You are on page 1of 81

OTP Based Smart Wireless Locking System Using ESP 8266

LITERATURE
SURVEY

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 1


OTP Based Smart Wireless Locking System Using ESP 8266

PAPER 1
Password Protected Locking System Using Arduino

This paper appears in: BIJIT - BVICAM’s International Journal of Information


Technology Bharati Vidyapeeth’s Institute of Computer Applications and Management
(BVICAM), New Delhi (INDIA)

Date of Publication: August 2015


Author(s): Sriharsha B S1 , Zabiullah2 , Vishnu S B3 and Sanju V4.

Abstract: In this current situation, the degree of security is feeble. So there is a lot of
robbery, theft going on in and around the world. So, people fear to keep any of their valuables
in their homes. Henceforth, many people prefer to keep it in banks. However, in this insecure
world even banks are not too safe enough to satisfy people needs. A common man feels his
valuables are secured if there is efficiency in security. Hence this project can give effective
security in minimal cost.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 2


OTP Based Smart Wireless Locking System Using ESP 8266

PAPER 2
Smart Door Lock System: Improving Home Security using
Bluetooth Technology

This paper appears in: International Journal of Computer Applications

Date of publication: February 2017


Author(s): Jayant Dabhade, Amirush Javare, Tushar Ghayal.

Abstract: In today's world, smart home control system is necessary in daily life. As the
technology is emerging a lot it's time for us to be more technical related to home secure
security and easy access to the user. This technique basically deals with key less door lock
system using smart phone in which SMS, E-mail, Image, anti-burglar will be used and for
guest users it will generate b-id. This will allow the guest user key to access the door for a
given particular time only. The system also includes motion detectors that will help to
determine the user. If an unauthorized person is trying to access the door, then camera will
take snaps of user at the door. These snaps will be sent to owner. Furthermore, this approach
can be applied and extended to different institutions like banks and offices..

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 3


OTP Based Smart Wireless Locking System Using ESP 8266

PAPER 3
GSM Based Door Lock System

This paper appears in: International Journal of Innovative Technology and Exploring
Engineering (IJITEE)

Date of Publication: April 2019


Author(s): A. Najma, B. Mohana, A. MohanBabu.

Abstract: In this work, we analyzed the door lock and unlock system using GSM. Today's
world be it offices, laboratories, school or home the first thing which concern is the security.
In order to make your data, money, premises and personal belonging safe and secured from
unauthorized person. This paper represents a GSM based door lock system to controlling of
door lock by short message service. In this security system we are using ARDUINO
microcontroller, GSM module, Keypad, LCD display, Motor drive, DC motor and Buzzer.
Interface Matrix Keypad is the main aspect of the project. ARDUINO microcontroller is
controlling the whole driver unit. It is used for communication. The GSM system for sending
the alert message on mobile for unsuccessful attempts of password. A keypad module is used
for entering the password for authentication. Once the password entered is incorrect the
unsuccessful message will be displayed on the LCD screen. GSM module gets triggered and
the registered user gets a message, the buzzer connected will be initiated to alert the people or
the security official in the surroundings.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 4


OTP Based Smart Wireless Locking System Using ESP 8266

PAPER 4
Finger Print Based Bank Locker Security System

This paper appears in: International Journal of Engineering Research & Technology
(IJERT) ISSN: 2278-0181

Date of Publication: November 2018

Author(s): Pooja K M, Chandrakala K G, Nikhitha M A.

Abstract: — The main goal of this project is to design and implement a bank locker
security system based on Finger print and OTP technology. This can be organized in bank,
offices and homes. In this system only the authenticate person recover the documents or
money from the lockers. In this security system fingerprint and OTP is used. In this system
first person enroll user name and password and mobile number. If user name and password
matches then Finger of person will detect and store with ID. If the ID gets matches. Then four
digit code will be sent on authorized person mobile to unlock. So biometric and Bluetooth
security is more advantages than other system. This system can also create a log containing
check in and checkout of each user along with basic information.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 5


OTP Based Smart Wireless Locking System Using ESP 8266

PAPER 5
DOOR CONTROLLER USING SMART CARD AND INTERACTIVE
CODE LOCK

This paper appears in: International Journal of Advanced Research in Computer Engineering
& Technology (IJARCET) Volume 5 Issue 2

Date of Publication: February 2016

Author(s): Tochukwu Churchill-Micheal Akubue Computer Science Department, Enugu


State Polytechnic, Iwollo

Abstract:. Security and user access are very important aspect of our everyday life. The
world having attained its level of digitalization requires a smart way of door access and
control. This work models a door that reads and validates a smart card and then enables a
digital display and keypad if the validation is successful. To further authenticate the bearer of
the smart card, an interactive code is required within 1 minute of smart card validation to
complete the door unlocking process. The door automatically closes after 30 seconds once
opened. Further research areas: database to tag each entrance to a particular user, deactivation
of the keypad and screen after a minute of smart card validation and yet no pass code input.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 6


OTP Based Smart Wireless Locking System Using ESP 8266

PAPER 6
ELECTRONIC LOCK USING OTP AND ALERT
SYSTEM
This paper appears in: International Journal of Recent Trends in Engineering &
Research (IJRTER) Conference on Electronics, Information and Communication Systems
(CELICS’17).

Date of Publication: March 2017


Author(s): Dr. K. Kalamani , M. Keerthimalikaa , M. Maxel Denief , B. Nandhini , R. D.
Preethi

Abstract: The main purpose of this paper is to design and implement advance locker
security system. In today’s materialistic world, security holds an in dispensable place. There
is a need of security in almost every sector of society viz. offices, houses, banks etc. as thefts
and robberies are increasing day by day. To overcome this security threat, a security system
has been proposed using Controller and GSM technology. This system is basically a
microcontroller based access control system which allows only authorized person to access
the locker with GSM technology. This system activates, authenticates and validates the user
and then unlocks the door. A standalone system controller is used to generate random
password i.e., OTP whereas GSM technology is used to send the password to the authorized
person’s mobile phone via SMS. The locker opens as the motor rotates after the correct
passcode is pressed in the keypad.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 7


OTP Based Smart Wireless Locking System Using ESP 8266

PROJECT OVERVIEW

Introduction: With the development of the Internet, Various methods have been developed
for network security techniques to ensure the safety of network hacking techniques. There is a
firewall to protect the trojan horse, hacking tools and viruses that threaten the security of the
user's mobile phone. However, the authentication of users on mobile phone has not been done
properly. The OTP(One Time Password) dynamic authentication has been focusing on the
authentication method by using the password and user account for the user authentication
method on this mobile phone.
Problem: Existing access control system, which is one of the digital door-lock card reader,
is using a lot of ways. For example, school officials use issued RFID cards on college
campuses. Thus Digital Door Lock on the Access Control System using OTP-based User
Authentication authorized RFID cards are issued only to a few persons who have the right to
be given access. In particular, the students who want to use the facilities such as classrooms
and laboratories must have permission to use from the administrator to take control of
opening and closing the door. The following are some of the discomfort. First, students must
be approved by the administrator on each time when they use the facility on campus. If
students who want to use the facility, they need to go directly, and administrators must open
and close the lab or classroom. In such a case, the student and administrator spend
unnecessary time. Second, the administrator absence, students will have to wait a lot of time,
or do not use the lab or classroom. In this paper, we propose the access management system
that combines OTP input method with card input method to solve some drawbacks of current
access control system.
Solution: The main objective is to design secure lock using the advance algorithm like
AES. Designing secured door lock to prevent unwanted access in the server room. To give the
user hassle free access without compromising security. To give the user hassle free access
without compromising security.
The approach: The door-lock OTP compares the received two values OTP, then performs
functions that are responsible for the opening and closing command transmission of digital
door-lock. Digital door-lock number input method are responsible for providing unique
number and OTP value input.
Conclusion: Our proposed system have solved the problem of loss or theft in current
access control system by using OTP value on user’s mobile phone. The installation cost is
cheap and it is a guarantee to secure for multi users to access management system.
DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 8
OTP Based Smart Wireless Locking System Using ESP 8266

INTRODUCTION
TO
EMBEDDED
SYSTEM

WHAT IS EMBEDDED SYSTEM?


DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 9
OTP Based Smart Wireless Locking System Using ESP 8266

System: A system is an arrangement in which all its unit assemble work together according
to a set of rules. It can also be defined as a way of working, organizing or doing one or many
tasks according to a fixed plan. For example, a watch is a time displaying system. Its
components follow a set of rules to show time. If one of its parts fails, the watch will stop
working. So we can say, in a system, all its subcomponents depend on each other.

Embedded system: As its name suggests, Embedded means something that is attached to
another thing. An embedded system can be thought of as a computer hardware system having
software embedded in it. An embedded system can be an independent system or it can be a
part of a large system. An embedded system is a microcontroller or microprocessor based
system which is designed to perform a specific task. For example, a fire alarm is an
embedded system; it will sense only smoke.

An embedded system has three components:

 It has hardware.
 It has application software.
 It has Real Time Operating system (RTOS) that supervises the application software
and provide mechanism to let the processor run a process as per scheduling by
following a plan to control the latencies. RTOS defines the way the system works. It
sets the rules during the execution of application program. A small scale embedded
system may not have RTOS.

So we can define an embedded system as a Microcontroller based, software driven, reliable,


real-time control system.

Characteristics of an Embedded System:

 Single-functioned – An embedded system usually performs a specialized operation


and does the same repeatedly. For example: A pager always functions as a pager.
 Tightly constrained – All computing systems have constraints on design metrics,
but those on an embedded system can be especially tight. Design metrics is a measure
of an implementation's features such as its cost, size, power, and performance.It must
be of a size to fit on a single chip, must perform fast enough to process data in real
time and consume minimum power to extend battery life.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 10


OTP Based Smart Wireless Locking System Using ESP 8266

 Reactive and Real time – Many embedded systems must continually react to
changes in the system's environment and must compute certain results in real time
without any delay. Consider an example of a car cruise controller; it continually
monitors and reacts to speed and brake sensors. It must compute acceleration or
deaccelerations repeatedly within a limited time; a delayed computation can result in
failure to control of the car.
 Microprocessors based – It must be microprocessor or microcontroller based.
 Memory – It must have a memory, as its software usually embeds in ROM. It does
not need any secondary memories in the computer.
 Connected – It must have connected peripherals to connect input and output
devices.
 HW-SW systems – Software is used for more features and flexibility. Hardware is
used for performance and security.

