integrated home security system: module on mobile

24
INTEGRATED HOME SECURITY SYSTEM: MODULE ON MOBILE APPLICATION MUHAMMAD 'IZZAT BIN RAMLI This report is submitted in partial fulfillment of the requirements for the award of the degree of Bachelor of Computer Systems and Networking Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang NOVEMBER 2010

Upload: others

Post on 26-Oct-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

INTEGRATED HOME SECURITY SYSTEM: MODULE ON MOBILE APPLICATION

MUHAMMAD 'IZZAT BIN RAMLI

This report is submitted in partial fulfillment of the requirements for the award of the degree of Bachelor of Computer Systems and Networking

Faculty of Computer Systems & Software Engineering

Universiti Malaysia Pahang

NOVEMBER 2010

ABSTRACT

Home security system is needed for occupants' convenience and safety. Nowadays, there

is lot of burglary happening across the city, the reason is no one helping or getting late for help.

Sometimes, guard in housing area also not helping because of the big area housing environment.

Nowadays, Malaysian still uses old technology alarm for their home security. How people react

for the alarm? Can the guard in housing area hear it? For this paper, I have design and

implementing a security system for home using Bluetooth and SMS notification which is smart in

helping owner to get helps from neighbor, friend, police station or guard in housing area faster.

The user can choose the recipient number from contact's phonebook and set SMS by self. This

system was implemented in J2ME to operate in mobile.

ABSTRAK

Alat penggera dirumah diperlukan untuk keselesaan penghuni dan keselamatan. Sehingga

kini, ada banyak kecurian berlaku di seluruh bandar, alasannya adalah tidak ada yang membantu

atau terlambat mendapatkan bantuan. Kadang-kadang, penjaga di kawasan perumahan juga tidak

membantu kerana kawasan perumahan yang luas. Pengguna di Malaysia saat mi masih

menggunakan penggera lama untuk keselamatan rumah mereka. Bagaimana orang sekeliling

bertindak balas? Bolehkah penjaga di kawasan perumahan mendengarnya? Untuk kajian mi, saya

telah merancang dan meiaksanakan sistem keselamatan untuk rwnah dengan menggunakan

Bluetooth dan notis SMS yang bijak dalam membantu pemilik untuk mendapatkan bantuan dan

tetangga, teman, pihak polis atau penjaga di kawasan perumahan dengan lebih cepat. Pengguna

boleh memiiih nombor penerima daripada buku telefon dan menetapkan SMS sendiri. Sistem mi

dilaksanakan di J2ME untuk beroperasi secara mobile.

