Home Security Alarm Using Wemos D1 and HC- SR501 Sensor Based Telegram Notification

Home Security Alarms in today's modern society only use CCTV that can only see the person without any notification that goes into the cellphone in dealing with the theft that occurred. To help the community in dealing with the theft that enters the house, a Home Security Alarm was made using WEMOS D1 and HC-SR501 Sensor with Telegram Notification. The whole tool is divided into several parts which consist of HCSR501 Sensor, WEMOS D1 and Buzzer. This tool works when the WEMOS D1 microcontroller processes the pear sensor as a motion detector and buzzer as a sound alarm if motion is detected, then the notification automatically enters into the Telegram Application, with this tool can monitor directly if anyone enters the house while being left Keywords—


INTRODUCTION
Seen from the point of view of the crime rate, it can be seen that the crime rate of finding empty houses is increasingly happening. The owner of the house does not know the condition of his house when traveling because there is no tool that can directly inform someone if the house has been entered by an unknown person and the ineffective information received when there is a suspicious movement at an unreasonable time.
Based on research from Muhammad Saleh et al, home is a place to store things valuable and perhaps very personal to the home owner because it is a lot of effort made by the community in order the house was spared from attempted theft. The venture is on among other things, conducting nightly patrols in the neighborhood community homes, put wild pets like the dog in the yard, padlocks the fence House. Overcoming the problems mentioned earlier, many studies have been carried out, for example Design and Implementation of a WIFI Based Home Automation System, System supports a wide range of home automation devices like power management components, and security components.
The proposed system is better from the scalability and flexibility point of view than the commercially available home automation systems, Elshafee and Hamed [1] [2]. Muhammad KhoiruSyabibi, ArkhanSubari in this article explained that when someone enters a house, he must press a button. If the input keypad is correct according to the passcode then the LED will turn off, indicating that the home security monitoring system is off for 10 seconds. If you enter the house without pressing the keypad according to the passcode then when the door is open the magnetic switch will be active, then the bell rings and the web indicator will change, indicating that he is a person who will commit a crime [3].
Hamzah & Rusilawati research about NFC is a technology that can simplify and facilitate transactions, transfer data, and wireless connections between two communication devices that are very close to a few centimeters. This system is designed using an Android device that has NFC technology [4] research conducted by Yuda Irawan et al discusses detecting heart rate using a sensor device, researchers designed to measure heart rate as an alternative in maintaining health, using a pulse sensor and Arduino circuit. This research produces a heart rate application system as a control to monitor the condition of the patient's heart rate, can provide information about the heart rate using a heart rate sensor to patients and doctors who have an application to read the heart rate that has been made [5].
Research conducted by Joyner R et al made a system using the Sm630 fingerprint sensor as input to detect fingerprints from motorbike users. This system is also supported by the Arduino Uno kit with the ATmega328 microcontroller as the brain to process data from the fingerprint sensor to the LCD, motorbikes and alarms. There will only be five users who can access the motorbike and the system will turn on an alarm when an inappropriate fingerprint is attached to the sensor because the sensor will only communicate with the fingerprints stored in the sensor database [6].
Research conducted by Balakrishna Gokaraju is the implementation of a home security system in this study aimed at comparing the design and implementation of the program against ARM microprocessors and ATmega microprocessors [7]. Research conducted by G. M. Sultan Mahmud Rana et al is the design and implementation of home security systems that can save costs but are flexible [8]. Research conducted by Naser Abbas Hussein et al is a security door locking system based on Raspberry pi technology where cameras, keypads and pi-lids are used to provide an alarming system to notify homeowners, and to recognize people who come by giving them a user identity [9]. Long-distance home security alarm system using low power developed by applying WSN and GSM technology, namely the research of Huiping Huang and friends [10]. Next researchers propose a smart alarm system, which uses machine learning techniques to intelligently detect threats using environmental data that has been collected by Arduino sensors and microcontrollers after which it notifies homeowners via email in real time [11]. Subsequent research discusses the Smart Home Security Monitor System Internet of Things (IoT) and Wireless Sensor Networks (WSNs) this monitoring system provides checks for events that occur and sends alarm messages to the user. This system uses three gradations, namely Client Sensor, Data Collector and Data Center [12].
Further research is the home security system by sending notifications to home owners using the Internet if someone enters secretly and can hide the alarm if needed by the home owner [13]. Further research is a system that can recognize security alarm events obtained from sensor nodes and forwarded by means of hop-by-hop transmission [14]. The next researcher uses the Internet of Things (IoT) for smart home security which can decide which people can enter the house and who cannot use cellphones and web applications [15]. Research by Chan Zhen Yue et al, namely the design and implementation of smart homes using sound [16]. The IoT project this time is focused on a smart wireless home security system which will send a warning to home owners using the Internet in the event of a breach which will optionally raise the alarm [17].
The next research states that the concept of smart homes and smart cities is in accordance with the state program "Russian Digital Economy", so it is advisable to use technology related to state programs [18]. In subsequent research using RFID, the terminal can precisely change the alarm mode and notify the home owner of an intruder quickly [19]. A home security system and teleguard that gives a warning when the owner is at home but also provides a voice message that comes from a previously recorded voice via a cellphone so that the home owner can control the condition of his house [20]. A home security system or what is called a smart home is needed nowadays and there are also very many enthusiasts because it is very helpful for home owners when the owner is far away or is outside the house [21].
There is also a study that discusses the safety of the home using Bluetooth using a microcontroller Peripheral Interface Controller (PIC) (16F1937) as the main manager and the equipment is connected to the microcontroller peripheral port via a relay [22]. This study discusses an approach to combining speech recognition technology with the Internet of Things (IoT) for smart homes [23]. The next research discusses a smart home which is how it works, namely when the owner leaves the house and it turns out that other people who come to the house will send an SMS to the home owner / user and the alarm will go off. after the alarm is on, the recorder will automatically record which results will be visible to the owner / user [24]. the system can recognize events and an alarm will fire using sensor nodes and forwarded by means of hop-by-hop transmission. There is a sensor network, a mobile home security robot (HSMR) and a home server in this system [25]. Homes without a sophisticated security system have a higher chance of being targeted by criminals than homes that use sophisticated security systems [26]. Subsequent research proposes a ZigBee and PSTN based wireless smart home sensor network system using the PIC18LF4620 SCM and 2.4G RF transceiver modules [27]. Subsequent research proposes algorithms to detect intruders into the room. The main idea of the proposed method is to estimate the feature variation of the room acoustic transfer function (RTF) [28]. In making home security systems, many use the Internet of Things framework which is popular in the Security Sector [29].
IoT devices are an integral part of IoT-based systems [30]. From some of the previous studies above, it can be concluded that the use of telegram is still very minimal, so that researchers are interested in using telegram as a medium for conveying home security information. This Telegram application will later be used as a medium for system monitoring activities to be made. This Telegram application will be used as a medium for system monitoring activities to be made. Telegram itself was chosen because this application is free, with a fairly complete and growing Bot API. The existence of the Application Programming Interface (API) feature is one of the advantages of this application. This application has a bot that functions as a service to create a computational system that will be created, and can also be developed by the wider community. Smartphones equipped with Android OS can be used to monitor the home security system and detect someone's presence by using a motion sensor such as the PIR sensor which detects the wavelength of passive infrared rays produced by the human body and then makes a sound from the buzzer device and will provide notification via Telegram application.
Based on the description above, a research is submitted for research with the title "Home Security Alarm Using Wemos D1 and Sensor HC-SR501 With Telegram Notification".

