You are on page 1of 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/264508469

A Remote Lock System Using Bluetooth Communication

Conference Paper · July 2014


DOI: 10.1109/IMIS.2014.63

CITATIONS READS
7 4,856

4 authors, including:

Hae-Duck Joshua Jeong Jiyoung Lim


Korean Biblie University Korea University of Technology and Education
50 PUBLICATIONS   663 CITATIONS    23 PUBLICATIONS   312 CITATIONS   

SEE PROFILE SEE PROFILE

Wooseok Hyun
Korean Biblie University
12 PUBLICATIONS   71 CITATIONS   

SEE PROFILE

All content following this page was uploaded by Hae-Duck Joshua Jeong on 08 August 2014.

The user has requested enhancement of the downloaded file.


2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing

A Remote Lock System Using Bluetooth Communication

Hae-Duck J. Jeong, Jiyoung Lim and WooSeok Hyun∗ Woojin Lee


Department of Computer Software Information Security Laboratory
Korean Bible University Graduate School of Information
Seoul, South Korea Yonsei University
Email: hdjjeong@gmail.com, {jylim, wshyun}@bible.ac.kr Seoul, South Korea

Corresponding Author Email: lionheart07@naver.com

Abstract—As smartphones have recently become one of the remote lock system using wireless communications has
most popular devices worldwide, various convenient applica- solved these kinds of problems. Using the user’s smartphone,
tions are being released. Now smartphones not only provide the remote lock can be easily managed. Furthermore, the
the ordinary internal processes such as dialing or receiving
phone calls, sending text messages, and doing mobile banking proposed system can be extensively used for various remote
wherever we are, but they also are beginning to control locks such as remote locks for lockers, remote locks for
various other devices that are part of our lives. Through bicycles, etc.
the smartphone using mobile applications, we can remotely The remainder of this paper is organized as follows: In
control a variety of external devices such as TVs, projectors for
Section II, a few related products and technologies of the
presentations, computers, and even cars. This paper presents
the design and implementation of a remote lock system using proposed remote lock system using Bluetooth communica-
wireless communications. The remote lock system is a lock tion are discussed. Section III presents how the proposed
system that can be controlled remotely by a dedicated Android system using Bluetooth communication is designed and
application. The main function of the Android smartphone implemented, and finally the conclusions are described in
is equipped with Bluetooth so that a lock can be opened
Section IV.
and managed via the application functions. The users’ lock
information in real time can be stored and managed in the
database via a server that a server manager builds and II. R ELATED W ORK AND T ECHNOLOGIES
manages. Even though users forget the password, our proposed
lock system also guides them to find it easily, and provides Related products and technologies of the proposed remote
the user’s manual. Using this system, users can do a variety lock system using Bluetooth communication including An-
of management functions such as adding, deleting, modifying, droid are the following.
and purchasing the user’s own locks. Existing locks are classified into three types: the key lock
Keywords-Remote lock system; Bluetooth; mobile device; method, the password lock system, and the remote lock
Android; wireless communication method. The key lock is the oldest method used with locks,
and people may lose the key and should always carry it. In
I. I NTRODUCTION contrast to the key lock, the advantage of using a password
The number of mobile device users including smartphone lock is that people do not need to carry a key all the time,
users has rapidly been increasing in the world, and various but people are likely to forget the password and the number
convenient and useful smartphone applications have been of ways that the password can be changed is limited. The
developed. Now smartphones not only work the ordinary remote control lock, like the key lock, has the disadvantage
internal processes such as dial and receive phone calls, send that people should always carry the remote control key, and
text messages, and do mobile banking wherever we are, but batteries are required.
they also are coming to control various other devices in To improve these kinds of problems, a previous patent [1]
our real everyday lives. Through smartphones and mobile proposed technology of an unlocking system using Bluetooth
applications, we can remotely control a variety of external is proposed. The structure of this system consists of three
devices such as TVs, projectors for presentations, computers, steps as follows:
and even cars. Step 1. A mobile terminal sends an address to a Bluetooth
People normally use ordinary locks with keys or locks device that we want to control, and the corresponding
having their passwords. However, these locks have a few Bluetooth device registers the received address on the
shortcomings such as people losing keys or forgetting pass- unlocked address.
words. In this paper, we propose a new remote lock system Step 2. In accordance with the external keys, the search of the
using wireless communications since these kinds of remote Bluetooth device list that the above-mentioned mobile
lock products and patents can rarely be found. Our proposed terminal has registered, then connects the selected