TABLE OF CONTENTS

CHAPTER TITLE PAGE

DECLARATION

DEDICATION iii

ACKNOWLEDGEMENT iv

ABSTRACT v

ABTSRAK vi

TABLE OF CONTENTS vii

LIST OF TABLES xi

LIST OF FIGURES xii

LIST OF ABBREVIATIONS xv

LIST OF APPENDICES xvii

I INTRODUCTION

1.1 Project Background 1

1.2 Objective 2

1.3 Scope 2

1.4 Problem Statement 3

1.5 Ti esis Organization 4

LITERATURE REVIEW

2.1 Introduction 5

2.2 Literature Review 6

2.2.1 Domain 6

VII

2.2.2 Keyword 7

2.2.2.1 Wireless Communication 7

2.2.2.1.1 Bluetooth 7

2.2.2.1.1.1 Topology 8 2.2.2.1.1.2 Protocol Stack 9

2.2.2.1.2 Short Message Service (SMS) 11

2.2.2.2 Mobile Application 12

2.2.2.2.1 Mobile Operating Systems 13 (Mobile OS) 2.2.2.2.1.1 SymbianOS 13

2.2,2.2.1.2 Windows Mobile 13

2.2.12.1.3 iPhone 14

2.2.2.2.1.4 Palm OS 14

2.2.2.2.1.5 BlackBerry 14

2.2.2.2.1.6 Android 15

2.2.2.3 Java 2 Micro Edition (J2ME) 16

2.2.2.3.1 J2ME API Specifications 18

2.2.3 Previous Research 23

2.2.3.1 Intelligent Wireless GSM Home 23 Alarm System

2.2.3.2 SMS GSM Alarm Messenger 23

2.2.12.1 The features of SMS GSM 27 Messenger

2.2.3.2.2 Alert of SMS GSM Messenger 27

2.2.3.3 ON-GUARD GSM Wireless Security System 28

2.2.3.3.1 ON-GUARD characteristics 29

2.2.3.3.2 Key Features 29

2.2.4 Previous Research Comparison 30

III METHODOLOGY

3.1 Introduction 32

3.2 Project Methodology 32

3.2.1 System Planning 34

3.2.2 System Analysis 34

3.2.3 System Design 35

VIII

3.2.3.1 Flowchart 35

3.2.3.2 System and Use case Diagram 36

3.2.3.2.1 Input 38

3.2.3.2.2 Process 38

12.3.2.3 Output 38

3.2.3.3 Interface Design 39

3.2.4 System Development 40

3.2.5 System Testing 40

3.2.6 System Implementation (Deploy) 41

3.2.7 Software Maintenance 42

3.3 Project Requirement 42

3.3.1 Development tools 42

3.3.2 Netbean6.8 43

3.3.3 Adobe Photoshop CS4 44

3.3.4 Microsoft Office 2007 45

3.3.5 Microsoft Windows 7 Ultimate 45

3.4 Project Schedule 46

IV IMPLEMENTATION

4.1 Introduction 47

4.2 Implementation Status 48

4.3 Interfaces 48

43.1 Client 49

4.3.1.1 Splash Screen 50

4.3.1.2 Setting 50

4.3.1.3 Date and Time Data Log 51

4.3.1.4 Ready 52

4.3.1.5 Help 54

4.3.1.6 Standby Mode 54

4.3.1.7 Alarm 55

4.3.2 Server 56

4.4 Coding Implementation (Core Module) 57

4.4.1 Application control with Bluetooth connection 57

Ix

4.4.1.1 Server/Master MiDlet 58

4.4.1.2 ClientIIHSS MilDet 62

4.4.1.2.1 Bluetooth Connection 63

4.4.1.2.2 RMS(Record Management 68 System)

4.4.1.2.3 Alarm

4.4.1.2.4 Sign &Certify 75

V RESULTS AND DISCUSSION

5.1 Introduction 77

5.2 Analysis Result 77

5.3 System Constraint 78

lv CONCLUSION

6.1 Observation on Expected Weaknesses and Expected Strength 80

6.1.1 Expected Strengths 80

6.1.1.1 Saves Time 80

6.1.1.2 Improved Security 81 6.1.1.3 Simple and User-Friendly Interface 81

4.1.2 Expected Weakness 81

6.1.2.1 Prototype 81

6.1.2.2 Delay 81

6.1.2.3 Battery Usage 82

62 Conclusion 82

REFERENCES 83

APPENDIX A - C 85-89

X

LIST OF TABLES

TABLE TITLE PAGE

2.1 Bluetooth device classes 6

2.2 Description of Bluetooth Protocol Stack 11

2.3 Mobile Software Platform Comparison 15

2.4 J2ME Architecture 18

2.5 MIDP Profile Architecture 18

2.6 Advantages & Disadvantages Wireless home intruder alarm system 25

2.7 Advantages & Disadvantages SMS GSM Alarm Messenger 28

2.8 Advantages & Disadvantages ON-GUARD 30

2.9 Comparison between Intelligent Wireless GSM Home Alarm System, 30

3.1 Software Requirement to Develop the System 43

3.2 Hardware Requirement to Develop the System 43

4.1 Implementation Status . 47

4.2Summary of the Wireless Messaging API vi .0 68 (javax.wireless.messaging

xi

LIST OF FIGURES

FIGURE TiTLE PAGE

2.1 Bluetooth Network Topology 9

2.2 The Bluetooth Protocol Stack 10

2.3 Sending SMS over SMSC 12

2.4 Relationship between CLDC and CDC within J2SE 17

2.5 The Message Interface and its Sub interfaces 19

2.6 Overview of J2ME RMS and MiDlet interfacing 20

2.7 RMS Data Storage Model 21

2.8 The MMAPI Architecture 22

2.9 Intelligent Wireless GSM Home Alarm System Device 24

2.10 Configuring the device using PC through R232 serial port 25

2.11 Configuring the device using mobile through SMS 26

2.12 SMS sent to the server to store in database 26

2.13 SMS sent to the mobile 27

2.14 ON-GUARD GSM Wireless Security System devices 28

XII

3.1 Phases in Rapid Application Development 33

3.2 Searching the device Bluetooth connection 35

3.3 Flowchart for Mobile Application System 36

3.4 System diagram for Integrated Home Security System: Module on Mobile 37 Application

3.5 Use case diagram for integrated Home Security System: Module on 37 Mobile Application

3.6 Interface design for View Setting 39

3.7 Interface design for Setup 40

4.1 Interface Diagram of integrated Home Security System 49

