Professional Documents
Culture Documents
net/publication/264508469
CITATIONS READS
7 4,856
4 authors, including:
Wooseok Hyun
Korean Biblie University
12 PUBLICATIONS 71 CITATIONS
SEE PROFILE
All content following this page was uploaded by Hae-Duck Joshua Jeong on 08 August 2014.
Abstract—As smartphones have recently become one of the remote lock system using wireless communications has
most popular devices worldwide, various convenient applica- solved these kinds of problems. Using the user’s smartphone,
tions are being released. Now smartphones not only provide the remote lock can be easily managed. Furthermore, the
the ordinary internal processes such as dialing or receiving
phone calls, sending text messages, and doing mobile banking proposed system can be extensively used for various remote
wherever we are, but they also are beginning to control locks such as remote locks for lockers, remote locks for
various other devices that are part of our lives. Through bicycles, etc.
the smartphone using mobile applications, we can remotely The remainder of this paper is organized as follows: In
control a variety of external devices such as TVs, projectors for
Section II, a few related products and technologies of the
presentations, computers, and even cars. This paper presents
the design and implementation of a remote lock system using proposed remote lock system using Bluetooth communica-
wireless communications. The remote lock system is a lock tion are discussed. Section III presents how the proposed
system that can be controlled remotely by a dedicated Android system using Bluetooth communication is designed and
application. The main function of the Android smartphone implemented, and finally the conclusions are described in
is equipped with Bluetooth so that a lock can be opened
Section IV.
and managed via the application functions. The users’ lock
information in real time can be stored and managed in the
database via a server that a server manager builds and II. R ELATED W ORK AND T ECHNOLOGIES
manages. Even though users forget the password, our proposed
lock system also guides them to find it easily, and provides Related products and technologies of the proposed remote
the user’s manual. Using this system, users can do a variety lock system using Bluetooth communication including An-
of management functions such as adding, deleting, modifying, droid are the following.
and purchasing the user’s own locks. Existing locks are classified into three types: the key lock
Keywords-Remote lock system; Bluetooth; mobile device; method, the password lock system, and the remote lock
Android; wireless communication method. The key lock is the oldest method used with locks,
and people may lose the key and should always carry it. In
I. I NTRODUCTION contrast to the key lock, the advantage of using a password
The number of mobile device users including smartphone lock is that people do not need to carry a key all the time,
users has rapidly been increasing in the world, and various but people are likely to forget the password and the number
convenient and useful smartphone applications have been of ways that the password can be changed is limited. The
developed. Now smartphones not only work the ordinary remote control lock, like the key lock, has the disadvantage
internal processes such as dial and receive phone calls, send that people should always carry the remote control key, and
text messages, and do mobile banking wherever we are, but batteries are required.
they also are coming to control various other devices in To improve these kinds of problems, a previous patent [1]
our real everyday lives. Through smartphones and mobile proposed technology of an unlocking system using Bluetooth
applications, we can remotely control a variety of external is proposed. The structure of this system consists of three
devices such as TVs, projectors for presentations, computers, steps as follows:
and even cars. Step 1. A mobile terminal sends an address to a Bluetooth
People normally use ordinary locks with keys or locks device that we want to control, and the corresponding
having their passwords. However, these locks have a few Bluetooth device registers the received address on the
shortcomings such as people losing keys or forgetting pass- unlocked address.
words. In this paper, we propose a new remote lock system Step 2. In accordance with the external keys, the search of the
using wireless communications since these kinds of remote Bluetooth device list that the above-mentioned mobile
lock products and patents can rarely be found. Our proposed terminal has registered, then connects the selected
442
Figure 2. Bluetooth connection procedure. Figure 3. Configuration of the role of the Bluetooth security manager.
2) Bluetooth Security Manager: Bluetooth basically pro- there is a limit as to eavesdropping possibilities.
vides security services such as authentication, confidential- ∙ Security Mode 2 is a service level-enforced security
ity, and authorization. Bluetooth controls control rights for mode. The service access depends on devices as fol-
Bluetooth devices and services through a security manager lows: Trusted devices have unrestricted access to all ser-
at the link level. Figure 3 shows about relevance of the vices, fixed relationship to other devices, and untrusted
Bluetooth security manager. After Logical Link Control and devices generally have no permanent relationship and
Adaptation Protocol (L2CAP), which is used within the services that it has access to are limited.
Bluetooth protocol stack and is used to communicate over ∙ Security Mode 3 is the link level-enforced security
the host ACL link, receives connection requests, the security mode. Security is implemented by symmetric keys in
manager confirms whether the access has been done or a challenge-response system. Security implementations
not. The security manager determines whether the service in Bluetooth units are all the same.
database and the device database exist, and they are applied ∙ Security Mode 4 is a service level enforced security
to the appropriate authentication or encryption if there are. mode in which security procedures are initiated after
If the security manager authorizes to allow access to the link setup. Secure Simple Pairing (SSP) uses Elliptic
L2CAP, the connection setup is maintained [7]. Curve Diffie Hellman (ECDH) techniques for key ex-
The main features of the security manager are as follows: change and link key generation. ECDH is an anony-
information security management related to services, secu- mous key agreement protocol that allows two parties,
rity information management related to devices, questions each having an elliptic curve public-private key pair, to
and answers related to security of protocol and application establish a shared secret over an insecure channel.
security, and authentication and encryption performance. 4) Link Key Generation: A method of link key generation
3) Bluetooth Security Level: Bluetooth is divided into is not provided in the Security Mode 1, and there are two
trusted and untrusted devices. The trusted devices are au- methods in which link key generation is performed for
thorized devices, and the link key is stored. They are Bluetooth. Security Modes 2 and 3 use one method, while
defined as ”Trusted” in a database. The untrusted devices Security Mode 4 uses another.
