Developing an Alarm System Using Arduino Technology

Article Preview

Abstract:

This research investigates the integration of Global System for Mobile Communications (GSM), laser technology, Arduino microcontrollers, and Light Dependent Resistors (LDR) to develop an active laser sensor security system for homes. The system activates when doors and windows are closed, whether locked or not, by utilizing an active laser detector connected to a microcontroller. This microcontroller interprets the detector's signal state, triggering an alarm through the laser and sending a call signal to a mobile phone via a GSM module if the laser beam is interrupted. By integrating these technologies, the paper offers a promising solution for improving home security and showcases potential innovative applications in electronics and telecommunications. The alert device automatically begins to ring whenever a person or object crosses in front of the laser light. The laser beam is nearly undetectable and may travel great distances without experiencing any scattering. When it detects any irregular activity, a laser security system can function as a stand-alone device that emits noise or commotion. It can also be a component of a larger security system or any other automation system that can notify users.

You might also be interested in these eBooks

Info:

Periodical:

Engineering Headway (Volume 35)

Pages:

114-123

Citation:

Online since:

February 2026

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2026 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Baballe, M. A., M. Cavas, "Design and Simulation of Four Walls Crossed Security System against Intrusion Using PIC Microcontroller," American Journal of Engineering Research, vol. 7, no. 12, pp.233-244, December 2018.

Google Scholar

[2] Baballe, M. A., M. Cavas, "Design and Simulation of personal computer base Walls Crossed Security System against Intrusion Using PIC Microcontroller", International Journal of Engineering Science Invention, vol. 8, no. 03, pp.59-74, March 2019.

Google Scholar

[3] Baballe, M. A., A. B Abdullahi, A. S. Muhammad, Y. B. Saleh, U. B. Usman, "The Various Types of sensors used in the Security Alarm system," International Journal of New Computer Architectures and their Applications, vol. 9, no. 2, pp.50-59, September 2019.

DOI: 10.17781/p002618

Google Scholar

[4] Baballe, M. A., M. Cavas, "A Review Advancement Of Security Alarm System Using Internet Of Things (IoT)", International Journal of New Computer Architectures and their Applications, vol. 9, no. 2, pp.38-49, September 2019.

DOI: 10.17781/p002617

Google Scholar

[5] Baballe, M. A., A. S. Muhammad, A. A. Abdullahi, A. Tijjani, A. S. Iliyasu, I. M. Muhammad, I. Ibrahim, S. Tijjani, Y. Idris, I. K. Dahiru, A. A. Umar, J. Sulaiman, A. L. Musa, S. A. Mohammed, S. I. Abdullahi, A. H. K. Naisa, M. Surajo, S. A. Muhammad, B.

DOI: 10.17781/p002636

Google Scholar

[6] Baballe, M. A., A. S. Muhammad, A. S. Iliyasu, A. A. Umar, B. A. Imam, S. H. Ayagi, M. B. Ahmad, "Gabor Based Band Selection For Multispectral Palmprint Recognition System Using Feature Fusion", i-manager's Journal o Image Processing, vol. 6, no. 2, pp.14-19, April - June 2019.

Google Scholar

[7] Baballe, A., M., Mukhtar, I., B., Abubakar, S., M., Bello, A., I., "Design and Simulation of Crossed Walls Security Detection System", International Journal of New Computer Architectures and their Applications, The Society of Digital Information and Wireless Communications, ) vol. 11, no. 1, pp.10-2021.

Google Scholar

[8] Baballe, A., M., Fatima, A., N., "The need of using a Radio Frequency Identification (RFID) System", International Journal of New Computer Architectures and their Applications (IJNCAA), vol. 11, no. 2 pp.22-29, 2021.

Google Scholar

[9] Baballe, A., M., "Detection of crossed walls security alarm system against invasion.", Review of computer engineering research, vol. 8, no. 1, pp.14-26, 2021.

DOI: 10.18488/journal.76.2021.81.14.26

Google Scholar

[10] Malik, A.W.; Anwar, Z. Do Charging Stations Benefit from Cryptojacking? A Novel Framework for Its Financial Impact Analysis on Electric Vehicles. Energies 2022, 15, 5773.

DOI: 10.3390/en15165773

Google Scholar

[11] Malik, A.W.; Anwar, Z.; Rahman, A.U. A novel framework for studying the business impact of ransomware on connected vehicles. IEEE Internet Things J. 2022.