4.2 Screenshots of splash screen in different devices 50

4.3 Screenshots of Setting interface in different device 50

4.4 Screenshots of Date and Time Data Log in different devices 51

4.5 Screenshots of waiting connection in different devices 53

4.6 Screenshots of connection not established in different devices 53

4.7 Screenshots of Help form in different devices 54

4.8 Screenshots of Standby Mode in different devices 55

4.9 Screenshots of Alarm form in different devices 56

4.10 Screenshot of server interface 57

4.11 Server class with proper import 58

4.12 Implementation of Bluetooth in Local Device 59

XIII

4.13 Wait for client connection in Server 60

4.14 Implementation of canvas key in Server 61

4.15 IHSS class with proper import 62

4.16 Splash screen code with 3 seconds timeout 62

4.17 Gauge code for checking connection 63

4.18 caliClient method with thread 63

4.19 Timer code in IHSS 64

4.20 Retrieving Signal Code 65

4.21 Record Store Copied to array for SMS uses 66

4.22 SMS code for multiple receiver 67

4.23 Data flow for Record Store in IHSS 69

4.24 Opening Record Store in MiDlet 70

4.25 Write data in Record Store 70

4.26 Update Record in Record Store 71

4.27 Delete Record Store and add Record 72

4.28 Read record in record store 73

4.29 Media code for Alarm 74

4.30 Screenshots of how to build certificate by self. 75

xiv

LIST OF ABBREVIATIONS

SMS Short Message Service

PSM Projek Sarjana Muda

ICT Information and Communication Technology

PDAs Personal digital assistants

GPS Global Positioning System

GSM Global System for Mobile Communication

PANs Personal Area Networks

HISS Integrated Home Security System: Module on Mobile Application

HCI Host Controller Interface

TCS Telephony Control System

SDP Service Discovery Protocol

WAP Wireless Access Point

OBEX Object Exchange

L2CAP Logical Link Control and Adaptation Protocol

RFCOMM Radio frequency communication

xv

SMSC Short Message Service Center

HLR Home Location Register

GPRS General Packet Radio Service

3G Third Generation

OS Operating System

RIM Research In Motion

APIs Application Interface Programming's

LCD Liquid Crystal Display

SIMCard Subscriber Identity Module

USB Universal Serial Bus

RJ45 Register Jacks 45

MSA Mobile Service Architecture

JTWI Java Technology for the Wireless Industry

JCP Java Technology for the Wireless Industry

CLDC Connected Limited Device Configuration

MIDP Mobile Information Device Profile

OTA Over-The-Air

DPD Desktop Publishing Program

SSADM Structured System Analysis and Design Method

SDLC Software Development Life Cycle

RAD Rapid Application Development

xvi

LIST OF APPENDICES

APPENDIX TiTLE PAGE

A Types of JSR 85

B Gantt Chart PSMI&ll

C Client Class Bluetooth Source code 88-89

xvii

CHAPTER I

INTRODUCTION

1.1 Project Background

Currently, there are many systems developed in order to meet user requirements. In this

modern lifestyle, the important thing to know is what to input in order to receive the desired

outputs of a system. In this global world, technologies growth wider and makes user wish for a

system that can assist them in their daily life. With this growing demand, it is recommended to

develop a system that can achieve user's target and expectation.

Nowadays, mobile phone is one of the most essential things of people. It takes much

convince for people. The technology of mobile phone is increase rapidly every day. Form l'

generation up to now. When phone had been found at the first time, Phone just use to

completing our voice communication need. When newer technology was found, we only know

that SMS (short message service), as text communication service. SMS service has been caught

pager user to use SMS and nowadays anything can be done using mobile.

The system that will be developed is Project Sarjana Muda (PSM) Integrated Home

Security System: Module on Mobile Application (IHSS). The target users of this project are the

household who wants to secure their house. HISS can help the owner of their house to get helps

1

2

from neighbor, security guard or people they know and knowing them without panicking. So in

this situation, it will exist the cooperating in their neighborhood and improve the level of the

home security.

12 Objective

The main objectives for the development of Security System on Mobile Application are:

I. To develop mobile application on security system.

ii. To implement new technology for Home security using mobile.

iii. To implement wireless networking using Bluetooth protocol for signal

transmission.

iv. To make easier for household to inform and get helps from neighbor, security guard

and friends earlier without panicking.

