
LIST OF ABBREVIATIONS xv
LIST OF APPENDICES xvii
I INTRODUCTION
1.1 Project Background 1
1.2 Objective 2
1.3 Scope 2
1.4 Problem Statement 3
1.5 Ti esis Organization 4
LITERATURE REVIEW
2.1 Introduction 5
2.2 Literature Review 6
2.2.1 Domain 6
VII
2.2.2 Keyword 7
2.2.2.1 Wireless Communication 7
2.2.2.1.1 Bluetooth 7
2.2.2.1.1.1 Topology 8 2.2.2.1.1.2 Protocol Stack 9
2.2.2.1.2 Short Message Service (SMS) 11
2.2.2.2 Mobile Application 12
2.2.2.2.1 Mobile Operating Systems 13 (Mobile OS) 2.2.2.2.1.1 SymbianOS 13
2.2,2.2.1.2 Windows Mobile 13
2.2.12.1.3 iPhone 14
2.2.2.2.1.4 Palm OS 14
2.2.2.2.1.5 BlackBerry 14
2.2.2.2.1.6 Android 15
2.2.2.3 Java 2 Micro Edition (J2ME) 16
2.2.2.3.1 J2ME API Specifications 18
2.2.3 Previous Research 23
2.2.3.1 Intelligent Wireless GSM Home 23 Alarm System
2.2.3.2 SMS GSM Alarm Messenger 23
2.2.12.1 The features of SMS GSM 27 Messenger
2.2.3.2.2 Alert of SMS GSM Messenger 27
2.2.3.3 ON-GUARD GSM Wireless Security System 28
2.2.3.3.1 ON-GUARD characteristics 29
2.2.3.3.2 Key Features 29
2.2.4 Previous Research Comparison 30
III METHODOLOGY
3.1 Introduction 32
3.2 Project Methodology 32
3.2.1 System Planning 34
3.2.2 System Analysis 34
3.2.3 System Design 35
VIII
3.2.3.1 Flowchart 35
3.2.3.2 System and Use case Diagram 36
3.2.3.2.1 Input 38
3.2.3.2.2 Process 38
12.3.2.3 Output 38
3.2.3.3 Interface Design 39
3.2.4 System Development 40
3.2.5 System Testing 40
3.2.6 System Implementation (Deploy) 41
3.2.7 Software Maintenance 42
3.3 Project Requirement 42
3.3.1 Development tools 42
3.3.2 Netbean6.8 43
3.3.3 Adobe Photoshop CS4 44
3.3.4 Microsoft Office 2007 45
3.3.5 Microsoft Windows 7 Ultimate 45
3.4 Project Schedule 46
IV IMPLEMENTATION
4.1 Introduction 47
4.2 Implementation Status 48
4.3 Interfaces 48
43.1 Client 49
4.3.1.1 Splash Screen 50
4.3.1.2 Setting 50
4.3.1.3 Date and Time Data Log 51
4.3.1.4 Ready 52
4.3.1.5 Help 54
4.3.1.6 Standby Mode 54
4.3.1.7 Alarm 55
4.3.2 Server 56
4.4 Coding Implementation (Core Module) 57
4.4.1 Application control with Bluetooth connection 57
Ix
4.4.1.1 Server/Master MiDlet 58
4.4.1.2 ClientIIHSS MilDet 62
4.4.1.2.1 Bluetooth Connection 63
4.4.1.2.2 RMS(Record Management 68 System)
4.4.1.2.3 Alarm
4.4.1.2.4 Sign &Certify 75
V RESULTS AND DISCUSSION
5.1 Introduction 77
5.2 Analysis Result 77
5.3 System Constraint 78
lv CONCLUSION
6.1 Observation on Expected Weaknesses and Expected Strength 80
6.1.1 Expected Strengths 80
6.1.1.1 Saves Time 80
6.1.1.2 Improved Security 81 6.1.1.3 Simple and User-Friendly Interface 81
4.1.2 Expected Weakness 81
6.1.2.1 Prototype 81
6.1.2.2 Delay 81
6.1.2.3 Battery Usage 82
62 Conclusion 82
REFERENCES 83
APPENDIX A - C 85-89
X
LIST OF TABLES
TABLE TITLE PAGE
2.1 Bluetooth device classes 6
2.2 Description of Bluetooth Protocol Stack 11
2.3 Mobile Software Platform Comparison 15
2.4 J2ME Architecture 18
2.5 MIDP Profile Architecture 18
2.6 Advantages & Disadvantages Wireless home intruder alarm system 25
2.7 Advantages & Disadvantages SMS GSM Alarm Messenger 28
2.8 Advantages & Disadvantages ON-GUARD 30
2.9 Comparison between Intelligent Wireless GSM Home Alarm System, 30
3.1 Software Requirement to Develop the System 43
3.2 Hardware Requirement to Develop the System 43
4.1 Implementation Status . 47
4.2Summary of the Wireless Messaging API vi .0 68 (javax.wireless.messaging
xi
LIST OF FIGURES
FIGURE TiTLE PAGE
2.1 Bluetooth Network Topology 9
2.2 The Bluetooth Protocol Stack 10
2.3 Sending SMS over SMSC 12
2.4 Relationship between CLDC and CDC within J2SE 17
2.5 The Message Interface and its Sub interfaces 19
2.6 Overview of J2ME RMS and MiDlet interfacing 20
2.7 RMS Data Storage Model 21
2.8 The MMAPI Architecture 22
