Professional Documents
Culture Documents
Abstract: Nowadays the use of Internet of Things (IoT) previously. It also discusses the design of new innovation in
technology has developed that almost all aspects in human’s life lock system. The concept of SLS will be explained on part II,
utilize IoT technology to increase the quality of life. Lock system is part III will explain architecture of SLS, The security of the
one of those aspects that has been impacted by the massive lock system will be explained on part IV, part V will explain
development of IoT, for example lock system that can be opened or the application of the system and part VI will explain the
closed by entering the password or by gadget to control it. The main conclusion briefly.
component of smart home concept lays on the door, so the door
lock system becomes an interesting topic to discuss. The paper II. THE CONCEPT OF LOCK SYSTEM
presents a design of lock system for operating door without a
control to open or lock it that brings a comfort and can be applied The development of IoT technology makes the human’s
effectively. Besides, the lock system can be used for all kinds of lifestyle changes into more flexible and efficient especially in
human’s physical condition. The system uses bluetooth technology doing their activities, for example the use of IoT technology
with low power and is available on almost all gadgets. The design of applied on the lock system that it does not need conventional
the system is also completed with special feature to increase the lock to open or close the lock. It saves the spends on the
security and the comfort of the users. The lock system indirectly production and key duplication. However, not all people can
supports the program of United Convention of Right People with access lock system using technology, for example people with
Disabilities. disabilities.
Keywords— Lock System; Smart Lock System; Bluetooth A research [9] has found that people with disabilities have
Technology; Security; Internet Of Things; Door; difficulty in accessing lock system for door either using
technology or conventional way because it is a bit hard for
I. INTRODUCTION them to reach the lock. The design of the lock system
Lock system is one of the systems needed by human. It is recommended in the paper does not need a contact between the
mainly because human needs a security to put all their things user and the lock system that it enable all people to access it
[1] or they want to have a privacy on the places that can only disregarding their physical condition.
be accessed by themselves. The lock concept was invented The system uses bluetooth technology as the
4000 years ago [2], [3]. As the use of Internet of Things (IoT) communication protocol between the user of access and the
technology gets developed, the conventional lock has also been lock system. If the user of access is near by the door using the
developed and innovated. The development and the innovation lock system, then it will be opened automatically and the other
on the conventional lock are aimed at decreasing the way around. Therefore, the user does not need to do an action
weaknesses. Then, there appear several designs of lock system to open or lock the door. Bluetooth has lower power compared
utilizing IoT technology in which the application enables to wifi connectivity (10) and better security. Besides, almost all
people to operate it. gadgets have bluetooth. It then enables the SLS design for door
There are several security variations of the lock system to use any kinds of gadget with bluetooth as the lock system.
utilizing IoT technology, such as the use of password to access The system is featured website and smartphone
the lock [4], a secret code that is saved in a device like applications. It also has special feature to support the security
smartcard, tag, and smartphone [5], [6]. On its control design, and the comfort of the users. It will be explained further on the
the lock can be controlled through an application set on the next part.
smartphone [2], [7], [8]. The security variations and the lock
system control have their own weaknesses. Some of which are III. ARCHITECTURE OF THE SYSTEM
forgetting the password making the lock system cannot be This part covers the explanation of the architecture of the
operated or losing the device that is used to control the lock SLS design completely and detail. Firstly, it will be explained
system that it might be taken over by irresponsible people. the parts of the lock system. Secondly, it will be explained the
This paper will discuss a design of Smart Lock System work system of SLS. Lastly, it will be explained the special
(SLS) that can solve the problem of lock system explained feature available on the system.
A. The Parts of the System located on the validation area. On the other way around, if the
user of access is not located on the validation area, the door
will be locked automatically. It is purposively designed to
avoid the door opened and locked automatically if the user of
access is far from the door and that it keeps the security of the
users.
For more detail, the researcher will explain three general
conditions on the lock system to get to know clearly how the
SLS works.
1) Condition 1: The user of access is located on bluetooth
signal area and the user of no access is located on the
validation area.
The condition identifies that the user of access is located on
the bluetooth signal area, yet the system has not given the
command to open or lock the door. The user of no access is
located on the validation area, yet the identity of the user
detected on the area does not match the identity saved on the
server, so the door lock is still on the locked status.
Figure 1. SLS System Architecture
397
2018 International Conference on Information and Communications Technology (ICOIACT)
C. Special Feature
The system is designed with special feature that can be
activated on a specific condition to increase the security and
the comfort of the user in operating SLS.
1) Feature 1 : Get Back
The feature is used in the condition in which the user loses
the device to access the lock system. The user is able to use
other device connected to the internet to access the SLS
website application. The user firstly fills the data of username
and password to access the SLS website. Those who can access
the SLS website application are those with direct authority to
SLS. If the user can log in, the user is able to remove the
identity of the lost software so that it can no longer be used to
access the lock system.
2) Feature 2: Fingerprint
SLS design provides fingerprint feature for smartphone
users or other application with fingerprint detector. However,
the feature needs a contact between the user and SLS that it can
Figure 3. Condition 2 only be used by people with no disability on their fingers. For
more detail on how the feature works, we can see it on figure 5.
3) Condition 3: the user of access and the user of no access are
located on the validation area.
If the condition happens, the lock system will give
command to the door lock to open because the identity of the
user is detected matched with the one saved in the server. It is
designed purposively for the condition where the user of access
might bring relatives with no access to enter the room. When
the user of access is out of the validation area, then the lock
control system gives command to the door lock to stay locked
automatically.
IV. SECURITY
Figure 4. Condition 3
To avoid any irresponsible acts from irresponsible people
To determine the validation area, the researcher uses the that hack the lock system by manipulating the data of user on
logic of measuring the minimal power of bluetooth signal the system, then the researcher applies security protocol on the
within 1 radius of the measurement equipment. As done in the bluetooth communication by referring to bluetooth security
research [11]. protocol explained in the textbook (12). There are 3 security
modes on the bluetooth communication used in SLS, they are:
398
2018 International Conference on Information and Communications Technology (ICOIACT)
1) Pairing and Link Key Generation encryption process of the sent or received packages by
bluetooth communication.
In this step, system does lock making from the pin code
made on the bluetooth server for the device that is going to be V. APPLICABILITY
used. Figure 6 explains the concept of lock making from the
pin code used in SLS. There is no more interaction between the user and SLS.
Therefore, it is applicable for doors of all kinds of places such
2) Authentication as private house, office, campus, and home for older people
and people with disabilities. Besides, the system can also be
If the system has set the lock to the bluetooth device, the
used by all human disregarding the physical condition except
next process is authentication procedure by the system. In this
the system with fingerprint feature.
process, the system functions as the verifier to match the valid
identity of the software that has been set a lock. Figure 7 By only bringing the device with active bluetooth
explains the concept of authentication process. connectivity, the system can be accessed automatically.
Therefore, either normal people, people with disabilities, or
older people can access the lock. For further use, the system is
not only applied for door building, but also for vehicle such as
car or motorcycle for the purpose of making the access to the
lock system of the vehicle easier.
399
2018 International Conference on Information and Communications Technology (ICOIACT)
400