15CTN Digitallock
15CTN Digitallock
net/publication/329835341
CITATIONS READS
7 8,542
2 authors:
All content following this page was uploaded by Sankar Sennan on 18 March 2019.
Nowadays, there is a drastic increase of corporate, startup companies and apartment houses, due
to the smart city project, business and huge population in cities. The digital lock system plays
a significant role, to provide the security and reduce the manpower in smart home and building
automation scenario. The proposed system implements the digital lock system using Internet of
Things (IoT), to provide the security for an authorized and a guest user. If the person is an autho-
rized, and their details (password and biometric thump impression) are already stored in a local
database or cloud storage. Whenever the person wants to enter/leave the home or office, they need
to enter the text password or thumb impression, and the door will be open automatically. If the per-
son may be a guest, they need to enter the guest option in the hardware device. It will capture the
image and it will send the details to an authorized person like admin, owner through the internet.
The admin or owner can see their details through mobile application or E-Mail. Once, they will give
the approval to the digital lock system, and it will be open/close the door automatically.
Keywords: Smart Lock, Digital Lock, Internet of Things, Cloud Storage.
1. INTRODUCTION Zigbee, etc. The edge router or IoT Gateway collects the
RESEARCH ARTICLE
IoT is a collection of sensor and actuator enabled phys- data from the sensor through the wireless communica-
ical devices connected to the internet, that’s able to tion device, and it is forwarded the data to cloud storage.
exchange the data between them without the person’s The user can access the data from cloud storage through
involvement.1 2 The combination of emerging technolo- internet.5 6
gies such as Wireless Sensor Network (WSN), Big Data, Figure 2 shows that the Block diagram of IoT sensor
Cloud Computing, ubiquitous computing and the Internet node. The node consists of the processor, power supply,
is transforming the physical object into smart objects. The memory, transceiver and sensors. The processor can use
smart objects able to learn and understand the environment either microcontroller or microprocessor. The RAM size is
by itself and take the decision accordingly. IoT enabling in terms of kilobytes. The power supply ranges from 3.3 V
technologies are allowed, to establish the communica- to 5 V. The transceiver is mostly used in 2.4 GHZ.7 8
tion between physical devices. IoT enabling technologies In Ref. [2] and Gartner Inc. says that 8.6 billion devices
are WSN, Radio Frequency Identification (RFID), Near are expected to connect to the internet from 2014 and
Field Communication (NFC), Quick Response Code, Blue- 2021. From the year 2016 to till date, 31 percentages of
tooth Low Energy (BLE), Wi-Fi, Z-wave and Zigbee. The devices are increased to communicate on the internet. In
most popular IoT applications are smart city, smart home, the year 2014, only 0.5 billion of devices connected to the
internet. In the year 2015, the number of devices connected
smart health, logistics, smart agriculture, smart Grid, sup-
to the internet is 0.6 billion. Likewise, the upcoming years,
ply management chain, etc.3 4
we are expected more devices connected to the internet.
Figure 1 shows that general architecture of IoT. It com-
Figure 3 shows that machine to machine communication
prises of three parts namely sensor, storage and appli-
from 2014 to 2021.9
cation. In sensor part, the sensor nodes are deployed
Nowadays, the digital lock system mainly used for the
based on the application requirement, and it is attached
application of smart home and home automation. However,
to the wireless communication device. We use the sen-
some occasion we need to share the security key to our
sors temperature, webcam, light sensor and it is connected relation or guest in the smart home or building automa-
to the wireless communication devices namely Bluetooth, tion. The proposed system introduces the technique to rec-
tify the limitations. Nowadays, technology is a part of our
∗
Author to whom correspondence should be addressed. human life that enables to improve our lifestyle.10 11
2. RELATED WORK
Anuradha et al.10 implemented an optimized door lock-
ing and unlocking system for physically challenged
people. This work is implemented using Arduino Yun
microcontroller. The primary objective of this work, the
physically challenged person, can lock and unlock the door
through the mobile application. In this system, the signif-
icant components are Wi-Fi, Arduino microcontroller and
servo motor.
In Ref. [12] presented a digital door lock using IoT.
It is used to improve the security and usability. The per-
son appears in front of the door; this system captured the
image and sent it to the admin. When the unauthorized
tries to enter the home, this system enabled the security
function and sent the alert to admin and additionally locks
the door automatically.
Fig. 1. General architecture of internet of things. Rishabh Kumar Gupta et al.13 implemented an IoT
based door entry system. It is used to control the home
and office door remotely. This system has one option for
The paper is organized as follows: Section 2 describes guest monitoring. The person needs to press that option.
the related work. Section 3 presents the problem statement. It enabled the camera; speaker and it captured the image.
