Sistem Alarm Deteksi Gerak Berbasis IoT Menggunakan Sensor PIR dan ESP32 dengan Notifikasi Telegram Real-Time
DOI:
https://doi.org/10.62712/juktisi.v4i2.701Kata Kunci:
Security System, PIR Sensor, ESP32, Telegram Notification, Retail Crime PreventionAbstrak
Isu terkait Meningkatnya risiko tindak pidana di bisnis ritel kecil, terutama toko perhiasan, menggarisbawahi perlunya sistem keamanan yang mampu memberikan peringatan dini. Sistem pasif konvensional seperti Televisi Sirkuit Tertutup (CCTV) belum memiliki kemampuan notifikasi waktu nyata (real-time), sehingga menyoroti urgensi solusi pemantauan digital yang lebih responsif. Studi ini mengusulkan perancangan dan pengembangan sistem keamanan peringatan dini berbasis sensor gerak Inframerah Pasif (PIR) yang terintegrasi dengan peringatan otomatis melalui Bot Telegram. Pendekatan kualitatif deskriptif diadopsi untuk membangun prototipe menggunakan sensor PIR HC-SR501, mikrokontroler ESP32, modul relai, dan buzzer. Integrasi API Telegram diimplementasikan melalui Arduino IDE. Performa sistem dievaluasi melalui uji fungsionalitas perangkat keras, validasi perangkat lunak, dan pengukuran waktu respons pada jarak 1–3 meter dalam kondisi dunia nyata. Sistem ini menunjukkan deteksi gerakan yang andal dalam jarak 0–3 meter, aktivasi alarm otomatis, dan notifikasi Telegram waktu nyata dengan latensi minimal. Waktu respons rata-rata adalah 3,08 detik (1 m), 3,21 detik (2 m), dan 3,64 detik (3 m), menunjukkan kinerja operasional yang stabil dan sesuai untuk aplikasi peringatan dini. Para pemilik toko melaporkan peningkatan persepsi keamanan setelah implementasi. Penelitian ini memberikan dasar untuk peningkatan di masa mendatang, termasuk integrasi modul ESP-CAM untuk verifikasi visual secara real-time.
Unduhan
Referensi
H. Herdianto, H. Hafni, D. Nasution, and S. Ramadhan, “Implementasi Metode Yolo pada Deteksi Objek Manusia,” METHOMIKA J. Manaj. Inform. dan Komputerisasi Akunt., vol. 8, no. 2, pp. 234–240, Oct. 2024, doi: 10.46880/jmika.Vol8No2.pp234-240.
T. Li et al., “Ultrasensitive Capacitive Sensor Composed of Nanostructured Electrodes for Human–Machine Interface,” Adv. Mater. Technol., vol. 7, no. 10, Oct. 2022, doi: 10.1002/admt.202101704.
Abhay Mangalore, “Fusion of mmWave radar data with image sensors for enhanced vision systems,” Int. J. Sci. Res. Arch., vol. 14, no. 3, pp. 286–289, Mar. 2025, doi: 10.30574/ijsra.2025.14.3.0656.
K. Okokpujie, I. P. Okokpujie, F. T. Young, and R. E. Subair, “Development of an Affordable Real-Time IoT-Based Surveillance System Using ESP32 and TWILIO API,” Int. J. Saf. Secur. Eng., vol. 13, no. 6, pp. 1069–1075, Dec. 2023, doi: 10.18280/ijsse.130609.
S. Supiyandi, C. Rizal, H. Hermansyah, and S. Khodijah, “Implementation Of Rapid Application Development Methodology In UI/UX Design of Mangrove Forest Information System,” J. Inf. Syst. Res., vol. 6, no. 1, pp. 125–133, Oct. 2024, doi: 10.47065/josh.v6i1.5941.
G. T. Hadiyanto, H. S. Gurran, B. Apriyanto, and R. Saptarika, “Pengaruh Waktu Respon Pada Sistem Keamanan Rumah Berbasis IOT dengan ESP32-Cam dan PIR Menggunakan SmartPhone Android,” JURIKOM (Jurnal Ris. Komputer), vol. 9, no. 6, p. 1698, Dec. 2022, doi: 10.30865/jurikom.v9i6.4957.
G. Saleem, U. I. Bajwa, R. H. Raza, and F. Zhang, “Edge-Enhanced TempoFuseNet: A Two-Stream Framework for Intelligent Multiclass Video Anomaly Recognition in 5G and IoT Environments,” Futur. Internet, vol. 16, no. 3, p. 83, Feb. 2024, doi: 10.3390/fi16030083.
S. Narula, M. Ghasemigol, J. Carnerero-Cano, A. Minnich, E. Lupu, and D. Takabi, “Exploring Research and Tools in AI Security: A Systematic Mapping Study,” IEEE Access, vol. 13, pp. 84057–84080, 2025, doi: 10.1109/ACCESS.2025.3567195.
H. Su, M. J. Rungtusanatham, and K. Linderman, “Retail inventory shrinkage, sensing weak security breach signals, and organizational structure,” Decis. Sci., vol. 54, no. 1, pp. 8–28, Feb. 2023, doi: 10.1111/deci.12524.
