You are on page 1of 5

Proceedings of the 2nd International conference on Electronics, Communication and Aerospace Technology (ICECA 2018)

IEEE Conference Record # 42487; IEEE Xplore ISBN:978-1-5386-0965-1

An Automated Garage Door and Security


Management System
(A dual control system with VPN IoT & Biometric Database)

R. JENIFER PRARTHANA A.MOHAMED DHANZIL,N.I. MAHESH ,


Assistant Professor, S.RAGHUL
Department of ECE, Student,
Sri Ramakrishna Engineering College, Sri Ramakrishna Engineering College,
Coimbatore. Coimbatore.
E-mail: jenifer.r@srec.ac.in E-mail: mohameddhanzil.1402118@srec.ac.in

commonly referred to as the fourth industrial


Abstract – Internet of Things (IoT) have revolution. This has turned the traditional way in which
revolutionized the entire way in which the industry the industries have been operating all these days.
operates. The authenticity and entry access to certain It is apparent that certain parts of the industry
places of the industry plays a crucial role in must be provided with a secured access [] and must
maintaining the secrecy of the operations. Therefore never be open to all to safeguard against spoofing and
providing limited access to such confidential places industrial spying. In such situations the need for a
proves to be seemingly vital. The proposed work highly impressive security system becomes alarmingly
provides a dual security mechanism against vital.
unauthorized entry and hence enhances the integrity This work aims to provide a security access to
of the system. This system thus eradicates the common the restricted and most protected parts of the industry
security threats such as Spoofing, Repudiation and through a system that manages the security of the arena.
trafficking from evaders especially in the current Several automation models and smart door management
scenario of industry 4.0. This system uses two systems were considered in modeling the system with
techniques for the controlled access. One via a the required inclusion relevant for the industrial arena.
fingerprint access that utilizes the raspberry pi3 and a
biometric database system for control. This method is II. RELEVANT WORKS
a thorough hardware based solution and could be Several automation systems for secured access
utilized when there is a physical presence of a person. have been introduced in this era of smart phones.
In case if the authenticator is not available in the Initially several door lock mechanisms were introduced.
arena, the alternate mechanism would be followed to It is a combo of RFID for maintaining the
provide a secured access authenticity through Virtual authentication data, LCD and motor part for
Point Network (VPN) & IoT. The utility of VPN maintaining door motions, sensors for inquiring the
facilitates the personnel to prove his / her credentials environment, an inter communiqué module, and control
from any remote location. Thus this dual mode system module for establishing overall control. Zigbee [2]
provides a highly credential entry / exit system in an module was used in commencing the overall operations.
industrial arena. Another door lock system with Raspberry pi
technology [3] was use where cameras, keypad and pi-
Keywords — Smart system, Authentication, Security, IoT, lids were employed to be acquainted with authenticator
VPN, Biometric Database System, Python, Raspberry Pi3,
by ransoming them a user-id. In this streak, the
HTML
approved individuals alone could access the doors.
I.INTRODUCTION An alternate system that comprises of an
In this contemporary era the Internet of Things (IoT) integrated NFC potentials of a smart phone. This acts as
has spread its paws in almost all the walks of life. The a module to open the entry point by a logical link
role of Computers, Smart gadgets have paved route for control mechanism. The permission access is granted
more personalized systems. Hence it turned out to be with respect to password or a code matching.
prevailing part of almost all the industries. In addition, a system was proposed [8] with
Industry 4.0 is the cutting edge and current relevance to the plan of GSM digital entry exit system
trend of automation and data exchange in with the utility of PIC platform. A 5-digit pass code is
manufacturing technologies. It comprises of a high used to lock/unlock the entry point [9]. If the
level security systems, the Internet of things, cloud authenticator provides the right pass code the proprietor
computing and cognitive computing. Industry 4.0 is