978-1-4799-4331-9/14 $31.00 © 2014 IEEE 441


DOI 10.1109/IMIS.2014.63
B. Bluetooth
Bluetooth is fairly simple to use and can be used to
connect up to seven devices at a time. It is also easy to switch
between devices or find and connect to any device. Bluetooth
devices, such as mobile phones, a mouse, keyboards, office
and industrial automation devices operate in the frequency
domain between 2.4 GHz and 2.4835 GHz that is not
authenticated. To avoid the interference of devices operating
in the same zone, using a frequency hop algorithm, the
device uses a frequency of 1600 per second. This device
operates for a certain frequency, called time slot, and it lasts
for 625 microseconds. Piconet1 internal frequency based on
the pseudo-random hop frequency is changed by the master
unit. Frequency band is divided into 79 channels in the area
of 1 MHz, and the data is transmitted in units of frames.
Figure 1. Whole system architecture for the remote lock system. Two different kinds of links can be established be-
tween master/slave devices in the network: the Asyn-
chronous Connection-Less (ACL) link and the Synchronous
Bluetooth device from a user, and sends out the Connection-Oriented (SCO) link as follows: The first tech-
Bluetooth address by wireless. nique is a data transfer method that is controlled when the
Step 3. After judging whether the Bluetooth address by wire- data is needed so that it can be processed. A slave unit and a
less received from the above-mentioned mobile termi- master unit are connected to the ACL link only. The second
nal is the same registered address or not, then when connection method is used when real time data such as voice
two addresses are the same, the lock/unlock action is data is necessary to transmit. The slave unit to the master
performed. unit is connected to up to three SCO links possible, and is
Such a system, however, has a few disadvantages. implemented at the rate of 64kb / sec.
When Bluetooth information is leaked by hacking, a non- Bluetooth devices can be defined as three groups: class
authorized person can unlock the lock. Another disadvantage 1 (100mW, 100m range), class 2 (2.5mW, 10m range), and
is that in case of such a system, if the user loses the class 3 (1mW, 1m range). Most of Bluetooth devices belong
password, unlocking will be difficult. Several objectives of to a group of class 2 or class 3. HC-06 in Figure 1, which
our proposed system are taken into account to improve and is used in the remote lock, belongs to class 2.
solve discussed problems as follows: First, because mobile 1) Pairing Procedure between Bluetooth Devices: Blue-
devices that all the users carry have become a key, users tooth pairing and connection is technology that can transmit
do not have to carry a separate key or remote control, data, while Bluetooth enabled devices are connected. Figure
and it is easy to use. Second, since the user’s application 2 shows a Bluetooth connection procedure as follows.
provides a way to easily manage the user’s passwords, the ∙ To be connected to a Bluetooth device, connection
user can make things less of a burden when forgetting the information such as device name and address is needed,
password. Third, even when the user loses a password, there and in order to know this, the counterpart device shall
is a procedure so that the user can open the lock. The be allowed.
last objective is provided by the remote lock system using ∙ Through search, query the Bluetooth information that
the wireless communication equipped with multiple safety can be connected.
locks. ∙ Select the destination of the Bluetooth information that
can be connected, and request pairing (task to share
A. Android
password that is necessary to connect).
Android is a Linux-based open mobile platform for mo- ∙ If there has not been pairing, the two devices request
bile devices such as smartphones and tablet computers. It pairing approval.
is composed of not only an operating system, but also ∙ When the two devices approve pairing, try to accept
middleware, User Interface (UI), browser, and application. the connection.
It also includes C/C++ libraries that are used in components
1 A piconet is a network that is created using a wireless Bluetooth
of various Android systems [2], [3]. Android system archi-
connection and is formed when two or more devices discover each other and
tecture is divided into five hierarchical categories: applica- begin to communicate. A piconet can have up to seven devices, with one
tions, application framework, libraries, Android runtime, and device acting as a master and the rest acting as slaves. The first device to
Linux kernel [4], [5], [6]. Figure 1 shows that the proposed initiate transmission becomes the master, although the specification provides
for a master and slave unit to exchange roles.
application was designed and developed on Android.

