SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
ยฉ 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 305
Design and Implementation of Smart Home Security system based on
IoT
Khyati Baghel1, Deepak Sharma2
1Department of Electronics & Telecommunication Engineering, Chhatrapati Shivaji Institute of Technology, Durg
(C.G.), India, 491001
2Department of Electronics & Telecommunication Engineering, Chhatrapati Shivaji Institute of Technology, Durg
(C.G.), India, 491001
-------------------------------------------------------------------------***------------------------------------------------------------------------
Abstract - This papers presents the design and implementation of smart door lock system using the idea of
internet of things. Internet of things is smart system that can help physical object to communicate with people
and devices. And recently internet of things is gaining attention because of advance of hardware technology and
big data. Smart home automation system playing a major role which helps in reducing a work done manually by
using some embedded hardware and software technologies that come with it. The proposed system is accessed
through fingerprint biometric, keypad system and also Wi-Fi based app control door lock system. The use of this
proposed system is to provide access to only authorized persons. An emergency alarm is provided to protect the
system if any unauthorized person intrudes into the system. In the system, motors are used for locking and
unlocking the door.
Keywords - Biometric fingerprint device, Wi-Fi, app inventor, microcontroller.
1. INTRODUCTION
Nowadays home and building automation systems provide increased comfort especially when employed in a private
home. The concept of Home Automation was a topic of interest in the Academic arena since the late 1970s, with time and
advancement of technology [1]. Where, peopleโ€™s expectations about Home Automation and how they should access their
home has dramatically changed. The affordability and popularity of electronic devices and internet were offering factors to
this change. Most of the home automation security system available in the market consist of a control panel that is
installed somewhere in the house. The snag of the system is that the home users are not be able to access and customized
the control panel when they are away from their home. Moreover, the home users are not able to monitor their home
security remotely. The motivation to design this system is due to the high number of home invasion and burglary reported
every year. A home automation security system should provide a security features for a home by warning (alarm) the
residents from threats such as theft, intruders and animals invading [2].
A smart door locking system is implemented and governed by fingerprint biometric, keypad system and also IoT (internet
of things) which authenticate and validate the user and open the door automatically. Smart door lock is arguably the most
important part of a truly smart, connected home. Not only will it allow user to come and go as you please, itโ€™ll also monitor
who is entering and leaving the home while the user is away. The system allows user to check-in and check-out under fast,
secure and convenient conditions. The system include door locking system which open when the user put their tag in
contact with fingerprint biometric system and the user information matched with the information already stored in
database. This smart lock also offers a mobile app that allows user to lock and unlock door with a simple icon tap. The
smart locks, are still in their awkward adolescence of development and many of these new wireless gadgets are
awkwardly designed and frustratingly unresponsive. We'll probably take to carrying a traditional key as a back-up in case
our smart home lock doesn't lock or unlock as advertised. The other features to look for include keyless touchpads for
those times when the user doesnโ€™t have the phone or keys, tamper and forced entry alarms that warn the user of a
possible break-in, and push, text, and email notifications that let the user knows who is coming and going in real-time.
2. FEATURES AND BENEFITES OF SMART LOCK
A. Easy to Install and Coverage
Wireless nodes can be mounted almost anywhere. In adjacent or remote places, where cabling may not be feasible at all. It
supports Wi-Fi which comes with a door sensor and a Wi-Fi bridge. This wireless technology also helps to enlarge the
covered area.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
ยฉ 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 306
B. Ability to Integrate with the of Smart devices
This is one of the most useful features that a smart door lock can have is the ability for it to integrate with other smart
devices and smart technology. This action enhances the smart door lockโ€™s features and also allows locks to complete a
series of complex tasks by working and communicating with other devices.
C. Key Features
Smart door lock that has the electronic key feature will give the ability to generate temporary keys so the user can assign
over certain pockets of time. These electronic keys can also be reused by assigning them to different individuals. It helps
homeowners remain in full control of their keys at all times and it has no negative effect on the key control for their homes.
If anyone wants to revoke someoneโ€™s electronic key, he can simply do so through the mobile application or online, rather
than having to hunt them down, have an awkward conversation and get his keys back. This key feature also helps users
track keys and/or delete unwanted users from having access to home.
D. Security
It is most important for homeowners to look for smart door locks with appropriate security features, or there will be no
point in even purchasing a smart lock. The most secure smart door locks will have features that make them resistant to
methods of forced entry. It is more important to look for a smart lock that has the proper authentication parameters as
well as one that uses secure automation protocol.
3. LITERATURE SURVEY
Arun Cyril Jose and Reza Malekian explain the importance of accessing modern smart homes over the internet. They
describe the evolution of Device Fingerprinting concept over time, and discuss various pitfalls in existing device
fingerprinting approaches [1]. Azfarina Jaafar, Murizah Kassim and Cik Ku Haroswati Che Ku Yahya 2016 propose Dynamic
home automation security (DyHAS) alert system with laser interfaces on webpages and windows mobile using raspberry
Pi. In which, the dynamics alert are triggered according to identified parameters and it is adaptively set with alarms, lights
and alert messages to home ownerโ€™s mobile devices and webpage [2]. Jayashri Bangali and Arvind Shaligram developed
Security Systems for Smart Home based on GSM technology. Where, the system provides enhanced security as whenever a
signal from sensor occurs, a text message is sent to a desired number to take necessary actions. They proposes two
methods for home security system. Where, the first method uses web camera. Whenever there is a motion in front of the
camera then it gives security alert in terms of sound and a mail is delivered to the owner. And the second method sends
SMS which uses GSM-GPS Module (sim548c) and Atmega644p microcontroller, sensors, relays and buzzers [3]. Deepali
