SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1400
Smart Door Security System using Raspberry Pi with Telegram
Shivani Desai1, Virendra D Pawar2
1Shivani Desai, Dept. of Computer Engineering, Vishwakarma Institute of Technology, Pune, Maharashtra
2Virendra D Pawar, Asst. Professor, Dept. of computer Engineering, Vishwakarma Institute of Technology, Pune,
Maharashtra
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In modern world, the IoT is at its peak. Theworld
is becoming smarter, the homeautomationisemerging. Smart
Door control system is a latest technology in home
automation. The main purpose of smart Door technology is to
provide a complete security to the door, ease and comfort for
users. The aim of this paper is to enlarge the door automation
technique using Raspberry pi andandroidphone. Raspberrypi
controls PIR sensor, camera module, bell button, whichis used
in detecting the motion of a arrival of a person, capturing an
image of a person as soon as the bell is being pressed and
sends the still image to the android device through telegram
app and alerts the owner about the person standing at the
door. The entire systems programminghasbeenestablishedin
python 3.5 domains for raspberry pi operations.
Key Words: IoT, Telegram, Raspberry pi, python, Putty,
Security
1. INTRODUCTION
In today’s era every “thing” has its unique identity that is
what IoT (Internet of Things) is. It enables the connectivity
with physical devices and allows user to transfer the data
across the world through the networks. The technology is
playing a vital role in day-to-days life. Likewise the security.
The main objective of this project is to build a system that
will control the door using a smart phone. This system
includes various components like a Raspberry Pi model B3
(Inbuilt-Wi-Fi), PIR Sensor, Bell, Camera Module and a
Telegram App for getting the notification on an Android
Device.
The Purpose of this system is that whenever the person
arrives in front of the door , the person’s motion is been
detected by a PIR sensor and as soon as he/she presses the
bell button, the camera captures the image and the still
image is sent on a telegram app of an android device. The
components are connected via raspberry pi which has an
internet connection through Wi-Fi.
The user can unlock the door with the help of a mobile
phone as soon as he/she gets notification. The user will
unlock the door if the person is known and will give
authentication to enter the house.
Now a day’s security plays a foremost role as per as high-
tech things are taken into the consideration “more the
technology, higher the security”. This paper procures the
security to the raspberry pi, to secure it from gettinghacked.
SSH keys (asymmetric cryptography) network security is
being used in this project. User can also use a FAIL2BAN
method to secure your raspberry pi.
2. LITERATURE REVIEW
Nareshkumar R.[1]This paper is related to design a home
based automation system using smart phone andRPIhaving
biometric system. It captures the images when sensed
through PIR sensor, and using GSM technology the
communication has been done between the system and a
computer.
Reeta R[2]This paper uses the Eigen face detection
technique, where image is been captured using a snippet
code detecting the features of a person, the captured images
are stored into the database and. Access is given to the
members particularly whose image is already in the
database , alert is send if unauthorized face is detectedusing
GSM.
Rishabh Kumar Gupta [3] This paper consist of remote
access control system, switch and the speaker is used for
interacting with the guest standing right outside at thedoor.
Zigbee module is designed to support wireless sensor
network. Image is captured to the primary host and if
needed then to the secondary host, so locking and unlocking
of door is done.
D.Kishore[4]This paper uses the Raspberry pi, PIR sensor
which captures the images, saves it on the system and sends
it through Email via TCP/IP. Entire system is built using
ARM1176JZF-S microcontroller, implementation is done on
smart phone using JavaScript.
3. SYSTEM OVERVIEW
Fig-1 Functional Block Diagram
Motion
Detected
Bell
Pressed
Sent on
Android
Image
Captured
User
notified
Person
known
Door
Unlocked
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1401
As shown in fig-1 The Motion is detected using PIR sensor,
and when bell is pressed still image is captured and sent to a
user on an android app ,user gets notified , and if the person
is known then the door is unlocked by the owner. System