2.9 Intelligent Wireless GSM Home Alarm System Device 24
2.10 Configuring the device using PC through R232 serial port 25
2.11 Configuring the device using mobile through SMS 26
2.12 SMS sent to the server to store in database 26
2.13 SMS sent to the mobile 27
2.14 ON-GUARD GSM Wireless Security System devices 28
XII
3.1 Phases in Rapid Application Development 33
3.2 Searching the device Bluetooth connection 35
3.3 Flowchart for Mobile Application System 36
3.4 System diagram for Integrated Home Security System: Module on Mobile 37 Application
3.5 Use case diagram for integrated Home Security System: Module on 37 Mobile Application
3.6 Interface design for View Setting 39
3.7 Interface design for Setup 40
4.1 Interface Diagram of integrated Home Security System 49
4.2 Screenshots of splash screen in different devices 50
4.3 Screenshots of Setting interface in different device 50
4.4 Screenshots of Date and Time Data Log in different devices 51
4.5 Screenshots of waiting connection in different devices 53
4.6 Screenshots of connection not established in different devices 53
4.7 Screenshots of Help form in different devices 54
4.8 Screenshots of Standby Mode in different devices 55
4.9 Screenshots of Alarm form in different devices 56
4.10 Screenshot of server interface 57
4.11 Server class with proper import 58
4.12 Implementation of Bluetooth in Local Device 59
XIII
4.13 Wait for client connection in Server 60
4.14 Implementation of canvas key in Server 61
4.15 IHSS class with proper import 62
4.16 Splash screen code with 3 seconds timeout 62
4.17 Gauge code for checking connection 63
4.18 caliClient method with thread 63
4.19 Timer code in IHSS 64
4.20 Retrieving Signal Code 65
4.21 Record Store Copied to array for SMS uses 66
4.22 SMS code for multiple receiver 67
4.23 Data flow for Record Store in IHSS 69
4.24 Opening Record Store in MiDlet 70
4.25 Write data in Record Store 70
4.26 Update Record in Record Store 71
4.27 Delete Record Store and add Record 72
4.28 Read record in record store 73
4.29 Media code for Alarm 74
4.30 Screenshots of how to build certificate by self. 75
xiv
LIST OF ABBREVIATIONS
SMS Short Message Service
PSM Projek Sarjana Muda
ICT Information and Communication Technology
PDAs Personal digital assistants
GPS Global Positioning System
GSM Global System for Mobile Communication
PANs Personal Area Networks
HISS Integrated Home Security System: Module on Mobile Application
HCI Host Controller Interface
TCS Telephony Control System
SDP Service Discovery Protocol
WAP Wireless Access Point
OBEX Object Exchange
L2CAP Logical Link Control and Adaptation Protocol
RFCOMM Radio frequency communication
xv
SMSC Short Message Service Center
HLR Home Location Register
GPRS General Packet Radio Service
3G Third Generation
OS Operating System
RIM Research In Motion
APIs Application Interface Programming's
LCD Liquid Crystal Display
SIMCard Subscriber Identity Module
USB Universal Serial Bus
RJ45 Register Jacks 45
MSA Mobile Service Architecture
JTWI Java Technology for the Wireless Industry
JCP Java Technology for the Wireless Industry
CLDC Connected Limited Device Configuration
MIDP Mobile Information Device Profile
OTA Over-The-Air
DPD Desktop Publishing Program
SSADM Structured System Analysis and Design Method
SDLC Software Development Life Cycle
RAD Rapid Application Development
xvi
LIST OF APPENDICES
APPENDIX TiTLE PAGE
A Types of JSR 85
B Gantt Chart PSMI&ll
C Client Class Bluetooth Source code 88-89
xvii
CHAPTER I
INTRODUCTION
1.1 Project Background
Currently, there are many systems developed in order to meet user requirements. In this
modern lifestyle, the important thing to know is what to input in order to receive the desired