Javale, Mohd. Mohsin, Shreerang Nandanwar and Mayur Shingate explain the design of home automation and security
system using android ADK. The system is based on a standalone embedded system board android ADK at home. Where,
the home appliances are connected to the ADK. The system creates a communication between the ADK and android mobile
device. The home appliances are connected to the input/output ports of the embedded system board and their status is
passed to the ADK. They provides an authentication to the system for authorized person to access home appliances [4]. K.
Atukorala, D. Wijekoon, M. Tharugasini, I. Perera and C. Silva present a recent research and development effort in
construing a real-time home automation and monitoring system. They propose two tasks; they are home automation and
monitoring through mobile phone. The system addresses turning on/off household electrical appliances, such as electric
bulbs, door locks etc. They uses an alerting mechanism together with security cameras to safeguard homes and provides
an interface to monitor and control the home through mobile devices.. The system integrates the home with the World
Wide Web and mobile devices [5]. Neelam Majgaonkar, Ruhina Hodekar, Priyanka Bandagale describe Automatic Door
Locking System. They provide a system that will give 24 into 7 service by using registered password in this system. Where,
we can unlock the door by which it increases the security level to prevent an unauthorized unlocking. If the user forgets
the password of the system, it gives the flexibility to the user to change or reset the password [6]. Sidhhi Kavde, Ridhhi
Kavde, Sonali Bodare and Gauri Bhagat explain smart digital door lock system using Bluetooth technology. The owner can
control their door using the smartphone by viewing the live feed. And the one database is there for storing visitor
information [7]. Yong Tae Park, Pranesh Sthapit and Jae- Young Pyun give the explanation about smart digital door lock for
the home automation. ZigBee module is embedded in digital lock and the door lock acts as a central controller of the
overall smart home automation system. Door lock system consists of RFID reader for user authentication, touch LCD,
motor module for opening and closing of the door, sensor modules for detecting the condition inside the house,
communication module, and control module for controlling other modules. This system also allows users to remotely
monitor the condition inside the house through Internet or any other public network. System can be easily installed when
and where necessary without requirement of any infrastructures and proper planning. Ilkyu Ha worked on Security and
Usability Improvement on a Digital Door Lock System based on Internet of Things. This system provides strengthened
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
ยฉ 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 307
security functions that can transfer recorded images to a user's mobile device when an unwanted user attempts an illegal
operation; it can also deliver alarm information to the mobile devices when the door lock is physically damaged. This door
lock system enables a user to check the access information and remotely operate the door lock to enhance convenience [9].
Brundha S.M., Lakshmi P. and Santhanalakshmi S. explain Home Automation in Client-Server Approach with User
Notification along with Efficient Security Alerting system. Home automation system (workflow) consists of 4 steps which
is the user environment by sensing, reporting the events to a centralized entity, centralized entity analyses and triggers the
workflow, workflow will execute and update user by any interactive channels or even exercise over a home device
(actuating). The physical condition of the system can also be altered based on the user request [10].
4. METHODOLOGY
A. Biometric approach using keypad fingerprint recognition
A fingerprint reader or fingerprint scanner is a biometric device that serves to identify that the person authenticating is
who he/she claims to be. It uses automated methods of recognizing a person based on unique physical characteristics of a
person's fingerprint. The fingerprint of each person must be enrolled with the database. A keypad which is pairedup with
biometrics is a set of buttons or keys bearing digits, symbols and/or alphabetical letters placed in order on a pad, which
can be used as an efficient input device. This keypad is a set of buttons complete with all alpha numerals and a couple of
symbols. When the fingerprints are enrolled, and the person swaps finger then the image of the fingerprint is matched
with the one stored in the database. If the fingerprint matches, the biometric fingerprint reader allows access to the
classified data. And also keypad locks allow users to change the codes used to unlock them to new codes of their choosing
where periodic code changes are generally encouraged as they provide added security in case someone was able to
discover a previous code. MEGA2560 already contains the needed AT commands for controlling the modules, which it
passes to the module. When MEGA2560 receives data from the sensor, it checks the data to find out whether it is valid or
not. If the data is valid then the MEGA2560 switch on the solenoid lock to open the door and if invalid the door will not
open. If the data is invalid then it will show error on the LCD screen.
When the user doesnโ€™t have the phone or forgot the code, tamper and forced entry alarms that warn the user of a
possible break-in, and push, text, and email notifications that let the user knows who is coming and going in real-time.
B. Wi-Fi based App control door lock
If the finger damaged then the proposed system can use app control door lock which is IoT (internet of things) based.
Every authorized member of the home will have a special mobile application (app inventor) installed on his mobile device.
Only this app inventor will be able to communicate with the embedded system, because there was developed a special data
format for this communication. And if a person is not a part of the home, the application is deleted from his device. In order
to prevent the application copying and thus give access to unauthorized people, the application (app inventor) was
developed mobile device dependent.
The command sends to the cloud which has an APN by the mobile device. Then, the command received by
the Wi-Fi module of the home and fed it to MEGA2560. MEGA2560 configures the data or command to find out who sent it
and if it is valid or not. If the data or command is valid then the MEGA2560 switch on the solenoid lock to open the door
through relay. If the data or command is invalid then the door will not open. After the locking and unlocking the door, it
will send the text message or notification on the authorized mobile devices. Secure Wi-Fi technology is used by cloud and
hardware interface system to communicate with each other. The user uses the same technology to login to the cloud based
application. If cloud is connected to the internet, so remote users can access cloud based application through the internet
on mobile devices using compatible web browser.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