requires following components:
1. Raspberry pi B3
2. PIR Sensor
3. Camera Module
4. Wi-Fi Module
5. Telegram App
1 Raspberry pi-3 Model B:
Fig-2 Raspberry pi-3 ModelB
Raspberry pi is a small credit card size computer, which acts
as a heart of the whole system. Its a BCM2837 processor,
System on chip (SoC) With an ARM having a CPU and GPU.
The CPU consist of Quad core ARM-Cortex A53, 64 bit.
Consisting of 1GB RAM. The RPI include a wireless
connectivity with802.11 wirelessLAN (Wi-Fi)andBluetooth
4.1, 4*USB 2.0 ports, a set of GPIO (2*20 pins) header. It also
has an audio jack, a camera interface,display interface,HDMI
port. It requires a power supply of min 2.5 A for glowing up
the repositioned Led’s. It has a small SD card slot at its back,
inserting the OS, other files import it in the card and then
export all the files and get started .Changes can be made as
per the requirements.
$sudo apt-get update && sudo apt-get update
$Sudo reboot
The above commands will help user to update the raspberry
pi and can proceed further to configure the pi.
2 PIR sensor:
Fig-3 PIR Sensor
PIR (Passive Infrared sensor) is an electronic component
that measures any kind of object (person / animal in the
field. The window behind the lens is made up of IR-
transmissive material. TheFresnel lenscondenseslightupto
some 6-7 meters and its highly sensitive. It has a pins
consisting of VCC, Ground and the Output. The output is
given to GPIO pins of Raspberry pi through 5V of power
supply to the VCC.
3 Camera Module
Fig-4 Camera Module
The camera module is a 5MP customized designed camera
for a raspberry pi. It has a small socket at the board named
as ‘Camera Interface’ situated between HDMI port and
Ethernet. Insert the camera module intoits slot,designed for
interfacing a camera. This module allows the user tocapture
the still images and also to record a video in full HD. When
the picture is taken its camera preview is opened for few
seconds, using python coding adjust the resolution andsend
the image to an android app.
“Sudo raspi-config” is the command which allows you to
enable the camera module on raspberry pi.
4 Wi-Fi Module:
Wi-Fi is a wireless technology that provides high speed
connectivity. It is trademarked as IEEE 802.11x. it is
supported by many applications such as videogames , home
networks , mobile phone etc. The Wi-Fi is the mostfavorable
choice for IoT now days which will increase the speed of
connecting the network worldwide. In this system the
Raspberry pi has a in-built Wi-Fi, hence accessing it from
anywhere, controlling the raspberry pi
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1402
5 Telegram App on Android Phone:
Fig-5 Telegram App
The telegram app is heavily encrypted app. It delivers the
messages, images, documents, files faster than other apps.It
is highly secured from attackers, as it has end – to end
encryption and it is a cloud based app. It can be accessed
from multiple devices as well. It also procures a “Secret
Chat” facility which has self destructing feature.
4. METHODOLOGY
When the person arrives at a home and stands in the front
on the door, he/she will get detected byPIR motiondetector,
Led glows as motion is detected, ThePIR sensorisconnected
to raspberry pi, it has three pins. The GND pin is connected
to GND of RPI, VCC is connected to 5V and the output is
connected with any GPIO pin. As soon as the person will
press the bell the image is captured with the help of a
camera module. The push button is used as a switch,
inserted in a breadboard, one wire is connected with GND
and other is connected to some GPIO pin. The image of a
person is captured and stored in a RPI andimmediatelysend
on an android phone, whenever the bell is pressed. The CLI-
Telegram is used on an mobile phone, Linux commands are
used for the installation process, since telegram is highly
secured app, has various features like Secret chat, hasendto
end encryption and also can send data and files up to 1.5 GB.
User need to add the contact details while installation
process , the data will be save in the script call tg.sh and the
photos will be saved in a script tg_photo.sh , thesescriptsare
saved in home/pi/tg.
Then after the still image is been sent, the user will unlock
the door if the person is known. The unlocking of door is
done when a user presses ‘’1” on a telegram itwill unlock the
door.
The requirement of this projects include a Raspberry pi
model 3B having a SD card which has a Raspbian OS , a
switch , a camera module of 5Mp , a PIR sensor and an
android phone with installation of an telegram app in it. It