G. Ntezicyimanikora and N. M. Enan, “Remote Control Home Security Monitoring,” J. Inf. Technol., vol. 5, no. 2, pp. 1–22, Apr. 2025, doi: 10.70619/vol5iss2pp1-22.
G. D’Angelo, V. Clerico, C. Bartolozzi, M. Hoffmann, P. M. Furlong, and A. Hadjiivanov, “Wandering around: a bioinspired approach to visual attention through object motion sensitivity,” Neuromorphic Comput. Eng., vol. 5, no. 2, p. 024019, Jun. 2025, doi: 10.1088/2634-4386/addc90.
M. Salah et al., “High speed neuromorphic vision-based inspection of countersinks in automated manufacturing processes,” J. Intell. Manuf., vol. 35, no. 7, pp. 3067–3081, Oct. 2024, doi: 10.1007/s10845-023-02187-0.
J. W. Jinzhu Wang, J. B. Jie Bai, L. H. Libo Huang, and H. C. Huanlei Chen, “Autonomous Driving Decision-making Based on the Combination of Deep Reinforcement Learning and Rule-based Controller,” in FISITA World Congress 2021 - Technical Programme, FISITA, Sep. 2021. doi: 10.46720/F2021-ACM-108.
T. Kissoon, “Optimum spending on cybersecurity measures,” Transform. Gov. People, Process Policy, vol. 14, no. 3, pp. 417–431, May 2020, doi: 10.1108/TG-11-2019-0112.
R. Elias, L. Reis, T. Delfino, and J. Fernandes, “Enterpreneurial Strategies for the Female Sector: Leveraging Instagram Sales During the Pandemic,” Eur. Conf. Innov. Entrep., vol. 17, no. 1, pp. 692–700, Sep. 2022, doi: 10.34190/ecie.17.1.548.
K. M. Ragab, M. F. Orhan, K. Saka, and Y. Zurigat, “A Study and Assessment of the Status of Energy Efficiency and Conservation at School Buildings,” Sustainability, vol. 14, no. 17, p. 10625, Aug. 2022, doi: 10.3390/su141710625.
S. Nasir and N. Vajjhala, “EVALUATING INFORMATION SECURITY AWARENESS AND COMPLIANCE IN SUB-SAHARAN AFRICA: AN INTERPRETIVIST PERSPECTIVE,” in Proceedings of the 13 th IADIS International Conference Information Systems 2020, IADIS Press, Apr. 2020, pp. 187–190. doi: 10.33965/is2020_202006R025.
H. Hermansyah, R. F. Wijaya, and R. B. Utomo, “Metode Waterfall Dalam Rancang Bangun Sistem Informasi Manajemen Kegiatan Masjid Berbasis Web,” KLIK Kaji. Ilm. Inform. dan Komput, vol. 3, no. 5, pp. 563–571, 2023.
L. Marlina, S. Wahyuni, and I. Sulistianingsih, “The Information System for Promotion of Products for Micro, Small, and Medium Enterprises in Hinai Village is Website-Based With a Membership Method,” Int. J. Comput. Sci. Math. Eng., vol. 2, no. 2, pp. 2962–4274, 2023.
F. Serepas, I. Papias, K. Christakis, N. Dimitropoulos, and V. Marinakis, “Lightweight Embedded IoT Gateway for Smart Homes Based on an ESP32 Microcontroller,” Computers, vol. 14, no. 9, p. 391, Sep. 2025, doi: 10.3390/computers14090391.
D. Witczak and S. Szymoniak, “Review of Monitoring and Control Systems Based on Internet of Things,” Appl. Sci., vol. 14, no. 19, p. 8943, Oct. 2024, doi: 10.3390/app14198943.
A. Ali, S. A. Ali, and N. Zaheer, “The Role of ESP32 in Enabling Industry 4.0 and 5.0: A Comprehensive Narrative Review of Edge Intelligence, Human-Centric Automation, and Sustainable Innovation.” Aug. 01, 2025. doi: 10.20944/preprints202508.0014.v1.
P. D. Mardika, “Integrasi Notifikasi CCTV Melalui Telegram Berbasis Iot Dengan Metode Pose Estimation,” J. Profesi Ins. Univ. Lampung, vol. 6, no. 2, Sep. 2025, doi: 10.23960/jpi.v6n2.200.
M. Zen and S. Rahman, “Pengembangan Sistem Monitoring pH Tanah Berbasis IoT dan Python untuk Optimalisasi Budidaya Jambu Air,” J. Komput. Teknol. Inf. Sist. Inf., vol. 4, no. 2, pp. 1318–1324, Sep. 2025, doi: 10.62712/juktisi.v4i2.626.
S. P. Lesmana, A. P. S. B. Merah, D. Hermawati, and N. Puspitasari, “Dampak Implementasi IoT pada Sistem Smart Home untuk Efisiensi Energi dan Keamanan di Kota Berkembang,” in Prosiding Seminar Nasional Amikom Surakarta, 2024, pp. 1265–1278.
Unduhan
Diterbitkan
Cara Mengutip
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2025 Suherman Suherman, Hermansyah Hermansyah, Junusdad Syahpita

Artikel ini berlisensi Creative Commons Attribution 4.0 International License.
Suherman Suherman















