You are on page 1of 5

2016 3rd International Conference on Advances in Computational Tools for Engineering Applications (ACTEA)

A Smart Lock System using Wi-Fi Security


Abdallah Kassem and Sami El Murr Department of Georges Jamous, Elie Saad and Marybelle Geagea
Electrical and Computer and Communication Engineering Department of Electrical and Computer and
Notre Dame University Louaize, Zouk Mosbeh-Lebanon Communication Engineering Notre Dame University
{akassem|selmurr}@ndu.edu.lb Louaize, Zouk Mosbeh-Lebanon {gejamous|mbgeagea|
easaad}@ndu.edu.lb

Abstract— In large apartment complexes, fraternities, or even for People normally operate ordinary locks with keys or
an owner having many keys for each and every apartment, car, or keyword locks such as a pin code. However, these locks have
gate he owns, maintaining entry to authorized personnel only is a few drawbacks such as misplacing keys or forgetting
problem. Besides the costs involved in fabrication, duplication, and passwords. Using smartphones, the remote lock can be easily
distribution of keys, there are security problems in case of lost keys. managed. Furthermore, the proposed system has wide range of
In this paper an innovative lock system prototype using today’s applications and can be used for various types of locks and
technologies will be presented. The novelty of this prototype relies systems, such as lockers, bicycles, cars, etc.
on the fact that using new technologies along with old ones will
result in a smart and more efficient. We propose a smart digital Smart-Lock-System is a complete reinvention of the
door lock system for any lock system. A digital door lock system is standard Key-Door lock, where all the digital keys are stored
any equipment that uses the digital information such as a secret in a Digital Keychain kept on the owner’s phone. Encrypted
code instead of the legacy key system. In our proposed system, a and secured Smart-Lock-System can be connected to the
Central Control module is embedded in the door itself, this is Internet via internet cable (UTP) or wirelessly (Wi-Fi).
required to prevent additional complications and more robust
mechanism for the door as a whole. Technically, this system The concept behind Smart-Lock-System is explained in
embeds itself in the Local Area Network of the house. This adds section II. In section III and VI, the hardware/software of the
extra security layers and prevents access to the system only through proposed prototype are detailed including the security concern.
the network. Furthermore, the biggest advantage of the proposed The applicability of the proposed system is described in section V.
system over existing ones is that it can be easily installed with Finally, a conclusion is summarized in section IV.
minimal requirement of infrastructures and planning.
Keywords— Local Area Network; Central Control; Smart- II. THE CONCEPT OF SMART-LOCK-SYSTEM
Lock-System; In large apartment complexes, fraternities, or even for an
I. INTRODUCTION owner having many keys for each and every apartment, car, or
gate he owns, maintaining entry to authorized only persons is
The technology of keys and locks remained the same for a problem. Besides the costs involved in fabrication,
the last century while everything else is evolving duplication, and distribution of keys, there are security
exponentially. So why not use current technologies and apply
concerns in case of lost keys. The use of keyless entry unit not
it with old ones to build something new and innovative.
only will tackle all of these problems, but adds some
Around 4000 years ago, the concept of Locks and Keys additional improvement features [3].
were invented, and until today, regardless of some minimal In recent years, digital homes have evolved into smart
variation in security and sustainability [1]; locks are installed homes. With the popularity of smart phone and the Internet,
in doors stimulated mechanically by the right key. Recently, the smart home technology is also growing fast. To improve
the Internet was enhanced, and everything was connected to it the quality of life, many models for smart home have been
(phones, televisions, laptops, tablets, cars and so on…). This proposed.
was done because we wanted to make systems “smarter”, in The house-door is an important and crucial part of any
other term “more productive”. smart home, because the door system must be simple and
Why not do the same thing with Locks? Enhancing the efficient enough to be used by anyone, and secure enough to
locks mechanism by connecting them to the internet, making work well and prevent unwanted access to the house.
them more robust and productive. But before we can even discuss how the lock works, we
Today, the number of mobile device users including must realize that we are living in a world where our
smartphone users has rapidly been increasing worldwide, and smartphones have probably more information about us then
various convenient and useful smartphone applications have we do in our own homes. They contain information about our
been developed [2]. Now smartphones are not only used to family, our friends, our bank accounts, where our kids go to
send and receive phone calls, send text messages, and perform school, and information about our lifestyle, etc.
mobile banking operations, but they also are used to control For that reason, SLS takes advantages of the fact that it is
various other devices in our real everyday lives. Through a easier to misplace keys than to lose our phone. Also some
mobile operating system and internal applications, we can phones are now more secure than ever, it is possible to use a
remotely control a variety of external devices such as TVs, standard AES encryption that is very hard to penetrate [4].
projectors, computers, cars, etc. Smart Lock replaces the legacy keychain with a digital