also requires a power supply of 1.5A to even 2A, a USB cable.
The coding is done in python having a python IDLE version
3.6. The necessary modules and libraries are also imported.
The Network security is playing a Vital role, the PUTTY and
PUTTY GEN are used for SSH (secure shell) The SSH key is
generated using a asymmetric cipher i.e. generation one
public and private key. The public key can be shared among
users, while a private key remains with the owner.
5. FLOWCHART AND ALGORITHM
No
No Yes
Yes
No Yes
Intruder Detected
Door remain
close
PIR
Sensor
Person Arrives
Start
Initialize Raspberry pi,
Camera, PIR sensor, Bell
Button
Bell
presse
d
Image Sent & user notified
on mobile phone
User
choice
Unlock the
door
Stop
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1403
1. Start
2. Initialize Raspberry pi, camera module, PIR sensor,
Bell Button etc
3. If person arrives, he/she will get detected by PIR
sensor
4. If the person presses the bell, then the image is
captured by the camera and will send a notification
and a snap on a smart phone.
5. The telegram app is been used to get the
notification on a smart phone.
6. The snap is sent, it’s a user choice to open a door or
to keep it close.
7. Stop.
Fig-6 Complete Setup
6. NETWORK SECURITY
SSH (Secure Shell) is a cryptographic Network protocol
which is used for securing a raspberry pi.
SSH uses an Asymmetric Cipher an algorithm that performs
encryption and decryption.
As SSH key has a user name and password which can be
stolen in the middle, but the SSH generates a pair of key:
Public and Private Key.
The data can be encrypted by using a user’s public key and
can be only decrypted by the private key.
In this project Putty and putty Generator are used for
generating the SSH for securing a raspberry pi
HOW TO SECURE RPI USING SSH:
1. Download Putty and key Generator.
2. Select key generator and click on “import- key”.
3. Generate the passphrase.
4. Putty will generate the public and private key
5. Save the private key with .ppk file
6. Now open the Putty and enter the host name, select SSH-
> authentication -> browse the private key and close it.
User must change the default “User name” and “Password”
$sudo raspi-config
Improve SSH security by using the following command -
$sudo nano /etc/ssh /sshd_config
User can make a use of FAIL2BAN, it is an intrusion
prevention software framework that protects computer
servers from malicious attacks, hence improves the security
of the Raspberry pi
It scans log files and bans IPs which are showing the
malicious signs, which make too many log in attempts or
performs unwanted activity.
HOW TO SET UP FAIL2BAN IN RPI?
Step1:$sudo apt-get installs fail2ban
During installation create a file “jail.conf”
Step2:$sudo
cp/etc/fail2ban/jail.conf/etc/fail2ban/jail.local
Step3: open file in nano editor:
sudo nano /etc/fail2ban/jail.local
Step4: within that use CTRL + W and search sshd
Type: enable = true
Filter =sshd
This shall process and enable the fail2ban and configure it.
7. CONCLUSION
We have a designed a smart system which reduces the
human efforts and provide the ease to operate the Smart
door, can access it from any corner of the world, providing a
good security. It is easy to upgrade, portable.Thesmartdoor
lock system using telegram is very efficient technique, which
allows the user to grant the access to the known person by
sending a back message to RPI and unlock the door. The
system uses various components like PIR sensor, camera
module, switch and telegram app on an android phone. The
networks security is also playing a vital role so that
raspberry pi could not be hacked. The coding is done using
python language and installation of a telegram is done using
CLI Telegram and some concept of Linux The networks
security is also playing a vital role so that raspberry pi could
not be hacked. The SSH key is used, which provides a good
network security. The Fail2ban software can also be used as
an additional security to Raspberry pi.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1404
REFERENCES
[1] Nareshkumar R. M.,Dnyaneshvari Shinde,- Smart Door
Security Control System Using Raspberry Pi Volume 6,
2347 – 8616 Issue 11 November 2017
[2] Reeta R -Smart Secure Door Lock System Using IoT And
Eigenface Approach,Volume 5, Issue 4 December 2017,
2320-2882
[3] Rishabh Kumar Gupta, S. Balamurugan, K. Aroul-IoT
Based Door Entry System Vol 9(37), DOI:
10.17485/ijst/2016/v9i37/102136,October2016,0974-
6846
[4] D.Kishore ,Shaik Anwar-Iot Based smart Home Security
System with Alert Door And Access Control UsingSmart
phone, vol-5 Issue 12,December 2016,2278-0181