1.3 Scope

The scopes of this project are as follows:

L Target Users

. The main user of the system will be the owner of their house

ii. Modules • The system will automatically send SMS to the chosen numbers.

• The system is using Bluetooth connection to retrieve connection from

the device detector.

• The system is going to develop using the JAVA programming language

for the software application.

• The main software to develop this software is using Wireless toolkit.

3

• The system will provide a simple user interface for the users, and will

mostly be focused how to setup the uses of the application.

. The mobile phone will make alert sound from the phone after retrieve

the connection from the device detector.

1.4 Problem Statement

Security has been the main issues in any organization or enterprise. A large number of

security systems existed in the whole world that has the same goal which is to create an efficient

and formidable security system. Out of all these systems, only a number of systems truly

achieve the goal. And to be more specific on the scope, there is lack of security system applied

that truly organized and efficient in handling home security with SMS notification.

Mobility in security has always been slow in progression nowadays. It will be a great

achievement if the mobility aspect in security could be integrate or combined. To give an

example, often, when a home intrusion occurs, the owner of the house should be the first to be

informed and he should inform to their friends or neighbor to get helps. But with the old system

alert using wired that triggered the alarm sound, the owner maybe can be panicked and will be

late to inform to the others friend or neighbor to get helps. And usually, they will get to know

about the intrusion late. But nowadays, people hate to hear the noisy alarm sound and that

always does not helping in home security. This is due to the lack of mobility aspect provided in

security.

These problems are extracted during the project identification process:

i. There is lack of security system applied that truly organized and efficient in handling

home security with mobile application through SMS notification.

ii. Often, when breaking and entering home occurs, the safety unit, friends, or neighbor

will get to know about it a bit late or just ignore it because hate the noisy sound alarm.

4

This is due to the lack of mobility aspect. So, SMS notification will be used in order to

encounter the issues.

iii. The old home security systems that have been use today make a noisy alarm to rouse

other people. But people hate the sound and this is not helping.

1.5 Thesis Organization

This thesis contains 6 chapters. Chapter 1 gives an overview of the research conducted.

It consists of 5 subtopics which are introduction, problem statement, objective, scope and thesis

organization. Chapter 2 reviews the previous research works that was conducted and method

usually used by researcher. All of the relevant books, report and intemets taken from those

researches will be discussed in detail. Meanwhile, chapter 3 reveals the techniques and the

algorithms that will be used in performing this study. Discussion about the process flow of this

research in detail is in this chapter. Chapter 4 discusses the details of the implementation.

Results of the testing are to be described in Chapter 5. Finally, chapter 6 concludes the entire

thesis.

CHAPTER II

LITERATURE REVIEW

2.1 Introduction

Chapter II is the important chapter for any project that will be develops. The purpose

of this chapter is to present a selected literature review, which is very important for the research.

This chapter also describes and explains on the literature review carried out on the system that

be used in developing in 1HSS. Besides that, previous research also will be discussed in this

section and at least three existing system that being used in to make as a research which is

related to IHSS will be explained and compared to highlight the differences.

For the project required section, where all the requirements such as software and

hardware as well as the operating system requirement will be listed so that developer can

understand all the features that are available in the requirement before proceeding to the

proposed project.

Finally, the last section of the chapter discusses the project schedule and milestones.

In this section, a Gantt chart will be attached together with this section. The Gantt chart listed

details of all task and activity required during the progress of the project and the conclusion

section will end the entire explanation for this chapter.

5

6

2.2 Literature Review

Literature review is aims to review the critical points of current knowledge on a

particular topic. Therefore, the purpose of the literature review is to find, read and analyze the

literature or any works or studies related to this system. It is important to well understand about

all information to be considered and related before develop this system.

For this project, some researchers have been done to understand the concept and

purpose of alert using mobile (SMS notification), programming language, protocol language,

and existing system that related to this project.

2.2.1 Domain

Every project has its own domain. in the IHSS for home protection, the domain for

the project is Information and Communication Technology (ICT) in Wireless Technology that

using the Bluetooth connection.

Bluetooth on Wireless connection normally used to refer to any type of electronic

operation that does not require a wired connection. Bluetooth is a standard and a

communications protocol primarily designed for low power consumption, with a short range

(power-class-dependent: lOOm, lOm and 1 m, but ranges vary in practice; (see Table 2.1) based

on low-cost transceiver microchips in each device. Bluetooth makes it possible for these devices

to communicate with each other when they are in range. Because the devices use a radio

(broadcast) communications system, they do not have to be in line of sight of each other.