978-1-4673-8523-7/16/$31.00 ©2016 IEEE 222


2016 3rd International Conference on Advances in Computational Tools for Engineering Applications (ACTEA)

keychain, and replaces keys with digital keys. The advantage Router to Central Control to Lock: Central Control receives
behind a digital keychain is that you don't have to carry it the command packets, assembles them with an Ethernet
around. It is stored in one place and can be accessed only by Module — then decides whether to act or not on the
the authorized person. Digital keys can be renewed anytime command.
and updated throughout all the devices, this can save time
Router to Server on the Internet: As feedback is important
compared to mechanically copying keys and carrying them
in any system, any command sent to the Central Control will
around. There are many more advantages that we will be
be sent to the Smart Lock server, where Notifications of
discussed throughout this paper.
important actions can be forwarded to the owner via APN
III. ARCHITECTURE OF THE SYSTEM Notification, Email or Text message.
A. System Parts C. Requirements For Operation
The Smart-Lock-System consists mainly of three major The first and most essential item for SLS is the Local Area
parts. Network (LAN) formed by a simple Router, because the
Part 1: system imbeds itself in the LAN and then becomes
Door lock controller: All functions necessary for keyless operational.
entry lock are implemented here. Now having the base structure for our system, the next
Part 2: crucial part is power, or power availability at all times. The
Central Control: This is the heart of the system. The Central system uses PoE technology (Power over Ethernet), this
Control is a combination of small systems. It reads the technology basically allows the system to harness power from
commands, locks, unlocks the door and executes many other the same Ethernet cable connecting it to the home network.
operations that are crucial to the whole system. This simplifies the design and makes it easier as it provides
Part 3: the system with power at all times. Figure 2 shows a basic PoE
Mobile Application: This is where all the digital keys are plug.
stored in the digital keychains. The SLS mobile application is
the only software that can control the system. The mobile
application provides additional useful tools to the owner, such
as creating additional keys for family members, or creating
temporary keys for guests and close friends.
B. System Operation I
The system should be connected to the home network
(LAN) via a UTP cable. Also, the user must be on the same
network in order to control the system. A brief system
architecture is shown in the Figure 1.

Figure 2. A PoE Plug


The PoE plug provides power for the Central Control
device and the Electric Lock. (No other input to the system is
needed)
D. System Operation II (Online Operation)

Figure 1. SLS System In this part the operation of the system will be discussed in
depth, form Startup to the point where the User issues a
Architecture Mobile Phone to Router: command.
As it is mentioned in the previous section, the user’s phone D1. Startup:
must be connected to the home network. When this is done,
1. System Initialization
the user can now send commands to the system only using the
mobile application provided. In this step the system performs a full Format Cycle
clearing its memory. Estimation Time (ET) is 300ms
Commands here are sent via Wifi (Packets of bits) and
routed by the router to the receiver; in this case the Central 2. Configure ports
Control.