Contenu connexe

Tendances

Automatic vehicle accident detection and messaging system using gsm and gps m...
Automatic vehicle accident detection and messaging system using gsm and gps m...Automatic vehicle accident detection and messaging system using gsm and gps m...
Automatic vehicle accident detection and messaging system using gsm and gps m...
mahesh_rman
 
A Remote home security system
A Remote home security systemA Remote home security system
A Remote home security system
Priyanka Tyagi
 

Tendances (20)

Arduino based Home Automation System with Android
Arduino based Home Automation System with AndroidArduino based Home Automation System with Android
Arduino based Home Automation System with Android
 
Face Recognition System for Door Unlocking
Face Recognition System for Door UnlockingFace Recognition System for Door Unlocking
Face Recognition System for Door Unlocking
 
Automatic vehicle accident detection and messaging system using gsm and gps m...
Automatic vehicle accident detection and messaging system using gsm and gps m...Automatic vehicle accident detection and messaging system using gsm and gps m...
Automatic vehicle accident detection and messaging system using gsm and gps m...
 
IoT home automation project
IoT home automation projectIoT home automation project
IoT home automation project
 
IOT in security camera and door unlock system
IOT in security camera and door unlock systemIOT in security camera and door unlock system
IOT in security camera and door unlock system
 
IRJET- Women Security System using GSM and GPS
IRJET-  	  Women Security System using GSM and GPSIRJET-  	  Women Security System using GSM and GPS
IRJET- Women Security System using GSM and GPS
 
Gsm based home security system
Gsm based home security systemGsm based home security system
Gsm based home security system
 
Gsm based home automation ppt
Gsm based home automation pptGsm based home automation ppt
Gsm based home automation ppt
 
Home automation with arduino
Home automation with arduinoHome automation with arduino
Home automation with arduino
 
Seminar on Home Automation Using Raspberry Pi
Seminar on Home Automation Using Raspberry PiSeminar on Home Automation Using Raspberry Pi
Seminar on Home Automation Using Raspberry Pi
 
Voice Controlled Robotic Vehicle
Voice Controlled Robotic VehicleVoice Controlled Robotic Vehicle
Voice Controlled Robotic Vehicle
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Women Safety Night Patrolling Robot Using IOT
Women Safety Night Patrolling Robot Using IOTWomen Safety Night Patrolling Robot Using IOT
Women Safety Night Patrolling Robot Using IOT
 
Smart Camera as Embedded System
Smart Camera as Embedded SystemSmart Camera as Embedded System
Smart Camera as Embedded System
 
Gsm based home automation
Gsm based home automationGsm based home automation
Gsm based home automation
 
HAND GESTURE CONTROLLED WHEEL CHAIR
HAND GESTURE CONTROLLED WHEEL CHAIRHAND GESTURE CONTROLLED WHEEL CHAIR
HAND GESTURE CONTROLLED WHEEL CHAIR
 
