You are on page 1of 5

2018 International Conference on Information and Communications Technology (ICOIACT)

Design of Smart Lock System for Doors with Special


Features using Bluetooth Technology
Muhammad Sabirin Hadis and Elyas Palantei Amil Ahmad Ilham and Akbar Hendra
Department of Electrical Engineering Department of Electrical Engineering
Hasanuddin University Hasanuddin University
Makassar, Indonesia Makassar, Indonesia
muhammadsabirinhadis@ieee.org amil@unhas.ac.id
elyas.palantei@gmail.com akbarhendra@ieee.org

Abstract: Nowadays the use of Internet of Things (IoT) previously. It also discusses the design of new innovation in
technology has developed that almost all aspects in human’s life lock system. The concept of SLS will be explained on part II,
utilize IoT technology to increase the quality of life. Lock system is part III will explain architecture of SLS, The security of the
one of those aspects that has been impacted by the massive lock system will be explained on part IV, part V will explain
development of IoT, for example lock system that can be opened or the application of the system and part VI will explain the
closed by entering the password or by gadget to control it. The main conclusion briefly.
component of smart home concept lays on the door, so the door
lock system becomes an interesting topic to discuss. The paper II. THE CONCEPT OF LOCK SYSTEM
presents a design of lock system for operating door without a
control to open or lock it that brings a comfort and can be applied The development of IoT technology makes the human’s
effectively. Besides, the lock system can be used for all kinds of lifestyle changes into more flexible and efficient especially in
human’s physical condition. The system uses bluetooth technology doing their activities, for example the use of IoT technology
with low power and is available on almost all gadgets. The design of applied on the lock system that it does not need conventional
the system is also completed with special feature to increase the lock to open or close the lock. It saves the spends on the
security and the comfort of the users. The lock system indirectly production and key duplication. However, not all people can
supports the program of United Convention of Right People with access lock system using technology, for example people with
Disabilities. disabilities.

Keywords— Lock System; Smart Lock System; Bluetooth A research [9] has found that people with disabilities have
Technology; Security; Internet Of Things; Door; difficulty in accessing lock system for door either using
technology or conventional way because it is a bit hard for
I. INTRODUCTION them to reach the lock. The design of the lock system
Lock system is one of the systems needed by human. It is recommended in the paper does not need a contact between the
mainly because human needs a security to put all their things user and the lock system that it enable all people to access it
[1] or they want to have a privacy on the places that can only disregarding their physical condition.
be accessed by themselves. The lock concept was invented The system uses bluetooth technology as the
4000 years ago [2], [3]. As the use of Internet of Things (IoT) communication protocol between the user of access and the
technology gets developed, the conventional lock has also been lock system. If the user of access is near by the door using the
developed and innovated. The development and the innovation lock system, then it will be opened automatically and the other
on the conventional lock are aimed at decreasing the way around. Therefore, the user does not need to do an action
weaknesses. Then, there appear several designs of lock system to open or lock the door. Bluetooth has lower power compared
utilizing IoT technology in which the application enables to wifi connectivity (10) and better security. Besides, almost all
people to operate it. gadgets have bluetooth. It then enables the SLS design for door
There are several security variations of the lock system to use any kinds of gadget with bluetooth as the lock system.
utilizing IoT technology, such as the use of password to access The system is featured website and smartphone
the lock [4], a secret code that is saved in a device like applications. It also has special feature to support the security
smartcard, tag, and smartphone [5], [6]. On its control design, and the comfort of the users. It will be explained further on the
the lock can be controlled through an application set on the next part.
smartphone [2], [7], [8]. The security variations and the lock
system control have their own weaknesses. Some of which are III. ARCHITECTURE OF THE SYSTEM
forgetting the password making the lock system cannot be This part covers the explanation of the architecture of the
operated or losing the device that is used to control the lock SLS design completely and detail. Firstly, it will be explained
system that it might be taken over by irresponsible people. the parts of the lock system. Secondly, it will be explained the
This paper will discuss a design of Smart Lock System work system of SLS. Lastly, it will be explained the special
(SLS) that can solve the problem of lock system explained feature available on the system.