ยฉ 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 308
5. HARDWARE DESIGN
Fig. 1: Block diagram
A. R307 Fingerprint Sensor
TTL UART is a finger print sensor with TTL UART interface. Where, user can store the finger print data in the module and
can configure it in 1:1 or 1: N mode for identifying the person. This module can directly interface with 3v3 Microcontroller
and a level converter (like MAX232) is required for interfacing with PC. The fingerprint processing includes two tasks:
fingerprint enrollment and fingerprint matching. The fingerprint of each person must be enrolled with the database. The
module will process the finger images, generate a template of the finger which is based on processing results and store the
template. When matching, the user enters the finger through optical sensor and module will generate a template of the
finger and compare it with templates of the finger library.
B. 4ร—4 Keypad System
The module will have 8 terminal. Where, 4 are rows of matrix and 4 are columns of matrix. These eight pins are driven out
from 16 buttons present in the module. Those 16 alphanumeric digits on the keypad system surface are the 16 buttons
arranged in MATRIX formation. The actual lock mechanism works by needing a small electrical current to release the lock
bolt and the current is generated when the proper code is entered at the keypad system.
C. MEGA2560
The control console consists of microcontroller MEGA2560. The module has 54 digital input/output pins, 16 analog inputs,
4 UARTs (hardware serial ports), a 16 MHz crystal oscillator, a USB connection, a power jack, an ICSP header, and a reset
button. MEGA2560 is interfaced with relay A2550 while on the other hand it is communicating with the Wi-Fi module. To
drive the other modules the microcontroller opens and closes the transistors. It receives the data from fingerprint sensor
and keypad module and checks it. If the data is well founded, MEGA2560 starts the configuration of the modules.
D. Relay A2550
This is an electrically operated switch, typically incorporating an electromagnet to mechanically operate a switch, this is
activated by a current or signal in one circuit to open or close another circuit. The relay is interfaced with solenoid lock
and MEGA2560 through relay driver are operated based on the commands or data received.
E. Wi-Fi Module ESP8266
The system provides a complete and self-contained Wi-Fi networking solution, allowing this module to either host the
application or to offload all Wi-Fi networking functions from another application processor. Alternately, serving as a Wi-Fi
adapter, wireless internet access can be added to MEGA2560 with simple connectivity through UART interface or the CPU
AHB bridge interface. The mobile devices are connected with this.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
ยฉ 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 309
F. Display Unit 16ร—2 LCD
This module is offered over seven segments and other multi segment LEDs. The reasons behind this: easily programmable;
LCDs are economical; have no limitation of displaying special & even custom characters, animations and so on. The module
has two registers, namely, Command and Data. Where, Command register stores the command instructions given to the
LCD. The command is an instruction given to LCD to do a predefined task like initializing it, clearing its screen, setting the
cursor position, controlling display etc. The data register stores the data to be displayed on the LCD.
6. RESULTS
The MEGA2560 as well as the app inventor application could successfully receive the needed data and to perform the
required tasks. The system worked as it was desired: system gave access to the user if the data or command which was
sent was valid, otherwise, no actions were performed and the data was just skipped. All the valid data was successfully
operated and passed as it was designed. The app inventor application was tested several times, in order to test itโ€™s setup,
including loading the specification and needed data from the file. The networking tests of application of the system were
performed several times before the system tests and they also completed successfully.
7. CONCLUSION
The Smart home Lock System could run properly and stably. The system also provides a security and easy for Android
phone users. With the Wi-Fi connection in MEGA2560 permits the system installation in more easy way. The system has
been successfully designed and aimed to control the door condition using fingerprint sensor pairedup with keypad system
and Wi-Fi technology. Till now we have successfully implemented hardware and one small application has been invented
using app inventor on mobile phone. The Smart home lock System has great potential. The system will allow users to
forget about their traditional key and to use their mobile device to get access to the needed are.
REFFERENCES
[1] Arun Cyril Jose, Reza Malekian, Ning Ye, "Improving Home Automation Security; Integrating Device Fingerprinting
into Smart Home," IEEE Access 4, pp. 5776-5787.
[2] Azfarina Jaafar, Murizah Kassim and Cik Ku Haroswati Che Ku Yahya, "Dynamic Home Automation Security (DyHAS)
Alert System with Laser Interfaces on Webpages and Windows Mobile using Respberry Pi ", IEEE 7th Control and
System Graduate Research Colloquium (ICSGRC 2016).
[3] Jayashri Bangali and Arvind Shaligram, "Design and Implementation of Security Systems for Smart Home based on
GSM technology," Vol.7, No.6 (2013), pp.201-208 http://dx.doi.org/10.14257/ijsh.2013.7.6.19.
[4] Deepali Javale, Mohd. Mohsin, Shreerang Nandanwar, Mayur Shingate, "Home Automation and Security System Using
Android ADK," International Journal of Electronics Communication and Computer Technology (IJECCT) Volume 3
Issue 2.
[5] K. Atukorala, D. Wijekoon, M. Tharugasini, I. Perera, C. Silva, "SmartEye - Integrated solution to home automation,
security and monitoring through mobile phones", 2009 Third International Conference on Next Generation Mobile
Applications, Services and Technologies.
[6] Neelam Majgaonkar, Ruhina Hodekar, Priyanka Bandagale, "Automatic Door Locking System," 2016 IJEDR, Volume 4,
Issue 1, ISSN: 2321-9939.
[7] Sidhhi Kavde, Ridhhi Kavde, Sonali Bodare and Gauri Bhagat, "Smart digital door lock system using Bluetooth
technology," 10.1109/ICICES.2017.8070788.
[8] Mohamed Abd El-Latif Mowad, Ahmed Fathy, Ahmed Hafez, "Smart Home Automated Control System Using Android
Application and Microcontroller," Volume 5, Issue 5, May-2014 ISSN 2229-5518.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
ยฉ 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 310
[9] Ilkyu Ha, "Security and Usability Improvement on a Digital Door Lock System based on Internet of Things",
International journal of security and its applications Vol 9, No. 8, 2015, pp. 45-54.
[10] Brundha S.M., Lakshmi P. and Santhanalakshmi S., " Home Automation in Client-Server Approach with User
Notification along with Efficient Security Alerting system," 978-1-5386-0569-1. IEEE.
[11] A. Tseloni, R. Thompson, L. Grove, N. Tilley, and G. Farrell, "The effectiveness of burglary security devices," Security
Journal, 2014.
[12] Sheikh Izzal Azid and Sushil Kumar, "Analysis and Performance of a Low Cost SMS Based Home Security
System,"International Journal of Smart Home, vol. 5, no. 3, (2011) July.