978-1-5386-0965-1/18/$31.00 ©2018 IEEE 1468


Proceedings of the 2nd International conference on Electronics, Communication and Aerospace Technology (ICECA 2018)
IEEE Conference Record # 42487; IEEE Xplore ISBN:978-1-5386-0965-1
is notified by the system setup via communication opening and closing of the garage entries is controlled
module. by the way in which the python code operates.
A system is proscribed by a PIC
microcontroller 16F76 [7]. It congregates the
information from the sensors. It makes a decision and
sends an SMS to the appropriate number by the aid of a D) Virtual Network Computing (VNC) Viewer
GSM modem. It do comprises of a cluster of sensors to It is a graphical desktop sharing system which works in
the remote frame buffer protocol to take in control of
detect smoke and other obstacles [9]. If any the systems attached to it. Since it is platform
interruptions like this are recognized, then PIC will independent and provides option for multiple users
send a SMS to the proprietor and another SMS to the connectivity at same instance it is much preferred in the
nearby patrol. recent times for connecting with the Raspberry Pi 3.
An intelligent system for home based security Here in this design
with the aid of the radiance sensitive contextual model
is used [10]. Such system enables tracking and the connectivity establishments for the entire system
detection of intruder and it is based on providing home takes place with the VNC. In addition to this it also
security. For this purpose, a face recognition technique supports to view the interior code runs in the raspberry
is utilized to identify the intruder and on finding him, pi 3.
an image of the intruder is sent on the owner mail id for
further action. The implementation of this system also IV OPERATION
includes the comparison of different approaches for A) When the authenticator is available to provide the
object tracking and then used an illumination-sensitive Credentials
background modeling approach for the proposed The finger print of the authenticator is stored
security system. But this system doesn’t use password in the database of the finger print sensor system [1].
for identification. More than thousand entries could be sorted in the data
base that is being used here. Serial communication
III PROPOSED MODEL UART port is utilized to interface this sensor module to
A) Raspberry Pi 3 the central control Raspberry Pi 3. The Coding that is
The Raspberry Pi 3 possess an inbuilt quad-core ARM done with the aid of the Python is used to control the
Cortex-A 53 processor and its performance is far more access for provisioning of entry and exit. The
superior when compared to that of its predecessor. The Raspberry Pi 3 is connected with the system module in
options for wifi and Bluetooth connectivity in addition order to establish the connectivity between them.
to 16 GB SD card inclusions makes it to be the unique
choice for the proposed model.

B) Finger print Sensor


A finger print sensor with a database for the storage of
the authenticated finger prints to prove the credentials
of the secured user is the vital integral part of this
design. The specialty of the system lies in the fact that
more than hundred samples could be stored in the
system. This setup is connected to the Raspberry Pi 3
module via a serial UART.

C) DC Motor
The DC motor with the following specification a of
24V dc control input voltage, a current value of 3.5
Amperes, a supply voltage of 3.8 V and a speed of 2600
rpm is used to open and close the garages.

D) Python Idle
It’s a main module in the software package requirement
for this working model. It’s a high level inferred
programming language that aids the general purpose
programming. Since this provides code readability and
syntax that allows programmers to prompt perceptions Figure 1: Block Diagram for the overall module
in a small space scenario it is very much appropriate for
the raspberry pi 3 milieu. Here the overall control of This connectivity is established via VNC viewer. This
aids the other functionalities of the system to be

978-1-5386-0965-1/18/$31.00 ©2018 IEEE 1469


Proceedings of the 2nd International conference on Electronics, Communication and Aerospace Technology (ICECA 2018)
IEEE Conference Record # 42487; IEEE Xplore ISBN:978-1-5386-0965-1
diminished so that the contents of the Raspberry Pi 3 Raspberry Pi 3. Once a particular URL is fixed for the
could be viewed for further operations. With respect to open and close tabs, the authenticated user can provide
the code that is being executed and the verification of the credentials of entry and exit of the protected arena
the finger print saved in the database, the entry and exit though he/she is far away from the desired locality. It is
of the industrial garage or any secured part of the very much feasible and handy with the great deal of
industry could be closed or opened within a restricted availability of smart phones [4] these days.
authenticated mechanism. This functionalities could be
utilized when the authenticator is available to provide
his /her fingerprint.

V. ENACTMENT OF THE MODEL


The figure 3 depicts the connection formation
for the model.

Figure 3. Basic setup

The figure 4 depicts the feeding of fingerprints


as credential for authentication. As stated previously
more than thousand feeds could be provided to the
database associated with the fingerprint sensor. Figure 5
depicts random checks for the feeds and inquires how
data is fed in the system.

Figure 2. Flowchart for the operation of the


Proposed model Figure 4. Feeding fingerprints to the database

B) When the authenticator is in a remote location


The Virtual Private Network scenario could be
utilized to pass through / exit the garage when the
authenticator is in a remote location and he / she is not
physically present to provide the credentials of
authenticity. The VPN setup requires the wholesome set
of following steps: i) creation of the webpage with
HTML Codes to create Open and Close Tabs ii)
allocation of a particular fixed Universal Resource
Locator (URL) iii) Utilization of VNC viewer to Figure 5. Initial checkups for the feed
establish the connectivity between system resource and