Section 4 presents the proposed system. Section 5 repre- It sends to the admin and the door will be open based on
sents the results and discussion and final section is the the admin or owner decision.
conclusion of this work. In Ref. [14] proposed a security-based smart home sys-
tem using fingerprint. In smart home system, most of them
usually follow the fingerprint and security pattern, for pro-
viding the security. In this system, the admin or owner
can recognize the person identity through finger print. It
RESEARCH ARTICLE
3
in cloud storage. The authorized person can view and con-
trol the door from anywhere the world through mobile
2.5
application.16
2
Mohammad Nasimuzzaman Chowdhury et al.17 pro-
1.5
posed an access control mechanism for the smart home
1
system. The visitor wants to enter the home, and they
0.5 need to send the information to authorized person through
0 E-mail or Twitter. If the authorized person wants to see
2014 2015 2016 2017 2018 2019 2020 2021
their image, the camera is activated and captures the
Year
image, and it is sent automatically to allow person. Finally,
Fig. 3. Machine to machine communication from 2014 to 2021. the door will be open accordingly.
RESEARCH ARTICLE
the door in their home. sometimes, they may lose the key remote monitoring phase, we can see the person, who is
of the door. Apart from that, there may be less protection standing in front of the door through mobile application
on the door lock which the burglar can break the door. and E-Mail.
Start respective the admin or owner. They can view their details
through mobile application or E-mail. The admin or owner
needs to give the approval based on that open the door
User enters the biometric thumb accordingly.
impression or text password
RESEARCH ARTICLE
in all the cases. Figure 6 shows that the proposed system 6. CONCLUSION
hardware setup. The proposed system enhanced the usability and high reli-
i. Authorized User ability of the digital lock system using IoT. The digital
Whenever the person wants to enter inside/outside, lock system plays a significant role, to provide the secu-
they need to enter password or thumb impression. The rity and reduce the human resources in the smart home
and building automation scenario. The proposed method
is implemented the digital lock system, to ensure the
safety, for an authorized and the guest user. We tested
the security aspects in the different environment. It is
reduced the human manpower, and also it is provided
more security, for the smart home and building automation
applications.
References
1. A Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and
M. Ayyash, IEEE Communications Surveys and Tutorials 17, 2347
(2015).
2. S. Sankar and P. Srinivasan, International Journal of Pharmacy and
Technology 8, 26117 (2016).
3. J. Marietta and B. Chandra Mohan, International Journal of Phar-
macy and Technology 8, 22279 (2016).
4. S. Sankar and P. Srinivasan, International Journal of Intelligent
Engineering and Systems 10, 278 (2017).
5. G. Kulkarni, S. H. Manoor, and P. V. Mitragotri, International Jour-
nal of Advance Research, Ideas and Innovations in Technology 3
(2017).
Fig. 8. Guest alert through mobile application. 6. B. N. Silva, M. Khan, and K. Han, IETE Technical Review 1 (2017).
7. D. Vimala and K. Manikandan, International Journal of Pure and 14. N. Sri Prakash and N. Venkatram, Indian Journal of Science and
Applied Mathematics 118, 231 (2018). Technology 9, 1 (2016).
8. B. Tamilarasi and R. UmaRani, International Journal of Pure and 15. Shiu Kumar, International Journal of Computer Networks and Com-
Applied Mathematics 118, 737 (2018). munications 6, 33 (2014).
9. J. A. Stankovic, IEEE Internet of Things Journal 1, 3 (2014). 16. Neetu Gupta, Ritabarta Mandal, and Vinary Chaddha, 9, 385
10. R. S. Anuradha, R. Bharathi, K. Karthika, S. Kirithika, (2016).
and S. Venkatasubramanian, International Journal of Innovative 17. Md. Nasimuzzaman Chowdhury, Md. Shiblee Nooman, and Srijon
Research in Computer and Communication Engineering 4, 3397 Sarker, International Journal of Scientific and Engineering Research
(2016). 4, 550 (2013).
11. C. Vongchumyen, P. Watanachaturaporn, C. Jinjakam, 18. Shweta Chanda, Deepak Rasaily, and Prerna Khulal, International
A. Watcharapupong, W. Kasemsiri, K. Tongprasert, and A. Hami, Journal of Engineering Trends and Technology 32, 213.
Door lock system via web application, 2017 International Electrical 19. Annie P. Oommen, A. P. Rahul, V. Pranav, S. Ponni, and
Engineering Congress (iEECON), IEEE, March (2017), pp. 1–4. Renjith Nadeshan, International Journal of Advanced Research in
12. O. Doh and I. Ha, Advanced Science and Technology Letters 109, 33 Electrical, Electronics and Instrumentation Engineering 3, 7604
(2015). (2014).
13. Rishabh Kumar Gupta, et al., Indian Journal of Science and Tech- 20. I.-K. Hwang and J.-W. Baek, IEEE Trans. on Consumer Electronics
nology 9, 1 (2016). 53, 1724 (2007).