Advantages

 Easily Customizable
 Low power consumption
 Low cost
 Enhanced performance

Disadvantages

 High development effort


 Larger time to market

COMPONENTS OF EMBEDDED SYSTEM:

 It has Hardware Processor, Timers, Interrupt controller, I/O Devices, Memories, Ports,
etc.
 It has main Application Software Which may perform concurrently the series of tasks
or multiple tasks.
 It has Real Time Operating System (RTOS) RTOS defines the way the system work.
Which supervise the application software. It sets the rules during the execution of the
application program. A small scale embedded system may not need an RTOS.
DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 11
OTP Based Smart Wireless Locking System Using ESP 8266

EMBEDDED SYSTEM HARDWARE:

Fig1: Embedded system Hardware


CLASSIFICATIONS OF EMBEDDED SYSTEM:
1. Small Scale Embedded System
2. Medium Scale Embedded System
3. Sophisticated Scale Embedded System

SMALL SCALE EMBEDDED SYSTEM


 Single 8 bit or 16bit Microcontroller.
DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 12
OTP Based Smart Wireless Locking System Using ESP 8266

 Little hardware and software complexity.


 They May even be battery operated.
 Usually “C” is used for developing these system
 The need to limit power dissipation when system is running continuously.
Programming tools: Editor, Assembler and Cross Assembler.
MEDIUM SCALE EMBEDDED SYSTEM
 Single or few 16 or 32 bit microcontrollers or Digital Signal Processors (DSP) or
Reduced Instructions Set Computers (RISC).
 Both hardware and software complexity.
Programming tools: RTOS, Source code Engineering Tool, Simulator, Debugger and
Integrated Development Environment (IDE).
SOPHISTICATED EMBEDDED SYSTEM
 Enormous hardware and software complexity
 Which may need scalable processor or configurable processor and programming
logic arrays.
 Constrained by the processing speed available in their hardware units.
Programming Tools: For these systems may not be readily available at a reasonable cost or
may not be available at all. A compiler or retargetable compiler might have to be developed
for this.

EMBEDDED SYSTEM PROCESSOR:


Processor is the heart of an embedded system. It is the basic unit that takes inputs and
produces an output after processing the data. For an embedded system designer, it is
necessary to have the knowledge of both microprocessors and microcontrollers.

Processors in a System:
A processor has two essential units:
 Program Flow Control Unit (CU)
 Execution Unit (EU)
The CU includes a fetch unit for fetching instructions from the memory. The EU has circuits
that implement the instructions pertaining to data transfer operation and data conversion from
one form to another. The EU includes the Arithmetic and Logical Unit (ALU) and also the
circuits that execute instructions for a program control task such as interrupt, or jump to

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 13


OTP Based Smart Wireless Locking System Using ESP 8266

another set of instructions. A processor runs the cycles of fetch and executes the instructions
in the same sequence as they are fetched from memory.
Types of Processors:
Processors can be of the following categories:
 General Purpose Processor (GPP)
 Microprocessor
 Microcontroller o Embedded Processor
 Digital Signal Processor o Media Processor
 Application Specific System Processor (ASSP)
 Application Specific Instruction Processors (ASIPs)
 GPP core(s) or ASIP core(s) on either an Application Specific Integrated Circuit
(ASIC) or a Very Large Scale Integration (VLSI) circuit.
MICROPROCESSOR
A microprocessor is a single VLSI chip having a CPU. In addition, it may also have other
units such as coaches, floating point processing arithmetic unit, and pipelining units that help
in faster processing of instructions. Earlier generation microprocessors’ fetch-and-execute
cycle was guided by a clock frequency of order of ~1 MHz. Processors now operate at a
clock frequency of 2GHz.

Fig2: block diagram of Microprocessor

MICROCONTROLLER
A microcontroller is a single-chip VLSI unit (also called microcomputer) which, although
having limited computational capabilities, possesses enhanced input/output capability and a
number of on-chip functional units.
DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 14
OTP Based Smart Wireless Locking System Using ESP 8266

CPU RAM ROM

SERIAL COM
I/O PORT TIMER PORT

Microcontroller chip

Microcontrollers are particularly used in embedded systems for real-time control applications
with on-chip program memory and devices.

VARIOUS MICROCONTROLLERS
INTEL 8031,8032,8051,8052,8751,8752
PIC 8-bit PIC16, PIC18, 16-bit DSPIC33 / PIC24, PIC16C7x
Motorola MC68HC11

MICROPROCESSOR MICROCONTROLLER
The functional blocks are ALU, registers, It includes functional blocks of
timing & control units. microprocessors & in addition has timer,
parallel i/o, RAM, EPROM, ADC & DAC.

Bit handling instruction is less, One or two Many type of bit handling instruction.
type only

Rapid movements of code and data between Rapid movements of code and data within
external memory & MP MC.

It is used for designing general purpose They are used for designing application
digital computers system. specific dedicated systems.

EMBEDDED PROCESSOR
 Special microprocessors & microcontrollers often called, Embedded processors.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 15


OTP Based Smart Wireless Locking System Using ESP 8266

 An embedded processor is used when fast processing fast context-switching & atomic
ALU operations are needed.
 Examples: ARM 7, INTEL i960, AMD 29050.

DIGITAL SIGNAL PROCESSOR


 DSP as a GPP is a single chip VLSI unit.
 It includes the computational capabilities of microprocessor and multiply &
accumulate units (MAC).
 DSP has large number of applications such as image processing, audio, video &
telecommunication processing systems.
 It is used when signal processing functions are to be processed fast.
 Examples: TMS320Cxx, SHARC, Motorola 5600xx
APPLICATION SPECIFIC SYSTEM PROCESSOR (ASSP)
 ASSP is dedicated to specific tasks and provides a faster solution.
 An ASSP is used as an additional processing unit for running the application in place
of using embedded software.
 Examples : IIM7100, W3100A
MULTI PROCESSOR SYSTEM USING GPPs
 Multiple processors are used when a single processor does not meet the needs of
different task.
 The operations of all the processors are synchronized to obtain an optimum
performance.
OTHER HARDWARE
 Power Source
 Clock Oscillator
 Real Time Clock (RTC)
 Reset Circuit, Power-up Reset and watchdog timer Reset
 Memory
 I/O Ports, I/O Buses
 Interrupt Handler
 DAC and ADC
 LCD and LED Display

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 16


OTP Based Smart Wireless Locking System Using ESP 8266

 Keypad/Keyboard
SOFTWARE
SOFTWARE: C C++ Dot Net
SIMULATOR: Masm
COMPILER: RIDE KEIL

APPLICATIONS:

 Household appliances: Microwave ovens, Television, DVD Players & Recorders


 Audio players

 Integrated systems in aircrafts and


missiles

 Cellular telephones

 Electric and Electronic Motor


controllers

 Engine controllers in automobiles

 Calculators

 Medical equipments

 Videogames
Digital musical instruments, etc

Fig3: Application Of Embedded System

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 17


OTP Based Smart Wireless Locking System Using ESP 8266

DOOR
LOCKING
SYSTEM

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 18


OTP Based Smart Wireless Locking System Using ESP 8266

DOOR LOCKING SYSTEM:

INTRODUCTION

Security represents protection of our life and assets. Ensuring safety of peoples and their
valuable things is very important for the prevention of illegal handling. Hence, mainly
focusing on door lock security or gate security is very important to avoid the further problems
in monitored area. Even with the use of mechanical locks, the crime, robberies get happened
due to the fact that such locks were easily broken. So, there is a need to invent other kind of
locks which cannot be easily broken. So, many authors present different kinds of digital door
locks, automatic password based door locks, software based door locks etc. which have been
widely used in houses and offices.

The prevention of unauthorized entry into buildings through the main doors is done by using
ordinary, electronically operated locks, digital codes and biometrics technique like the finger
print technology or some are based on thumb printing only. Nowadays, advanced automatic
door security systems are available with the use of palmtop recognition systems face
recognition systems, face detection systems, wireless sensors, PIR sensors, RFID techniques,
smart cameras and many more that helps people to make their home or organizations secure
from long distance. Hence, people need not to be worry about the home security though they
are away from home. Doors are to keep people out. They are being made of metals not simply
wood any longer. The security sectors are experiencing variousness as it has never seen
before. So, demand is to audit the authenticity of currently available systems and need is to
research for the creation of more reliable and good systems which operate smartly with no
more efforts. The important thing is to provide higher security.

The technology of keys and locks remained the same for the last century while everything
else is evolving exponentially. So why not use current technologies and apply it with old ones
to build something new and innovative. Around 4000 years ago, the concept of Locks and
Keys were invented and until today, regardless of some minimal variation in security and
sustainability locks are installed in doors stimulated mechanically by the right key. Recently,
the Internet was enhanced, and everything was connected to it (phones, television, laptops,
tablets, cars and so on).

This was done because we wanted to make systems smarter in other term a more productive.
Why not do the same thing with Locks? Enhancing the locks mechanism by connecting them

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 19


OTP Based Smart Wireless Locking System Using ESP 8266

to the internet, making them more robust and productive. Today, the number of mobile device
users including smart phone users has rapidly been increasing worldwide, and various
convenient and useful smart phone applications have been developed. Now smart phones are
not only used to send and receive phone calls, send text messages and perform mobile
banking operations, but they also are used to control various other devices in our real
everyday lives. Through a mobile operating system and internal applications, we can
remotely control a variety of external devices such as TVs, projectors, computers, cars, etc.
People normally operate ordinary locks with keys or keyword locks such as a pin code.
However, these locks have few drawbacks such as misplacing keys or forgetting passwords.
Using smart phones, the remote lock can be easily managed. Furthermore, the proposed
system has wide range of applications and can be used for various types of locks and systems,
such as lockers, bicycles, cars, etc.