outputs of a system. In this global world, technologies growth wider and makes user wish for a
system that can assist them in their daily life. With this growing demand, it is recommended to
develop a system that can achieve user's target and expectation.
Nowadays, mobile phone is one of the most essential things of people. It takes much
convince for people. The technology of mobile phone is increase rapidly every day. Form l'
generation up to now. When phone had been found at the first time, Phone just use to
completing our voice communication need. When newer technology was found, we only know
that SMS (short message service), as text communication service. SMS service has been caught
pager user to use SMS and nowadays anything can be done using mobile.
The system that will be developed is Project Sarjana Muda (PSM) Integrated Home
Security System: Module on Mobile Application (IHSS). The target users of this project are the
household who wants to secure their house. HISS can help the owner of their house to get helps
1
2
from neighbor, security guard or people they know and knowing them without panicking. So in
this situation, it will exist the cooperating in their neighborhood and improve the level of the
home security.
12 Objective
The main objectives for the development of Security System on Mobile Application are:
I. To develop mobile application on security system.
ii. To implement new technology for Home security using mobile.
iii. To implement wireless networking using Bluetooth protocol for signal
transmission.
iv. To make easier for household to inform and get helps from neighbor, security guard
and friends earlier without panicking.
1.3 Scope
The scopes of this project are as follows:
L Target Users
. The main user of the system will be the owner of their house
ii. Modules • The system will automatically send SMS to the chosen numbers.
• The system is using Bluetooth connection to retrieve connection from
the device detector.
• The system is going to develop using the JAVA programming language
for the software application.
• The main software to develop this software is using Wireless toolkit.
3
• The system will provide a simple user interface for the users, and will
mostly be focused how to setup the uses of the application.
. The mobile phone will make alert sound from the phone after retrieve
the connection from the device detector.
1.4 Problem Statement
Security has been the main issues in any organization or enterprise. A large number of
security systems existed in the whole world that has the same goal which is to create an efficient
and formidable security system. Out of all these systems, only a number of systems truly
achieve the goal. And to be more specific on the scope, there is lack of security system applied
that truly organized and efficient in handling home security with SMS notification.
Mobility in security has always been slow in progression nowadays. It will be a great
achievement if the mobility aspect in security could be integrate or combined. To give an
example, often, when a home intrusion occurs, the owner of the house should be the first to be
informed and he should inform to their friends or neighbor to get helps. But with the old system
alert using wired that triggered the alarm sound, the owner maybe can be panicked and will be
late to inform to the others friend or neighbor to get helps. And usually, they will get to know
about the intrusion late. But nowadays, people hate to hear the noisy alarm sound and that
always does not helping in home security. This is due to the lack of mobility aspect provided in
security.