DOI: 10.1109/jiot.2022.3209687

Google Scholar

[12] Saoudi, O.; Singh, I.; Mahyar, H. Autonomous Vehicles: Open-Source Technologies, Considerations, and Development. arXiv 2022, arXiv:2202.03148.

Google Scholar

[13] Wilkinson, A.; Hill, M.; Gollan, P. The sustainability debate. Int. J. Oper. Prod. Manag. 2001, 1, 26.

Google Scholar

[14] Goodland, R. The concept of environmental sustainability. Annu. Rev. Ecol. Syst. 1995, 1, 24.

Google Scholar

[15] Lubin, D.A.; Esty, D.C. The sustainability imperative. Harv. Bus. Rev. 2010, 88, 42–50.

Google Scholar

[16] Mihet-Popa, L.; Saponara, S. Toward green vehicles digitalization for the next generation of connected and electrified transport systems. Energies 2018, 11, 3124.

DOI: 10.3390/en11113124

Google Scholar

[17] Salam, A. Internet of things for sustainable community development: Introduction and overview. In Internet of Things for Sustainable Community Development; Springer: Berlin/Heidelberg, Germany, 2020; p.1–31.

DOI: 10.1007/978-3-030-35291-2_1

Google Scholar

[18] Kumar, A.D.; Chebrolu, K.N.R.; KP, S. A brief survey on autonomous vehicle possible attacks, exploits and vulnerabilities. arXiv 2018, arXiv:1810.04144.

Google Scholar

[19] Othman, K. Exploring the implications of autonomous vehicles: A comprehensive review. Innov. Infrastruct. Solut. 2022, 7, 1–32.

DOI: 10.1007/s41062-022-00763-6

Google Scholar

[20] Silva, Ó.; Cordera, R.; González-González, E.; Nogués, S. Environmental impacts of autonomous vehicles: A review of the scientific literature. Sci. Total. Environ. 2022, 1, 154615.

DOI: 10.1016/j.scitotenv.2022.154615

Google Scholar

[21] Hataba, M.; Sherif, A.; Mahmoud, M.; Abdallah, M.; Alasmary, W. Security and Privacy Issues in Autonomous Vehicles: A Layer-Based Survey. IEEE Open J. Commun. Soc. 2022, 3, 811–829.

DOI: 10.1109/ojcoms.2022.3169500

Google Scholar

[22] Ahmed, H.U.; Huang, Y.; Lu, P.; Bridgelall, R. Technology Developments and Impacts of Connected and Autonomous Vehicles: An Overview. Smart Cities 2022, 5, 382–404.

DOI: 10.3390/smartcities5010022

Google Scholar

[23] Alam, M.S.; Georgakis, P. The State of the Art of Cooperative and Connected Autonomous Vehicles from the Future Mobility Management Perspective: A Systematic Review. Future Transp. 2022, 2, 589–604.

DOI: 10.3390/futuretransp2030032

Google Scholar

[24] Bathla, G.; Bhadane, K.; Singh, R.K.; Kumar, R.; Aluvalu, R.; Krishnamurthi, R.; Kumar, A.; Thakur, R.; Basheer, S. Autonomous Vehicles and Intelligent Automation: Applications, Challenges, and Opportunities. Mob. Inf. Syst. 2022, 2022, 7632892.

DOI: 10.1155/2022/7632892

Google Scholar

[25] Bharathidasan, M.; Indragandhi, V.; Suresh, V.; Jasiński, M.; Leonowicz, Z. A review on electric vehicle: Technologies, energy trading, and cyber security. Energy Rep. 2022, 8, 9662–9685.

DOI: 10.1016/j.egyr.2022.07.145

Google Scholar

[26] Kim, K.; Kim, J.S.; Jeong, S.; Park, J.H.; Kim, H.K. Cybersecurity for autonomous vehicles: Review of attacks and defense. Comput. Secur. 2021, 103, 102150. Electronics Sourcing How Many Chips Are in Our Cars? 2022. Available online: https://electronics-sourcing.com/2022/05/04/how-many-chips-are-in-our-cars/ (accessed on 10 January 2023).

DOI: 10.1016/j.cose.2020.102150

Google Scholar

[27] Whalen, J. USA Will Miss Electric-Vehicle Targets without Big Investments in Semiconductor Manufacturing, Commerce Secretary Warns. 2021. Available online: https://www.washingtonpost.com/technology/2021/11/29/electric-vehicles-semicondutors-chips-act/ (accessed on 10 January 20).

Google Scholar