Smart-Lock- System is a complete reinvention of the standard Key-Door lock, where all the
digital keys are stored in a Digital Key chain kept on the owner as phone. Encrypted and
secured Smart-Lock-System can be connected to the Internet via internet cable (UTP) or
wirelessly (Wi-Fi). question paper from this semantically labelled question bank.

Various control systems have been designed over the years to prevent access to unauthorized
user. The main aim for providing locks for our home, school, office, and building is for
security of our lives and property. It is therefore important to have convenient way of
achieving this goal .

Automatic door system has become a standard feature on many different types of buildings
and homes. And they are becoming popular every day to develop effective electronic devices
which provide security. Home security has been a
major issue because of the increase in crime rate and everybody wants to take proper action
to prevent unauthorized user.

The micro controller based digital lock presented here is an access control system that allows
only authorized persons to access a restricted area, this system is the best suitable for corporate
offices, automated machine (ATM s) and home security.

Security represents protection of our life and assets. Ensuring safety of peoples and their
valuable things is very important for the prevention of illegal handling. Hence, mainly

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 20


OTP Based Smart Wireless Locking System Using ESP 8266

focusing on door lock security or gate security is very important to avoid the further problems
in monitored area .
Even with the use of mechanical locks, the crime, robberies get happened due to the fact that
such locks were easily broken. So, there is a need to invent other kind of locks which cannot
be easily broken. So, many authors present different kinds of digital door locks, automatic
password based door locks, software based door locks etc. which have been widely used in
houses and offices.
Due to the advancement in recent techniques, some door lock security systems are based on
microcontroller, GSM, GPS, many sensors, software like MATLAB, PROTEUS, biometrics
like face recognition, Iris scanner, RFID, Smart Card and password etc. Each system has their
own advantages and disadvantages. In most of systems, SMS technique is used for
communication so the system will become cost effective, more reliable and it will take less
time to deliver message. As security becomes major problem nowadays, the security
monitoring systems today needs to make use of the latest technology. In some papers, the
authors have presented door lock security monitoring system based on embedded and Zigbee
and sometimes the lock is protected by automatic password hence it could not easily hack by
hackers. Also the enhanced security systems are available based on android platform, wireless
techniques and embedded systems. A lot of modification takes places in various Door lock
security from the last few years, in next coming years many changes will takes place.

Door lock security systems are classified based on technology used as 1) smart card based,
2) RFID based, 3) Biometric based, 4) GSM based, 5) Password based, 6) Bluetooth based, 7)
Door phone based, 8) OTP based, 9) Social networking sites based, 10) Motion detector
based, 11) Smart Lock System using Wi-Fi Security ,12)VB based, 13) Combined system .

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 21


OTP Based Smart Wireless Locking System Using ESP 8266

Smart Card Based System

A model entryway security framework is intended to permit an authorized person for getting
a safe (without need of any key) entryway where valid card of smart RFID is necessary for
ensuring the pass of the door. Total control activity is performed by the microcontroller.

Security and user access are very important aspect of our everyday life. The world having
attained its level of digitalization requires a smart way of door access and control. This work
models a door that reads and validates a smart card and then enables a digital display and
keypad if the validation is successful. To further authenticate the bearer of the smart card, an
interactive code is required within 1 minute of smart card validation to complete the door
unlocking process. The door automatically closes after 30 seconds once opened. Further
research areas: database to tag each entrance to a particular user, deactivation of the keypad
and screen after a minute of smart card validation and yet no pass code input. All smartcards
comes with built-in chip(s) though some as originally implemented using light rays for its
analysis while some have a flash upgradeable firmware. The reader calculates the resistance
of the inserted card and sends to the microcontroller for validation. If the card is valid, access
password is demanded for and if a correct code is given, access to the door is gained.

This paper, therefore, presents the design analysis of a security lock system using pass code
and smartcard with the following design objectives:

 To gain access using the right code and remain locked if the right code is not entered.

 To start an alarm when the wrong code is entered more than two times.

 To retain a high level of exclusivity within the access control region.

 To reduce the number of intruders.

 To protect against unauthorized duplication of keys that operate hardware locks.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 22


OTP Based Smart Wireless Locking System Using ESP 8266

RFID Based Systems

These types of security systems used for digital door lock are utilizing inactive RFID tags
(passive). With the help of this, it ensures that only valid person can get entry. Such systems
are working in real time basic for opening the door in which user have to place the tag in
contact with RFID detector, then the entryway gets opens and in the central server the
registration data is stored with necessary data of the users. Attendance and person tracking is
possible by using such type of system. RFID Based Gate Access Security System which
points out authorized peoples and permits just them was effectively created by K.Srinivasa .
This system ought to have the capacity to minimize the trained or specialized human error
during secured door access. Latest RFID based door lock security system are based on
arduino platform with audio acknowledgement at the point when card put close to the RFID
module, it peruses the card data and it matches with the data stored in the program memory
and shows authorize/unauthorized entry. Arduino is also used by many other applications for
example A specific Arduino ATMEL processor can be used for sensing and recognition of
person , another example like ECG Parameter Identification and Monitoring as they have
open source platform.

Existing access control system, which is one of the digital door-lock card reader, is using a lot
of ways. For example, school officials use issued RFID cards on college campuses. Thus
Digital Door Lock on the Access Control System using OTP-based User Authentication
Seung-Soo Shin, Kun-Hee Han, Kwang-Yoon Jin 437 authorized RFID cards are issued only
to a few persons who have the right to be given access. In particular, the students who want to
use the facilities such as classrooms and laboratories must have permission to use from the
administrator to take control of opening and closing the door. The following are some of the
discomfort. First, students must be approved by the administrator on each time when they use
the facility on campus. If students who want to use the facility, they need to go directly, and
administrators must open and close the lab or classroom. In such a case, the student and
administrator spend unnecessary time. Second, the administrator absence, students will have
to wait a lot of time, or do not use the lab or classroom. Third, in the case of lost or stolen an
RFID card, a risk of theft occurring further if the place where it is possible people that are not
allowed to open and close freely.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 23


OTP Based Smart Wireless Locking System Using ESP 8266

Biometric Based System

The palmtop recognition is the next step for fingerprint recognition. It operates on the image
of palmtop. Firstly system takes an image of the palmtop then it works on that image by
partitioning it and process is required. At the end, verify the right person. Hence, it reduces
the chances of error in other human recognition methods and clarifies the problems which
were faced in the fingerprint recognition. The biometric technique is very useful in bank
lockers. Except fingerprint recognition the vein detector and iris scanner gives best and
accurate result so, in the bank security system , microcontroller continuously monitors the
Vein Detector and Iris Scanner through keypad authenticated codes. During night the wireless
motion detector will be active, if any variation occurs in its output, it will be sensed by the
controller and alert sounds will be given by it.

Recently, the fast based principal component analysis approach is proposed in which the
modification of principal component analysis approach for the face recognition and face
detection process is done. The image is captured by the web camera and it gets matched with
the image stored in the database. New advanced door lock security systems are available
based on the pattern of the human iris for providing a high level of security. And to make the
system more efficient n reliable the simulation is done in MATLAB.

The arrival of fast growing technologies makes users to have high security systems with
electronic identification options. These identification technologies include Bank Lockers and
ATM as well as other intelligent cards, user IDs and password based systems, and so on. But,
unfortunately these are not protected due to hacker attacks, thefts, and forgotten passwords.
In spite of all these faults or failure and malfunctions or crash these systems are still existing;
however, the biometric or fingerprint authentication based identification is the most efficient
and reliable solution for stringent security. Biometrics measure individual’s unique physical
or the characteristics to recognize or authenticate their identity The physical characteristics
are fingerprint hand, face, iris etc and the characteristics are signature, voice keystroke
patterns etc. Biometric system operates in verification mode or identification mode. In the
verification mode system validates person’s identity by comparing the captured biometric
template which is prestored in the system data base.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 24


OTP Based Smart Wireless Locking System Using ESP 8266

In the identification mode the system recognize an individual by searching entire template
data base for match. And the system performs one to many comparisons to establish the
individual identity or fails if the subject is not enrolled in the system data base. So in our
project we are using fingerprint security system.

Global system for mobile communication (GSM) is mainly used for sending or receiving data
such as voice and message. In our security system GSM plays important role. Through the
use of GSM the user will get the message if an unauthorized person will try to open the lock.
We are implementing this bank locker security system using fingerprint, password and GSM
Technology based security system which provide most efficient and reliable security system
than the traditional system.

Finger print processing includes two parts, fingerprint enrolment and fingerprint matching
(the matching can be 1:1 or 1: N). When enrolling, user needs to enter the finger two times.
The system will process the two time finger images, generate a template of the finger based
on processing results and store the template. When matching, user enters the finger through
optical sensor and system will generate a template of the finger and compare it with templates
of the finger library.

GSM Based Systems:

In many door lock security systems, GSM is used for communication purpose. The purpose
of a work cultivated by utilization of a circuits like a GSM module which gets activated by a
controller for sending SMS in emergency to proprietor and for sending corresponding
services of security at the time of break in. For detecting obstacles, the system requires
various sensors. It gathers data from the sensors and settles on a choice. With the help of
GSM module, sends SMS to a respective number.

A recently created model for security of door easily controlled like remote control operations
by a GSM hand set acts as the transmitter and the other GSM phone set with the DTMF
associated with the motor attached to door with the use of DTMF decoder, a stepper motor
and microcontroller unit. Nowadays people want to be secure though they are away from
home so, the work proposed by Jayashri Bangali . When the owner is not at his home,
security of home and important things is the big issue in front of all. Two frameworks were
created which depends on GSM based technology. For detection of the gate-crashes, it takes
place by capturing image through web camera.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 25


OTP Based Smart Wireless Locking System Using ESP 8266

When peoples are not at their homes, the system sends notification in terms of SMS to the
crisis number. A novel administrator based system can login without any stretch to the system
and can see guests record and listen their recorded messages and also automatically lock the
door using mobile communication technology.

GSM module is mainly used for mobile communication. GSM module is connected to
ARDUINO for sending and receiving of messages. SIM900 GSM module is used that
supports communication in 9000MHz band. This GSM module requires a 12V power supply.
The block of GSM modules are enabled by interfacing GSM modem to PCB and giving
outputs for RS232. The data can be feed from GSM module to ARDUINO UNO through the
output pins.