442
Figure 2. Bluetooth connection procedure. Figure 3. Configuration of the role of the Bluetooth security manager.

2) Bluetooth Security Manager: Bluetooth basically pro- there is a limit as to eavesdropping possibilities.
vides security services such as authentication, confidential- ∙ Security Mode 2 is a service level-enforced security
ity, and authorization. Bluetooth controls control rights for mode. The service access depends on devices as fol-
Bluetooth devices and services through a security manager lows: Trusted devices have unrestricted access to all ser-
at the link level. Figure 3 shows about relevance of the vices, fixed relationship to other devices, and untrusted
Bluetooth security manager. After Logical Link Control and devices generally have no permanent relationship and
Adaptation Protocol (L2CAP), which is used within the services that it has access to are limited.
Bluetooth protocol stack and is used to communicate over ∙ Security Mode 3 is the link level-enforced security
the host ACL link, receives connection requests, the security mode. Security is implemented by symmetric keys in
manager confirms whether the access has been done or a challenge-response system. Security implementations
not. The security manager determines whether the service in Bluetooth units are all the same.
database and the device database exist, and they are applied ∙ Security Mode 4 is a service level enforced security
to the appropriate authentication or encryption if there are. mode in which security procedures are initiated after
If the security manager authorizes to allow access to the link setup. Secure Simple Pairing (SSP) uses Elliptic
L2CAP, the connection setup is maintained [7]. Curve Diffie Hellman (ECDH) techniques for key ex-
The main features of the security manager are as follows: change and link key generation. ECDH is an anony-
information security management related to services, secu- mous key agreement protocol that allows two parties,
rity information management related to devices, questions each having an elliptic curve public-private key pair, to
and answers related to security of protocol and application establish a shared secret over an insecure channel.
security, and authentication and encryption performance. 4) Link Key Generation: A method of link key generation
3) Bluetooth Security Level: Bluetooth is divided into is not provided in the Security Mode 1, and there are two
trusted and untrusted devices. The trusted devices are au- methods in which link key generation is performed for
thorized devices, and the link key is stored. They are Bluetooth. Security Modes 2 and 3 use one method, while
defined as ”Trusted” in a database. The untrusted devices Security Mode 4 uses another.
are authenticated, and the link key is stored, but they are For Bluetooth, operating in Security Mode 2 or 3, two
not defined as ”Trusted” in a database. Bluetooth has three associated devices simultaneously derive link keys during
security functions to be applied in four modes [8], [9]. the initialization phase when users enter an identical PIN
∙ Security Mode 1 is a non-secure mode. A device will into one or both devices, depending on the configuration
not initiate any security. Only security at this level is by and device type. The PIN entry, device association, and key
the nature of the connection: data-hopping and short- derivation are depicted conceptually in Figure 4. Note that
distance. Bluetooth devices transmit over the unlicensed if the PIN is less than 16 bytes, the BD ADDR is used to
2.45GHz radio band, the same band used by microwave supplement the PIN value used to generate the initialization
ovens and cordless phones. All Bluetooth devices em- key. After initialization is complete, devices automatically
ploy data-hopping, which entails skipping around the and transparently authenticate and initiate the encryption
radio band up to 1600 times per second, at 1MHz procedure to secure the wireless link, if encryption is en-
intervals. Most connections are less than 10 meters, so abled. The PIN code used in Bluetooth devices can vary

443
Figure 6. HC-06 module.

Figure 4. Link key generation.