223
2016 3rd International Conference on Advances in Computational Tools for Engineering Applications (ACTEA)

The Central Control issues a full re-initialization of all the information pertaining to the member sending this
INPUT and OUTPUT ports, and thus resetting the state of command as well as the Key.
the LEDs and BUZZERS. ET: 500ms If the key is correct the system will unlock the door for 8
3. Check system Seconds, giving the person enough time to enter. The door
During this step the whole system will be checked for security is then locked, and the server is alerted of this event.
purposes preventing anyone from tampering with the system. D4. Leaving Door Open
The system shuts down in this case. ET : 100ms
In the case where the door is open for longer than 30
4. Connect to the local network Seconds, a small beep will sound every 30 Seconds. Also,
During this cycle the system attempts to connect to the the CC will contact the server and issue a request every 2
LAN. This is important since the system must have an IP minutes to alert all House members via Notifications,
Address to communicate with the Mobile Application. Emails or Text messages.
Here the system goes in a loop until connection is made. A E. System Operation III (Offline Operation)
red LED blinks in this case until connection is made. ET:
To prevent system breakdown when no valid internet
1000ms — in normal case
connection is available (in step 5 to submit keys to server),
5. Configuration of keys the system will run in offline mode where only the users
Each Central Control has its own UDID (Universal Device holding the Master key can unlock the door.
IDentifier). Using this UDID, it generates a set of accepted The master key is a pre-defined key in the system, as
keys. Note that for every startup, new keys are generated well as in the Mobile Application. The master key is never
on the same UDID. transferred over the internet, nor can it be viewed or shared
These keys are checked, encrypted and submitted to the by the members. It is kept in the SLS Chip and in the
application encrypted.
server.
USAGE: Each SLS system is tailored to its members.
6. Main loop And during installation of the system, the master key is
The system goes into the main loop. installed on the SLS Chip and provided to the house
members. When installed on both the devices any hard
D2. Main Loop record of the master key will be destroyed.
In the main loop, the system waits for the User’s F. Fail Safe Operation
commands and keeps the connection to the router alive. In the event where the system fails to load, for any reason, a
Day to day operations, like restarting the router, will force mechanical key can be used to open the door mechanically.
the Central Control to request a new IP and re-configure Figure 4 gives a brief overview of how an unlock door
the keys. This is done for security reasons to keep the keys command propagates through the system.
updated at all times. Figure 3 reveals the security layers.

Figure 3. Security
layers D3. Open Door Command
Figure 4. Flowchart of the unlock door command
When the user connects to the LAN, the command to the
Central Control is sent via the mobile application. The IV. SECURITY
Central Control (CC) checks the key validity and the
How does SLS perform against hacks and the latest security
identity of the sender. The packet sent to the CC contains
bypassing techniques?

224
2016 3rd International Conference on Advances in Computational Tools for Engineering Applications (ACTEA)