978-1-5386-0954-5/18/$31.00 ©2018 IEEE 396


2018 International Conference on Information and Communications Technology (ICOIACT)

A. The Parts of the System located on the validation area. On the other way around, if the
user of access is not located on the validation area, the door
will be locked automatically. It is purposively designed to
avoid the door opened and locked automatically if the user of
access is far from the door and that it keeps the security of the
users.
For more detail, the researcher will explain three general
conditions on the lock system to get to know clearly how the
SLS works.
1) Condition 1: The user of access is located on bluetooth
signal area and the user of no access is located on the
validation area.
The condition identifies that the user of access is located on
the bluetooth signal area, yet the system has not given the
command to open or lock the door. The user of no access is
located on the validation area, yet the identity of the user
detected on the area does not match the identity saved on the
server, so the door lock is still on the locked status.
Figure 1. SLS System Architecture

As seen on the picture 1, there are four main parts of SLS.


They are:
1) Part 1: Door Lock
This part is functioned to open and close the door
automatically according to the command that was given by the
system without using mechanic key.
2) Part 2 : Lock Control System
This part is the main part of all SLS design. It is functioned
to take the action of opening or locking the door. Besides, it is
also functions as the bluetooth server to search for the identity
of the user of access located near the door lock. It is also
functions as the center of the communication protocol between
the user of access and the lock system.
3) Part 3 : Server
This part saves all the data identity and the data of security
of the user used as the lock on the lock system.
4) Part 4 : Device with Bluetooth Technology Figure 2. Condition 1
The device signals the bluetooth that enables the user
recognized by the system to do an action. 2) Condition 2: the user of access is located on the validation
area and the user of no access is located on the bluetooth signal
B. The Work of the System area.
The system works by using device that activates bluetooth There is no action from the system if the user is located on
to identify the user located near the bluetooth signal area. The the bluetooth signal area, yet the system can detect an active
system then match the identity and connect the communication bluetooth software, match the identity, and connect
between the lock control system and the user of access. The communication for the user of access. On condition 2 figure, it
system will then open if the user of access is located near the is identified that the user of access is located on the validation
validation area. area, so the system gives command to the door lock to open
The researcher gives two areas of system identification automatically.
process: bluetooth signal area and validation area.
1) Bluetooth Signal Area
Bluetooth signal area covers the area that can be reached by
the bluetooth signal device in the lock system.
2) Validation Area
The area has 1 meter radius from the door and is functioned
to open the door automatically when the user of access is

397
2018 International Conference on Information and Communications Technology (ICOIACT)

C. Special Feature
The system is designed with special feature that can be
activated on a specific condition to increase the security and
the comfort of the user in operating SLS.
1) Feature 1 : Get Back
The feature is used in the condition in which the user loses
the device to access the lock system. The user is able to use
other device connected to the internet to access the SLS
website application. The user firstly fills the data of username
and password to access the SLS website. Those who can access
the SLS website application are those with direct authority to
SLS. If the user can log in, the user is able to remove the
identity of the lost software so that it can no longer be used to
access the lock system.
2) Feature 2: Fingerprint
SLS design provides fingerprint feature for smartphone
users or other application with fingerprint detector. However,
the feature needs a contact between the user and SLS that it can
Figure 3. Condition 2 only be used by people with no disability on their fingers. For
more detail on how the feature works, we can see it on figure 5.
3) Condition 3: the user of access and the user of no access are
located on the validation area.
If the condition happens, the lock system will give
command to the door lock to open because the identity of the
user is detected matched with the one saved in the server. It is
designed purposively for the condition where the user of access
might bring relatives with no access to enter the room. When
the user of access is out of the validation area, then the lock
control system gives command to the door lock to stay locked
automatically.

Figure 5. Special Feature

IV. SECURITY
Figure 4. Condition 3
To avoid any irresponsible acts from irresponsible people
To determine the validation area, the researcher uses the that hack the lock system by manipulating the data of user on
logic of measuring the minimal power of bluetooth signal the system, then the researcher applies security protocol on the
within 1 radius of the measurement equipment. As done in the bluetooth communication by referring to bluetooth security
research [11]. protocol explained in the textbook (12). There are 3 security
modes on the bluetooth communication used in SLS, they are:

398
2018 International Conference on Information and Communications Technology (ICOIACT)

1) Pairing and Link Key Generation encryption process of the sent or received packages by
bluetooth communication.
In this step, system does lock making from the pin code
made on the bluetooth server for the device that is going to be V. APPLICABILITY
used. Figure 6 explains the concept of lock making from the
pin code used in SLS. There is no more interaction between the user and SLS.
Therefore, it is applicable for doors of all kinds of places such
2) Authentication as private house, office, campus, and home for older people
and people with disabilities. Besides, the system can also be
If the system has set the lock to the bluetooth device, the
used by all human disregarding the physical condition except
next process is authentication procedure by the system. In this
the system with fingerprint feature.
process, the system functions as the verifier to match the valid
identity of the software that has been set a lock. Figure 7 By only bringing the device with active bluetooth
explains the concept of authentication process. connectivity, the system can be accessed automatically.
Therefore, either normal people, people with disabilities, or
older people can access the lock. For further use, the system is
not only applied for door building, but also for vehicle such as
car or motorcycle for the purpose of making the access to the
lock system of the vehicle easier.