GSM Based Security System PIR sensor detects motion by sensing the difference in infrared
or radiant heat levels emitted by surrounding objects. The output of the PIR sensor goes high
when it detects any motion. The range of a typical PIR sensor is around 6 meters or about 30
feet. When the PIR sensor detects any motion, the output of the sensor is high. This is
detected by the Arduino. Then it communicates with the GSM module via serial
communication to make a call to the preprogrammed mobile number. An important point to
be noted about PIR sensors is that the output will be high when it detects motion.

A home security system with the GSM/GPRD technology services to achieve controlling of
door lock by short message service (SMS). ARDUINO is the microcontroller which controls
the whole driver unit. Keypad, GSM module Buzzer is connected to the microcontroller,.
ARDUINO board can be used as a tool to interchange information with a computer or other
microcontrollers. GSM system for sending the alert message to the mobile for three
unsuccessful attempts of password. At present time door security is the most important and so
we designed and implemented a digital door lock system which works in three different
modules. The Keypad module is used for entering the 4-digit password. GSM module is the
most secured mode in which the owner has to enter the password through his mobile via text
message to open or close the lock.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 26


OTP Based Smart Wireless Locking System Using ESP 8266

Password Based Systems:

The programmable electronic code lock device is programmed in such a way that it will
operates only with the correct entry of predefined digits. It is also called an integrated
combinational type lock.

Fig4: Programmable electronic code lock

Electronics safe is its example. Based on the programmable electronic code lock, the
reprogrammable digital door locks were invented in that the password can change any time as
it stored in PROM. For operating the device, GSM/CDMA module can be used. When any
person calls up from his phone, the call will be received by the system. And the door will
opens only if the call is from specified user.

A cellphone controlled password protected door lock system ,which was proposed to open the
door with the help of cell phone device by entering a specific code. The user can make a call
to a system‟s number. This call is responsible for opening or closing of the entry with the use
of correct password. In latest password based system, a more advanced system develops
which communicates the owner of the office or house, when any unauthorized person tries to
open the code, by giving correct code as well.

While closing the door of office/home, the owner has to press the „0 ‟ key available on the
hex keypad and leave the system. The system developed by Annie P. Oommen et. allows for

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 27


OTP Based Smart Wireless Locking System Using ESP 8266

changing the password. To open the lock, the entered password must matches with the
changed one.

In some systems the security dial-up enables through the GSM modem , when the
unauthorized person enters an invalid password then the controller informs to the owner
through GSM modem. Latest security system is designed where the locking security system
can be enhanced with the help of RF and GSM wireless technology by using a 4 digit
password which provides the authentication.

Bluetooth Based Systems:

Bluetooth based system is a bit like sarvy house innovations that utilizes Bluetooth function
available in smart devices. The framework using Bluetooth turns out to be more simple and
productive for proper utilization. Such systems are generally based on Arduino platform. The
hardware of such framework is the combo of android smart phone and Bluetooth module.
Arduino microcontroller here is acting as a controller and solenoid can be acting as output of
locking system. The use of Bluetooth technology in a smart phone today is not just for the
transfer of data and files only. In recent years, smart home automation is one of the
applications of Bluetooth technology. Bluetooth technology operate over unlicensed, its
available at 2.4GHz frequency, it also can link digital devices within a range of 10m to 100m
at the speed of up to 3Mbps but it depending on the Bluetooth device class .

With these qualifications of Bluetooth; we offer a door automation system based on


Bluetooth technology, especially in door automation system. Door lock system has been one
of the most popular consumer devices replacing many of the conventional locks because of
the user convenience and affordable price. Many of the wireless network solution such as
Bluetooth, ultra wide band (UWB), wireless Ethernet and many more are in the area of home
networking . From among these Bluetooth has become the most attraction technique in the
research and commercial domain. Bluetooth enables to develop various kind of wireless
system via handsets or smartphones. Research by using handset and actuator by remote
operation of various electrical devices at home. By pressing a single button on the handset, a
signal is sent to the actuator and subsequently switches On /Off the intended device. Since
Bluetooth has become so prevalent in mobile devices, it was seen as simple, low cost, secure
solution for wireless network connecting a mobile device to home network system. Smart

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 28


OTP Based Smart Wireless Locking System Using ESP 8266

digital door lock is a system to monitor and control several devices in the home. Our smart
digital door lock system operates over wireless sensor network.

It is a network of sensor nodes with digital door lock as sink node. The smart digital door
lock system can be divided into five parts: the control module (PC app), the sensor module,
the communication module (server) and the I/O module, Android application. The control
module is the brain of the system. The locking operation is controlled by the microcontroller.
The communication module is used to connect the devices and micro controller. The user can
access to the door lock system through I/O module. The I/O module is connected to micro
controller that will fetch the B-id from the user or visitor

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 29


OTP Based Smart Wireless Locking System Using ESP 8266

Fig5: Bluetooth system

Door Phone Based System:

The earlier system, a specific system in which identification of a visitant is done for the most
part by direct communication with the set of the housing estate concerned . A dialling up to
the sets over the handsfree telephone is created by the framework at the entryway. Visitors
enter inside through the gate by controlling the gate with the help of the telephone set. The
latest system is based on video door phone surveillance which is used to identify the visitors,
developed by Chau-Huang Wei.

The work utilized a novel powerline communication chip for build up a digital networked
video door phone. Moreover, they exchanged audio and visual information and upgraded the
passageway guarding capacities.

The objective of this work is to provide remote access to door lock and lighting system. The
obvious motivation for providing such a kind of remote access to door lock is to make homes
much more secure and enable us to remotely unlock or lock door for guests etc. This work
also ensures that the user need not worry about whether the door is left unlocked or not and
hence ensures peace of mind for the user. The remote lighting system allows user to remotely
control lighting i.e. switching it ON / OFF and also vary the intensity of light. This ensures
that electricity is never wasted even if the user forgets to switch off the lighting as it can be
remotely switched OFF.

The following figure shows the block diagram of proposed system which controls the door
locking and lighting system for the smart home using Internet of Things .The block diagram
consists of a GPRS module ,relays, a Microcontroller which is the heart of our proposed
system, a LCD display and a keypad.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 30


OTP Based Smart Wireless Locking System Using ESP 8266

Fig6: Door phone based system

For the proposed system, PIC MC is used as controller. As shown in the figure it is interfaced
with a LCD, Keypad, MAX232, Motor Driver and Relay Driver, GSM/GPRS. The keypad is
interfaced for the user to enter the password. Also the LCD is interfaced to display the
password and other visual details such as password correct/incorrect. When user enters
password from keypad then if the password is correct the door is opened. The light or any
devices are connected with relay in home. When user enters password from keypad then if
the password is correct the door is opened. The light or any devices are connected with relay
in home. If the user wants to switch ON/Off the plug device from anywhere the user can use
the internet and type the IP address and then the web page of device control is opened on
smart phone, laptop etc. Through GPRS the data is received in the system at home. For the
proposed system, PIC MC is used as controller. As shown in the figure it is interfaced with a
LCD, Keypad, MAX232, Motor Driver and Relay Driver, GSM/GPRS. The keypad is
interfaced for the user to enter the password. Also the LCD is interfaced to display the
password and other visual details such as password correct/incorrect. When user enters
password from keypad then if the password is correct the door is opened. The light or any
devices are connected with relay in home.
When user enters password from keypad then if the password is correct the door is opened.
The light or any devices are connected with relay in home.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 31


OTP Based Smart Wireless Locking System Using ESP 8266

If the user wants to switch ON/Off the plug device from anywhere the user can use the
internet and type the IP address and then the web page of device control is opened on smart
phone, laptop etc. Through GPRS the data is received in the system at home.

OTP Based Systems:

The proposed method in latest work does not need administrator‟s help to access the facility
if the user knows OTP technique and has a registered mobile phone,Likewise the OTP is
generated and sent to the proprietor‟s mobile phone whenever user requests to access facility.
Then the OTP should enter through keypad on the door, the door will open.

In case if the mobile is not available or off then the option to open the door is to answer the
security question ask by system.

Access management system of OTP-based is configured server ad OTP server, server control
door-lock, digital door-lock, and users. Server can generate OTP SEED or store user
information. OTP server provides a function to generate the value of the OTP based on OTP
SEED, and it transmits OTP value to user and control server.

The door-lock OTP compares the received two values OTP, then performs functions that are
responsible for the opening and closing commands transmission of digital door-lock. Digital
door-lock number input method are responsible for providing unique number and OTP value
input.

Social Networking Sites Based Systems :

A specific work, the digitalization and safety perspectives were accomplished by utilizing the
phone device and web camera. The model can empower a pin to close and open a door from
allotted region using SMS from a (social networking site) like Facebook, Whatsapp etc.

Recently, a new digital door lock system get designed which detects the unknown physical
contact of a visitant then immediately informs to the owner through the smart phone as
shown in . At the moment, if wrong password gets detected more than the specified times, the
system catches the picture of the unknown visitant and sends it to the owner through smart
device. In this manner, increases the strength of the security function.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 32


OTP Based Smart Wireless Locking System Using ESP 8266

With help of latest advanced technology, demonstration of an intelligent door system using
Internet of Things is given by S. Nazeem Basha . The system provides notification of
intrusion by sending out email notification to the owner. It logs all the intrusion data into
Google spread sheet of owner‟s Google drive account.

ADXL345 accelerometer detects the change in motion of the door and raspberry pi reads the
sensor intrusion data and to communicate to the Amazon Web Services Internet of Things
(AWS IoT) console. Similar to the Ardiuno, Raspberry Pi module used mostly as It is an
inexpensive computer that uses Linux-based operating system. It is also having open source
platform for using devices like GPIO, HDMI, 10/100 Ethernet and USB port etc. It is also
having slots for SD cards in which Linux raspberry package can be stored. It has large scope
in research and development in the field of automatic door lock systems.

Fig7: Social networking sites based system

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 33


OTP Based Smart Wireless Locking System Using ESP 8266

Motion Detector Based System:

The Motion Detector System working is based on the principle of amount of light falling on
the photodiode. At the point when the laser light is falling constantly on the photodiode, its
reading is 255 in decimals. But when it’s hindered by deterrent, the voltage falls less than 50
in decimals. This flames the alarm and gives notification to the owner about the break in. And
automatic lock can be activated.