Table 2.1 Bluetooth device classes

Type j Power Consumption Operating Range

Class 1 100mW (20 dBm) Up to 100 meters (300 feet)

Class 2 2.5mW (4 dBm) Up to 10 meters (30 feet)

Class 3 1 mW (0 dBm) 0.1-10 meters (less than 30 feet)

7

Source: Karygianrns and Owens. Wireless Network Security: 802.11, Bluetooth and Handled Device table 4.2, page 4-5

2.2.2 Keyword

2.2.2.1 Wireless Communication

Wireless is normally used to refer to any type of electrical or electronic operation which

is accomplished without the use of a hard wired connection. Wireless is a transmission or

Information transport method that enables Mobile computing over a distance. The distances

involved may be short or long range that refers to any wireless technology used.

The examples of Wireless technology include:

• Two way radios

• Cellular telephones

• Personal digital assistants (PDAs)

• Wireless networking

• GPS units

• Wireless computer mice and keyboards

• Satellite television and cordless telephones.

For the 11ISS, the wireless technology that will be use is Bluetooth and GSM network

that using Short Message Service (SMS).

2.2.2.1.1 Bluetooth

Bluetooth is an industrial specification for wireless personal area networks (PANs).

Bluetooth provides a way to connect and exchange information between devices such as mobile

8

phones, laptops, personal computers, printers, GPS receivers, digital cameras, and video game

consoles over a secure, globally unlicensed short-range radio frequency. The Bluetooth

specifications are developed and licensed by the Bluetooth Special Interest Group.

Bluetooth is a standard and communications protocol primarily designed for low power

consumption, with a short range (power-class-dependent: 1 meter, 10 meters, 100 meters) based

on low-cost transceiver microchips in each device.

Bluetooth enables these devices to communicate with each other when they are in

range. The devices use a radio communications system, so they do not have to be in line of sight

of each other, and can even be in other rooms, as long as the received transmission is powerful

enough.

Bluetooth exists in many products, such as phones, printers, modems and headsets. The

technology is useful when transferring information between two or more devices that are near

each other in low-bandwidth situations. Bluetooth is commonly used to transfer sound data with

phones (i.e. with a Bluetooth headset) or byte data with hand-held computers (transferring files).

Bluetooth simplifies the discovery and setup of services between devices. Bluetooth

devices advertise all of the services they provide. This makes using services easier because

there is no longer a need to setup network addresses or permissions as in many other networks.

2.2.2.1.1.1 Topology

Bluetooth device are grouped in piconets. Each piconet consists of master and different

slave. A master and a slave are connecting through the point-to-point communication. So if they

are more than one slave, a point-to-multipoint is established. The master is the unit which

initiates the communication. A device in one piconet can connect to a device belonging to

another piconet, forming a scatternet.

9

O. Master • Slave

•.0 • • I 4

• • •

.0 . 0 • .• I •- - I

is.44

- S w : --

-w ••0:

••.

a -a

a b c

point-to-point b point-to-multipoint

Scatte.rflet

Figure 2.1 Bluetooth Network Topology

Source: Introduction to Bluetooth and Bluetooth enabled Java Applications for Mobile Phones, Tran Cong Hung Ph.D. & Dang Hong Minh figure 1.2, page 2.

2.2.2.1.1.2 Protocol Stack

The Bluetooth specification aims to allow Bluetooth devices from different

manufactures to work with each other, so it is not sufficient to specify just a radio system.

Because of this, the Bluetooth specification does not only outline a radio system but a complete

protocol stack to ensure that Bluetooth devices can discover, -explore and use these services with

each other. The Bluetooth protocol stack is shown in Figure 2.2.

10

I Applications

__ ____ I SDPJ

OBEX WAP

I "COMM 1

[CJ

Logical Link Control and Adaption Protocol (L2CAP)

Host Controller Interface (HCI)

I Link Manager Protocol

I Baseband /Link Controller

I Radio

Figure 2.2 The Bluetooth Protocol Stack

Source: Anne Margrette Q. Caccam, Myra Colina, B. Dideles, Bienvenido H. Galang, Jr. and Ian C.Wong, Development of a Bluetooth Host-side Protocol Stack Using Formal Design Technique. http://www.omimo.be/magazine/00q4/2000q4j028.pdf

The Bluetooth stack is made up of many layers. The HCI is usually the layer separating

hardware from software and is implemented partially in software and hardware. The layers

below HCI are usually implemented in hardware and the layer above the HCI is usually

implemented in software. Tables 2.2 give a short description of each layer shown on figure 2.1.