More Related Content

What's hot

1 importance of light weight authentication in iot
1 importance of light weight authentication in iot1 importance of light weight authentication in iot
1 importance of light weight authentication in iot
Chintan Patel
ย 
Home Automation Life is One Click away from being better
Home Automation Life is One Click away from being betterHome Automation Life is One Click away from being better
Home Automation Life is One Click away from being better
ijtsrd
ย 

What's hot (20)

IRJET- IoT based Home Automation and Smart Security System
IRJET- IoT based Home Automation and Smart Security SystemIRJET- IoT based Home Automation and Smart Security System
IRJET- IoT based Home Automation and Smart Security System
ย 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell System
ย 
IRJET- Automatic Door Monitoring System
IRJET-  	  Automatic Door Monitoring SystemIRJET-  	  Automatic Door Monitoring System
IRJET- Automatic Door Monitoring System
ย 
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
ย 
IRJET- Secure Buddy: An Intelligent Door Lock
IRJET-  	  Secure Buddy: An Intelligent Door LockIRJET-  	  Secure Buddy: An Intelligent Door Lock
IRJET- Secure Buddy: An Intelligent Door Lock
ย 
IRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET- Smart Door Security System using Raspberry Pi with TelegramIRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET- Smart Door Security System using Raspberry Pi with Telegram
ย 
Smart homes for a better living using bluetooth
Smart homes for a better living using bluetoothSmart homes for a better living using bluetooth
Smart homes for a better living using bluetooth
ย 
1 importance of light weight authentication in iot
1 importance of light weight authentication in iot1 importance of light weight authentication in iot
1 importance of light weight authentication in iot
ย 
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
ย 
Design and implementation a security system for bank using voice recognition
Design and implementation a security system for bank using voice recognitionDesign and implementation a security system for bank using voice recognition
Design and implementation a security system for bank using voice recognition
ย 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
ย 
Home Automation using IOT and Mobile App
Home Automation using IOT and Mobile AppHome Automation using IOT and Mobile App
Home Automation using IOT and Mobile App
ย 
Final year project 2013 14 for ECE, EEE, TE, EIE Branches
Final year project 2013 14 for ECE, EEE, TE, EIE BranchesFinal year project 2013 14 for ECE, EEE, TE, EIE Branches
Final year project 2013 14 for ECE, EEE, TE, EIE Branches
ย 
Home Automation Life is One Click away from being better
Home Automation Life is One Click away from being betterHome Automation Life is One Click away from being better
Home Automation Life is One Click away from being better
ย 
Cell phone based automation systems
Cell phone based automation systemsCell phone based automation systems
Cell phone based automation systems
ย 
Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.
ย 
Internet of things for the โ€œsmart homeโ€
Internet of things for the โ€œsmart homeโ€Internet of things for the โ€œsmart homeโ€
Internet of things for the โ€œsmart homeโ€
ย 
IRJET- Voice Controlled Home Automation System
IRJET- Voice Controlled Home Automation SystemIRJET- Voice Controlled Home Automation System
IRJET- Voice Controlled Home Automation System
ย 
IRJET- IoT based Smart Voting System
IRJET- IoT based Smart Voting SystemIRJET- IoT based Smart Voting System
IRJET- IoT based Smart Voting System
ย 
Internet of Things (IoT) Killer Applications Design Insights from Patents
Internet of Things (IoT) Killer Applications Design Insights from PatentsInternet of Things (IoT) Killer Applications Design Insights from Patents
Internet of Things (IoT) Killer Applications Design Insights from Patents
ย 

Similar to IRJET- Design and Implementation of Smart Home Security System based on IoT