A Smart Lock System using Wi-Fi Security:

In large apartment complexes, fraternities, or even for an owner having many keys for each
and every apartment, car, or gate he owns, maintaining entry to authorized personnel only is a
problem. Besides the costs involved in fabrication, duplication, and distribution of keys, there
are security problems in case of lost keys.

In this paper an innovative lock system prototype using todays technologies will be
presented. The novelty of this prototype relies on the fact that using new technologies along
with old ones will result in a smart and more efficient.

We propose a smart digital door lock system for any lock system. A digital door lock system
is any equipment that uses the digital information such as a secret code instead of the legacy
key system. In our proposed system, a Central Control module is embedded in the door itself,
this is required to prevent additional complications and more robust mechanism for the door
as a whole. Technically, this system embeds itself in the Local Area Network of the house.
This adds extra security layers and prevents access to the system only through the network.
Furthermore, the biggest advantage of the proposed system over existing ones is that it can be
easily installed with minimal requirement of infrastructures and planning.

VB Based System:

Electronic eyerepresents the model for capturing the door images with the help of
microcontroller to ensure the safety for offices and houses. In this system, the image gets
captured when the door is opened and these images are displayed by using VB application on
computing system.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 34


OTP Based Smart Wireless Locking System Using ESP 8266

Combined System:

The locker security system is as shown in Fig in view of RFID, FINGERPRINT,


PASSWORD and GSM technology containing door locking frameworks which can be
without much of a stretch, initiated, authenticated and validated by the authorized person. It
unlocks the locker door in real time manner.

Fig 8: Combined system

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 35


OTP Based Smart Wireless Locking System Using ESP 8266

PROteus
And
Arduino ide

PROTEUS:

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 36


OTP Based Smart Wireless Locking System Using ESP 8266

The Proteus Design Suite combines schematic capture, SPICE circuit simulation, and PCB
design to make a complete electronics design system. Add to that the ability to simulate
popular micro-controllers running your actual firmware, and you have a package that can
dramatically reduce your development time when compared with a traditional embedded
design process.

Integrated Package:

The Proteus Design Suite comprises a fully integrated EDA package with modules for
schematic capture (ISIS), circuit simulation (PROSPICE), PCB layout (ARES) and
embedded co-simulation (VSM). The simulation functions take place entirely within the
schematic editor whilst ISIS and ARES share a common, easy to use, Windows user
interface. All of which reduces the time it will take you to master the software. Naturally,
ISIS and ARES are themselves tightly integrated, offering both forward and backward
annotation and a unique Design Explorer which allows you to navigate and cross probe
between the schematic, netlist and PCB databases.

Modern User Interface

Much of the power of an application can be lost on its users if is difficult to learn, or hard to
use. On the one hand, newcomers to the package will give up if they cannot manage to
produce something fairly quickly whilst on the other hand, expert users tend to become
frustrated if they cannot do the things they have to do often as quickly and easily as possible.
In Proteus, we have addressed the first issue by making the editors work very much like the
standard Windows applications that every computer literate user is already familiar with. In
addition, detailed, graphical tutorials help the newcomer become productive as quickly as
possible. Meanwhile, the expert user will soon appreciate that the editors are largely
modeless. Objects can be placed, wired, moved, edited and deleted without having to switch
between several different modes. Finally, all users - beginner and expert alike - will
appreciate that detailed context sensitive help is never more than a mouse click away, whilst
expert technical help is no more than a phone call away.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 37


OTP Based Smart Wireless Locking System Using ESP 8266

The VSM Advantage

The Proteus Design Suite is wholly unique in offering the ability to co-simulate both high
and low-level microcontroller code in the context of a mixed mode SPICE circuit simulation.
With this Virtual System Modelling facility, you can transform your product design cycle,
reaping huge rewards in terms of reduced time to market and lower cost of development. If
one person designs both the hardware and software, then that person benefits because the
hardware design may be changed just as easily as the software design. In larger organizations
where the two roles are separated, the software designers can begin work as soon as the
hardware team have a produced a schematic; there is no need for them to wait until a physical
prototype exists.

Fig9:VSM advantage

ISIS (INTELLIGENT SCHEMATIC INPUT SYSTEM):

ISIS lies right at the heart of the PROTEUS system and is far more than just another
schematics package. It combines an exceptionally powerful design environment with the
ability to control most aspects of the drawing appearance. Whether your requirement is the
rapid entry of complex designs for simulation & PCB layout, or the creation of attractive
schematics for publication, ISIS is the tool for the job.
DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 38
OTP Based Smart Wireless Locking System Using ESP 8266

ARDUINO IDE:
Arduino is a prototype platform (open-source) based on an easy-to-use hardware and
software. It consists of a circuit board, which can be programed (referred to as a
microcontroller) and a ready-made software called Arduino IDE (Integrated Development
Environment), which is used to write and upload the computer code to the physical board.
The key features are:
 Arduino boards are able to read analog or digital input signals from different sensors
and turn it into an output such as activating a motor, turning LED on/off, connect to
the cloud and many other actions.
 You can control your board functions by sending a set of instructions to the
microcontroller on the board via Arduino IDE (referred to as uploading software).
 Unlike most previous programmable circuit boards, Arduino does not need an extra
piece of hardware (called a programmer) in order to load a new code onto the board.
You can simply use a USB cable.
 Additionally, the Arduino IDE uses a simplified version of C++, making it easier to
learn to program.
 Finally, Arduino provides a standard form factor that breaks the functions of the
micro-controller into a more accessible package.

Fig 10: Arduino board

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 39


OTP Based Smart Wireless Locking System Using ESP 8266

Arduino – Installation:
After learning about the main parts of the Arduino UNO board, we are ready to learn how to
set up the Arduino IDE. Once we learn this, we will be ready to upload our program on the
Arduino board. In this section, we will learn in easy steps, how to set up the Arduino IDE on
our computer and prepare the board to receive the program via USB cable.

Step 1: First you must have your Arduino board (you can choose your favorite board) and a
USB cable. In case you use Arduino UNO, Arduino Due milanove, Nano, Arduino Mega
2560, or Diecimila, you will need a standard USB cable (A plug to B plug), the kind you
would connect to a USB printer as shown in the following image.

Step 2: Download Arduino IDE Software. You can get different versions of Arduino IDE
from the Download page on the Arduino Official website. You must select your software,
which is compatible with your operating system (Windows, IOS, or Linux). After your file
download is complete, unzip the file.

Step 3: Power up your board. The Arduino Uno, Mega, Duemilanove and Arduino Nano
automatically draw power from either, the USB connection to the computer or an external
power supply. If you are using an Arduino Diecimila, you have to make sure that the board is
configured to draw power from the USB connection. The power source is selected with a
jumper, a small piece of plastic that fits onto two of the three pins between the USB and
power jacks. Check that it is on the two pins closest to the USB port. Connect the Arduino
board to your computer using the USB cable. The green power LED (labeled PWR) should
glow.

Step 4: Launch Arduino IDE. After your Arduino IDE software is downloaded, you need to
unzip the folder. Inside the folder, you can find the application icon with an infinity label
(application.exe). Double click the icon to start the IDE.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 40


OTP Based Smart Wireless Locking System Using ESP 8266

Step 5: Open your first project. Once the software starts, you have two options:

 Create a new project.


 Open an existing project example.
To create a new project, select File --> New.

To open an existing project example, select File -> Example -> Basics -> Blink.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 41


OTP Based Smart Wireless Locking System Using ESP 8266

Here, we are selecting just one of the examples with the name Blink. It turns the LED on and
off with some time delay. You can select any other example from the list.
Step 6: Select your Arduino board. To avoid any error while uploading your program to the
board, you must select the correct Arduino board name, which matches with the board
connected to your computer. Go to Tools -> Board and select your board.

Step 7: Select your serial port. Select the serial device of the Arduino board. Go to Tools ->
Serial Port menu. This is likely to be COM3 or higher (COM1 and COM2 are usually
reserved for hardware serial ports). To find out, you can disconnect your Arduino board and
re-open the menu, the entry that disappears should be of the Arduino board. Reconnect the
board and select that serial port.

Step 8: Upload the program to your board. Before explaining how we can upload our
program to the board, we must demonstrate the function of each symbol appearing in the
Arduino IDE toolbar.
A- Used to check if there is any compilation error.
B- Used to upload a program to the Arduino board.
C- Shortcut used to create a new sketch.
D- Used to directly open one of the example sketch.
E- Used to save your sketch.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 42


OTP Based Smart Wireless Locking System Using ESP 8266

F- Serial monitor used to receive serial data from the board and send the serial data to the
board.
Now, simply click the "Upload" button in the environment. Wait a few seconds; you will see
the RX and TX LEDs on the board, flashing. If the upload is successful, the message "Done
uploading" will appear in the status bar.
Bare minimum code:
setup: It is called only when the Arduino is powered on or reset. It is used to initialize
variables and pin modes.
loop: The loop functions runs continuously till the device is powered off. The main logic of
the code goes here. Similar to while (1) for micro-controller programming.
PinMode:
 A pin on arduino can be set as input or output by using pinMode function.
 pinMode(13, OUTPUT); // sets pin 13 as output pin
 pinMode(13, INPUT); // sets pin 13 as input pin

Reading/writing digital values:


 digitalWrite(13, LOW); // Makes the output voltage on pin 13 , 0v
 digitalWrite(13, HIGH); // Makes the output voltage on pin 13 , 5V
 int buttonState = digitalRead(2); // reads the value of pin 2 in buttonState

Libraries:
Libraries are a collection of code that makes it easy for you to connect to a sensor, display,
module, etc. For example, the built-in Liquid Crystal library makes it easy to talk to character
LCD displays. There are hundreds of additional libraries available on the Internet for
download.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 43


OTP Based Smart Wireless Locking System Using ESP 8266

METHODOL
OGY

Wireless Technology:

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 44


OTP Based Smart Wireless Locking System Using ESP 8266

The term wireless communication refers to the transfer of information using electromagnetic
(EM) or acoustic waves over the atmosphere rather than using any propagation medium that
employs wires. Not requiring an explicit network of wires and permitting communication
while on the move.