These problems are extracted during the project identification process:
i. There is lack of security system applied that truly organized and efficient in handling
home security with mobile application through SMS notification.
ii. Often, when breaking and entering home occurs, the safety unit, friends, or neighbor
will get to know about it a bit late or just ignore it because hate the noisy sound alarm.
4
This is due to the lack of mobility aspect. So, SMS notification will be used in order to
encounter the issues.
iii. The old home security systems that have been use today make a noisy alarm to rouse
other people. But people hate the sound and this is not helping.
1.5 Thesis Organization
This thesis contains 6 chapters. Chapter 1 gives an overview of the research conducted.
It consists of 5 subtopics which are introduction, problem statement, objective, scope and thesis
organization. Chapter 2 reviews the previous research works that was conducted and method
usually used by researcher. All of the relevant books, report and intemets taken from those
researches will be discussed in detail. Meanwhile, chapter 3 reveals the techniques and the
algorithms that will be used in performing this study. Discussion about the process flow of this
research in detail is in this chapter. Chapter 4 discusses the details of the implementation.
Results of the testing are to be described in Chapter 5. Finally, chapter 6 concludes the entire
thesis.
CHAPTER II
LITERATURE REVIEW
2.1 Introduction
Chapter II is the important chapter for any project that will be develops. The purpose
of this chapter is to present a selected literature review, which is very important for the research.
This chapter also describes and explains on the literature review carried out on the system that
be used in developing in 1HSS. Besides that, previous research also will be discussed in this
section and at least three existing system that being used in to make as a research which is
related to IHSS will be explained and compared to highlight the differences.
For the project required section, where all the requirements such as software and
hardware as well as the operating system requirement will be listed so that developer can
understand all the features that are available in the requirement before proceeding to the
proposed project.
Finally, the last section of the chapter discusses the project schedule and milestones.
In this section, a Gantt chart will be attached together with this section. The Gantt chart listed
details of all task and activity required during the progress of the project and the conclusion
section will end the entire explanation for this chapter.
5
6
2.2 Literature Review
Literature review is aims to review the critical points of current knowledge on a
particular topic. Therefore, the purpose of the literature review is to find, read and analyze the
literature or any works or studies related to this system. It is important to well understand about
all information to be considered and related before develop this system.
For this project, some researchers have been done to understand the concept and
purpose of alert using mobile (SMS notification), programming language, protocol language,
and existing system that related to this project.
2.2.1 Domain
Every project has its own domain. in the IHSS for home protection, the domain for
the project is Information and Communication Technology (ICT) in Wireless Technology that
using the Bluetooth connection.
Bluetooth on Wireless connection normally used to refer to any type of electronic
operation that does not require a wired connection. Bluetooth is a standard and a
communications protocol primarily designed for low power consumption, with a short range
(power-class-dependent: lOOm, lOm and 1 m, but ranges vary in practice; (see Table 2.1) based
on low-cost transceiver microchips in each device. Bluetooth makes it possible for these devices
to communicate with each other when they are in range. Because the devices use a radio
(broadcast) communications system, they do not have to be in line of sight of each other.
Table 2.1 Bluetooth device classes
Type j Power Consumption Operating Range
Class 1 100mW (20 dBm) Up to 100 meters (300 feet)
Class 2 2.5mW (4 dBm) Up to 10 meters (30 feet)
Class 3 1 mW (0 dBm) 0.1-10 meters (less than 30 feet)
7
Source: Karygianrns and Owens. Wireless Network Security: 802.11, Bluetooth and Handled Device table 4.2, page 4-5
2.2.2 Keyword
2.2.2.1 Wireless Communication
Wireless is normally used to refer to any type of electrical or electronic operation which
is accomplished without the use of a hard wired connection. Wireless is a transmission or
Information transport method that enables Mobile computing over a distance. The distances
involved may be short or long range that refers to any wireless technology used.