Figure 8. Bluetooth Encryption Procedure [12]


Figure 6. Link Key Generation from PIN [12]
VI. APPLICATION
To make it easy and managed well, the use of SLS
application is divided into two, they are:
A. The Use on Website Application
The use of website is designed for two user categories, they
are the administrator and the user. The application is designed
to organize the users that can access SLS. The following will
be explained what the user can do on the website application,
1) Administrator Side:
a) Administrator can add, edit, and remove the data of
the user device.
b) Administrator can add, edit, and remove the username
and the password of the user used to log in to the
Figure 7. Bluetooth Authentication [12] website.
2) User side:
3) Confidentiality a) User can remove his/her own device identity.
This mode is a kind of the secret service of bluetooth to
encrypt all packages sent or received among the device so that
it avoids packages stealing or hacking. Figure 8 explains the

399
2018 International Conference on Information and Communications Technology (ICOIACT)

B. The Use on Mobile Application REFERENCES


Mobile application is used by the user to activate SLS [1] “History of Locks,” History of Keys, 2017. [Online]. Available:
operational mode. To change the user’s operational mode, it http://www.historyofkeys.com/locks-history/history-of-locks/.
[Accessed: 29-Sep-2017].
requires the password. The things that user can do on the [2] A. Kassem, S. E. Murr, G. Jamous, E. Saad, and M. Geagea, “A smart
mobile application are, lock system using Wi-Fi security,” 2016, pp. 222–225.
[3] Liberty Aries, “Penemu Kunci Pertama kali.” [Online]. Available:
1) Activating automatic mode. If the mode is active, the http://www.beritacnn.com/2013/01/penemu-kunci-pertama-kali.html.
application will activate the bluetooth automatically that it [Accessed: 01-Oct-2017].
enables the access to the lock without any control to the [4] Jain, Ankit, Anita Shukla, and Ritu Rajan, “Password Protected Home
system. Automation System with Automatic Door Lock,” 2016.
[5] .DVÕP $GDODQ DQG %XUVD %UDQFK ³)DFH UHFRJQLWLRQ 1)& DQG YRLFH
2) Activating fingerprint mode. When the mode is used, the controlled door lock system,” 2016.
application will require the user’s fingerprint to access the [6] C.-H. Hung, Y.-W. Bai, and J.-H. Ren, “Design and implementation
lock. of a single button operation for a door lock control system based on a
near field communication of a smartphone,” 2015, pp. 260–261.
VII. CONCLUSION [7] N. H. Ismail, Z. Tukiran, N. N. Shamsuddin, and E. I. . Saadon,
“Android-based home door locks application via Bluetooth for
The conclusion of the discussion of SLS design using disabled people,” 2014, pp. 227–231.
bluetooth technology is the innovation created from lock [8] J. Potts and S. Sukittanon, “Exploiting Bluetooth on Android mobile
system with no more direct contact between the user and the devices for home security application,” 2012, pp. 1–4.
lock. It is completed with bluetooth security protocol and [9] Y. Poria, A. Reichel, and Y. Brandt, “Dimensions of hotel experience
of people with disabilities: an exploratory study,” Int. J. Contemp.
special feature to increase the security and the comfort of the Hosp. Manag., vol. 23, no. 5, pp. 571–591, Jul. 2011.
system use. It also solves the problem of the lock system [10] Kabir, M, Md Khan, and Abbas Ali, “COMPARISON AMONG
explained previously. SHORT RANGE WIRELESS NETWORKS: BLUETOOTH,
ZIGBEE, & WI-FI,” 2016.
Without having to do a control and additional contact to [11] T. Tsubota and T. Yoshii, “An Analysis of the Detection Probability
access the lock, the system can be used by all people of MAC Address from a Moving Bluetooth Device,” Transp. Res.
disregarding the physical condition. Indirectly, SLS also Procedia, vol. 21, pp. 251–256, 2017.
supports the program of United Convention of Right People [12] J. Padgette et al., “Guide to bluetooth security,” National Institute of
Standards and Technology, Gaithersburg, MD, NIST SP 800-121r2,
with Disabilities due to the easy access offered by the system. May 2017.

400

You might also like