All digital keychains and digital keys are stored on the User login authentication is required like Username and
User’s mobile phone, and can only be accessed from this Password. No need to remember and retype long digital keys.
phone. The first layer of security is the User’s phone. Today, They are kept on the device encrypted by the owner’s mobile
every phone company follows standard encryption protocols phone password, as well as the credentials of the user.
[5], where the mobile phone is completely encrypted when What SLS-APP CAN DO:
locked.
As is mentioned earlier, SLS embeds itself in the LAN of (a) Lock or unlock the door by selecting the right key from the
the house formed by a Router. That being said, the second digital keychain.
layer of security that needs to be addressed is the Local Area (b) Add new family members. This will generate unique
Network. Many Wireless security protocols are implemented username and password for that member to be able to use the
on today’s routers, but since we need the best of the best, the application.
router’s security will be set to WPA2/PSK with a key of at (c) Generate temporary keys that work only at a specific time
least 15 characters long [6]. and date of the week. This is good for friends or family
WPA2/PSK protocol with a 15 characters key will have member coming over.
around 95^15 (4.632912302 E29) possible keys [6], which (d) Disable keys for certain users. If the phone was stolen.
makes it very hard or impossible to penetrate the system. (e) Receive notifications (with images if camera on system is
As mentioned previously that the SLS (mainly Central installed) or on any event.
Control shown in figure 1) is connected to the router via cable, (example: “Paul, your wife just left the apartment. “ or “Your
not Wifi. That is for adding an extra layer of security (layer 3) son Elie used his key at 6PM to enter the house” or “The
on the system. Tampering with the system will require nanny, got in at 2:00pm and left at 5:00pm as scheduled”).
physical access to the components of the SLS.
CONCLUSION
Now for the UDID, Keys are generated by the Master key.
Table I shows a pattern string of each key. In conclusion, the Smart-Lock-System will open the door
Each UDID is unique, each Master Key is also unique, as leading to a wide range of innovations in the world of lock
well as each generated key. Keys are generated randomly as systems wherever they may be. With its ease of installation
well as by timestamp (System Time) to prevent a duplicate and use, minimum complexity, wide applicability options, and
string [7]. strong feasibility, SLS guarantees a huge aspiring step forward
Table I. Key Pattern (Case Sensitive) into a better future lock system. All of the above can’t be
Type Demo Key
considered authentic or even possible without considerately
taking into account one of the most vital aspects to the
UDID (40 characters) de305d54-75b4-431b-adb2 innovation: security. Therefore, after examining the detailed
MASTER_KEY (20 characters) 7drFj1rjvXpLQdcwOsLF evaluation and explanation of this phase, the project really
KEY_GEN_1 (10 characters) CJsyeFSa5f0JcfOxGhJq-VH tackles the security concerns to eliminate any worries which
KEY_GEN_2 (10 characters) j4ZI5MWtSlsq7yHpEcSJ-S7 might cause a threat to the system’s success and prosperity.
REFERENCES
V. APPLICABILITY
[1] "History". Locks.ru. Retrieved 2016-03-14, website :
There is a wide range of applicability to this system, not www.locks.ru/germ/informat/schlagehistory.htm
only be applied on home front doors, but also on gates, cars, [2] A. Kassem; M. Hamad, C. El Moucary, “A Smart Spirometry Device for
resorts with many locked areas and so on. Asthma Diagnosis”, 37th Annual International Conference of the IEEE
Since SLS is a standalone system that operates by itself Engineering in Medicine and Biology Society (EMBS), pp. 1629-1632,
without the need for many requirements, and takes advantage 2015
of the power of mobile application and 3G networks to contact [3] X. Lv and L. Xu, "AES encryption algorithm keyless entry system,"
the server. SLS can also be used on car system with minimum Consumer Electronics, Communications and Networks (CECNet), 2012
2nd International Conference on, Yichang, pp. 3090-3093, 2012.
infrastructure.
In this paper, a general overview of this system is presented. [4] Chih-Chung Lu and Shau-Yin Tseng, "Integrated design of AES
(Advanced Encryption Standard) encrypter and decrypter," Application-
Deep Car lock designs can be built around it. Making the Specific Systems, Architectures and Processors, 2002. Proceedings. The
mobile phone the only keychain needed holding all the digital IEEE International Conference on, pp. 277-285, 2002.
keys. [5] Cao Wanpeng and Bi Wei, "Adaptive and dynamic mobile phone data
Furthermore, SLS can be applicable on large buildings and encryption method," in China Communications, vol. 11, no. 1, pp. 103-
resorts with many doors and each door for a specific set of 109, 2014.
users. And all these users share a unique key for the main gate. [6] C. M. Chen and T. H. Chang, "The Cryptanalysis of WPA & WPA2
in the Rule-Based Brute Force Attack, an Advanced and Efficient
VI. MOBILE APPLICATION Method," Information Security (AsiaJCIS), 2015 10th Asia Joint
Conference on, Kaohsiung, pp. 37-41, 2015.
The only way to control SLS is via the SLS mobile
[7] S. Goswami, S. Misra and M. Mukesh, "A PKI based timestamped
application. SLS-App will contact directly the system once on secure signing tool for e-documents," High Performance Computing
the network to unlock/lock the door. and Applications (ICHPCA), 2014 International Conference on,
Bhubaneswar, pp. 1-6, 2014.
225

You might also like