Development of wireless and intelligent home automation system
Development of wireless and intelligent home automation systemDevelopment of wireless and intelligent home automation system
Development of wireless and intelligent home automation system
TELKOMNIKA JOURNAL
ย 
[[IAA JSR 10(1)36-48, 2023.Automated Hybrid Smart Door Control System.pdf
[[IAA JSR 10(1)36-48, 2023.Automated Hybrid Smart Door Control System.pdf[[IAA JSR 10(1)36-48, 2023.Automated Hybrid Smart Door Control System.pdf
[[IAA JSR 10(1)36-48, 2023.Automated Hybrid Smart Door Control System.pdf
PUBLISHERJOURNAL
ย 

Similar to IRJET- Design and Implementation of Smart Home Security System based on IoT (20)

IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
ย 
RAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AIRAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AI
ย 
IRJET - Smart Classroom Automation based on IoT
IRJET -  	  Smart Classroom Automation based on IoTIRJET -  	  Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoT
ย 
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
ย 
Home security based on Internet of things Review paper
Home security based on Internet of things Review paperHome security based on Internet of things Review paper
Home security based on Internet of things Review paper
ย 
Development of wireless and intelligent home automation system
Development of wireless and intelligent home automation systemDevelopment of wireless and intelligent home automation system
Development of wireless and intelligent home automation system
ย 
Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT
ย 
Smart and Secure Home using IoT
Smart and Secure Home using IoTSmart and Secure Home using IoT
Smart and Secure Home using IoT
ย 
IRJET- A Survey on Secure Protocols of Communication for IoT Components i...
IRJET-  	  A Survey on Secure Protocols of Communication for IoT Components i...IRJET-  	  A Survey on Secure Protocols of Communication for IoT Components i...
IRJET- A Survey on Secure Protocols of Communication for IoT Components i...
ย 
IRJET- Theft Control using IoT
IRJET-  	  Theft Control using IoTIRJET-  	  Theft Control using IoT
IRJET- Theft Control using IoT
ย 
AN AMELIORATED METHODOLOGY FOR THE DESIGN AND IMPLEMENTATION OF HOME AUTOMATI...
AN AMELIORATED METHODOLOGY FOR THE DESIGN AND IMPLEMENTATION OF HOME AUTOMATI...AN AMELIORATED METHODOLOGY FOR THE DESIGN AND IMPLEMENTATION OF HOME AUTOMATI...
AN AMELIORATED METHODOLOGY FOR THE DESIGN AND IMPLEMENTATION OF HOME AUTOMATI...
ย 
A Short Review on the Perspective of Home Automation Technology
A Short Review on the Perspective of Home Automation TechnologyA Short Review on the Perspective of Home Automation Technology
A Short Review on the Perspective of Home Automation Technology
ย 
Home automation
Home  automationHome  automation
Home automation
ย 
Smart Security System IOT
Smart Security System IOTSmart Security System IOT
Smart Security System IOT
ย 
Design and Development of IntelliHome
Design and Development of IntelliHomeDesign and Development of IntelliHome
Design and Development of IntelliHome
ย 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
ย 
IRJET- Implementation of Smart Surveillance System Based on Bio-Metrics
IRJET-  	  Implementation of Smart Surveillance System Based on Bio-MetricsIRJET-  	  Implementation of Smart Surveillance System Based on Bio-Metrics
IRJET- Implementation of Smart Surveillance System Based on Bio-Metrics
ย 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
ย 
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTEnergy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoT
ย 
[[IAA JSR 10(1)36-48, 2023.Automated Hybrid Smart Door Control System.pdf
[[IAA JSR 10(1)36-48, 2023.Automated Hybrid Smart Door Control System.pdf[[IAA JSR 10(1)36-48, 2023.Automated Hybrid Smart Door Control System.pdf
[[IAA JSR 10(1)36-48, 2023.Automated Hybrid Smart Door Control System.pdf
ย 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
ย 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
ย 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
ย 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
ย 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
ย 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
ย 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
ย 
A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
ย 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
ย 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
ย 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
ย 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
ย 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
ย 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
ย 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
ย 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
ย 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
ย 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
ย 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
ย 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
ย 

Recently uploaded

Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
ย 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
ย 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
ย 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
ย 
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
SUHANI PANDEY
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
KreezheaRecto
ย 

Recently uploaded (20)

chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
ย 
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
ย 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
ย 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
ย 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
ย 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
ย 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ย 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
ย 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
ย 
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
ย 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
ย 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
ย 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
ย 