Current Wireless Systems

• Cellular Systems

• Wireless LANs

• WIMAX

• Satellite Systems

• Paging Systems

• Bluetooth

• Ultrawideband Radios

• Zigbee Radios

RFID TECHNOLOGY:

Radio frequency identification, or RFID, is a generic term for technologies that use radio
waves to automatically identify people or objects. There are several methods of identification,
but the most common is to store a serial number that identifies a person or object, and
perhaps other information, on a microchip that is attached to an antenna (the chip and the
antenna together are called an RFID transponder or an RFID tag). The antenna enables the
chip to transmit the identification information to a reader. The reader converts the radio
waves reflected back from the RFID tag into digital information that can then be passed on to
computers that can make use of it.

An RFID system consists of a tag, which is made up of a microchip with an antenna, and an
interrogator or reader with an antenna. The reader sends out electromagnetic waves. The tag
antenna is tuned to receive these waves.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 45


OTP Based Smart Wireless Locking System Using ESP 8266

A passive RFID tag draws power from field created by the reader and uses it to power the
microchip’s circuits. The chip then modulates the waves that the tag sends back to the reader
and the reader converts the new waves into digital data.

Password Based Door Lock System is designed using ARDUINO UNO where in once the
correct code or password is entered, the door is opened and the concerned person is allowed
access to the secured area. Password Based Door Lock System using Arduino UNO is a
simple project where a secure password will act as a door unlocking system. Old fashioned
lock systems use mechanical locking and these can be replaced by new advanced techniques
of locking systems. These methods are a combination of mechanical and electronic devices
and are highly intelligent. One of the distinct features of these intelligent lock systems is their
simplicity and high efficiency. Such an automated lock system consists of electronic control
assembly, which controls the output load through a password. The example of this output
load can be a motor or a lamp or any other mechanical/electrical load.

Here, we made an electronic code lock system using Arduino UNO, which provides control
to the actuating the load. It is a simple embedded system with takes input from the keyboard
and the output being actuated accordingly. This system demonstrates a Password based Door
Lock System using Arduino UNO, wherein once the correct code or password is entered, the
door is opened and the concerned person is allowed access to the secured area. If another
person arrives, it will ask to enter the password again. If the password is wrong, then door
would remain locked, denying access to the person.

Main idea behind this project is of a door-latch opening using a password entered through
keypad. User can modify this password anytime he/she wishes using a keypad. The main
component in the circuit is Arduino UNO which is basically used to send a text message to
owner of the house about the breach of security.4*4 keypad is used to enter the password.
The entered password is compared with the known password. If it is correct password, the
system opens the door by servo motor and displays the status of door on LCD. If the
password is wrong then door remains closed and displays “WRONG PASSWORD” on LCD.

The device is a system to lock and unlock the door. Rather than using a key, it uses a
command that is delivered digitally via Bluetooth on Smartphone and other mobile devices.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 46


OTP Based Smart Wireless Locking System Using ESP 8266

The use of electronic lock using Bluetooth on Android smart phones in addition to providing
ease of use, also provide better security than conventional key. The system designed to
simulate an electronic key, which is controlled through a Bluetooth-enabled smart phone.
Controlling conducted by sending a command via Bluetooth to the Arduino circuit that acts as
a connection between Android smart phone and solenoid.

Solenoid door lock is the electronic device that made for door lock and often use for
automatic door locks. Solenoid will operate if the system has a voltage. The average of the
solenoid door lock is 12 volt. In normal condition, the lever will be Normally Closed. If there
is any voltage through the solenoid, it will unlock the door. Usually the solenoids combine
with electric key lock system with RFID and password. In our research we combine solenoid
door lock with Bluetooth-based smart phone.

HARDWARE ARCHITECTURE AND IMPLEMENTATION

There are several step in hardware design, i.e.

 The design of Arduino Uno circuit


 The design of Bluetooth circuit
 The design of Solenoid door lock circuit
 The design of LED circuit
 The design of power supply circuit
 The design of driver relay circuit Arduino microcontroller serves as the brain of the
whole series. The microcontroller can be linked with other circuits to perform certain
functions. The Arduino microcontroller using IC ATMega328P-PU and works by
entering the program that has been created and ready for instantly use. Bluetooth
module used in this circuit is the type of HC-05, which requires a 3.3 V DC power
drawn from the Arduino microcontroller circuit (pin 3.3 V), Pin (TX 1) is a pathway
transmit / send data on the Bluetooth module HC-05 with microcontroller and Pin
(Rx 0) as the receive path / receiver data on the HC-05 Bluetooth module with
microcontroller while the path GND (Ground) is a path connecting the data between
HC-05 Bluetooth module with microcontroller circuit.

The system required a program that must be implemented to the microcontroller.


Programming language for the Arduino microcontroller is C language. To run the the
program and incorporate the program to the microcontroller needed software i.e. Arduino.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 47


OTP Based Smart Wireless Locking System Using ESP 8266

The mechanism of device is to input a digital keypad on the software on android Smartphone
first, if there is a command that is controlled by the user, the data will be instantly sent via a
Bluetooth network then the input received by the Hc-05 Bluetooth module that connected to
Arduino microcontroller. Arduino microcontroller circuit serves as a data processor that
controls the solenoid that previously connected to a relay that functions as an on / off switch.
Microcontroller is the central data in processing system. Microcontroller Arduino has been
equipped with an internal EEPROM, Flash memory, etc.

This section will examine the input password, and give orders to the LED and relay, to fill
out his program with the principle of ISP (In System Programming) so that the program can
be done without removing control. Power supply circuit is used to supply power throughout
the series; the power needed for the whole series is equal to 12 Volts DC. There are several
components in the power supply circuit, such as transformers that serve for lowering the
voltage. Capacitors are used as filters. And the last is the type LM7812 regulator IC that
functions as a regulator of the power output by 12 Volt . Relay has a function as an electronic
switch. Relay will be active when given input from the microcontroller, and serves as a
switch for the solenoid system. In this research, we use the electro mechanical solenoid 12 V
with supply voltage to 12V from Adaptor. Solenoid connected to the Relay, Relay connected
to the 5V pin of the Arduino Uno for supplying coil voltage and ground Relay to ground
Arduino Uno pin. LED circuit serves as indicator for electric current. LED will turn on when
current is passed from 12V DC solenoid in open-door condition, so the LED will be off when
the system / solenoid current is not passed in the locked state.

Access Control System:

Access control system is classified into a digital door-lock according to the method of
operation by an electrical control and mechanical door-lock analog. Digital door-lock can be
classified into card recognition, number input method, and bio information recognition
methods based on the recognition technology.

(1) Mechanical Door-lock It is a method for controlling opening and closing of the door in
an analog manner using a key. For the mechanical door-lock, installation cost is low
compared to the digital door-lock to use a lot. However, the user needs a key and the number
of keys are the same as he number of users. It’s a disadvantage if the key get lost or stolen to
re-issue the key which is expensive.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 48


OTP Based Smart Wireless Locking System Using ESP 8266

(2) Digital Door-lock Digital door-lock which is operated by electric control is card
recognition method, number input mode, and a biometric information recognition method,
and it has been developed continuously. The card recognition method has the advantage that
it is easy to use compared to the mechanical door lock by which recognized (such as an ID
card) medium which an IC chip is built, but it does not solve the drawbacks of the mechanical
door lock.

Digital door-lock number input method has solved the drawbacks of the method of card
recognition and mechanical door- lock. However, there is a disadvantage that anyone who
knows the password, then they can open and close the door. Biometric information
recognition method is a method of signature and physical characteristics that individuals
fingerprints, face, iris, and etc. which have to recognize individuals using behavioral
characteristics such as voice. They don’t have to put number on the door, so we have solved
some drawbacks of card recognition method and mechanical door-lock. However, there are
some drawbacks that installation cost is high.

Access Management System based OTP

Access management system of OTP-based is configured server ad OTP server, server control
door-lock, digital door-lock, and users. Server can generate OTP SEED or store user
information. OTP server provides a function to generate the value of the OTP based on OTP
SEED, and it transmits OTP value to user and control server. The door-lock OTP compares
the received two values OTP, then performs functions that are responsible for the opening and
closing commands transmission of digital door-lock. Digital door-lock number input method
are responsible for providing unique number and OTP value input. The users who have a
mobile phone use the lab and classroom.

In this chapter, we propose a model of access control system using an OTP to be able to
receive the entry permit and laboratory and lecture room of the campus without administrator.
The proposed scheme consists of the five stage, such as the registration, permission confirm,
OTP generation, user authentication, and access control phase.

Member Registration Procedure The step of registration is the first step for users to gain
access. It is a step to check the mobile phone of the person ownership registration on offline.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 49


OTP Based Smart Wireless Locking System Using ESP 8266

You will want to register the personal information name, student ID number, department such
as mobile phone number at this time, then it sends a random number to the mobile phone, for
verification of ownership of the mobile phone. After registering is performed, and then OTP
SEED value is stored on the server. These processes are as follows

. Step 1 : The user registers ID, Name, Po, and HP to the server.

Step 2 : Server compares user’s registration, ID, Name, Po, and HP. After verification, the
server generates a CN for user identification which is a value obtained by calculating the mod
nanosecond. In addition, the server sends to the user's mobile phone the CN′ the user
identification. •

Step 3 : User retransmits the CN received from the Server.

Step 4 : Server compare received CN with the first generated CN′ received from the User,
and if these two numbers are matched, the server, the number of both If they match, the
server generates H(ID| |RN) which can create the value of the OTP in the future.

To verify the Permissions:

This procedure is the stage to check out the permission for the facility before the user can use
a particular facility. The user would enter user’s unique number into a digital door-lock, and it
sends the unique number to the server via the door-lock control server. Server checks the
access permissions to the facility that the user applied for access by identifying the user and
facilities. If the user has a permission to use, then permission is granted. Otherwise,
permission deny.

Step 1 : The user inputs a digital door-lock ID to use the facility.

Step 2 : Digital door-lock send user’s ID and facility digital door-lock number(DN) to the
door lock control server for verification of permission.

