You are on page 1of 5

e-KTP as the Basis of Home Security System using

Arduino Uno

Miftah Andriansyah1, Muhammad Subali2, Imam Rizky Agung Pramono4


Purwanto3, Antonius Irianto S5 Teknik Informatika
1,2,3
Teknik Informatika, 5Teknik Elektro Universitas Gunadarma
Sekolah Tinggi Teknik Multimedia Cendekia Abditama Jakarta, Indonesia
(STTMCA) r17agung@gmail.com
Tangerang, Indonesia
{1miftah; 2subali; 3imam; 5irianto}@cendekia.ac.id

Abstract— The combination of technological advances in understanding of the importance and beneficial of e-KTP as
hardware and software brought new innovations. One of them is government programs for citizens
the application in home security system for the community.
Electronic Identity Card (e-KTP), began to be applied as part of
II. LITERATURE REVIEW
the vision of a Single Identity Number in Indonesia. The use of e-
KTP provides many opportunities, one of which is used as the
basis of residential security systems. Arduino UNO technology A. Radio Frequency Identification (RFID)
and Radio Frequency Identification (RFID) are utilized as part RFID is a wireless development technology that can be
of the prototype of the security system to be built. This security applied in electronic based daily life[14]. RFID has 3 parts [1],
system has the advantage of storing inbound access databases which are:
and is scalable in displaying databases using a browser. With the
design of e-KTP based security system would give users • RFID Reader is a tool used to read RFID Tags
awareness of the benefical of government-promoted e-KTP through radio waves. Radio waves on RFID Reader
program. are emitted through an antenna that works not only
transmits waves, but also receives responses from
Keywords— Home Security System, e-KTP, RFID, Arduino RFID Tags, RFID Tags have memory containing
Uno microchip ID data [2] (see in Figure 1).

I. INTRODUCTION (HEADING 1)
The combination of technological advances in hardware
and software brought new innovations. One of them is the
application in home security system for the community[6][8].
Electronic Identity (e-KTP), began to be applied as part of
the vision of a Single Identity Number in Indonesia.
Based on the research and analysis of home door security
system that is being faced by every housing in the capital city,
the proposed solution for home security is to design a
prototype of home door security system using a Radio
Frequency Identification (RFID) system from e-KTP that use
Figure 1. RFID Reader
a microcontroller as a doormap in a door-based digital home
security system. • The antenna serves to transmit radio frequency
signals between RFID Reader and RFID Tags [10].
The use of e-KTP provides many opportunities, one of
Whereas in RFID Tag and RFID Reader each has its
which is used as the basis of home security systems. Arduino
own internal antenna because RFID Tag and RFID
UNO technology and Radio Frequency Identification (RFID)
Reader is Transceiver (transmitter - receiver) [7].
are utilized as part of the prototype of the security system to
be built. The design is expected to • RFID Transponder (RFID Tag) consists of chips
develop the process of home security system can be mass integrated in an antenna. Electronic circuits of RFID
produced and affordable by many housing in Indonesia. The Tags generally have memory. This memory allows
use of e-KTP as a basis, is expected to provide a significant RFID Tags have the ability to store data. Memory in
Tags is divided into cells. Some cells store Read

Authorized licensed use limited to: UNIVERSITAS GADJAH MADA. Downloaded on September 17,2020 at 07:19:57 UTC from IEEE Xplore. Restrictions apply.
Only data, such as ID number. All RFID Tags get the Arduino. Arduino IDE is also used to upload compiled
ID number at the time the Tag is produced [4]. (see in programs to the Arduino board program memory [3], and can
Figure 2. be downloaded at www.arduino.cc.

E. Software Processing
Processing is an open source programming language and
programming environment to program Image, Animation and
Interaction. Processing is an open project initiated by Ben Fry
and Casey Reas.Processing integrates a programming
Figure 2. RFID Tag Working Process
language, programming environment, and teaching
methodology into an integrated system. So it can be
implemented in creating the database process from Arduino to
B. Arduino UnoMicrocontrollers mysql database [15].
Arduino UNO R3 is an Arduino board that uses
Atmega328 microcontroller. Arduino UNO R3 provides 20
pin I / O, which consists of 14 digital pins, as well as analog III. METHODOLOGY
input. There is a 16 MHz crystal oscillator, a USB connection,
a voltage source connector, an ICSP header, and a reset button There are 5 stages in making home security system based
[Computers, 2010]. Arduino UNO contains everything needed on e-KTP using Arduino Uno, those are: (1) Microcontroller
to support a microcontroller. Just connect it to a computer via Design; (2) Microcontroller Flow Chart;
USB or provide AC and DC voltage from battery or adapter (3) Serial Processing Technology; (4) Hardware & Software
that can make it work [11]. Specification; (5) Microcontroller Experiment; (6) Test
Results.
TABLE 1. ARDUINO UNO SPEC