Figure 7. L9110 module.

D. HC-06 Module
Figure 5. M328-mini V1.0 module.
HC-06 Bluetooth slave module in Figure 6 is used to
connect with Bluetooth master devices such as a Bluetooth
dongle 2 or Android smartphone. When the power is sup-
between one and 16 bytes. The typical four-digit PIN may plied to the master module, search for the HC-06 Bluetooth
be sufficient for low-risk situations; a longer PIN should be slave module in the neighborhood and the slave module is
used for devices that require a higher level of security. directly connected.
SSP was introduced in Bluetooth for use with Security
Mode 4. SSP simplifies the pairing process by providing a
number of association models that are flexible in terms of E. L9110 Module
device input capability. SSP also improves security through
the addition of ECDH public key cryptography for protec- This module can control two DC motors or one two-phase
tion against passive eavesdropping and Man-In-The-Middle four-wire stepping motor. As two ports of blue terminal are
Attacks (MITM) during pairing. Security Mode 4 requires motor A and motor B ports, the DC motor is connected
Bluetooth services to mandate an authenticated link key, an to each port. Figure 7 shows a 6-pin header pins, which is
unauthenticated link key, or no security at all. connected to a digital pin of the Arduino, which is an open-
source electronics prototyping platform based on flexible,
easy-to-use hardware and software, to control the motor. For
C. M328-mini V1.0 Module controlling a DC motor A (A-1B, A-1A), 2 pins are needed
The M328-mini V1.0 module in Figure 5 is small size and for controlling a DC motor B (B-1B, B-1A), 2 pins
of 26 x 30 mm, and mounted AVR MEGA328P-20AU. are also needed. It should be noted that the PC USB port
This module is equipped with PWR-LED, RUN-LED, 6- supplies up to 500mA current.
PIN ISP, 16MHz XTAL, and USB2 Serial converters. This
system used the main Arduino compatible module to control 2 A device that is connected to a computer to allow access to wireless
a Bluetooth module and motor module. broadband or use of protected software.

444
III. I MPLEMENTATION AND R ESULTS is based on MySQL, and query statements that are
received from the server are run.
A. System Architecture of the Proposed System
∙ The mobile device stores a password for locking and
Our proposed remote lock system consists of a lock with unlocking the lock.
four main modules, a mobile device, and server computer.
The system provides seven operations to achieve the above B. Some Selected Menus
goals as follows. ∙ Figure 8 (a) shows the main menu that after starting the

∙ Our proposed system consists of four major modules:


application, the user enters the main menu and starts
motor, Bluetooth, main, and biometric modules. Plus, to communicate with the server. After the user brings
the lock is paired with Bluetooth communications with necessary data (the lock information which was regis-
a mobile device, and the mobile device also commu- tered, announcements, etc.) taken from the database in
nicates with a server. For remote locks, after removing the server, and the user temporarily stores them his/her
existing internal modules of the remote control lock device. Figure 8 (b) and Figure 9 (a) show unregistered
product with the remote controller, which is sold by lock menu that the lock is available to register, and
eBay in the United States, we renovated the lock lock information. After user’s Bluetooth searches for
product when developing our proposed remote lock his/her peripheral devices in a new registration menu,
system. For Android, Bluetooth socket connections for unregistered lock is retrieved. The user selects the
operating, the lock was programmed using Java and, retrieved lock and inputs user’s information, and its
socket communications with the server using sockets information is stored in the database. This information
were implemented to store, delete, and modify individ- is successfully stored, and completion message will be
ual users’ information. In other words, when using the shown on the menu.
applications, WiFi, Bluetooth, or 3G communications
should be available. The remote lock system provides
that the lock is connected with the main and biometric
modules for wireless communications.
∙ The application is running on a mobile device to
manage passwords sending and receiving between the
mobile device and the server. When the password
is authenticated by the Bluetooth module, the main
module of the lock operates the motor module through
wireless communications.
∙ The server can distinguish and classify each mobile
device, and each user can register each other. The
password entered by the user and the password hint (a) Main menu (b) Unregistered lock
that the user uses to log in are also registered. The Figure 8. Some of selected menus.
proposed remote lock system provides these roles via
wireless communications.
∙ When each user authentication through the biomet-
ric module and each password authentication through
Bluetooth are performed, respectively, our proposed
system provides that a control signal is delivered from
the main module to the motor module using a wireless
communication system.
∙ On top of that, this lock is equipped with an alarm
means and it shows when the Bluetooth pairs. When
locking and unlocking of the lock, the system provides
a sound function and lighting of the lamp.
∙ The server also grants a master number to each mobile
device, and if a person authenticates by himself/herself,
this system shows the master number in the mobile (a) Lock information input (b) Password input
device. The server is linked with a database, when the Figure 9. Some of selected menus (Continued).
data transfer request from the client receives, depending
on the input received instructions, it will work in ∙ Figure 9 (b) and Figure 10 (a) show password request
conjunction with the database. Our proposed system and ’Open’ button creation after connecting the lock.

