SURVEY ON SMART OBJECT DETECTION USING ESP8266
Srividya RamisettyDept. of ISE, CMR Institute of Technology, Bengaluru, Karnataka, India ***
Abstract - These days Human Beings are facing a problem of forgetting their belongings very often. In order to overcome this, we are implementing object detection using ESP8266 device. ESP8266 is a low-cost Wi-Fi microchip with full TCP/IP stack and microcontroller capability. Electronic Stability Program (ESP) is a computerized technology which acts as a Hotspot. Here we make use of set of ESPs’ in which one acts as a transmitter (hotspot) and rest acts as receiver. In this model, the ESP transmitter (Hotspot) send signals to the set of ESP receivers. Whenever, any of the receiver device exceeds the specified range of the Hotspot, then it produces an alert sound.
Key Words: ESP8266, Microcontoller, switch, buzzer Arduino.
1.INTRODUCTION
Peopleforgettheirbelongingsveryoften,bymakinguseof this model (longer range) it assures people not to forget theirbelongings.Peoplelosetheirbelongingsveryoften,by making use of this model (shorter range) it helps people searchthelostbelongings.IfanyoneoftheESPreceiversget disconnected, it is possible to connect another device by dumpinganewcode.MakinguseofasetofESP8266devices ensure the user that all of his/her belongings are present withintherange.AsESPtransmitteractsasaHotspot,itis connected to all the ESP receivers. Whenever any ESP receiver exceeds specified range of Hotspot, then the transmitter produces an alert sound indicating that the receiverhasexceededtherangeoftheHotspot.
ThismodelcanbeusedinLongerRangeorShorterRange modeLonger range is a method which detects the ESP receiverwhenitexceedsthespecifiedrangeoftheHotspot whereas shorter range is a method which detects the ESP receiverwhenitentersthespecifiedrangeoftheHotspot. Wemakeuseofatoggleswitchwhichwillhelpustoselect theappropriatemodeasperourconvenience.
2. LITERATURE SURVEY
This section discusses the existing literature and the shortcomingsandproblemsinexistingwork.
Radio Frequency Identification (RFID) as being used in anumberofpracticalapplications,suchasinmprovingsupply chainmanagement,trackinghouseholdpets,accessingoffice buildingsandspeedinguptollcollectiononroadways.RFID isusedtoautomaticallyidentifypeople,objectsandanimals usingshortrangeradiotechnologytocommunicatedigital
information between a stationary location (reader) and movableobject(tag).
RFID technology can be used to track products in a mannersimilartousingbarcodesforproductidentification, but RFID also carries additional benefits. RFID does not requirelineofsighttoreadthetag,hasalongerreadrange thanabarcodereaderandtagscanstoremoredatathanbar codes. Readers can simultaneously communicate with multipletags.Thisfeaturecouldallowcustomerstobreeze through grocery store checkout counters while a reader identifies all items in a shopping cart at the same time, insteadofscanningeachbarcodeindividually.
RFIDtagsfallintotwocategories,Activetags,whichcontain an internal power source and Passive tags which obtain powerfromthesignalofanexternalreader.Becauseoftheir lower price and smaller size, Passive tags are more commonlyusedthanActivetagsforretailpurposes.Apassive tagconsistsofamicrochipsurroundedbyaprintedantenna and some form of encapsulation, plastic laminates with adhesivethatcanbeattachedtoaproductorasmallglassfor implantation.Thetagreaderpowersandcommunicateswith Passivetags.Thetag’santennaconductstheprocessofthe energycaptureandIDtransfer.Atag’schiptypicallyholds datatoidentifyanindividualproduct,theproductmodeland manufacturer.
Anemergingmobiletechnology,Beaconsenablesmart phoneapplicationstopinpointtheirexactlocation,indooror outdoor,withalevelofaccuracydowntoafewcentimeters. The signal from a Beacon can be used to trigger a specific application notification relevant to that location and time. Beaconsareinexpensive,smallandoftenbatterypowered devicesthatcanbediscretelyplacedinretail,entertainment, hospitality,transport,healthcare,outdoormediaandprivate locationstoenableawidevarietyofusecases.Beaconshelp appdeveloperstoengageconsumersattherightplaceand time, pushing out the relevant information and content, rather than requiring the consumer search for offers, paymentdetails,ticketsorloyaltycards.Note,insomecases an app may need to use a cellular or Wi-Fi connection to display the appropriate content, while in other cases the relevant content may already be cached within the app. Beacons can also give app developers greater insight into consumersbehavior,forexamplebyenablingthemtotrack thetypicalpaththroughastoreordwelltimeataparticular product.