The examples of Wireless technology include:
• Two way radios
• Cellular telephones
• Personal digital assistants (PDAs)
• Wireless networking
• GPS units
• Wireless computer mice and keyboards
• Satellite television and cordless telephones.
For the 11ISS, the wireless technology that will be use is Bluetooth and GSM network
that using Short Message Service (SMS).
2.2.2.1.1 Bluetooth
Bluetooth is an industrial specification for wireless personal area networks (PANs).
Bluetooth provides a way to connect and exchange information between devices such as mobile
8
phones, laptops, personal computers, printers, GPS receivers, digital cameras, and video game
consoles over a secure, globally unlicensed short-range radio frequency. The Bluetooth
specifications are developed and licensed by the Bluetooth Special Interest Group.
Bluetooth is a standard and communications protocol primarily designed for low power
consumption, with a short range (power-class-dependent: 1 meter, 10 meters, 100 meters) based
on low-cost transceiver microchips in each device.
Bluetooth enables these devices to communicate with each other when they are in
range. The devices use a radio communications system, so they do not have to be in line of sight
of each other, and can even be in other rooms, as long as the received transmission is powerful
enough.
Bluetooth exists in many products, such as phones, printers, modems and headsets. The
technology is useful when transferring information between two or more devices that are near
each other in low-bandwidth situations. Bluetooth is commonly used to transfer sound data with
phones (i.e. with a Bluetooth headset) or byte data with hand-held computers (transferring files).
Bluetooth simplifies the discovery and setup of services between devices. Bluetooth
devices advertise all of the services they provide. This makes using services easier because
there is no longer a need to setup network addresses or permissions as in many other networks.
2.2.2.1.1.1 Topology
Bluetooth device are grouped in piconets. Each piconet consists of master and different
slave. A master and a slave are connecting through the point-to-point communication. So if they
are more than one slave, a point-to-multipoint is established. The master is the unit which
initiates the communication. A device in one piconet can connect to a device belonging to
another piconet, forming a scatternet.
9
O. Master • Slave
•.0 • • I 4
• • •
.0 . 0 • .• I •- - I
is.44
- S w : --
-w ••0:
••.
a -a
a b c
point-to-point b point-to-multipoint
Scatte.rflet
Figure 2.1 Bluetooth Network Topology
Source: Introduction to Bluetooth and Bluetooth enabled Java Applications for Mobile Phones, Tran Cong Hung Ph.D. & Dang Hong Minh figure 1.2, page 2.
2.2.2.1.1.2 Protocol Stack
The Bluetooth specification aims to allow Bluetooth devices from different
manufactures to work with each other, so it is not sufficient to specify just a radio system.
Because of this, the Bluetooth specification does not only outline a radio system but a complete
protocol stack to ensure that Bluetooth devices can discover, -explore and use these services with
each other. The Bluetooth protocol stack is shown in Figure 2.2.
10
I Applications
__ ____ I SDPJ
OBEX WAP
I "COMM 1
[CJ
Logical Link Control and Adaption Protocol (L2CAP)
Host Controller Interface (HCI)
I Link Manager Protocol
I Baseband /Link Controller
I Radio
Figure 2.2 The Bluetooth Protocol Stack
Source: Anne Margrette Q. Caccam, Myra Colina, B. Dideles, Bienvenido H. Galang, Jr. and Ian C.Wong, Development of a Bluetooth Host-side Protocol Stack Using Formal Design Technique. http://www.omimo.be/magazine/00q4/2000q4j028.pdf
The Bluetooth stack is made up of many layers. The HCI is usually the layer separating
hardware from software and is implemented partially in software and hardware. The layers
below HCI are usually implemented in hardware and the layer above the HCI is usually
implemented in software. Tables 2.2 give a short description of each layer shown on figure 2.1.