IRJET- Design and Implementation of Smart Home Security System based on IoT

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 ยฉ 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 305 Design and Implementation of Smart Home Security system based on IoT Khyati Baghel1, Deepak Sharma2 1Department of Electronics & Telecommunication Engineering, Chhatrapati Shivaji Institute of Technology, Durg (C.G.), India, 491001 2Department of Electronics & Telecommunication Engineering, Chhatrapati Shivaji Institute of Technology, Durg (C.G.), India, 491001 -------------------------------------------------------------------------***------------------------------------------------------------------------ Abstract - This papers presents the design and implementation of smart door lock system using the idea of internet of things. Internet of things is smart system that can help physical object to communicate with people and devices. And recently internet of things is gaining attention because of advance of hardware technology and big data. Smart home automation system playing a major role which helps in reducing a work done manually by using some embedded hardware and software technologies that come with it. The proposed system is accessed through fingerprint biometric, keypad system and also Wi-Fi based app control door lock system. The use of this proposed system is to provide access to only authorized persons. An emergency alarm is provided to protect the system if any unauthorized person intrudes into the system. In the system, motors are used for locking and unlocking the door. Keywords - Biometric fingerprint device, Wi-Fi, app inventor, microcontroller. 1. INTRODUCTION Nowadays home and building automation systems provide increased comfort especially when employed in a private home. The concept of Home Automation was a topic of interest in the Academic arena since the late 1970s, with time and advancement of technology [1]. Where, peopleโ€™s expectations about Home Automation and how they should access their home has dramatically changed. The affordability and popularity of electronic devices and internet were offering factors to this change. Most of the home automation security system available in the market consist of a control panel that is installed somewhere in the house. The snag of the system is that the home users are not be able to access and customized the control panel when they are away from their home. Moreover, the home users are not able to monitor their home security remotely. The motivation to design this system is due to the high number of home invasion and burglary reported every year. A home automation security system should provide a security features for a home by warning (alarm) the residents from threats such as theft, intruders and animals invading [2]. A smart door locking system is implemented and governed by fingerprint biometric, keypad system and also IoT (internet of things) which authenticate and validate the user and open the door automatically. Smart door lock is arguably the most important part of a truly smart, connected home. Not only will it allow user to come and go as you please, itโ€™ll also monitor who is entering and leaving the home while the user is away. The system allows user to check-in and check-out under fast, secure and convenient conditions. The system include door locking system which open when the user put their tag in contact with fingerprint biometric system and the user information matched with the information already stored in database. This smart lock also offers a mobile app that allows user to lock and unlock door with a simple icon tap. The smart locks, are still in their awkward adolescence of development and many of these new wireless gadgets are awkwardly designed and frustratingly unresponsive. We'll probably take to carrying a traditional key as a back-up in case our smart home lock doesn't lock or unlock as advertised. The other features to look for include keyless touchpads for those times when the user doesnโ€™t have the phone or keys, tamper and forced entry alarms that warn the user of a possible break-in, and push, text, and email notifications that let the user knows who is coming and going in real-time. 2. FEATURES AND BENEFITES OF SMART LOCK A. Easy to Install and Coverage Wireless nodes can be mounted almost anywhere. In adjacent or remote places, where cabling may not be feasible at all. It supports Wi-Fi which comes with a door sensor and a Wi-Fi bridge. This wireless technology also helps to enlarge the covered area.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 ยฉ 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 306 B. Ability to Integrate with the of Smart devices This is one of the most useful features that a smart door lock can have is the ability for it to integrate with other smart devices and smart technology. This action enhances the smart door lockโ€™s features and also allows locks to complete a series of complex tasks by working and communicating with other devices. C. Key Features Smart door lock that has the electronic key feature will give the ability to generate temporary keys so the user can assign over certain pockets of time. These electronic keys can also be reused by assigning them to different individuals. It helps homeowners remain in full control of their keys at all times and it has no negative effect on the key control for their homes. If anyone wants to revoke someoneโ€™s electronic key, he can simply do so through the mobile application or online, rather than having to hunt them down, have an awkward conversation and get his keys back. This key feature also helps users track keys and/or delete unwanted users from having access to home. D. Security It is most important for homeowners to look for smart door locks with appropriate security features, or there will be no point in even purchasing a smart lock. The most secure smart door locks will have features that make them resistant to methods of forced entry. It is more important to look for a smart lock that has the proper authentication parameters as well as one that uses secure automation protocol. 3. LITERATURE SURVEY Arun Cyril Jose and Reza Malekian explain the importance of accessing modern smart homes over the internet. They describe the evolution of Device Fingerprinting concept over time, and discuss various pitfalls in existing device fingerprinting approaches [1]. Azfarina Jaafar, Murizah Kassim and Cik Ku Haroswati Che Ku Yahya 2016 propose Dynamic home automation security (DyHAS) alert system with laser interfaces on webpages and windows mobile using raspberry Pi. In which, the dynamics alert are triggered according to identified parameters and it is adaptively set with alarms, lights and alert messages to home ownerโ€™s mobile devices and webpage [2]. Jayashri Bangali and Arvind Shaligram developed Security Systems for Smart Home based on GSM technology. Where, the system provides enhanced security as whenever a signal from sensor occurs, a text message is sent to a desired number to take necessary actions. They proposes two methods for home security system. Where, the first method uses web camera. Whenever there is a motion in front of the camera then it gives security alert in terms of sound and a mail is delivered to the owner. And the second method sends SMS