Step 3 : The digital door-lock checks out the current state of the facility whether opening and
closing of digital door-lock. Then, it transmits to the server ID that is sent to identify the user
whether the opening and closing of the digital door-lock and DN.

Step 4 : Server stores all access attempts to analyze usage of the facility. Then, comparing ID
with DN', after verification, server sends the result of the confirmation of the authority of the
user (Yes / No) to the door-lock control server.
DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 50
OTP Based Smart Wireless Locking System Using ESP 8266

Step 5 : Door-lock control server checks the value of the result received from the server
(Yes / No). According to the results, the digital door-lock server send "command input
wait(Wait)" or "command initialization(Reset)" to the server.

Step of OTP generation:

This step is a step of generating the value of the OTP required for user authentication. When a
user completes a confirmation about accessing the facility, OTP is generated and sent to door-
lock server and the user simultaneously. At this time, the OTP value will be sent to the mobile
phone that users have registered in the registration stage.

Step 1 : The server sends the SMS to the user's mobile phone values OTP and digital door-
lock number DN to use the value of the OTP Seed, DN and generate the value of the OTP
that is required for user authentication. At this moment, the server generates an OTP value
number of 8-digit decimal in(32bit).

Step 2 : OTP server sends the DN and OTP value to the door-lock control server. At the same
time, the value of the OTP is sent to the user's mobile phone. OTP server deletes the value of
OTP in order to prevent open for exposing OTP value.

Step 3 : The user confirms OTP value with mobile phone.

User Authentication Procedure:

This is the stage that the user can get permission to use the facility. The user requests for
authentication by entering OTP value into the digital door-lock. By comparing the value of
the OTP that is input from the user and the value of the OTP sent from the OTP server in the
previous step, the door-lock control server authenticates the user.

Step 1: User enters OPT′ into the digital door-lock received by the mobile phone to be
authenticated.

Step 2 : Digital door-lock sends OTP′ and DN to the door-lock control server.

Step 3 : The door-lock control server checks the received DN, digital door-lock and
compares the value of OTP 'which is transmitted from the OTP generation server to the value
of the OTP.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 51


OTP Based Smart Wireless Locking System Using ESP 8266

Access Control Stage:

If user authentication is complete, the procedure is the step for performing the opening and
closing of the digital door-lock. Once authenticated by using the value of OTP, the result is
stored to the server.

Step 1 : If user authentication is completed, then Open/Close commands are transmitted. If


user authentication is rejected, Reset commands will be sent.

Step 2 : Standby digital door-lock opens or closes according to the Open/Close. Reset will be
sent whether input wait is more than 3 minutes or denial of access request is once.

Step 3 : Door-lock control server sends logging user information, door-lock information,
such as the operation command to the server.

Step 4 : Server stores all logging of access and command execution.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 52


OTP Based Smart Wireless Locking System Using ESP 8266

Project
DESCRIPTIO
N

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 53


OTP Based Smart Wireless Locking System Using ESP 8266

BLOCK DIAGRAM:

Fig 11: Block diagram

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 54


OTP Based Smart Wireless Locking System Using ESP 8266

Hardware Components
NODE MCU 8266:
NodeMCU V3 is an open-source firmware and development kit that plays a vital role in
designing an IoT product using a few script lines. Multiple GPIO pins on the board allow us
to connect the board with other peripherals and are capable of generating PWM, I2C, SPI,
and UART serial communications.
The interface of the module is mainly divided into two parts including both Firmware and
Hardware where former runs on the ESP8266 Wi-Fi SoC and later is based on the ESP-12
module. The firmware is based on Lua – A scripting language that is easy to learn, giving a
simple programming environment layered with a fast scripting language that connects you
with a well-known developer community.
And open source firmware gives you the flexibility to edit, modify and rebuilt the existing
module and keep changing the entire interface until you succeed in optimizing the module as
per your requirements.
 USB to UART converter is added on the module that helps in converting USB data to
UART data which mainly understands the language of serial communication. Instead
of the regular USB port, MicroUSB port is included in the module that connects it
with the computer for dual purposes: programming and powering up the board.
 The board incorporates status LED that blinks and turns off immediately, giving you
the current status of the module if it is running properly when connected with the
computer. The ability of module to establish a flawless WiFi connection between two
channels makes it an ideal choice for incorporating it with other embedded devices
like Raspberry Pi.

NodeMCU V3 Pinout:
NodeMCU V3 comes with a number of GPIO Pins. Following figure shows the Pinout of the
board.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 55


OTP Based Smart Wireless Locking System Using ESP 8266

There is a candid difference between Vin and VU where former is the regulated voltage that
may stand somewhere between 7 to 12 V while later is the power voltage for USB that must
be kept around 5 V.

Fig 12: Nodemcu pindiagram

Features:
1. Open-source
2. Arduino-like hardware
3. Status LED
4. MicroUSB port
5. Reset/Flash buttons
6. Interactive and Programmable

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 56


OTP Based Smart Wireless Locking System Using ESP 8266

7. Low cost
8. ESP8266 with inbuilt wifi
9. USB to UART converter
10. GPIO pins
11. Arduino-like hardware IO
12. Advanced API for hardware IO, which can dramatically reduce the redundant work for
configuring and manipulating hardware.
13. Code like arduino, but interactively in Lua script.
14. Nodejs style network API
15. Event-driven API for network applicaitons, which faciliates developers writing code
running on a 5mm*5mm sized MCU in Nodejs style.
16. Greatly speed up your IOT application developing process.
17. Lowest cost WI-FI
18. Less than $2 WI-FI MCU ESP8266 integrated and esay to prototyping development kit.
19. We provide the best platform for IOT application development at the lowest cost.

Arduino:
Open Source electronic prototyping platform based on flexible easy to use hardware and
software.
Arduino UNO:
This microcontroller is based on the ATmega328P. There are total of 20 pins (0-19) out of
which 6 are analog inputs, 14 are digital input output pins(6 pins provide PWM voltage)
which can also be used as general purpose pins, a ceramic resonator of frequency 16 MHz, an
USB connection, a power jack and a reset button. It has an operating voltage of 5V. It
contains everything needed to support a microcontroller.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 57


OTP Based Smart Wireless Locking System Using ESP 8266

Fig 13: Arduino uno board


We will study the Arduino UNO board because it is the most popular board in the Arduino
board family. In addition, it is the best board to get started with electronics and coding. Some
boards look a bit different from the one given below, but most Arduinos have majority of
these components in common.

RFID:
RFID technology emerged some time back and was not used that much because of lack of
standardization and high costs. Latest technologies have brought costs down and standards
are being developed. Today RFID is mostly used as a medium for numerous tasks including
managing supply chains, tracking livestock, preventing counterfeiting, controlling building
access, and supporting automated checkout. The use of RFID is limited by security concerns
and delays in standardization.

Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify


and track tags attached to objects. An RFID tag consists of a tiny radio transponder; a radio
receiver and transmitter. When triggered by an electromagnetic interrogation pulse from a
nearby RFID reader device, the tag transmits digital data, usually an identifying inventory
number, back to the reader. This number can be used to inventory goods. There are two
types. Passive tags are powered by energy from the RFID reader's interrogating radio
waves. Active tags are powered by a battery and thus can be read at a greater range from the
RFID reader; up to hundreds of meters. Unlike a barcode, the tag doesn't need to be within
the line of sight of the reader, so it may be embedded in the tracked object. RFID is one
method of (AIDC).

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 58


OTP Based Smart Wireless Locking System Using ESP 8266

RFID tags are used in many industries. For example, an RFID tag attached to an automobile
during production can be used to track its progress through the assembly line; RFID-tagged
pharmaceuticals can be tracked through warehouses; and implanting RFID microchips in
livestock and pets enables positive identification of animals.

Since RFID tags can be attached to cash, clothing, and possessions, or implanted in animals
and people, the possibility of reading personally-linked information without consent has
raised serious privacy concerns.[2] These concerns resulted in standard specifications
development addressing privacy and security issues. ISO/IEC 18000 and ISO/IEC 29167 use
on-chip cryptography methods for un traceability, tag and reader authentication, and over-the-
air privacy. ISO/IEC 20248 specifies a digital signature data structure for RFID
and barcodes providing data, source and read method authenticity.

This work is done within ISO/IEC JTC 1/SC 31 Automatic identification and data capture
techniques. Tags can also be used in shops to expedite checkout, and to prevent theft by
customers and employees.

Fig 14: RFID cards and reader

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 59


OTP Based Smart Wireless Locking System Using ESP 8266

Fig 15: RFID work

Fig 16: RFID system

RFID Security:
The major and primary security concern of RFID is that anyone can access the RFID data
because there is no line of sight problem and be able to gather data. In addition, people are
cloning RFID tags and using them just as the way it was done for credit cards before.
Preventing effective cloning of RFID tags is still an open and challenging problem. Criminals
with RFID readers could scan crowds for high-value banknotes. And terrorists could scan
digital passports to target specific nationalities. Currently the research is on-going on RFID
malware [8]. RFID malware can be grouped into three distinct categories: exploits, worms,
and viruses. RFID exploits are traditional hacking attacks that are identical to those found on
the Internet like buffer overflows, code insertion, and SQL injection attacks. RFID worms
and viruses are simply RFID exploits that copy the original exploit code to newly appearing
RFID tags. The main difference between the two is that RFID worms rely on network
connections whereas RFID viruses do not.

PIR SENSOR:
A passive infrared sensor (PIR sensor) is an electronic sensor that measures infrared (IR)
light radiating from objects in its field of view. They are most often used in PIR-based motion
detectors. PIR sensors are commonly used in security alarms and automatic lighting
applications.

PIR sensors detect general movement, but do not give information on who or what moved.
For that purpose, an active IR sensor is required.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 60


OTP Based Smart Wireless Locking System Using ESP 8266

PIR sensors are commonly called simply "PIR", or sometimes "PID", for "passive infrared
detector". The term passive refers to the fact that PIR devices do not radiate energy for
detection purposes.

They work entirely by detecting infrared radiation (radiant heat) emitted by or reflected from
objects.
Operating Principle:

All objects with a temperature above absolute zero emit heat energy in the form of radiation.
Usually this radiation isn't visible to the human eye because it radiates at infrared
wavelengths, but it can be detected by electronic devices designed for such a purpose.