are authenticated, and the link key is stored, but they are For Bluetooth, operating in Security Mode 2 or 3, two
not defined as ”Trusted” in a database. Bluetooth has three associated devices simultaneously derive link keys during
security functions to be applied in four modes [8], [9]. the initialization phase when users enter an identical PIN
∙ Security Mode 1 is a non-secure mode. A device will into one or both devices, depending on the configuration
not initiate any security. Only security at this level is by and device type. The PIN entry, device association, and key
the nature of the connection: data-hopping and short- derivation are depicted conceptually in Figure 4. Note that
distance. Bluetooth devices transmit over the unlicensed if the PIN is less than 16 bytes, the BD ADDR is used to
2.45GHz radio band, the same band used by microwave supplement the PIN value used to generate the initialization
ovens and cordless phones. All Bluetooth devices em- key. After initialization is complete, devices automatically
ploy data-hopping, which entails skipping around the and transparently authenticate and initiate the encryption
radio band up to 1600 times per second, at 1MHz procedure to secure the wireless link, if encryption is en-
intervals. Most connections are less than 10 meters, so abled. The PIN code used in Bluetooth devices can vary
443
Figure 6. HC-06 module.
D. HC-06 Module
Figure 5. M328-mini V1.0 module.
HC-06 Bluetooth slave module in Figure 6 is used to
connect with Bluetooth master devices such as a Bluetooth
dongle 2 or Android smartphone. When the power is sup-
between one and 16 bytes. The typical four-digit PIN may plied to the master module, search for the HC-06 Bluetooth
be sufficient for low-risk situations; a longer PIN should be slave module in the neighborhood and the slave module is
used for devices that require a higher level of security. directly connected.
SSP was introduced in Bluetooth for use with Security
Mode 4. SSP simplifies the pairing process by providing a
number of association models that are flexible in terms of E. L9110 Module
device input capability. SSP also improves security through
the addition of ECDH public key cryptography for protec- This module can control two DC motors or one two-phase
tion against passive eavesdropping and Man-In-The-Middle four-wire stepping motor. As two ports of blue terminal are
Attacks (MITM) during pairing. Security Mode 4 requires motor A and motor B ports, the DC motor is connected
Bluetooth services to mandate an authenticated link key, an to each port. Figure 7 shows a 6-pin header pins, which is
unauthenticated link key, or no security at all. connected to a digital pin of the Arduino, which is an open-
source electronics prototyping platform based on flexible,
easy-to-use hardware and software, to control the motor. For
C. M328-mini V1.0 Module controlling a DC motor A (A-1B, A-1A), 2 pins are needed
The M328-mini V1.0 module in Figure 5 is small size and for controlling a DC motor B (B-1B, B-1A), 2 pins
of 26 x 30 mm, and mounted AVR MEGA328P-20AU. are also needed. It should be noted that the PC USB port
This module is equipped with PWR-LED, RUN-LED, 6- supplies up to 500mA current.
PIN ISP, 16MHz XTAL, and USB2 Serial converters. This
system used the main Arduino compatible module to control 2 A device that is connected to a computer to allow access to wireless
a Bluetooth module and motor module. broadband or use of protected software.
444
III. I MPLEMENTATION AND R ESULTS is based on MySQL, and query statements that are
received from the server are run.
A. System Architecture of the Proposed System
∙ The mobile device stores a password for locking and
Our proposed remote lock system consists of a lock with unlocking the lock.
four main modules, a mobile device, and server computer.
The system provides seven operations to achieve the above B. Some Selected Menus
goals as follows. ∙ Figure 8 (a) shows the main menu that after starting the
445
This menu retrieves the lock through Bluetooth, and the Android application. The main function of the Android
user enters a password. If the information is correctly smartphone is equipped with Bluetooth so that a lock can
entered, the device and Bluetooth will be connected. be opened and managed via the application functions. Users’
When ’Open’ button is touched, the lock is opened. lock information in real time can be stored and managed in
Figure 11 also show a sequence diagram of the regis- the database via a server that a server manager builds and
tered lock retrieval. manages. In addition, even though users forget the password,
∙ Figure 10 (b) shows list of registered lock, modification, our proposed lock system guides them to find it easily, and
and deletion dialog. This management page shows the provides the user’s manual. Using this system, users can do
list of the lock that the user has registered in the server. a variety of management actions such as adding, deleting,
Then when the user wants to change the information, modifying, and purchasing user’s own locks.
if input password is the same as the existing password,
ACKNOWLEDGMENT
the user can enter new information.
The authors would like to give thanks to the funding
agencies for providing financial support. Parts of this work
were supported by a research grant from Korean Bible
University. The authors also thank Robert Hotchkiss and
anonymous referees for their constructive remarks and valu-
able comments.
R
EFERENCES
[1] B.-K. Lee, “Unlock System and Method Using Bluetooth,”
Patent Kor 10-0 464 023, 2004.
[6] C.-Y. Lee, B. An, and H.-Y. Ahn, “Android based Local SNS,”
Institute of Webcating, Internet Television and Telecommunica-
tion, vol. 10, no. 6, pp. 93–98, 2010.
[8] D.-H. Kang, K.-H. Baek, and K.-Y. Kim, “Bluetooth Security
Technology,” Weekly Technology Trends, National IT Industry
Promotion Agency, vol. 1380, pp. 1–13, 2009.
IV. C ONCLUSION
This paper proposes a new remote lock system using
wireless communications. The remote lock system is a lock
system that can be controlled remotely by a dedicated
446