which uses GSM-GPS Module (sim548c) and Atmega644p microcontroller, sensors, relays and buzzers [3]. Deepali Javale, Mohd. Mohsin, Shreerang Nandanwar and Mayur Shingate explain the design of home automation and security system using android ADK. The system is based on a standalone embedded system board android ADK at home. Where, the home appliances are connected to the ADK. The system creates a communication between the ADK and android mobile device. The home appliances are connected to the input/output ports of the embedded system board and their status is passed to the ADK. They provides an authentication to the system for authorized person to access home appliances [4]. K. Atukorala, D. Wijekoon, M. Tharugasini, I. Perera and C. Silva present a recent research and development effort in construing a real-time home automation and monitoring system. They propose two tasks; they are home automation and monitoring through mobile phone. The system addresses turning on/off household electrical appliances, such as electric bulbs, door locks etc. They uses an alerting mechanism together with security cameras to safeguard homes and provides an interface to monitor and control the home through mobile devices.. The system integrates the home with the World Wide Web and mobile devices [5]. Neelam Majgaonkar, Ruhina Hodekar, Priyanka Bandagale describe Automatic Door Locking System. They provide a system that will give 24 into 7 service by using registered password in this system. Where, we can unlock the door by which it increases the security level to prevent an unauthorized unlocking. If the user forgets the password of the system, it gives the flexibility to the user to change or reset the password [6]. Sidhhi Kavde, Ridhhi Kavde, Sonali Bodare and Gauri Bhagat explain smart digital door lock system using Bluetooth technology. The owner can control their door using the smartphone by viewing the live feed. And the one database is there for storing visitor information [7]. Yong Tae Park, Pranesh Sthapit and Jae- Young Pyun give the explanation about smart digital door lock for the home automation. ZigBee module is embedded in digital lock and the door lock acts as a central controller of the overall smart home automation system. Door lock system consists of RFID reader for user authentication, touch LCD, motor module for opening and closing of the door, sensor modules for detecting the condition inside the house, communication module, and control module for controlling other modules. This system also allows users to remotely monitor the condition inside the house through Internet or any other public network. System can be easily installed when and where necessary without requirement of any infrastructures and proper planning. Ilkyu Ha worked on Security and Usability Improvement on a Digital Door Lock System based on Internet of Things. This system provides strengthened
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 ยฉ 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 307 security functions that can transfer recorded images to a user's mobile device when an unwanted user attempts an illegal operation; it can also deliver alarm information to the mobile devices when the door lock is physically damaged. This door lock system enables a user to check the access information and remotely operate the door lock to enhance convenience [9]. Brundha S.M., Lakshmi P. and Santhanalakshmi S. explain Home Automation in Client-Server Approach with User Notification along with Efficient Security Alerting system. Home automation system (workflow) consists of 4 steps which is the user environment by sensing, reporting the events to a centralized entity, centralized entity analyses and triggers the workflow, workflow will execute and update user by any interactive channels or even exercise over a home device (actuating). The physical condition of the system can also be altered based on the user request [10]. 4. METHODOLOGY A. Biometric approach using keypad fingerprint recognition A fingerprint reader or fingerprint scanner is a biometric device that serves to identify that the person authenticating is who he/she claims to be. It uses automated methods of recognizing a person based on unique physical characteristics of a person's fingerprint. The fingerprint of each person must be enrolled with the database. A keypad which is pairedup with biometrics is a set of buttons or keys bearing digits, symbols and/or alphabetical letters placed in order on a pad, which can be used as an efficient input device. This keypad is a set of buttons complete with all alpha numerals and a couple of symbols. When the fingerprints are enrolled, and the person swaps finger then the image of the fingerprint is matched with the one stored in the database. If the fingerprint matches, the biometric fingerprint reader allows access to the classified data. And also keypad locks allow users to change the codes used to unlock them to new codes of their choosing where periodic code changes are generally encouraged as they provide added security in case someone was able to discover a previous code. MEGA2560 already contains the needed AT commands for controlling the modules, which it passes to the module. When MEGA2560 receives data from the sensor, it checks the data to find out whether it is valid or not. If the data is valid then the MEGA2560 switch on the solenoid lock to open the door and if invalid the door will not open. If the data is invalid then it will show error on the LCD screen. When the user doesnโ€™t have the phone or forgot the code, tamper and forced entry alarms that warn the user of a possible break-in, and push, text, and email notifications that let the user knows who is coming and going in real-time. B. Wi-Fi based App control door lock If the finger damaged then the proposed system can use app control door lock which is IoT (internet of things) based. Every authorized member of the home will have a special mobile application (app inventor) installed on his mobile device. Only this app inventor will be able to communicate with the embedded system, because there was developed a special data format for this communication. And if a person is not a part of the home, the application is deleted from his device. In order to prevent the application copying and thus give access to unauthorized people, the application (app inventor) was developed mobile device dependent. The command sends to the cloud which has an APN by the mobile device. Then, the command received by the Wi-Fi module of the home and fed it to MEGA2560. MEGA2560 configures the data or command to find out who sent it and if it is valid or not. If the data or command is valid then the MEGA2560 switch on the solenoid lock to open the door through relay. If the data or command is invalid then the door will not open. After the locking and unlocking the door, it will send the text message or notification on the authorized mobile devices. Secure Wi-Fi technology is used by cloud and hardware interface system to communicate with each other. The user uses the same technology to login to the cloud based application. If cloud is connected to the internet, so remote users can access cloud based application through the internet on mobile devices using compatible web browser.