Fig 17: PIR sensor

RELAY:
A relay is an electrically operated switch. It consists of a set of input terminals for a single or
multiple control signals, and a set of operating contact terminals. The switch may have any
number of contacts in multiple contact forms, such as make contacts, break contacts, or
combinations thereof.

Relays are used where it is necessary to control a circuit by an independent low-power signal,
or where several circuits must be controlled by one signal. Relays were first used in long-
distance telegraph circuits as signal repeaters: they refresh the signal coming in from one

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 61


OTP Based Smart Wireless Locking System Using ESP 8266

circuit by transmitting it on another circuit. Relays were used extensively in telephone


exchanges and early computers to perform logical operations.

The traditional form of a relay uses an electromagnet to close or


open the contacts, but other operating principles have been
invented, such as in solid-state relays which
use semiconductor properties for control without relying
on moving parts. Relays with calibrated operating characteristics
and sometimes multiple operating coils are used to protect electrical circuits from overload or
faults; in modern electric power systems these functions are performed by digital instruments
still called protective relays.

LCD:
Liquid Crystal Display, which we are using in our project is 16*2 LCD. This display consists
of 16 columns and 2 rows. This is programmed using the library <LiquidCrystal.h>.

Fig 18: LCD display


KEYPAD:
In our project we will be using 4X4 matrix membrane keypad. This 16 button keypad will
provide user interface component for Arduino project.
This is programmed using the library
<keypad.h>.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 62


OTP Based Smart Wireless Locking System Using ESP 8266

Servo Motor
The servo motor used in the project is SG90 Micro Servo weighing about 9g. This is
programmed using the library<servo.h>.

BLUETOOTH
The HC-05 Bluetooth Module has 6 pins named as Vcc, GND, TX, RX, Key, and LED. It is
pre-programmed as a slave, so there is no need to connect the Key pin. If you want to make it
as a MASTER then you have to check its pin configuration. There is major difference
between Master and Slave modes. In Slave mode the Bluetooth module cannot have a
connection. It can only accept incoming connections. After the connection is established the
Bluetooth module can transmit and receive data according to the mode it is running in. You
can simply use it in the Slave mode if you are using a phone to connect to the Bluetooth
module. The default data transmission rate is 9600kbps (kilo bytes per second).The range for
Bluetooth communication is usually 30m or less than 30m.

Different Stages

The proposed scheme consists of the five stage, such as the registration, permission confirm,
OTP generation, user authentication, and access control phase.
Member Registration Procedure: The step of registration is the first step for users to gain
access. It is a step to check the mobile phone of the person ownership registration on offline.
You will want to register the personal information name, student ID number, department such
as mobile phone number at this time, then it sends a random number to the mobile phone, for

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 63


OTP Based Smart Wireless Locking System Using ESP 8266

verification of ownership of the mobile phone. After registering is performed, and then OTP
SEED value is stored on the server.

To verify the Permissions: This procedure is the stage to check out the permission for the
facility before the user can use a particular facility. The user would enter user’s unique
number into a digital door-lock, and it sends the unique number to the server via the door-
lock control server. Server checks the access permissions to the facility that the user applied
for access by identifying the user and facilities. If the user has a permission to use, then
permission is granted. Otherwise, permission deny.

Step of OTP generation: This step is a step of generating the value of the OTP required for
user authentication. When a user completes a confirmation about accessing the facility, OTP
is generated and sent to door-lock server and the user simultaneously. At this time, the OTP
value will be sent to the mobile phone that users have registered in the registration stage.

User Authentication Procedure : This is the stage that the user can get permission to use the
facility. The user requests for authentication by entering OTP value into the digital door-lock.
By comparing the value of the OTP that is input from the user and the value of the OTP sent
from the OTP server in the previous step, the door-lock control server authenticates the user.

Access Control Stage: If user authentication is complete, the procedure is the step for
performing the opening and closing of the digital door-lock. Once authenticated by using the
value of OTP, the result is stored to the server.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 64


OTP Based Smart Wireless Locking System Using ESP 8266

Result
Analysis

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 65


OTP Based Smart Wireless Locking System Using ESP 8266

LED BLINKING:

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 66


OTP Based Smart Wireless Locking System Using ESP 8266

L293D INTERFACE WITH LOGIC GATE:

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 67


OTP Based Smart Wireless Locking System Using ESP 8266

L293D INTERFACE WITH LOGIC GATE WITH TWO INPUTS:

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 68


OTP Based Smart Wireless Locking System Using ESP 8266

LCD INTERFACE WITH ARDUINO:

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 69


OTP Based Smart Wireless Locking System Using ESP 8266

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 70


OTP Based Smart Wireless Locking System Using ESP 8266

FUTURE
WORK

FUTURE SCOPE:
The security level can be increased by adding a biometric fingerprint scanner. Also the lock
could be opened by sending password as a SMS to GSM module by the owner.

We can add life , wind and LPG sensors so that in case of accident , the doors will
automatically open.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 71


OTP Based Smart Wireless Locking System Using ESP 8266

based on “FACE”, “IRIS and Retina” Scanning for visual identification of the In addition to
this the future scope of this project is to develop smart bank Locker security system person.

CONCLUSION:
With development of IT technology, various services using OTP have been developed, and
various authentication techniques have been used in the field of access control system.
Current access control systems use card recognition method, number input method, and the
biological information recognition method. Recently, however, the combination of two
methods is used due to inconvenience. An administrator who has the issued ID card can open
DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 72
OTP Based Smart Wireless Locking System Using ESP 8266

or close the door in the facilities in current access control system of the campus. In addition,
there is the risk of theft of the card or misused problem. Whenever users try to use the
facilities there is inconvenience to require administrator. In case of a large number of users, it
can make inconvenient both users and administrator.

The proposed system is not a way to enter a static number digital card recognition method,
and it is a combination of a dynamic digital number input method using the OTP to enhance
the user authentication. The proposed access control system is able to obtain permission
without administrator’s control. In the proposed method, in order for the user gain access,
user must know specific number of their own and posses registered phone.

Therefore, our proposed system have solved the problem of loss or theft in current access
control system by using OTP value on user’s mobile phone. The installation cost is cheap and
it is a guarantee to secure for multi users to access management system.

REFERENCE:
[1] Oke Alice O., Adigun Adebisi A., Falohun Adeleye S., and Alamu F. O.,
“DEVELOPMENT OF A PROGRAMMABLE ELECTRONIC DIGITAL CODE LOCK
SYSTEM” , International Journal of Computer and Information Technology (ISSN: 2279 –
0764) Volume 02– Issue 01, January 2013 .

[2] Mohammad Amanullah “MICROCONTROLLER BASED REPROGRAMMABLE


DIGITAL DOOR LOCK SECURITY SYSTEM BY USING KEYPAD & GSM/CDMA

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 73


OTP Based Smart Wireless Locking System Using ESP 8266

TECHNOLOGY”, IOSR Journal of Electrical and Electronics Engineering (IOSR - JEEE),


Volume 4, Issue 6 (Mar. - Apr. 2013).

3] Ashish Jadhav, Mahesh Kumbhar, Mahesh Walunjkar, “FEASIBILITY STUDY OF


IMPLEMENTATION OF CELL PHONE CONTROLLED, PASSWORD PROTECTED
DOOR LOCKING SYSTEM” , International Journal of Innovative Research in Computer
and Communication Engineering, Vol. 1, Issue 6, August 2013.

[4] P. K. Gaikwad, “DEVELOPMENT OF FPGA AND GSM BASED ADVANCED


DIGITAL LOCKER SYSTEM”, International Journal of Computer Science and Mobile
Applications, Vol.1 Issue. 3, September2013

. [5] Annie P. Oommen, Rahul A P, Pranav V, Ponni S, Renjith Nadeshan, “DESIGN AND
IMPLEMENTATION OF A DIGITAL CODE LOCK”, International Journal of Advanced
Research in Electrical, Electronics and Instrumentation Engineering, Vol. 3, Issue 2, February
2014.

[6] Arpita Mishra, Siddharth Sharma, Sachin Dubey, S.K.Dubey, “PASSWORD BASED
SECURITY LOCK SYSTEM”, International Journal of Advanced Technology in
Engineering and Science, Volume No.02, Issue No. 05, May 2014.

[7] E.Supraja, K.V.Goutham, N.Subramanyam, A.Dasthagiraiah, Dr.H.K.P.Prasad,


“ENHANCED WIRELESS SECURITY SYSTEM WITH DIGITAL CODE LOCK USING
RF &GSM TECHNOLOGY”, International Journal of Computational Engineering Research,
Vol 04, Issue 7, July – 2014.

[8] Kawser Wazed Nafi, Tonny Shekha Kar, Sayed Anisul Hoque, “ AN ADVANCED
DOOR LOCK SECURITY SYSTEM USING PALMTOP RECOGNITION SYSTEM”,
International Journal of Computer Applications (0975 – 8887), Volume 56– No.17, October
2012.

[9] Shraddha Pramod Nikumbh, Vijay D. Chaudhari, Dr. K. P. Rane, “FINGERPRINT


RECOGNITION WITH MONITORING ON REMOTE WHATS APP”, International Journal
on Recent and Innovation Trends in Computing and Communication, Volume: 4 Issue: 5,
May 2016.

[10] Miss Amrita Singh, Mr. A D Vishwakarma, “REAL TIME ECG PARAMETER
IDENTIFICATION AND MONITORING”, International Journal on Recent and Innovation
Trends in Computing and Communication, Volume: 4 Issue: 5, May 2016.

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 74


OTP Based Smart Wireless Locking System Using ESP 8266

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 75


OTP Based Smart Wireless Locking System Using ESP 8266

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 76


OTP Based Smart Wireless Locking System Using ESP 8266

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 77


OTP Based Smart Wireless Locking System Using ESP 8266

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 78


OTP Based Smart Wireless Locking System Using ESP 8266

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 79


OTP Based Smart Wireless Locking System Using ESP 8266

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 80


OTP Based Smart Wireless Locking System Using ESP 8266

DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING 81

You might also like