A. MicrocontrollerDesign

C. E-KTPs
Figure 4. Microcontroller Architecture
Indonesian’s Electronic Identity (e-KTP) is a demographic
document that contains a security system/control both from Figure 5 is a series of tools used to move the door
the administration or information technology based on the with the help of Arduino UNO microcontroller, as for a
national demographic database.Citizen are only allowed to series of tools that must be provided, which are:Arduino
have 1 (one) citizenship identity card and each identity card IDE as a program upload; ArduinoUNOas hardware;
has a resident/citizen identity number (NIK) which is the sole RFIDRC522 as an e-KTP detector; Blue led, Red led and
identity of every resident that is valid for life. buzzer as an indication of user access and provide
notification about valid data or invalid data; Pushbuttonas
The NIK number on the e-KTP card will be used as the alarm stop; Power supply for selenoid use 12 v AC adapter to
basis for others documents i.e the issuance of Passport, enable selenoid to move; Selenoid as a door driver.
Driver's License, Taxpayer Identification Number
(NPWP)[16]. There are four stages to run the home security system:
• Activation stage is running the system by activating the
tool that connects the Arduino UNO USB port to the
computer, and connect the adapter cable from the place
in the Arduino UNO to the outlet which will then
activate the lamp connected to the adapter as the
marker has been powered
Figure 3. E-KTP's Block Diagram • The insert stage is entering data obtained from the
RFID
D. Arduino Uno IDE Reader tool as an e-ID card detector which is RFID
Arduino Integrated Development Environment (Arduino Tag Passive
IDE) is a software used to write and compile programs for

Authorized licensed use limited to: UNIVERSITAS GADJAH MADA. Downloaded on September 17,2020 at 07:19:57 UTC from IEEE Xplore. Restrictions apply.
• Process Stage is specifying a data entered valid value In terms of the tool is formed using Block Diagram, Block
or invalid will generate indicator such as light and diagram in Figure 7 describes the flow of the tool used,
alarm. consist of:
• Stage Output is a tool used to open the door that is • Two pieces of activator such as 12v adapter as power
selenoid, in this last stage, if the input stage and source for selenoid motor driver and laptop as power
processing stages are valid then selenoid will move to source for microcontroller connected via USB port.
open the door of the house.
• Two pieces of input such as e-KTP and push button,
eKTP serves as the identity of the homeowner used to
open the door and push button serves as a reset the
program is running to turn off the alarm and repeat all
running processes.
• Then for the process consists of 3 pieces of processing,
the Arduino as a tool to enter the program and provide
input or output according to the program that has been
entered into the microcontroller Arduino UNO, RFID
Reader serves as a tool to capture the existing signal on
e-KTP and Retrieve data contained in e-KTP,
Processing serves as a processing to bridge between
Figure 5. Prototype of Home Security System Arduino with database so that data received in RFID
Reader can be sent.
B. Microcontroller Diagram • The last is the output of the system created by the
The e-KTP-based home security system uses a Flowchart author, consisting of 5 outputs ie selenoid functioning
diagram, when power is turned on and there is an e-KTP card as a door opener and closing digitally, mysql database
it will perform the data recorded on the e-KTP card into the serves as home access storage, red lights, blue lights
RFID Reader if the read e-KTP will display the data into the and alarms are used as a notification that the data
serial monitor, If it does not display on the serial monitor will entered is valid or invalid.
stop and repeat the scanning process when the e-KTP has
been received will be sent into processing and verification
process. If the data matches, it will raise a successful notice,
turn on the light, and open the door, then the data entry access
will be stored and displayed to the web that is native.
If the verification is unsuccessful, it will generate a
"threshold" notification, turn on the red light, and alarm to
identify that the theft has occurred in the house. To turn off
the alarm can press the reset button, it will directly repeat to
the initial stage and the alarm along with the light will be
automatically stopped.

Figure 7. Arduino Microcontroller Block Diagram

C. Serial Processing Technology


A technology used to send data received Arduino IDE,
by RFID Reader is displayed on the monitor series contained
in Arduino IDE and sent to Processing for the process through
data verification.
This serial processing technology can be done by taking
transaction data displayed on the arduino according to the
screen display 9600 on processing so that data will be
obtained will come out and can display the results. As in
Figure 8.

Figure 6. Home Security System Flowchart Diagram

Authorized licensed use limited to: UNIVERSITAS GADJAH MADA. Downloaded on September 17,2020 at 07:19:57 UTC from IEEE Xplore. Restrictions apply.
Figure 9b. Test Data Input

F. Running Serial Processing Technique


Figure 8. Serial Processing Technology The existence of technology using Serial to Processing to
help the author as a material in getting data from Arduino
D. Hardware and Software Specification microcontroller tool and input into the web database, as
Table 2 and Table 3 are desribing hardware and software follows:
specification. • First open the software Processing 2
Table 2: HARDWARE SPECIFICATION
• Open Xampp for the database on mysql can be
equated with the data obtained
• Open the file ProgramDB.pde
• Run the program, make sure the serial monitor
on Arduino IDE has been closed so that the port
does not collide
TABLE 3: SOFWARE SPECIFICATION
• If valid will bring up data shown in Figure 10

Figure 10. Valid Data Notification


E. Hardware and Software Specification
• Check on the database in the mysql database. If
Simply folowwing the stages: there is then the database has been successfully
• install the Arduino IDE software inputted.