II. METHODS
Researchers use the prototype method, because this method is a method that is widely used by software developers. The essence of this method is the work of a model development into a final system. The following are the stages of making a prototype method, namely:

Collection of Needs
Researchers analyze the needs in the design of the control system to be built. Among them is the selection of the required hardware and software. In this case the researchers used the Wemos D1 microcontroller as the main hardware and Telegram as an intermediary for communication between the smartphone and hardware.

Building Prototyping
In this case the researcher describes the input and output formats that will be produced by the security system being Here the researcher describes the input and output schemes that will be received by Wemos D1.

Prototype Evaluation
Furthermore, after the prototyping development stage, the researcher defines the format and requirements of the entire security system, identifies all the requirements, and an outline of the system to be built, for example the communication path between the Wemos D1 microcontroller and the Telegram platform.

Encoding the System
In this stage the prototyping that has been agreed upon is translated into an appropriate programming language as a process for inputting commands that will be received on the microcontroller. In this system, the programming language used is C ++ using the Arduino IDE software.

Testing the System
In this stage, the modules that have been made are combined and tested to find out whether the system that has been built is in accordance with the design and whether there are still errors or not. Testing using android is testing carried out directly by the user.

System Evaluation
System evaluation is not prototyping evaluation, system evaluation is evaluating the finished system or software and hardware whether it is in accordance with the wishes or not. If not, then the system will be revised again and return to stages 4 and 5. If the system is said to be OK, the system is ready to continue at the next stage.

Using the System
This stage is the final stage of creating a security system using the Prototyping Model method. At this stage, the finished tools that have passed the test are ready for use.

III. IMPLEMENTATION
Implementation is one of the stages in system development, where this stage is the stage of placing a home security alarm at home so that it is ready for operation and can be seen as an effort to realize the system that has been designed.

A. System Testing
Testing the WEMOS D1 system on Home Alarm Security can be done with the following steps: 1. Connect the cellphone charger cable to the Home Security Alarm hardware circuit and press the on button. After that open the cellphone and the telegram application, then enter the command / Turn on Sensor to turn on the device to connect to the telegram. 3. If successful, the tool will automatically activate and detect every movement that crosses the sensor of the pear causing a sound on the buzzer and then giving a notification to the telegram. 4. To check the status of whether the tool is turned off or on, type / StatusSensor then we will be able to see whether the tool is turned off or on. 5. When finished, type the command / Turn off the sensor, the sensor will automatically turn off and cannot detect human beings who cross it.

B. Testing Systems on the Prototype
Tests are carried out to test the system on a prototype designed with the movement of humans passing through it. The result is shown Table 1.

C. PIR Sensor Testing
Testing by testing the distance on the pear sensor. The distance on the sensor is generally 5 m, so the device sounds and can detect human presence and provide message notifications on telegram.

IV. CONCLUSION
Based on the results of the analysis, design and implementation that has been done. Then several conclusions can be drawn including the following: 1. Home Security Alarm uses a PIR Sensor as a detection of the presence of humans entering the house, a Buzzer which provides notification sounds inside the house, and a telegram which is a software to receive and activate notifications if someone is detected entering the house. 2. Home Security Wemos d1 alarm and pir sensor can more effectively assist people in overcoming theft that occurs at home.