445
This menu retrieves the lock through Bluetooth, and the Android application. The main function of the Android
user enters a password. If the information is correctly smartphone is equipped with Bluetooth so that a lock can
entered, the device and Bluetooth will be connected. be opened and managed via the application functions. Users’
When ’Open’ button is touched, the lock is opened. lock information in real time can be stored and managed in
Figure 11 also show a sequence diagram of the regis- the database via a server that a server manager builds and
tered lock retrieval. manages. In addition, even though users forget the password,
∙ Figure 10 (b) shows list of registered lock, modification, our proposed lock system guides them to find it easily, and
and deletion dialog. This management page shows the provides the user’s manual. Using this system, users can do
list of the lock that the user has registered in the server. a variety of management actions such as adding, deleting,
Then when the user wants to change the information, modifying, and purchasing user’s own locks.
if input password is the same as the existing password,
ACKNOWLEDGMENT
the user can enter new information.
The authors would like to give thanks to the funding
agencies for providing financial support. Parts of this work
were supported by a research grant from Korean Bible
University. The authors also thank Robert Hotchkiss and
anonymous referees for their constructive remarks and valu-
able comments.
R
EFERENCES
[1] B.-K. Lee, “Unlock System and Method Using Bluetooth,”
Patent Kor 10-0 464 023, 2004.

[2] I. Darwin, Android Cookbook


. O’Reilly Media, Inc., 2012.
[3] Android, “Android Operating System, Wikipedia,”
(a) Connection (b) Select modification or http://en.wikipedia.org/wiki/Android OS.
deletion
Figure 10. Some of selected menus (Continued). [4] J. Aguero, M. Rebollo, C. Carrascosa, and V. Julian, “Does
Android Dream with Intelligent Agents?”
Computing, vol. 50, pp. 194–204, 2009. Advances in Soft

[5] A. Agarwal, K. Wardhan, and P. Mehta, “JEEVES -


A Natural Language Processing Application for Android,”
http://www.slideshare.net, 2012.

[6] C.-Y. Lee, B. An, and H.-Y. Ahn, “Android based Local SNS,”
Institute of Webcating, Internet Television and Telecommunica-
tion, vol. 10, no. 6, pp. 93–98, 2010.

[7] J.-K. Baek, “A Study of Security Vulnerability Bluetooth


Environment,” Master’s thesis, Soongsil University, 2011.

[8] D.-H. Kang, K.-H. Baek, and K.-Y. Kim, “Bluetooth Security
Technology,” Weekly Technology Trends, National IT Industry
Promotion Agency, vol. 1380, pp. 1–13, 2009.

[9] K. Scarfone and J. Padgette, “Guide to Bluetooth Security,”


NIST Special Publication 800-121, 2008.

Figure 11. A sequence diagram of the registered lock retrieval.

IV. C ONCLUSION
This paper proposes a new remote lock system using
wireless communications. The remote lock system is a lock
system that can be controlled remotely by a dedicated

446

View publication stats

You might also like