A Remote home security system
A Remote home security systemA Remote home security system
A Remote home security system
 
Obstacle Avoidance Robotic Vehicle
Obstacle Avoidance Robotic VehicleObstacle Avoidance Robotic Vehicle
Obstacle Avoidance Robotic Vehicle
 
smart Home security
smart Home securitysmart Home security
smart Home security
 
Smart Door locking system using arduino
Smart Door locking system using arduinoSmart Door locking system using arduino
Smart Door locking system using arduino
 

Similaire à IRJET- Smart Door Security System using Raspberry Pi with Telegram

Similaire à IRJET- Smart Door Security System using Raspberry Pi with Telegram (20)

Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
 
Home Security System based on IOT: A Systematic Alert System
Home Security System based on IOT: A Systematic Alert SystemHome Security System based on IOT: A Systematic Alert System
Home Security System based on IOT: A Systematic Alert System
 
IRJET- Motion Activated Security System
IRJET-  	  Motion Activated Security SystemIRJET-  	  Motion Activated Security System
IRJET- Motion Activated Security System
 
S.W.A.T – Motion Based Intrusion Detection System
S.W.A.T – Motion Based Intrusion Detection SystemS.W.A.T – Motion Based Intrusion Detection System
S.W.A.T – Motion Based Intrusion Detection System
 
Bank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingBank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image Processing
 
Designing Of Multifunctional Surveillance And Security System
Designing Of Multifunctional Surveillance And Security SystemDesigning Of Multifunctional Surveillance And Security System
Designing Of Multifunctional Surveillance And Security System
 
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasSecured Spy for Highly Secured Areas
Secured Spy for Highly Secured Areas
 
IRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking SystemIRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking System
 
Raspberry pi ppt
Raspberry pi pptRaspberry pi ppt
Raspberry pi ppt
 
Comparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi TechnologyComparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi Technology
 
IRJET - Raspberry Pi based Intelligent Security System
IRJET -  	  Raspberry Pi based Intelligent Security SystemIRJET -  	  Raspberry Pi based Intelligent Security System
IRJET - Raspberry Pi based Intelligent Security System
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
 
Home Automation System using Raspberry Pi
Home Automation System using Raspberry PiHome Automation System using Raspberry Pi
Home Automation System using Raspberry Pi
 
IRJET- Iot based Interactive Display Unit using Raspberry PI
IRJET- Iot based Interactive Display Unit using Raspberry PIIRJET- Iot based Interactive Display Unit using Raspberry PI
IRJET- Iot based Interactive Display Unit using Raspberry PI
 
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry PiIRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
 
Q180203109113
Q180203109113Q180203109113
Q180203109113
 
IRJET- H-Box (Connecting Homes)
IRJET- H-Box (Connecting Homes)IRJET- H-Box (Connecting Homes)
IRJET- H-Box (Connecting Homes)
 
Raspberry pi project smart motion detection system using raspberry pi 3
Raspberry pi project smart motion detection system using raspberry pi 3Raspberry pi project smart motion detection system using raspberry pi 3
Raspberry pi project smart motion detection system using raspberry pi 3
 
IRJET - Smart Door System
IRJET - Smart Door SystemIRJET - Smart Door System
IRJET - Smart Door System
 
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry PiIRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
 

Plus de IRJET Journal

Plus de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Dernier

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 

Dernier (20)

ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 

IRJET- Smart Door Security System using Raspberry Pi with Telegram

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1400 Smart Door Security System using Raspberry Pi with Telegram Shivani Desai1, Virendra D Pawar2 1Shivani Desai, Dept. of Computer Engineering, Vishwakarma Institute of Technology, Pune, Maharashtra 2Virendra D Pawar, Asst. Professor, Dept. of computer Engineering, Vishwakarma Institute of Technology, Pune, Maharashtra ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In modern world, the IoT is at its peak. Theworld is becoming smarter, the homeautomationisemerging. Smart Door control system is a latest technology in home automation. The main purpose of smart Door technology is to provide a complete security to the door, ease and comfort for users. The aim of this paper is to enlarge the door automation technique using Raspberry pi andandroidphone. Raspberrypi controls PIR sensor, camera module, bell button, whichis used in detecting the motion of a arrival of a person, capturing an image of a person as soon as the bell is being pressed and sends the still image to the android device through telegram app and alerts the owner about the person standing at the door. The entire systems programminghasbeenestablishedin python 3.5 domains for raspberry pi operations. Key Words: IoT, Telegram, Raspberry pi, python, Putty, Security 1. INTRODUCTION In today’s era every “thing” has its unique identity that is what IoT (Internet of Things) is. It enables the connectivity with physical devices and allows user to transfer the data across the world through the networks. The technology is playing a vital role in day-to-days life. Likewise the security. The main objective of this project is to build a system that will control the door using a smart phone. This system includes various components like a Raspberry Pi model B3 (Inbuilt-Wi-Fi), PIR Sensor, Bell, Camera Module and a Telegram App for getting the notification on an Android Device. The Purpose of this system is that whenever the person arrives in front of the door , the person’s motion is been detected by a PIR sensor and as soon as he/she presses the bell button, the camera captures the image and the still image is sent on a telegram app of an android device. The components are connected via raspberry pi which has an internet connection through Wi-Fi. The user can unlock the door with the help of a mobile phone as soon as he/she gets notification. The user will unlock the door if the person is known and will give authentication to enter the house. Now a day’s security plays a foremost role as per as high- tech things are taken into the consideration “more the technology, higher the security”. This paper procures the security to the raspberry pi, to secure it from gettinghacked. SSH keys (asymmetric cryptography) network security is being used in this project. User can also use a FAIL2BAN method to secure your raspberry pi. 2. LITERATURE REVIEW Nareshkumar R.[1]This paper is related to design a home based automation system using smart phone andRPIhaving biometric system. It captures the images when sensed through PIR sensor, and using GSM technology the communication has been done between the system and a computer. Reeta R[2]This paper uses the Eigen face detection technique, where image is been captured using a snippet code detecting the features of a person, the captured images are stored into the database and. Access is given to the members particularly whose image is already in the database , alert is send if unauthorized face is detectedusing GSM. Rishabh Kumar Gupta [3] This paper consist of remote access control system, switch and the speaker is used for interacting with the guest standing right outside at thedoor. Zigbee module is designed to support wireless sensor network. Image is captured to the primary host and if needed then to the secondary host, so locking and unlocking of door is done. D.Kishore[4]This paper uses the Raspberry pi, PIR sensor which captures the images, saves it on the system and sends it through Email via TCP/IP. Entire system is built using ARM1176JZF-S microcontroller, implementation is done on smart phone using JavaScript. 3. SYSTEM OVERVIEW Fig-1 Functional Block Diagram Motion Detected Bell Pressed Sent on Android Image Captured User notified Person known Door Unlocked