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 ยฉ 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 308 5. HARDWARE DESIGN Fig. 1: Block diagram A. R307 Fingerprint Sensor TTL UART is a finger print sensor with TTL UART interface. Where, user can store the finger print data in the module and can configure it in 1:1 or 1: N mode for identifying the person. This module can directly interface with 3v3 Microcontroller and a level converter (like MAX232) is required for interfacing with PC. The fingerprint processing includes two tasks: fingerprint enrollment and fingerprint matching. The fingerprint of each person must be enrolled with the database. The module will process the finger images, generate a template of the finger which is based on processing results and store the template. When matching, the user enters the finger through optical sensor and module will generate a template of the finger and compare it with templates of the finger library. B. 4ร—4 Keypad System The module will have 8 terminal. Where, 4 are rows of matrix and 4 are columns of matrix. These eight pins are driven out from 16 buttons present in the module. Those 16 alphanumeric digits on the keypad system surface are the 16 buttons arranged in MATRIX formation. The actual lock mechanism works by needing a small electrical current to release the lock bolt and the current is generated when the proper code is entered at the keypad system. C. MEGA2560 The control console consists of microcontroller MEGA2560. The module has 54 digital input/output pins, 16 analog inputs, 4 UARTs (hardware serial ports), a 16 MHz crystal oscillator, a USB connection, a power jack, an ICSP header, and a reset button. MEGA2560 is interfaced with relay A2550 while on the other hand it is communicating with the Wi-Fi module. To drive the other modules the microcontroller opens and closes the transistors. It receives the data from fingerprint sensor and keypad module and checks it. If the data is well founded, MEGA2560 starts the configuration of the modules. D. Relay A2550 This is an electrically operated switch, typically incorporating an electromagnet to mechanically operate a switch, this is activated by a current or signal in one circuit to open or close another circuit. The relay is interfaced with solenoid lock and MEGA2560 through relay driver are operated based on the commands or data received. E. Wi-Fi Module ESP8266 The system provides a complete and self-contained Wi-Fi networking solution, allowing this module to either host the application or to offload all Wi-Fi networking functions from another application processor. Alternately, serving as a Wi-Fi adapter, wireless internet access can be added to MEGA2560 with simple connectivity through UART interface or the CPU AHB bridge interface. The mobile devices are connected with this.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 ยฉ 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 309 F. Display Unit 16ร—2 LCD This module is offered over seven segments and other multi segment LEDs. The reasons behind this: easily programmable; LCDs are economical; have no limitation of displaying special & even custom characters, animations and so on. The module has two registers, namely, Command and Data. Where, Command register stores the command instructions given to the LCD. The command is an instruction given to LCD to do a predefined task like initializing it, clearing its screen, setting the cursor position, controlling display etc. The data register stores the data to be displayed on the LCD. 6. RESULTS The MEGA2560 as well as the app inventor application could successfully receive the needed data and to perform the required tasks. The system worked as it was desired: system gave access to the user if the data or command which was sent was valid, otherwise, no actions were performed and the data was just skipped. All the valid data was successfully operated and passed as it was designed. The app inventor application was tested several times, in order to test itโ€™s setup, including loading the specification and needed data from the file. The networking tests of application of the system were performed several times before the system tests and they also completed successfully. 7. CONCLUSION The Smart home Lock System could run properly and stably. The system also provides a security and easy for Android phone users. With the Wi-Fi connection in MEGA2560 permits the system installation in more easy way. The system has been successfully designed and aimed to control the door condition using fingerprint sensor pairedup with keypad system and Wi-Fi technology. Till now we have successfully implemented hardware and one small application has been invented using app inventor on mobile phone. The Smart home lock System has great potential. The system will allow users to forget about their traditional key and to use their mobile device to get access to the needed are. REFFERENCES [1] Arun Cyril Jose, Reza Malekian, Ning Ye, "Improving Home Automation Security; Integrating Device Fingerprinting into Smart Home," IEEE Access 4, pp. 5776-5787. [2] Azfarina Jaafar, Murizah Kassim and Cik Ku Haroswati Che Ku Yahya, "Dynamic Home Automation Security (DyHAS) Alert System with Laser Interfaces on Webpages and Windows Mobile using Respberry Pi ", IEEE 7th Control and System Graduate Research Colloquium (ICSGRC 2016). [3] Jayashri Bangali and Arvind Shaligram, "Design and Implementation of Security Systems for Smart Home based on GSM technology," Vol.7, No.6 (2013), pp.201-208 http://dx.doi.org/10.14257/ijsh.2013.7.6.19. [4] Deepali Javale, Mohd. Mohsin, Shreerang Nandanwar, Mayur Shingate, "Home Automation and Security System Using Android ADK," International Journal of Electronics Communication and Computer Technology (IJECCT) Volume 3 Issue 2. [5] K. Atukorala, D. Wijekoon, M. Tharugasini, I. Perera, C. Silva, "SmartEye - Integrated solution to home automation, security and monitoring through mobile phones", 2009 Third International Conference on Next Generation Mobile Applications, Services and Technologies. [6] Neelam Majgaonkar, Ruhina Hodekar, Priyanka Bandagale, "Automatic Door Locking System," 2016 IJEDR, Volume 4, Issue 1, ISSN: 2321-9939. [7] Sidhhi Kavde, Ridhhi Kavde, Sonali Bodare and Gauri Bhagat, "Smart digital door lock system using Bluetooth technology," 10.1109/ICICES.2017.8070788. [8] Mohamed Abd El-Latif Mowad, Ahmed Fathy, Ahmed Hafez, "Smart Home Automated Control System Using Android Application and Microcontroller," Volume 5, Issue 5, May-2014 ISSN 2229-5518.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 ยฉ 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 310 [9] Ilkyu Ha, "Security and Usability Improvement on a Digital Door Lock System based on Internet of Things", International journal of security and its applications Vol 9, No. 8, 2015, pp. 45-54. [10] Brundha S.M., Lakshmi P. and Santhanalakshmi S., " Home Automation in Client-Server Approach with User Notification along with Efficient Security Alerting system," 978-1-5386-0569-1. IEEE. [11] A. Tseloni, R. Thompson, L. Grove, N. Tilley, and G. Farrell, "The effectiveness of burglary security devices," Security Journal, 2014. [12] Sheikh Izzal Azid and Sushil Kumar, "Analysis and Performance of a Low Cost SMS Based Home Security System,"International Journal of Smart Home, vol. 5, no. 3, (2011) July.