• Install the Processing 2 software, and download • If the data is invalid it will appear "notice there is
following library, such as SQL Library a thief" (Awas Ada Maling. in Bahasa) and will
(BezierSQLib) sound the alarm for as long as possible until the
button button on the tool is pressed.
• Programming on an Arduino IDE that uses
looping commands according to the RFID RC522 G. Web View
library and captures the ID on the chip embedded
in the e-KTP to display in the Arduino IDE as This stage is about the appearance of data, and used to
shown in Figure 9 monitor accessing the home by looking at some users who
• Activate XAMPP server, to create a database for have accessed the house using e-KTP, as for how, by running
e-KTP on the web XAMPP server and Browser:
• select the access data contained in the top right
• Entering data according to tables that have been
corner of the web.
loaded on the database
• If the data has been successfully saved and
• Create a table in the required e-KTP database, i.e successfully displayed then the home door
access time, Status Identity Number (NIK), Name security system with eKTP based Arduino UNO
Status and Action has been successfully implemented. (see figure
11)

Figure 9a. e-KTP User ID

Figure 11. User Access Log View Browser

Authorized licensed use limited to: UNIVERSITAS GADJAH MADA. Downloaded on September 17,2020 at 07:19:57 UTC from IEEE Xplore. Restrictions apply.
IV. CONCLUSION & RECOMMENDATIONS [3] Hastomo, W. (2013).Pengertian dan kelebihan database mysql.
http://hastomo.net/php/pengertian-dan-kelebihandatabasemysql.
A. Conclusion [4] Jose, D. S. (2009). Rfid tag considerations, 12 agustus 2016.
[5] http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Mob
The design of home security system based on e-KTP works ility/WiFiLBSDG/wifich6.html.
well. The system can recognize e-KTP that have access to the [6] Kaushal.G, Mishra.R, Chaurasiya. N, Singh. P. (2015), RFID Based
system 100% of the experiments performed. An e-KTP Security and Access Control System using Arduinowith GSM Module,
number that has no access in the database can not open the International Journal of Electrical and Electronic Engineering (IJEE),
door as part of the home security system. Hardware and Vol 2, issue 2
software can synchronize between Arduino microcontroller [7] Komputer, W. (2010). ShortCourse Series:
and some software such as Arduino IDE, Processing, and SQL Server 2008 Express. Penerbit Andi.
PHPMyAdmin as its database. Access Validation is indicated [8] Mishra. Y, Marwah. G. K, Verma. S. (2015), Arduino Based Smart
RFID Security and Attendance System with Audio Acknowledgement,
by notification alarm. Web-based logging systems with web International Journal of Engineering Research & Technology (ijert), Vol
browsers can run to record security system access events 4, issue 01.
natively. [9] Nasir, S. Z. (2015). Interfacing of rfid rc522 with arduino, Accesed 19th
August 2016
B. Recommendation [10] Rao. K.V. S, Nikitin. P. V, Lam. S. F (2005), Antenna Design for UHF
RFID Tags : A Review and Practical Application, IEEE Transaction on
Based on the experiment it is necessary to make sure the Antennas and Propagation, Vol. 53, issue :12, p. 3870 - 3876
paths in the circuit of the devices are interconnected and are
[11] Shalahuddin, M. and Rosa, A. (2008). Analisis dan desain
not different between the paths on the sensors with the sistem informasi. Politeknik Telkom. Bandung.
incoming currents in the Arduino Uno microcontroller tool. In [12] Syaftari, F. (2015). Proyek Robotik Keren
the activation of other open currents for the door can be open dengan Arduino. PT Elex Media Komputindo.
using adapter 9-12V and using e-KTP in accessing it.. [13] Turaip, M. (2014). Membangun Prototipe pengendali Tempat
Masuk Parkir Apartmen BerBerbasis RFID. Unpublished
[14] Want. R (2006), An Introduction to RFID Technology, IEEE Pervasive
Computing, Vol. 5, issue : 1, p. 25-33
References [15] Widianto (2007). Pengenalan processing.
[1] Daleseis, U. A.(2010). Rfid sebagai supply chain management. http://blogs.itb.ac.id/wnugroho/processing/
https://www.scribd.com/document/Rfid [16] Wikipedia (2014). Pengertian electronic-ktp.
[2] Darmawan, A. (2016). Arduino Belajar Cepat dan https://id.wikipedia.org/wiki/Kartu-Tanda-Penduduk-elektronik
Pemrograman. Informatika Bandung.

Authorized licensed use limited to: UNIVERSITAS GADJAH MADA. Downloaded on September 17,2020 at 07:19:57 UTC from IEEE Xplore. Restrictions apply.

You might also like