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1401 As shown in fig-1 The Motion is detected using PIR sensor, and when bell is pressed still image is captured and sent to a user on an android app ,user gets notified , and if the person is known then the door is unlocked by the owner. System requires following components: 1. Raspberry pi B3 2. PIR Sensor 3. Camera Module 4. Wi-Fi Module 5. Telegram App 1 Raspberry pi-3 Model B: Fig-2 Raspberry pi-3 ModelB Raspberry pi is a small credit card size computer, which acts as a heart of the whole system. Its a BCM2837 processor, System on chip (SoC) With an ARM having a CPU and GPU. The CPU consist of Quad core ARM-Cortex A53, 64 bit. Consisting of 1GB RAM. The RPI include a wireless connectivity with802.11 wirelessLAN (Wi-Fi)andBluetooth 4.1, 4*USB 2.0 ports, a set of GPIO (2*20 pins) header. It also has an audio jack, a camera interface,display interface,HDMI port. It requires a power supply of min 2.5 A for glowing up the repositioned Led’s. It has a small SD card slot at its back, inserting the OS, other files import it in the card and then export all the files and get started .Changes can be made as per the requirements. $sudo apt-get update && sudo apt-get update $Sudo reboot The above commands will help user to update the raspberry pi and can proceed further to configure the pi. 2 PIR sensor: Fig-3 PIR Sensor PIR (Passive Infrared sensor) is an electronic component that measures any kind of object (person / animal in the field. The window behind the lens is made up of IR- transmissive material. TheFresnel lenscondenseslightupto some 6-7 meters and its highly sensitive. It has a pins consisting of VCC, Ground and the Output. The output is given to GPIO pins of Raspberry pi through 5V of power supply to the VCC. 3 Camera Module Fig-4 Camera Module The camera module is a 5MP customized designed camera for a raspberry pi. It has a small socket at the board named as ‘Camera Interface’ situated between HDMI port and Ethernet. Insert the camera module intoits slot,designed for interfacing a camera. This module allows the user tocapture the still images and also to record a video in full HD. When the picture is taken its camera preview is opened for few seconds, using python coding adjust the resolution andsend the image to an android app. “Sudo raspi-config” is the command which allows you to enable the camera module on raspberry pi. 4 Wi-Fi Module: Wi-Fi is a wireless technology that provides high speed connectivity. It is trademarked as IEEE 802.11x. it is supported by many applications such as videogames , home networks , mobile phone etc. The Wi-Fi is the mostfavorable choice for IoT now days which will increase the speed of connecting the network worldwide. In this system the Raspberry pi has a in-built Wi-Fi, hence accessing it from anywhere, controlling the raspberry pi
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1402 5 Telegram App on Android Phone: Fig-5 Telegram App The telegram app is heavily encrypted app. It delivers the messages, images, documents, files faster than other apps.It is highly secured from attackers, as it has end – to end encryption and it is a cloud based app. It can be accessed from multiple devices as well. It also procures a “Secret Chat” facility which has self destructing feature. 4. METHODOLOGY When the person arrives at a home and stands in the front on the door, he/she will get detected byPIR motiondetector, Led glows as motion is detected, ThePIR sensorisconnected to raspberry pi, it has three pins. The GND pin is connected to GND of RPI, VCC is connected to 5V and the output is connected with any GPIO pin. As soon as the person will press the bell the image is captured with the help of a camera module. The push button is used as a switch, inserted in a breadboard, one wire is connected with GND and other is connected to some GPIO pin. The image of a person is captured and stored in a RPI andimmediatelysend on an android phone, whenever the bell is pressed. The CLI- Telegram is used on an mobile phone, Linux commands are used for the installation process, since telegram is highly secured app, has various features like Secret chat, hasendto end encryption and also can send data and files up to 1.5 GB. User need to add the contact details while installation process , the data will be save in the script call tg.sh and the photos will be saved in a script tg_photo.sh , thesescriptsare saved in home/pi/tg. Then after the still image is been sent, the user will unlock the door if the person is known. The unlocking of door is done when a user presses ‘’1” on a telegram itwill unlock the door. The requirement of this projects include a Raspberry pi model 3B having a SD card which has a Raspbian OS , a switch , a camera module of 5Mp , a PIR sensor and an android phone with installation of an telegram app in it. It also requires a power supply of 1.5A to even 2A, a USB cable. The coding is done in python having a python IDLE version 3.6. The necessary modules and libraries are also imported. The Network security is playing a Vital role, the PUTTY and PUTTY GEN are used for SSH (secure shell) The SSH key is generated using a asymmetric cipher i.e. generation one public and private key. The public key can be shared among users, while a private key remains with the owner. 