3. PROPOSED MODEL
InthisPaperweareproposingamodelwhichwillbehelpful for detecting the misplaced or lost (within the specified range)object.ItisanormalfunctionthateveryHumanBrain tends to forget so many things which is because of the frustration undergone by Brain. In such a case the Human Brain enters into a sort of Google search wherein the subconsciousmindtriestorememberwheretheobjectwas beingplaced.Thesubconsciousmindtriestogetananswer after a random amount of time. What if the subconscious mindfailstogetananswer?Inordertoovercomethis,we canmakeuseofthismodel.
Basically, it is implemented using active device such as ESP8266.Inthismodel,wemakeuseofmultipleESP8266 devices in which one of the devices act as a transmitter whereasrestoftheESP8266deviceswillbehaveasreceivers.
Normally,anESP8266hasamaximumrangeof150meters. Fig.1showstheproposeddesignandmodel.Intheproposed modelESP8266transmitter’srangewillbepredefinedinthe code.TherestofESP8266receiverswillbepresentwithin thespecifiedrangeoftheESP8266transmitter.TheESP8266 transmitter when turned ON will ping each and every receiver. If the receiver fails to send an Acknowledgement packetitmeansthatthereceiverhasexceededthespecified rangeofthetransmitter.Thiswillresultinanalertsoundin thetransmitterindicatingthatthereceiverhasexceededthe specifiedrangeofthetransmitter.
gets an Acknowledgement only if the receiver enters the specified range which will be helpful to detect the nearby misplacedobjects.Theaboveexplainedscenarioisknownas Shortrangemode.
Thecomponentsusedarediscussedasbelow:
3.1 ESP8266
TheESP8266is a low-costWi-Fimicrochip with fullTCP/IPstackandmicrocontrollercapabilityproducedby Shanghai-basedChinesemanufacturer,ExpressifSystems.
Thechipfirstcametotheattentionofwesternmakersin August 2014 with theESPmodule, made by a third-party manufacturer, Ai-Thinker. This small module allows microcontrollers to connect to a Wi-Fi network and make simple TCP/IP connections usingHayes-style commands. However,atthetimetherewasalmostnoEnglish-language documentation on the chip and the commands it accepted.The very low price and the fact that there were very few external components on the module which suggested that it could eventually be very inexpensive in volume,attractedmanyhackerstoexplorethemodule,chip, and the software on it, as well as to translate the Chinese documentation.
3.2 ARDUINO
Arduinois an open source computer hardware and software company and user community that designs and manufacturessinglemicrocontrollerandmicrocontrollerkitsforbuildingdigital devices and interactive objects that can sense and control objects in the physical world. The project's products are distributed asopen source hardwareandsoftware, which are licensed under theGNU Lesser General Public License(LGPL) or theGNU General Public License(GPL),permitting the manufacture of Arduino boardsandsoftwaredistributionbyanyone.Arduinoboards areavailablecommerciallyinpreassembledform,orasdoit-yourself (DIY)kits.
Fig -1:Proposedmodel
The above explained scenario is known as Longer range mode.Itisalsopossibletomakethemodelworkintheother wayaround,thatistomakethetransmitterproduceanalert sound when the receiver enters the specified range of the transmitter.Astransmitterpingseachandeveryreceiver,it
Arduinoboarddesignsuseavarietyofmicroprocessors andcontrollers.Theboardsareequippedwithsetsofdigital andanaloginput/output(I/O)pinsthatmaybeinterfacedto variousexpansionboards(shields)andothercircuits.The boards feature serial communications interfaces, includingUniversalSerialBus(USB)onsomemodels,which are also used for loading programs from personal computers.Themicrocontrollersaretypicallyprogrammed using a dialect of features from the programming languagesCandC++. In addition to using traditional compiler tool chains, the Arduino project provides anintegrated development environment(IDE) based on theProcessinglanguageproject.
The Arduino project started in 2003 as a program for students at theInteraction Design Institute IvreainIvrea, Italy,aimingtoprovidealow-costandeasywayfornovices andprofessionalstocreatedevicesthatinteractwiththeir environment usingsensorsandactuators. Common examplesofsuchdevicesintended for beginnerhobbyists includesimplerobots,thermostats,andmotiondetectors.
ThenameArduinocomesfromabarinIvrea,Italy,where someofthefoundersofthe projectusedto meet. Thebar wasnamedafterArduinoofIvrea,whowasthemargraveof theMarchofIvreaandKingofItalyfrom1002to1014.
Arduino isopen-source hardware. The hardware reference designs are distributed under aCreative CommonsAttribution Share-Alike 2.5 license and are available on the Arduino website. Layout and production filesforsome versions of thehardwarearealsoavailable. The source code for the IDE is released under theGNU General Public License, version 2. Nevertheless, an officialBill of Materialsof Arduino boards has never been releasedbyArduinostaff.
