Системы безопасности для дома.

Security systems for home. Security is the state of a system or an object when the impact of external and internal factors does not violate its activities.
Currently, there are many private and public objects (all kinds of property) that use security systems of various types.

Currently, there are many private and public objects (all kinds of property) that use security systems of various types:

  • warning system;
  • security systems for cottages;
  • security systems for private houses;
  • fire extinguishing systems;
  • power supplies of the fire alarm system;
  • GSM-system of protection of objects;
  • video surveillance systems.

Security systems with security alerts

Means of communication is established for notification at the facilityfor the cases when the security regime is violated or an emergency occurs. The objects should operate SOSE-system of warning and management of evacuation of people. This system can be used in 2 modes:

  • manual alert mode. It is carried out through loudspeaker communication with the help of the dispatcher or through the alarm button for the pannel security system;
  • automatic option. It is produced by several sources through the transmission of an alarm signal and the transmission of an information message.

Modern automatic systems allow:

  • transmit and receive alarms according to the specified program;
  • to replace messages after a certain period of time;
  • control the system transmitting the signal;
  • to transmit a voice message to employees and officials according to a given program.

Installation, installation and features of security security systems for cottages and private houses

Security security systems:

  • autonomous alarm;
  • security alarm systems using GSM;
  • security alarm with signal transmission over the telephone line.

Independent alarm system consists of sensors detecting violation of the protection mode. When the system is triggered, it generates light and sound signals, warning neighbors of illegal intrusion into a residential facility. In this case, neighbors should call for security or a police order to check the object . Security systems for private homes can increase the security of property and reduce the incidence of theft.

Security alarm system with GSM signal. Mobile communication is used for installing this security system. The alarm goes to the owner of the facility and to the security company which protects the homeownership. The alarm system with a telephone line operates according to the same principle. A signal of violation of the mode is transmitted to the security panel, which send fast response group to the object and checks it.

The security system for signal transmission uses a special protected channel with a frequency of 433 MHz, which comes from intrusion detection sensors to the object.

Different sensors can be installed in the house:

  • infrared passive motion sensor, fixes the movement of thermal radiation through the room;
  • contact magnetic sensors;
  • smoke detectors;
  • sensors for responding to the movement of an object with signal transmission at radio frequency;
  • vibration sensors that react to the slightest fluctuations;
  • ray infrared sensors respond to the intersection of a laser beam with an extraneous object.

It should be noted that the sensors used in the wired system have a larger radius of detection and fixation of security violations. For wire sensors, the maximum operating range is not more than 100 meters.

Security systems with the ability to respond and use fire extinguishing equipment

The fire alarm system is a complex of special technical means designed to detect the source of fire and unauthorized violation of the security regime.

The system includes:

  • control panel;
  • control prowess; sensors;
  • control devices;
  • various warning devices;
  • power supplies of the OPS system.

For automatic fire extinguishing, automatic fire extinguishing equipment is used, which is brought into operation in automatic mode when the control sensors detect fire. The cause of the fire extinguishing system can be increased smoke in the premises or an increase in the permissible temperature in the premises.

APCT is produced in several forms, depending on the substance used to extinguish the fire:

  • water;
  • foam;
  • gas;
  • powder;
  • aerosol.

For power supply of security and fire alarm and fire extinguishing systems, power supplies are used that provide power in the mode of backup and uninterrupted power supply.

Use of video surveillance systems

For continuous monitoring of objects, video surveillance systems with video cameras are used. Video surveillance can be performed in on-line mode, and also record all events on the DVR.

The kit for video surveillance includes:

  • cameras (analog or digital) in the amount of 2 to 8 pcs.;
  • the DVR;
  • Power Supply;
  • connecting wires;
  • control and management unit.

Cameras can be installed inside the house and around the perimeter of the site.

GSM-systems for security alarm systems

GSM / Wi-Fi network is used for GSM alarm signal transmission, which is able to operate at temperatures from -40 * С to + 50 * С and is highly reliable. GSM-system can be equipped with an IP camera that works in a Wi-Fi network and uses GSM communication as an additional signal transmission channel.

The use of security security systems significantly increases the level of security of houses and ensures the safety of property.

Protection against interception of GSM signal

There are three generations of wireless communication: 2G, 3G, 4G. The most popular standard is 2G, that is, it has the largest coverage area. It was commissioned in the early nineties. Since this standard is more than twenty years old, it has a number of security problems: one-way authentication and the ability to establish a connection without encryption.

There is a telephone and a base station. The phone on the SIM card has an unrecoverable key, which is used to authenticate. On the operator side, for each authentication, a random number, sres, and a session encryption key (Kc) are generated. The base station transmits a random number to the phone, the phone transmits the SIM card. The sim card, in return, returns two values ​​- sres and Kc. Sres is returned to the operator. Comparing sres, the operator identifies the subscriber. After that, the command for encryption is issued, which happens with Kc.

From the above algorithm, you can see: nothing prevents the substitution of the base station, replace the encryption with the lack of encryption. Using this vulnerability, an attacker can listen to us. To implement a full-fledged interception, you will need a virtual base station (BTS), a decoder and a phone emulator. The interceptor in the form of such a system will be quite expensive.

A simplified version can be used. There is a virtual base station and the Internet. Through the Internet via VoIP interception is carried out. This option has a number of limitations. That is, the relationship will be one-sided. Via VoIP, the caller can call, but will not be able to receive calls.

With this vulnerability, it is still possible to implement the IMSI-Catcher and the signal blocker. IMSI-Catcher is a system that receives the identifiers of mobile devices in the range of action and gives them a hang-over. That is, subscribers are returned to the network of the real telecommunications operator, but their identifiers are received. The signal blocker works in much the same way as the IMSI-Catcher, but after the authentication process it takes the subscriber. The subscriber is located on this virtual base station and no services are available to him.

There are a number of signs of signal interception:

  1. A powerful signal.
  2. Large coefficient C2. The factor C2 is used by the operator to balance the load between the cells.
  3. Absence of Paging Request. These are the packets responsible for requesting the establishment of a channel with a subscriber.
  4. Lack of services (EDGE, USSD and so on).
  5. Definition of "jamming" (signal suppressor).
  6. Absence of neighbors (all neighbors from another LAC).
  7. Absence of encryption.
  8. Opening a channel without making a transaction.

Given all these signs, you can try to find an attacker using SDR. This is a radio platform that allows you to tune in to the desired frequency, receive a signal, demodulate and decode it already on the computer. At the output, we can receive a spectrum and a broadcast channel. According to the GSM standard, there are a number of radio signals that must be observed for electromagnetic compatibility. Accordingly, after viewing the spectrum, there are signs of interception. Analyzing them, we can conclude: we are on a real base station or on a virtual one.