5. FLOWCHART AND ALGORITHM No No Yes Yes No Yes Intruder Detected Door remain close PIR Sensor Person Arrives Start Initialize Raspberry pi, Camera, PIR sensor, Bell Button Bell presse d Image Sent & user notified on mobile phone User choice Unlock the door Stop
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1403 1. Start 2. Initialize Raspberry pi, camera module, PIR sensor, Bell Button etc 3. If person arrives, he/she will get detected by PIR sensor 4. If the person presses the bell, then the image is captured by the camera and will send a notification and a snap on a smart phone. 5. The telegram app is been used to get the notification on a smart phone. 6. The snap is sent, it’s a user choice to open a door or to keep it close. 7. Stop. Fig-6 Complete Setup 6. NETWORK SECURITY SSH (Secure Shell) is a cryptographic Network protocol which is used for securing a raspberry pi. SSH uses an Asymmetric Cipher an algorithm that performs encryption and decryption. As SSH key has a user name and password which can be stolen in the middle, but the SSH generates a pair of key: Public and Private Key. The data can be encrypted by using a user’s public key and can be only decrypted by the private key. In this project Putty and putty Generator are used for generating the SSH for securing a raspberry pi HOW TO SECURE RPI USING SSH: 1. Download Putty and key Generator. 2. Select key generator and click on “import- key”. 3. Generate the passphrase. 4. Putty will generate the public and private key 5. Save the private key with .ppk file 6. Now open the Putty and enter the host name, select SSH- > authentication -> browse the private key and close it. User must change the default “User name” and “Password” $sudo raspi-config Improve SSH security by using the following command - $sudo nano /etc/ssh /sshd_config User can make a use of FAIL2BAN, it is an intrusion prevention software framework that protects computer servers from malicious attacks, hence improves the security of the Raspberry pi It scans log files and bans IPs which are showing the malicious signs, which make too many log in attempts or performs unwanted activity. HOW TO SET UP FAIL2BAN IN RPI? Step1:$sudo apt-get installs fail2ban During installation create a file “jail.conf” Step2:$sudo cp/etc/fail2ban/jail.conf/etc/fail2ban/jail.local Step3: open file in nano editor: sudo nano /etc/fail2ban/jail.local Step4: within that use CTRL + W and search sshd Type: enable = true Filter =sshd This shall process and enable the fail2ban and configure it. 7. CONCLUSION We have a designed a smart system which reduces the human efforts and provide the ease to operate the Smart door, can access it from any corner of the world, providing a good security. It is easy to upgrade, portable.Thesmartdoor lock system using telegram is very efficient technique, which allows the user to grant the access to the known person by sending a back message to RPI and unlock the door. The system uses various components like PIR sensor, camera module, switch and telegram app on an android phone. The networks security is also playing a vital role so that raspberry pi could not be hacked. The coding is done using python language and installation of a telegram is done using CLI Telegram and some concept of Linux The networks security is also playing a vital role so that raspberry pi could not be hacked. The SSH key is used, which provides a good network security. The Fail2ban software can also be used as an additional security to Raspberry pi.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1404 REFERENCES [1] Nareshkumar R. M.,Dnyaneshvari Shinde,- Smart Door Security Control System Using Raspberry Pi Volume 6, 2347 – 8616 Issue 11 November 2017 [2] Reeta R -Smart Secure Door Lock System Using IoT And Eigenface Approach,Volume 5, Issue 4 December 2017, 2320-2882 [3] Rishabh Kumar Gupta, S. Balamurugan, K. Aroul-IoT Based Door Entry System Vol 9(37), DOI: 10.17485/ijst/2016/v9i37/102136,October2016,0974- 6846 [4] D.Kishore ,Shaik Anwar-Iot Based smart Home Security System with Alert Door And Access Control UsingSmart phone, vol-5 Issue 12,December 2016,2278-0181