978-1-5386-0965-1/18/$31.00 ©2018 IEEE 1470


Proceedings of the 2nd International conference on Electronics, Communication and Aerospace Technology (ICECA 2018)
IEEE Conference Record # 42487; IEEE Xplore ISBN:978-1-5386-0965-1
The Raspberry Pi 3 is loaded with the python Figure 7. HTML coding for web page creation
code for opening and closing the garage shutters of a
restricted arena. Figure 8 and 9 depicts the final outcomes of
The sample code feed for the process is given as the process. The authenticator in a remote location
below: handles the shuttering process with the tab based VPN
Import RPi.GPI0 as GPI0 setup.
Import time
Import serial
Import time
#sudo systemct1 stop serial-getty@ttyAMA0.service
Port = serial.Serial(“/dev/ttyUSB0”,
baudrate=57600,timeout=3.0)
GPI0.setmode(GPI0.BCM)
GPI0.setup(17,GPI).IN,pull_up_down=GPI0.PUD_DO
WN)
Try :

Figure 8. Opening of the shutters with remote access

Figure 6 Python Coding module in Raspberry Pi 3


While (1):
rcv= rcv=port.read(50)
if ((GPI0.input(17)==1 or rcv!=’ ‘) and count==0);
print ‘open’ Figure 9. Closing of shutters with the remote access
GPI0.output(6,True)
GPI0.output(12,0)
Count=1 VI CONCLUSION
Elif((GPI0,input(22)==1 or rcv!=’’) We do live in an era of modernization in
GPI0.output(12,False) which there is an evolution of new technique for each
Count=0 and every hour. The need for safeguarding certain
Except: proprietary information and secrecy of the organization
GPI0.cleanup () becomes quite vital these days. In this circumstance,
having an authenticated entry exit system in industries
The figure 7 shows how the webpage is created through could be easily done through this effective model. The
the html codes. The page comprises of the open and dual access mode followed by the system has two
close tabs. The tabs when clicked would provide the schemes: i) When the authenticator is available to prove
credentials for the entry exit process his / her credential to have an access of the desired
arena. ii) When the authenticator is in a remote
location. For all these circumstances this system proves
to be an effective one that serves the purpose of all-
round automation in an entry exit access system.

REFERENCE
[1] Anil K Jain, Sunpreet S Arora, Kaicao, Lacey Best, “Fingerprint
recognition of young children”, IEEE Transaction On Information
Forensic And Security, December 2016.

978-1-5386-0965-1/18/$31.00 ©2018 IEEE 1471


Proceedings of the 2nd International conference on Electronics, Communication and Aerospace Technology (ICECA 2018)
IEEE Conference Record # 42487; IEEE Xplore ISBN:978-1-5386-0965-1
[2] S. Chitnis, N. Deshpande, and A. Shaligram, "An investigative
study for smart home security: Issues, challenges and
countermeasures," Wirel. Sens. Netw, vol. 8, pp. 61-68, 2016.

[3] A. Lee, D. Tyroler, H.-J. Chen, and H. Yuk, "Home automation


system monitored by security system," ed: Google Patents, 2016.

[4] C.-H. Hung, Y.-W. Bai, and J.-H. Ren, "Design and
implementation of a single button operation for a door lock control
system based on a near field communication of a smartphone," in
Consumer Electronics-Berlin (ICCE-Berlin), 2015 IEEE 5th
International Conference on, 2015, pp. 260-261.

[5]I.-K. Hwang and J.-W. Baek, "Wireless access monitoring and


control system based on digital door lock," IEEE Transactions on
Consumer Electronics, vol. 53, 2007.

[6] Y. T. Park, P. Sthapit, and J.-Y. Pyun, "Smart digital door lock for
the home automation," in TENCON 2009-2009 IEEE Region 10
Conference, 2009, pp. 1-6.

[7] C.-H. Hung, Y.-W. Bai, and J.-H. Ren, "Design and
implementation of a door lock control based on a near field
communication of a smartphone," in Consumer Electronics-Taiwan
(ICCE-TW), 2015 IEEE International Conference on, 2015, pp. 45-
46.

[8] A. Ibrahim, A. Paravath, P. Aswin, S. M. Iqbal, and S. U.


Abdulla, "GSM based digital door lock security system," in Power,
Instrumentation, Control and Computing (PICC), International
Conference, 2015, pp. 1-6.

[9] S. R. Khan, A. Al Mansur, A. Kabir, S. Jaman, and N.


Chowdhury, "Design and Implementation of Low Cost Home
Security System using GSM Network," International Journal of
Scientific & Engineering Research, vol. 3, p. 1, 2012.

[10] M. P. V. Kale and S. D. Sharma, "Intelligent Home

Security System using illumination sensitive background model,"


International Journal of Advance Engineering and Research
Development (IJAERD), vol. 1, 2014.

978-1-5386-0965-1/18/$31.00 ©2018 IEEE 1472

You might also like