Although the hardware and software designs are freely available undercopyleftlicenses, the developers have requested the nameArduino to beexclusive to the official productand not be used for derived works without permission. The official policy document on use of the Arduino name emphasizes that the project is open to incorporating work by others into the official product.SeveralArduino-compatibleproductscommercially released have avoided the project name by using various namesendingin-duino
A program written with the IDE for Arduino is called asketch.Sketchesaresavedonthedevelopmentcomputer as text files with the file extension.ino. Arduino Software (IDE)pre-1.0savedsketcheswiththeextension.pde.
TheArduinoIDEsupportsthelanguagesCandC++using specialrulesofcodestructuring.TheArduinoIDEsupplies asoftwarelibraryfromtheWiringproject,whichprovides manycommoninputandoutputprocedures.User-written code only requires two basic functions, for starting the sketch and the main program loop, that are compiled and linkedwithaprogramstubmain()intoanexecutablecyclic executiveprogram with theGNU toolchain, also included with the IDE distribution. The Arduino IDE employs the programarguedtoconverttheexecutablecodeintoa text fileinhexadecimalencodingthatisloadedintotheArduino boardbyaloaderprogramintheboard'sfirmware.
3.3 LITHIUM BATTERIES
Alithium-ion batteryorLi-ion battery(abbreviated asLIB) is a type ofrechargeable batteryin whichlithiumionsmovefromthenegativeelectrodetothe positiveelectrodeduringdischargeandbackwhencharging.
Li-ionbatteriesuseanintercalatedlithiumcompoundasone electrodematerial,comparedtothemetalliclithiumusedin anon-rechargeablelithium battery. Theelectrolyte, which allowsforionicmovement,andthetwoelectrodesarethe constituentcomponentsofalithium-ionbatterycell.
Lithium-ion batteries are common in-home electronics. They are one of the most popular types of rechargeable batteriesforportableelectronics,withahighenergydensity, tinymemory effectand lowself-discharge. LIBs are also growing in popularity for military,battery electric vehicleandaerospaceapplications.
4. CONCLUSIONS
Peopleforgetandlosetheirbelongingsveryoften,bymaking use of this model it assures people not to forget their belongings and also helps people to search the lost belongings in the prescribed range. So, this model can be used in two different ways they are Longer range and Shorter range. If any one of the ESP receivers get disconnected, it is possible to connect another device by dumping a new code. In this proposed system, instead of using Beacon Battery we are making use of Lithium ion Battery as it has wide range of advantages such as High energydensityandithastheabilitytoself-discharge.Beacon Batterieslastforalongertimebuttheydonotlastforever, oncethebatteryisdrainedoutithastobereplaced.
REFERENCES
[1] J.Aragones-Vilellaet.al“ABriefSurveyonRFIDPrivacy and Security”, Proceedings of the World Congress on Engineering 2007 Vol II, WCE 2007, July 2 - 4, 2007, London,U.K
[2] XiaoNie,XiongZhong“SecurityintheInternetofThings BasedonRFID:IssuesandCurrentCountermeasures”in Proceedings of the 2nd International Conference on ComputerScienceandElectronicsEngineering(ICCSEE 2013)
[3] Jitendra Kumar Gupta & K. K. Mishra“Efficient AuthenticationinRFIDDevicesUsingEtAl’sAlgorithm” on GlobalJournalofComputerScienceandTechnology Network,Web&Security,Volume12,Issue16,Version 1.0,Year2012
[4] Martin Feldhofer, Sandra Dominikus, and Johannes Wolkerstorfer” D.VAM.11 Suggested Algorithms for Light-Weight Cryptography n supported by the CommissionoftheEuropeanCommunitiesthroughthe ISTprogramundercontractIST-2002-507932.
[5] AxelPoschmann,GregorLeander,andKaiSchra”New Light-WeightCryptoAlgorithmsforRFID”Conference: Circuits and Systems, 2007. ISCAS 2007. IEEE InternationalSymposium.
[6] Jatinder Teji, Rimmy Chuchra, Sonam mahajan, Manpreet Kaur Gill, Manju Dandi “Detection and Prevention of Passive Attacks in Network Security” International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 6, November2013.
[7] Agusti Solanas and Jesus Manj “RFID Readers DeploymentforScalableIdentificationofPrivateTags” P. Kitsos, Y. Zhang (eds.) RFID Security: Techniques, Protocols 289 and System-on-Chip Design, Springer ScienceBusinessMedia,LLC2008.
[8] KapilSingh“SecurityinRFIDNetworksandProtocols”, InternationalJournalofInformationandComputation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 425-432, International Research PublicationsHouse.
[9] DaleR.Thompson,JiaDi,HarshithaSunkara,andCraig Thompson “Categorizing RFID Privacy Threats with STRIDE”.
[10] http://www.idconline.com/technical_references/pdfs/d ata_communications/Security_attacks.pdf